Preventing Theft of Quality of Service on Open Platforms Kwang-Hyun Baek and Sean W. Smith Department of Computer Science Dartmouth College

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Vpn-info.com.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Firewalls Uyanga Tserengombo
Chapter 6 Security Kernels.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Enforcement of Security Policy Compliance in Virtual Private Networks Prof. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Sony White House Anthem Lockheed Aramco Bushehr nuclear reactor NSA Hacked Facebook Hacked Apple,Google,Microsoft,
Chapter 7 HARDENING SERVERS.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Course 201 – Administration, Content Inspection and SSL VPN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
{vp, sra, Security in Differentiated Services Networks Venkatesh Prabhakar Srinivas R.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Windows 7 Firewall.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Chapter 2 Securing Network Server and User Workstations.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Chapter 6: Securing the Local Area Network
Wireless and Mobile Security
Module 10: Windows Firewall and Caching Fundamentals.
Trusted Operating Systems
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Cryptography and Network Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Basic Edge Core switch Training for Summit Communication.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Hardware-rooted Trust for Secure Key Management & Transient Trust
Trusted Computing and the Trusted Platform Module
Working at a Small-to-Medium Business or ISP – Chapter 8
100% Exam Passing Guarantee & Money Back Assurance
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Security Issues.
Trusted Computing and the Trusted Platform Module
Firewalls.
Presentation transcript:

Preventing Theft of Quality of Service on Open Platforms Kwang-Hyun Baek and Sean W. Smith Department of Computer Science Dartmouth College

This Talk Goal: Prevent insider’s theft of QoS while still permitting the user to be root Motivation: Dartmouth’s plan for traffic convergence Summary  Overview of threat model and Diffserv  Our solution Make end nodes trustworthy  Trusted hardware and high assurance OS  Network authentication Distribute Diffserv classifier and marker to end nodes  Security and performance discussions  Future work

Threat Model End node user with root account and physical access  Authenticated and authorized  Can install/modify hardware Can modify network driver, firmware, ROM  Can install/modify software, including kernel Can modify outgoing packets Can modify a program’s packet generation Can use arbitrary port for applications Can spoof MAC address and IP address

Background: Diffserv Differentiated Services At the Ingress/Egress nodes  Classify packets via packet inspection  Meter the temporal state of the packet (i.e., rate)  Mark the packets’ Diffserv Code Point (DSCP) according to its class  Shape the packets (drop or delay) At other nodes, Per-Hop Behavior (PHB) is applied based on DSCP  Assured Forwarding  Expedited Forwarding Problem  End nodes are not trusted  Network can gain only limited knowledge

End Node Class Platinum (Video streaming) layer-3: UDP application: RTP ip set DSCP 46 Class Best Effort ip set DSCP 0 Ingress Network Node Hacked File Sharing app Video Streaming Misbehaving Application

Misbehaving End Node End Node MAC: 00:00:00:00:00:00 Spoofed MAC: 00:04:00:00:00:00 Class Platinum (Priority Client) source MAC 00:04:00:00:00:00 ip set DSCP 46 Class Best Effort ip set DSCP 0 Ingress Network Node File Sharing Malware

Our Solution Apply trusted computing to QoS  Move Diffserv classifier and marker to each end node Network’s QoS rule: hash of program binary and DSCP  Use high assurance OS to create a configuration that classifies and marks the packets according to the network’s rule  Use trusted hardware to bind the configuration to authentication secret If classifying and marking is modified, access to the authentication secret is denied  Accessing the network  classifying and marking according to the network’s QoS rule

Building Block: Trusted Platform Module (TPM) Designed by Trusted Computing Group (TCG) Measures the hardware and software configuration of the host  Platform Configuration Registers Attests the host’s configuration to a remote party Stores RSA keys Binds the stored RSA keys to a configuration Problem  Root can spy on memory used by the TPM  Bound keys need to be changed too often if the configuration includes programs that need frequent updates  Root can change code after the TPM has measured it  Need for high assurance OS with restricted access control and integrity protection

Building Block: High Assurance OS SELinux Linux Security Module (NSA)  Role-based mandatory access control Compartmentalization blocks memory spying Robust access control over devices, memories, files, socket structures Enforcer LSM (Marchesini, et al)  Makes TPM-bound keys more usable Long term (hardware, OS, Admin’s public key, SELinux policy) protected by TPM-bound key Medium term (programs, kernel modules, libraries, linkers) protected by the LSM and Security Admin—a third party who issues signed database of trustworthy applications  Integrity Protection (modification results in TPM lock or kernel panic) Short term (data, configuration) protected by encrypted file system

Distributed Classifier and Marker QoS Admin  Issues signed database of program binary’s hash and the DSCP it should receive Modified LSM  The kernel keeps track of which opened socket belongs to which program (Socket monitor)  The kernel marks each packet’s DSCP at the kernel’s IP layer using Netfilter (standard Linux firewall) hooks, according to the QoS Admin’s signed database (DSCP marker)

Socket Monitor Is App X in Security Admin's Policy? App X calls socket syscall Is App X found in QoS Admin's Policy? Log and return (will be dropped) YES NO Record socket, h(X), default DSCP NO Record socket, h(X), DSCP

DSCP Marker Is the packet coming from a recorded socket? Outgoing packet enters IP Layer Modify the packet's DSCP to the recorded value YES Drop NO

Adding Client Authentication Uses TPM-bound key (EAP-TLS)  EAP-TLS authentication requires the knowledge of the private key During certification, the CA checks the long term configuration of the host To access the TPM-bound private key to authenticate itself to the network, an end node must do the following:  Be in the long term configuration to which the key is bound to Run Enforcer LSM, SELinux, and our socket monitor and DSCP marker Run valid Security Admin and QoS Admin’s databases (their signature is validated) SELinux is using a known, trustworthy SELinux policy  Have not modified important medium term configuration

Stopping Misbehaving Application Class Platinum Linphone Gnomemeeting ip set DSCP 46 Class Best Effort ip set DSCP 0 Hacked File Sharing End Node Linphone (VoIP) Class Blacklist Drop

Stopping Misbehaving End Node Hacked Wireless Driver and its firmware to gain better QoS End Node Configuration mismatch results in TPM lock or kernel panic Cannot access the authentication private key! Class Platinum Linphone Gnomemeeting ip set DSCP 46 Class Best Effort ip set DSCP 0 Class Blacklist Drop

Performance evaluation IBM T40, Pentium M 1.3 GHz, 256 MB Overhead caused by socket monitor  4.86 ms average delay for linphone Overhead caused by DSCP marking  ms average delay for linphone ITU recommends maximum delay of 150 ms for voice system  The Overhead is easily absorbed

Security Considerations Forked children inherit sockets  QoS Admin’s job to control the QoS level of the programs that fork and exec other programs  Another option: least privilege principle for shared socket SELinux should prohibit low-privileged programs from piping packets to high-privileged programs Hardware spying on TPM  No Plug-and-Play, USB/Firewire devices should be disabled at the kernel level EAP-TLS results in session keys for encryption and integrity protection  Compartmentalize to block spying on session keys  No man-in-the-middle attack between ingress node and end node

Future Work Attestable, cleaner, easy-to-understand policies for SELinux Migratable QoS and Security Admin database Database version check and automatic update  Boot-time generation of attribute certificate containing the policy version, signed by the TPM-bound key  Quarantined database updating using VLAN Bigger scale testing Performance evaluation depending on system loads Code will be available at  Or me until then for the kernel patch

Thanks We thank our sponsors—Mellon Foundation, Cisco, Intel, and the Office for Domestic Preparedness (U.S. Dept of Homeland Security)

Questions?