PCIe Trusted Configuration Space

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Auxiliary Display Platform in Longhorn Andrew Fuller Lead Program Manager Mobile PC microsoft.com Microsoft Corporation.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Lesson 9: Creating and Configuring Virtual Networks
Networking and Internetworking Devices Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009.
Windows Server Scalability And Virtualized I/O Fabric For Blade Server
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Windows Media DRM Device Porting Kit Review Scott Plette Program Manager Media Technology Group microsoft.com Microsoft Corporation.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
PCIe 2.0 Base Specification Protocol And Software Overview
Understanding Active Directory
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Secure Startup Hardware-Enhanced Security Peter Biddle Product Unit Manager Windows Security Microsoft Corporation Stacy Stonich Program Manager Windows.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Mahesh Wagh Intel Corporation Member, PCIe Protocol Workgroup.
New Document Lifecycle Opportunities N. Gregg Brown Lead Program Manager Digital Documents microsoft.com Microsoft Corporation.
Windows Server Licensing
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Dynamic Partitioning in Windows Longhorn Santosh Jodh Software Design Engineer Windows Kernel Platform Group microsoft.com Microsoft Corporation.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Unified EFI Update Tony Pierce President United EFI Forum microsoft.com.
The University of New Hampshire InterOperability Laboratory Introduction To PCIe Express © 2011 University of New Hampshire.
Chapter 13 – Network Security
Trusted Computing Platform Alliance
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
PCI Express Update for Windows Longhorn
Enabling the Digital Lifestyle: Navigating Public Policy Challenges Skip Pizzi Manager, Technical Policy Media/Entertainment & Technology Convergence skippiz.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Abstract & Main Goal המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory The focus of this project was the creation of an analyzing device.
Network Topology: Connectivity Visualized Dennis Morgan Lead Program Manager Network Experience microsoft.com Microsoft Corporation.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Microsoft Virtual Server: Overview and Roadmap Mike Neil Product Unit Manager Windows Virtualization microsoft.com Microsoft Corporation.
Enhanced Storage Architecture
Error Management Solutions Synergy With WHEA John Strange Software Design Engineer Core OS microsoft.com Microsoft Corporation.
Network Location Awareness Vision And Scenarios Tracey Yao Program Manager Windows Wireless Networking microsoft.com Microsoft Corporation.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
The Next Generation Designed for Windows Logo Program: An Introduction Jon Morris Program Manager Windows Logo Program microsoft.com Microsoft.
Web Services Security Patterns Alex Mackman CM Group Ltd
Goodbye SMI - ACPI and Graphics Driver/System Firmware Interface Paul Blinzer Staff Engineer ATI Research, Inc.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
NDIS 6.0 Roadmap and Value Statement
Internet Protocol Storage Area Networks (IP SAN)
Integrating the Healthcare Enterprise Improving Clinical Care: Enterprise User Authentication For IT Infrastructure Robert Horn Agfa Healthcare.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 15: IO Virtualization
Testing PCI Express Generation 1 & 2 with the RTO Oscilloscope
Why VT-d Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing.
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Chapter 3: Windows7 Part 4.
Managing Specialized Devices With Windows Embedded Device Manager 2011
Operating Systems: A Modern Perspective, Chapter 3
Cengage Learning: Computer Networking from LANs to WANs
NVMe.
Microsoft Data Insights Summit
Presentation transcript:

PCIe Trusted Configuration Space Joe Cowan Computer Systems Architect Technology Solutions Group Joe.Cowan @ hp.com Hewlett-Packard Company

Session Outline TCS ECN Background & Key Terms Trust Issues with PCIe Platforms TCS ECN Details Trusted Config Space and TCS Transactions Trusted Config Access Mech (TCAM) Standard vs Trusted Config Access New Capability Structures TCS Support in Root Ports, Switches, & Bridges TCS “Does not…” List Example Trusted Computing Platform Revisiting the Trust Issues Key Takeaways/Call to Action Questions

TCS ECN Background & Key Terms Trusted Configuration Space (TCS) is an ECN* for the PCI Express™ (PCIe™) 1.1 Base spec Brought to the Protocol Working Group in May 2004 Refined in a Sub-Workgroup through December 2004 Currently out for 30-day PCI-SIG® member review Final approval targeted for Summer 2005 Key terms Trusted Device: An Endpoint, Root Port, or Switch that implements Trusted Config Space Trusted Software: software that has a reliably established notion of identity Trusted Software Environment: a protected environment for running Trusted Software * Engineering Change Notice

High-Level Trust Issues An increasing number of systems have critical private data that needs protecting Financial Services and Banking Healthcare Personal Computers Security technologies typically use unique identifiers and keys to provide protection Care must be used to avoid the use of unique identifiers to be linked with Personally Identifiable Information (PII) TCS provides a means to isolate unique identifiers so that they cannot be linked to PII

Trust Issues with Existing PCIe Platforms Trusted Device perspective Did the Request I received come from Trusted Software? Did the Request I received come from some (untrusted) device instead of the Root Complex? Trusted Software perspective Am I operating in a Trusted Software Environment? Am I accessing a Trusted Device? Is the device virtualized in an authorized manner? Has the device been repurposed? CPU Root Complex Memory Switch End point 1 End point 2 End point 3 Will revisit these issues near the end to determine which are addressed by TCS and to what extent.

TCS ECN Details: TCS and TCS Transactions TCS is a new PCIe address space, distinct from I/O, Memory, Message, and (standard) Config 2 new PCIe Requests: Trusted Config Read & Trusted Config Write Parallels with (standard) Configuration Space: Single byte-enabled DWORD payload per transaction ID-based (Bus/Device/Function) routing 4KB space per Function Contrasts with (standard) Configuration Space: TCS is optional for Endpoints, Switches, & Root Ports A distinct software access mechanism for TCS (TCAM) TCS transactions are usable only after standard Config transactions have assigned hierarchy bus numbers

Trusted Config Access Mech (TCAM) The TCAM is patterned after the PCIe Enhanced Config Access Mechanism (ECAM), but is distinct Parallels with the ECAM: Memory-mapped regions, 1 MB per bus number Base Addrs & Bus number ranges reported by firmware Single or multiple TCAMs per platform or partition Each TCAM maps n bus number bits, with 1 ≤ n ≤ 8 Supports single- and multi-segment models Platforms can provide firmware access in lieu of TCAMs Contrasts with the ECAM: Usable only by the Trusted Software Environment (specifics are outside the scope of the specification) On some platforms, usable only when enabled by a hardware signal from a Trusted Platform Module (TPM)

Standard vs Trusted Config Access Standard Software Environment Trusted Software Environment Standard Device Driver Trusted Device Driver ECAM TCAM Standard Device Trusted Device Standard Config Space regs Trusted Config Space regs Standard Config Space regs Trusted Config Space regs Issue: how can Trusted Software verify that its standard Config & Trusted Config accesses are indeed reaching the same Device?

New Capability Structures Standard Config Space Capability Structures Config Access Correlation (CAC) Capability Struct: used to verify correlation between Trusted & Standard Config Spaces; existence also indicates the existence of a Trusted Config Space in this Function Trusted Config Space Capability Structures Config Access Correlation (CAC) Trusted Capability Struct: used to verify correlation between Trusted & Standard Config Spaces; required by all Trusted Devices Vendor-Specific Trusted Capability (VSTC): similar to a Vendor-Specific Extended Capability in standard Config Space, however vendors can define “public” VSTCs, which other vendors are permitted to use. “Private” VSTCs can also be defined.

Indicating TCS-Related Capabilities Firmware indicates the presence of TCAMs Root Ports and Switches indicate their ability to route TCS Requests via a new bit in the PCIe Capabilities Register in standard Config Space Functions indicate their implementation of a Trusted Config Space by the existence of a new CAC Capability Struct in standard Config Space

TCS Support in Root Ports, Switches, & Bridges Adding Root Port and Switch routing support for TCS Requests is relatively easy: Recognize two new Transaction Layer Packet types Handle TCS Request routing identically to standard Type 1 Config Request routing Indicate this support by setting one bit in the PCIe Capabilities register PCIe to PCI/PCI-X Bridge routing support for TCS Requests is not defined. There are no plans to add TCS to PCI-X or Conventional PCI. Root Ports, Switches, & Bridges are permitted to implement Trusted Config Space as Completers, but the value of doing so is debatable Root Ports and Switches are not required to implement Trusted Config Space in order to support TCS routing

TCS Itself Does Not … Provide a complete solution for building Trusted Computing Environments Substantial additional support required from hardware, OSs, drivers, applications, & firmware (some platforms) Handle Authentication (confirmation of identity) One envisioned approach is to include certificates or digital signatures in VSTCs Prohibit virtualization of Trusted Devices Virtualization is primarily a platform policy Provide high-bandwidth access to/from a device TCS itself is a low-bandwidth channel on most platforms, but can be used as a secure channel to set up high-bandwidth channels, e.g., that use encryption

Example Trusted Computing Platform The Trusted Computing Group™ has specified a Trusted Platform Module (TPM), which as part of a trusted subsystem can provide: Protected storage Protected capabilities Authentication of the platform Measurement of platform integrity Attestation of platform integrity The TPM can be used to assert a hardware signal that enables the TCAM for use only if/when platform integrity has been attested CPU Root Complex Memory TCAM TPM Switch End point 1 End point 2 End point 3

Revisiting the Trust Issues: Device Perspective Did the Request I received come from Trusted Software? Only Trusted Software operating within the Trusted Software Environment is permitted to generate TCS Requests Other technologies are needed to assess platform integrity Did the Request I received come from some (untrusted) device instead of the Root Complex? Endpoints are prohibited from generating TCS Requests Root Ports and Switches are prohibited from routing TCS Requests upstream or peer-to-peer

Revisiting the Trust Issues: Software Perspective Am I operating in a Trusted Software Environment? Other technologies are needed to assess platform integrity Am I accessing a Trusted Device? Trusted Software can determine if a device implements TCS Other technologies are needed to assess device integrity Is the device virtualized in an authorized manner? Device virtualization is a policy belonging primarily to the Platform High-end servers are likely to support virtualization environments Personal computers are envisioned less likely to support them Has the device been repurposed? Untrusted devices with FPGAs might be reprogrammed “in the field” to masquerade as Trusted Devices. Wide-spread use of FPGAs throughout the industry makes it unreasonable for the ECN simply to prohibit them

Key Takeaways TCS provides part of the foundation for Trusted Computing Environments, and is intended to work in synergy with other independent industry efforts such as those within the Trusted Computing Group™ TCS requires special hardware support in the Root Complex, Switches, and Trusted Devices TCS is envisioned to become an important feature on a wide range of PCIe platforms, from personal devices to personal computers to all classes of servers

Call to Action Chipset Designers: add support for TCS in your chipsets System OEMs: add support for TCS in your platforms Switch Vendors: add support for TCS routing in all Switches Adapter Vendors: add support for TCS if appropriate for your particular device

TCS Draft ECN for Member Review (PCI SIG Members only) Additional Resources http://www.pcisig.com TCS Draft ECN for Member Review (PCI SIG Members only) http://www.pcisig.com/specifications/pciexpress/review_zone https://www.trustedcomputinggroup.org* * Note: the Trusted Computing Group™ has no formal involvement with the development of TCS.

Community Resources Windows Hardware & Driver Central (WHDC) www.microsoft.com/whdc/default.mspx Technical Communities www.microsoft.com/communities/products/default.mspx Non-Microsoft Community Sites www.microsoft.com/communities/related/default.mspx Microsoft Public Newsgroups www.microsoft.com/communities/newsgroups Technical Chats and Webcasts www.microsoft.com/communities/chats/default.mspx www.microsoft.com/webcasts Microsoft Blogs www.microsoft.com/communities/blogs

© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.