SlideShare una empresa de Scribd logo
1 de 21
Maemo 6
Platform Security
Overview

Elena Reshetova


1
Outline
• What is Platform Security?
• Maemo 6 Device modes & Boot process
• Access Control
      • Our criteria
      • Basic principles & concepts
      • Aegis Security Policy & SW distribution
      • Installation and Run-time views
      • Shared libraries case
• Integrity Protection
      • Aegis Validator
      • Aegis Protected Storage
• IPC Security



2   E.Reshetova FOSDEM 6.02.2010
What is Platform Security?

• Set of a mechanisms and
  techniques, which are used to
  protect the entire SW platform




3   E.Reshetova FOSDEM 6.02.2010
Device modes




    • Open source strategy                     • Bigger developer offering
    • The same functionality as earlier            • Optional copy protection (DRM)
         • Compile and flash your own kernel   • More use cases for a device usage
         • Made a low-level platform               • Games, Commercial applications
           development                         • More business models
                                                   • Ovi Store
                                                   • Comes with Music

4     E.Reshetova FOSDEM 6.02.2010
Hardware enablers & Boot process
• Trusted Execution
  Environment (TrEE) (for
  instance ARM Trust Zone)
  with two main keys:
      • Root public key             Restrict security
      • Root device specific key     functionality




* includes:
      • DRM keys are disabled
      • Content from the previous
        mode can’t be decrypted

                                                        Integrity isn’t OK




5   E.Reshetova FOSDEM 6.02.2010
Access Control



6
Access control in Linux
• Classical Unix AC
      • Based on multiuser model
      • Discretionary AC
      • POSIX capabilities aren’t really in use (root has all, others none)

• Our criteria:
      • Process level mandatory access control needed
      • Minimal changes to the current model (enforcement phase)
      • Good level of flexibility and granularity, easy to understand concept (KISS)

• Existing security extensions, no good match to criteria
      • FreeBSD AC, MLS, Biba, SELinux, RBAC, AppArmor, TOMOYO Linux, …

• Our approach:
      • Apply, and minimally extend Classical Unix AC to meet set criteria
      • Re-use multiuser-model for application-level access control
      • Architecture outlined in the next slides.


7   E.Reshetova FOSDEM 6.02.2010
Access Control – Principles & Concepts
• Principle of least privileges
      • Every application should be able to access only limited set of needed resources
• Protected resources
      • Things like Cellular functionality, Location information and so on
      • No final list yet – work in progress
• Resource token
      • Abstract name describing a protected resource
      • Cellular, Location, and etc.
• Application must declare resources, it needs
      • Aegis Manifest File


• No security APIs by default  Development is almost unchanged



8   E.Reshetova FOSDEM 6.02.2010
Aegis Manifest File
• An optional xml file inside Debian package
• Declares needed and provided credentials
      • Resource tokens
      • UIDs, GUIs
      • POSIX capabilities
• Should be generated automatically by SDK based on the source code
• A D-Bus policy can be generated from Aegis Manifest during installation phase
• May contain a package signature
• Used for authorized security policy updates


• Application Identifier
                                   AppID = {SWSourceID, PackageName, AppName}



9   E.Reshetova FOSDEM 6.02.2010
Software Distribution
• SW comes inside Debian packages
• Each package has SW source (known or unknown)
       • SW repository (based on the repository signing)
       • Any virtual entity (based on the package signing) as single developer, web page and etc.
• Each known SW source has a asymmetric key pair
       • Public key is known to a device
       • Private key is used to sign the packages
• Each SW source is assigned a trust level
       • Update of SW package is possible only from the same SW source or from a SW source with
         higher trust level
• SW source trust is based on the
  Quality Assurance level of the SW source




10   E.Reshetova FOSDEM 6.02.2010
Aegis Security Policy
• Contains mapping between SW sources and allowed credentials
• Accessible only to Installer
• Allows to create different security levels on the devices
• The allowed credential set for each SW source is based on the risk level
• Can be updated via authorized policy updates
• Special domains:
       • Unknown
       • Developer




11   E.Reshetova FOSDEM 6.02.2010
Components Interaction – Installation time
                                                    Aegis     Application
1. Application arrives to the                      Manifest

  Aegis Installer together                                                         1.
  with Aegis Manifest
2. Aegis installer checks the                                  Aegis
  Aegis Security policy for the     D-Bus    D-Bus Daemon     Security
                                                               policy                      Installer
  information                       policy       D-Bus
                                               extensions
3. Aegis installer modifies                                                                    User mode
  the Credentials’ possession
                                                                                      3.
  list according to the
  “Intersection rule”                                                                        Kernel mode

[4.] Aegis installer possibly
  modifies D-Bus policy                                                     Credentials’
                                                                            Possession
                                                                                list




12   E.Reshetova FOSDEM 6.02.2010
Intersection rule
                                                                        Example


                                                  SW source
 Aegis Manifest
                                                credentials set:
 credentials set:
                                               What credentials
                               intersection     application can
What application
                                              get, if it is certified
wants to access?
                                              by this SW source?


                       Result credentials set:

                  What credentials application
                     has during run-time?




13   E.Reshetova FOSDEM 6.02.2010
Components Interaction – Run-time
1. Process Credentials Assigner gets the                                Aegis        Application
   allowed credentials set from the                                    Manifest

   Credentials’ possession list
2. Process Credentials Assigner
   modifies process’ credentials
   (process task structure) according to                                              Aegis
                                                              D-Bus Daemon           Security
   the received credentials                      D-Bus
                                                                                      policy                      Installer
                                                 policy               D-Bus
3a. File AC                                                         extensions

       • No changes                                                                                                   User mode

3b. D-Bus
       • Additional process credentials are
         taken into consideration by the d-                                                                         Kernel mode
                                                                            Process
         bus daemon                               File’s AC lists
                                                                           credentials
3c. Application by itself                                                                          Credentials’
                                                                                                   Possession
       • Application calls libcreds library to                                                         list
                                                      “Linux Kernel
         get process credentials, and makes a      Reference monitor”
         decision based on its own policy                                          Process
                                                                                  Credentials
                                                                                   assigner




14   E.Reshetova FOSDEM 6.02.2010
Loading the shared libraries




                                                              No!




                                                              Yes
                             Cellular,
                             UserData
                                    Application   OK   Call




                                     Library A

15   E.Reshetova FOSDEM 6.02.2010
Integrity Protection



16
Integrity protection – Aegis Validator
• Ensures integrity of the
  executable components
  (binaries, libraries, ...)
                                      Yes
       • Run-time
       • Against Offline attacks
• Kernel module                                         Storage of
• Calculates a cryptographic                 Aegis      reference
  hash of the file (currently               Validator    hashes
                                      No!
  SHA-1)
• Reference hashes                           Get the
                                             policy
       • Stored in the Aegis
         Protected Storage
       • Come inside of the package
         or can be computed during
         installation time




17   E.Reshetova FOSDEM 6.02.2010
Privacy Protection - Aegis Protected Storage
• Ensures integrity of data and
  configuration files after
  installation                                                            Place the files
                                                                             Integrity
                                                                               Check
                                                            Application   into status
                                                                               Protected
• Additional features:                                                        integrity
                                                                             Storage
       • Data encryption inside the
         storage
       • Private, shared and global or      Data file
         externally signed storages                                           Aegis
                                                                            Protected
       • Interface to TrEE, which is used   Configuration                  Storage APIs
         to sign/verify, encrypt/decrypt         file
         the data
       • Access to a protected storage is
         defined by an application
         identifier or application group




18   E.Reshetova FOSDEM 6.02.2010
Secure IPC



19
Secure IPC inside device
     • Maemo Crypt API
     • Ensures integrity and
       confidentially of the
       transmitted data
            • Signing
            • Encryption
     • No key management from
       applications
     • Different levels
            • Based on application ID
            • Based on the resource token


                                            Check the signature




20     E.Reshetova FOSDEM 6.02.2010
Conclusions & QA
• Most of the Security FW will be open sourced
• Public project “Maemo 6 Platform Security”
    • http://maemo.gitorious.org/
• Your questions, feedback and reports are welcomed!
       • http://wiki.maemo.org/MaemoSecurity
       • http://talk.maemo.org/forumdisplay.php?f=45
       • https://bugs.maemo.org/
• More details will still follow…




                                      Thank you!

                                                       elena.reshetova@nokia.com



21   E.Reshetova FOSDEM 6.02.2010

Más contenido relacionado

La actualidad más candente

Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04Niit Care
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsEduardo Castro
 
Ruckus BYOD whitepaper
Ruckus BYOD whitepaperRuckus BYOD whitepaper
Ruckus BYOD whitepaperMichal Jarski
 
Introduction to VMware Infrastructure
Introduction to VMware  Infrastructure  Introduction to VMware  Infrastructure
Introduction to VMware Infrastructure aktivfinger
 
Infraestructure WMWARE
Infraestructure  WMWAREInfraestructure  WMWARE
Infraestructure WMWAREaktivfinger
 
Getting Started with ESXServer3iEmbedded
Getting Started with  ESXServer3iEmbedded  Getting Started with  ESXServer3iEmbedded
Getting Started with ESXServer3iEmbedded aktivfinger
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15 Suraj Kumar.A.S
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Venafi
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersVenafi
 
Reviewing sql server permissions tech republic
Reviewing sql server permissions   tech republicReviewing sql server permissions   tech republic
Reviewing sql server permissions tech republicKaing Menglieng
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security ModeluniqueYGB
 
Ce Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersCe Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersKislaychd
 
Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Vinayak Hegde
 
Sql server 2008 r2 security datasheet
Sql server 2008 r2 security   datasheetSql server 2008 r2 security   datasheet
Sql server 2008 r2 security datasheetKlaudiia Jacome
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 

La actualidad más candente (19)

Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
Product Number: 0
Product Number: 0Product Number: 0
Product Number: 0
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
 
Ruckus BYOD whitepaper
Ruckus BYOD whitepaperRuckus BYOD whitepaper
Ruckus BYOD whitepaper
 
BranchOffice Szenarios
BranchOffice SzenariosBranchOffice Szenarios
BranchOffice Szenarios
 
Introduction to VMware Infrastructure
Introduction to VMware  Infrastructure  Introduction to VMware  Infrastructure
Introduction to VMware Infrastructure
 
Infraestructure WMWARE
Infraestructure  WMWAREInfraestructure  WMWARE
Infraestructure WMWARE
 
Getting Started with ESXServer3iEmbedded
Getting Started with  ESXServer3iEmbedded  Getting Started with  ESXServer3iEmbedded
Getting Started with ESXServer3iEmbedded
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15
 
Be2010 全功能 20100301
Be2010 全功能 20100301Be2010 全功能 20100301
Be2010 全功能 20100301
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
 
Reviewing sql server permissions tech republic
Reviewing sql server permissions   tech republicReviewing sql server permissions   tech republic
Reviewing sql server permissions tech republic
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
 
Ce Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersCe Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database Servers
 
Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)
 
Sql server 2008 r2 security datasheet
Sql server 2008 r2 security   datasheetSql server 2008 r2 security   datasheet
Sql server 2008 r2 security datasheet
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 

Similar a Maemo Platform Security Fosdem

Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Guellord Mpia
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container SecurityKsenia Peguero
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersSecuring the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersMassimiliano Mattetti
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHansFarroCastillo1
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security modelPragati Rai
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platformabelsonp
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesJPINFOTECH JAYAPRAKASH
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...Amazon Web Services
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security Sandeep Patil
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsDominic Haigh
 

Similar a Maemo Platform Security Fosdem (20)

Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container Security
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersSecuring the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
 
Websphere - Introduction to SSL part 1
Websphere  - Introduction to SSL part 1Websphere  - Introduction to SSL part 1
Websphere - Introduction to SSL part 1
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
 

Último

专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gayasrsj9000
 
existing product research b2 Sunderland Culture
existing product research b2 Sunderland Cultureexisting product research b2 Sunderland Culture
existing product research b2 Sunderland CultureChloeMeadows1
 
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts ServiceVip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts Serviceankitnayak356677
 
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesVip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookmanojkuma9823
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一C SSS
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...srsj9000
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...Amil baba
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一diploma 1
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsappssapnasaifi408
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一ss ss
 
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一ss ss
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程1k98h0e1
 

Último (20)

young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565
 
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
 
existing product research b2 Sunderland Culture
existing product research b2 Sunderland Cultureexisting product research b2 Sunderland Culture
existing product research b2 Sunderland Culture
 
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts ServiceVip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
 
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesVip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
 
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
 
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程
 

Maemo Platform Security Fosdem

  • 2. Outline • What is Platform Security? • Maemo 6 Device modes & Boot process • Access Control • Our criteria • Basic principles & concepts • Aegis Security Policy & SW distribution • Installation and Run-time views • Shared libraries case • Integrity Protection • Aegis Validator • Aegis Protected Storage • IPC Security 2 E.Reshetova FOSDEM 6.02.2010
  • 3. What is Platform Security? • Set of a mechanisms and techniques, which are used to protect the entire SW platform 3 E.Reshetova FOSDEM 6.02.2010
  • 4. Device modes • Open source strategy • Bigger developer offering • The same functionality as earlier • Optional copy protection (DRM) • Compile and flash your own kernel • More use cases for a device usage • Made a low-level platform • Games, Commercial applications development • More business models • Ovi Store • Comes with Music 4 E.Reshetova FOSDEM 6.02.2010
  • 5. Hardware enablers & Boot process • Trusted Execution Environment (TrEE) (for instance ARM Trust Zone) with two main keys: • Root public key Restrict security • Root device specific key functionality * includes: • DRM keys are disabled • Content from the previous mode can’t be decrypted Integrity isn’t OK 5 E.Reshetova FOSDEM 6.02.2010
  • 7. Access control in Linux • Classical Unix AC • Based on multiuser model • Discretionary AC • POSIX capabilities aren’t really in use (root has all, others none) • Our criteria: • Process level mandatory access control needed • Minimal changes to the current model (enforcement phase) • Good level of flexibility and granularity, easy to understand concept (KISS) • Existing security extensions, no good match to criteria • FreeBSD AC, MLS, Biba, SELinux, RBAC, AppArmor, TOMOYO Linux, … • Our approach: • Apply, and minimally extend Classical Unix AC to meet set criteria • Re-use multiuser-model for application-level access control • Architecture outlined in the next slides. 7 E.Reshetova FOSDEM 6.02.2010
  • 8. Access Control – Principles & Concepts • Principle of least privileges • Every application should be able to access only limited set of needed resources • Protected resources • Things like Cellular functionality, Location information and so on • No final list yet – work in progress • Resource token • Abstract name describing a protected resource • Cellular, Location, and etc. • Application must declare resources, it needs • Aegis Manifest File • No security APIs by default  Development is almost unchanged 8 E.Reshetova FOSDEM 6.02.2010
  • 9. Aegis Manifest File • An optional xml file inside Debian package • Declares needed and provided credentials • Resource tokens • UIDs, GUIs • POSIX capabilities • Should be generated automatically by SDK based on the source code • A D-Bus policy can be generated from Aegis Manifest during installation phase • May contain a package signature • Used for authorized security policy updates • Application Identifier AppID = {SWSourceID, PackageName, AppName} 9 E.Reshetova FOSDEM 6.02.2010
  • 10. Software Distribution • SW comes inside Debian packages • Each package has SW source (known or unknown) • SW repository (based on the repository signing) • Any virtual entity (based on the package signing) as single developer, web page and etc. • Each known SW source has a asymmetric key pair • Public key is known to a device • Private key is used to sign the packages • Each SW source is assigned a trust level • Update of SW package is possible only from the same SW source or from a SW source with higher trust level • SW source trust is based on the Quality Assurance level of the SW source 10 E.Reshetova FOSDEM 6.02.2010
  • 11. Aegis Security Policy • Contains mapping between SW sources and allowed credentials • Accessible only to Installer • Allows to create different security levels on the devices • The allowed credential set for each SW source is based on the risk level • Can be updated via authorized policy updates • Special domains: • Unknown • Developer 11 E.Reshetova FOSDEM 6.02.2010
  • 12. Components Interaction – Installation time Aegis Application 1. Application arrives to the Manifest Aegis Installer together 1. with Aegis Manifest 2. Aegis installer checks the Aegis Aegis Security policy for the D-Bus D-Bus Daemon Security policy Installer information policy D-Bus extensions 3. Aegis installer modifies User mode the Credentials’ possession 3. list according to the “Intersection rule” Kernel mode [4.] Aegis installer possibly modifies D-Bus policy Credentials’ Possession list 12 E.Reshetova FOSDEM 6.02.2010
  • 13. Intersection rule Example SW source Aegis Manifest credentials set: credentials set: What credentials intersection application can What application get, if it is certified wants to access? by this SW source? Result credentials set: What credentials application has during run-time? 13 E.Reshetova FOSDEM 6.02.2010
  • 14. Components Interaction – Run-time 1. Process Credentials Assigner gets the Aegis Application allowed credentials set from the Manifest Credentials’ possession list 2. Process Credentials Assigner modifies process’ credentials (process task structure) according to Aegis D-Bus Daemon Security the received credentials D-Bus policy Installer policy D-Bus 3a. File AC extensions • No changes User mode 3b. D-Bus • Additional process credentials are taken into consideration by the d- Kernel mode Process bus daemon File’s AC lists credentials 3c. Application by itself Credentials’ Possession • Application calls libcreds library to list “Linux Kernel get process credentials, and makes a Reference monitor” decision based on its own policy Process Credentials assigner 14 E.Reshetova FOSDEM 6.02.2010
  • 15. Loading the shared libraries No! Yes Cellular, UserData Application OK Call Library A 15 E.Reshetova FOSDEM 6.02.2010
  • 17. Integrity protection – Aegis Validator • Ensures integrity of the executable components (binaries, libraries, ...) Yes • Run-time • Against Offline attacks • Kernel module Storage of • Calculates a cryptographic Aegis reference hash of the file (currently Validator hashes No! SHA-1) • Reference hashes Get the policy • Stored in the Aegis Protected Storage • Come inside of the package or can be computed during installation time 17 E.Reshetova FOSDEM 6.02.2010
  • 18. Privacy Protection - Aegis Protected Storage • Ensures integrity of data and configuration files after installation Place the files Integrity Check Application into status Protected • Additional features: integrity Storage • Data encryption inside the storage • Private, shared and global or Data file externally signed storages Aegis Protected • Interface to TrEE, which is used Configuration Storage APIs to sign/verify, encrypt/decrypt file the data • Access to a protected storage is defined by an application identifier or application group 18 E.Reshetova FOSDEM 6.02.2010
  • 20. Secure IPC inside device • Maemo Crypt API • Ensures integrity and confidentially of the transmitted data • Signing • Encryption • No key management from applications • Different levels • Based on application ID • Based on the resource token Check the signature 20 E.Reshetova FOSDEM 6.02.2010
  • 21. Conclusions & QA • Most of the Security FW will be open sourced • Public project “Maemo 6 Platform Security” • http://maemo.gitorious.org/ • Your questions, feedback and reports are welcomed! • http://wiki.maemo.org/MaemoSecurity • http://talk.maemo.org/forumdisplay.php?f=45 • https://bugs.maemo.org/ • More details will still follow… Thank you! elena.reshetova@nokia.com 21 E.Reshetova FOSDEM 6.02.2010