SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
June 2008
Inform of TVMI project
Discuss a new way to manage Virtual
Machines (VMs)
This is a report on ongoing research
◦ No releases will available in near term
◦ Output will most likely be specification, procedures,
  and architecture – minimal code
Still in concept phase – so feedback is
appreciated



                            Xen Summit Boston 2008
Trusted Virtual Machine (TVM)
◦ Does not subvert security policy
◦ Does not harm or tamper with other machines
◦ Is running on trusted platform with certified
  hypervisor
Need way to detect and identify TVMs
◦ UUIDs can be modified and forged
◦ MAC’s and processor ID’s have same problem
◦ No physical binding to Trusted Platform Modules




                           Xen Summit Boston 2008
Many environments require tracking and
auditing of information flow for legal,
regulatory or policy reasons
Untracked and unmanaged VMs provide
security risk of losing control of data and
access to network
Assigning strong cryptographic identities to
virtual machines provides a way to ensure all
VMs are authorized and authenticated



                        Xen Summit Boston 2008
System Owners
◦ Information system departments, service providers
◦ Need assurance that VM will not harm other VMs
  and systems on network
Data Owners
◦ Own the data that is on the VM
◦ Generally a company or agency
◦ Data any information used or created by VM




                           Xen Summit Boston 2008
Content Owners
◦ Providers of entertainment or other media
◦ Movies, Music, Books, Games, etc.
◦ Have an interest that content is not illegally
  distributed
Users
◦ Need to trust a VM will not compromise privacy
◦ Need assurance that they can complete their
  jobs/mission.




                             Xen Summit Boston 2008
Must run on a Trusted Platform
◦ Physical TPM is required
Must securely boot hypervisor (HV) and OS
Protocols to attest and authenticate VM
Someone must certify and accredit the VM
and platform
Nice to haves
◦ Reports of what else is running on platform
◦ Other VMs, applications, etc



                             Xen Summit Boston 2008
A Virtual Community of Interest Network
(vCOIN) is a network of VM appliances for a
specific task or community.
◦ Examples: Multi-agency Task Force, Operational
  Exercise or other Event
Each member receives a preconfigured VM
◦ VM has preconfigured applications, licenses, and
  keys for VPNs, secure data stores
◦ VM should not be out of control of owner
◦ Be able to revoke VM if compromised
Need to Identify and Authenticate VM

                           Xen Summit Boston 2008
Xen Summit Boston 2008
VMs are just “files” that can be manipulated
to alter configuration
VMs are under full control of another entity
◦ Hypervisor
◦ Host OS
HV can modify VM’s state at anytime
◦ Suspension
◦ Snapshot
◦ State Rollback
HV can spoof system calls
HV can eavesdrop VM’s communication and
play “man-in-the-middle” attacks

                        Xen Summit Boston 2008
HV can maliciously manipulate Guest OS
◦ State Rollback/Storage/Migration
◦ Snapshot and modification of memory
◦ Suspension and power states manipulation
Host OS/Device Emulation need to be
trusted
Virtual Machines can be duplicated and
migrated easily
◦ Want to control VM duplication and distribution
◦ Migration to machine with unknown security
  properties

                          Xen Summit Boston 2008
Develop a mechanism for identifying and
authenticating virtual machines
◦ What properties are required to be measured?
◦ How to interface with Policy Decision Points (PDPs)
  and Third Party Authenticators (TPAs)?
Propose an Attestation Infrastructure
Protect, detect and report changes to
configuration
◦ Monitor for VMBRs and Blue Pills
◦ Unauthorized changes to configuration



                            Xen Summit Boston 2008
Trusted Computing Systems
◦ Secure Execution Technology
◦ Trusted Platform Modules
Virtual Trusted Platform Module
Special Purpose Service Domains
◦ Mini-OS
◦ vTPM, TPM Emulator




                          Xen Summit Boston 2008
Xen Summit Boston 2008
Emulated TPM in a special driver domain
◦ Front-end driver in domU
◦ Back-end driver in domTPM
◦ Emulated TPM in domTPM
Protected through binding to physical TPM
One vTPM instance per domU
Provides all TPM functionality for domU




                         Xen Summit Boston 2008
TPM does not have an Endorsement Key
◦ Cannot vouch for it’s authenticity
◦ Someone else needs to do it
Need to bind to physical TPM
Need to assure that TPM has valid EK
◦ A TPM emulator could be used to bind to a TPM
How to handle migration
How to handle duplication
◦ Do not want to have two machines with identical
  identities


                            Xen Summit Boston 2008
Problem: How does one “lift” the trust inherent in
the hardware to the virtual machine?
What are the identity requirements for the virtual
machine?
Proposed Solutions
◦ Remotely attest the VM’s configuration to a Policy Decision
  Point (PDP) or Third Party Authenticator (TPA)
◦ Assure that the configuration of the platform adheres to a
  specified security policy.
◦ Receive authorization to launch applications
◦ Enforce security policy and detect tampering through
  secure HV and hardware enforcement



                                Xen Summit Boston 2008
Architecture and specification for identifying
TVMs
Proof of concept implementation
Part of larger Virtual Centurion Project
◦ Trusted Virtual Machine Environments
◦ high-integrity environments required for protecting
  information and privacy
◦ managing and operating VMs for use in vCOINs,
  multi-level security systems, and other applications




                            Xen Summit Boston 2008
Provide uniquely identifiable VMs for use in
trusted environments
Determine what is an acceptable attestation
for verifying the configuration the machine
◦ Determine the identity parameters
◦ What parts of platform need to be identified?
Show how the identity of the VM is generated,
stored, and reported
Develop protocol for vTPM to TPM binding



                            Xen Summit Boston 2008
Creates unique identity for each VM
    Two “identical” VMs could have same measurement
◦
    Different than attestation identity
◦
    vTPM is used to store identity
◦
    The identity is provides an “experience” of the VM
◦
     As each VM evolves, it’s identity tells something about
     it
       It’s migrations, duplications, configuration changes
       Performed through extending PCRs
     The identity provides a “genealogy” of the VM
       The identity can be associated to it’s ancestors, like DNA



                                   Xen Summit Boston 2008
Hardware based VM Monitoring and
Containment
Trusted Computing Group Specifications
◦ Trusted Platform Module
◦ Trusted Reporting Mechanism
Secure HV and virtual TPM
◦ Extend current work to support VM identification




                           Xen Summit Boston 2008
Each TVM should have an associated domTPM
◦ Machine should not function without vTPM presence
◦ TVM domain should not contain any other drivers
domTPM must migrate/duplicate with TVM
◦ Tightly coupled
◦ Reassignment of keys should update identity
Host platform must be able to attest it’s
configuration to TVM
◦ Hypervisor Version
◦ OS Version, Patch levels



                             Xen Summit Boston 2008
Components used to build TVMI
◦ Dell Optiplex 755 vPro
     Intel VT, VT-d, TXT, and AMT
    Fedora 8
◦
    Xen 3.2
◦
    vTPM
◦
    MiniOS
◦
    sHype
◦
    TrouSerS
◦
    Trusted GRUB
◦



                              Xen Summit Boston 2008
Create Unique Master Key (Identity) for vTPM
◦ Protects vTPM from malicious modification
◦ Seal other cryptographic keys in TVM with master
  key (VPN, Storage, etc.)
Bind Master Key to physical TPM through seal
◦ Must have a-priori knowledge of TPM
◦ Must have ownership privileges of TPM
Use vTPM to securely launch TVM
◦ TVM will only run on platform with bound TPM
◦ Migration possible by using migratable keys
Machine is now truly identifiable and unique

                           Xen Summit Boston 2008
TVMI Provides Unique Identity for each TVM
Detects migration and duplication
Ensures proper host properly configuration
Provides authenticated network connect
Provides fine-grained control of TVM network
No additional hardware required
◦ Runs on currently available COTS systems




                           Xen Summit Boston 2008
Value and feasibility of project
Ways to improve project
Collaboration and funding opportunities
Send comments to
◦ jkrautheim@gmail.com
◦ http://cyberlab.cs.umbc.edu/feedback
   Registration required




                           Xen Summit Boston 2008
TVMI is a new method to identify and
manage VMs
Unique cryptographic identities enhance
manageability of virtual networks
◦ vTPMs used to create and track identities
◦ Identities are fully migrateable and allows
  duplication




                           Xen Summit Boston 2008
XS 2008 Boston VTPM

Más contenido relacionado

La actualidad más candente

Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
rsnarayanan
 

La actualidad más candente (20)

XS Oracle 2009 Intro Slides
XS Oracle 2009 Intro SlidesXS Oracle 2009 Intro Slides
XS Oracle 2009 Intro Slides
 
XS Boston 2008 OpenSolaris
XS Boston 2008 OpenSolarisXS Boston 2008 OpenSolaris
XS Boston 2008 OpenSolaris
 
Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008
 
XS 2008 Boston Capacity Planning
XS 2008 Boston Capacity PlanningXS 2008 Boston Capacity Planning
XS 2008 Boston Capacity Planning
 
XS Boston 2008 Fault Tolerance
XS Boston 2008 Fault ToleranceXS Boston 2008 Fault Tolerance
XS Boston 2008 Fault Tolerance
 
XS Oracle 2009 Error Detection
XS Oracle 2009 Error DetectionXS Oracle 2009 Error Detection
XS Oracle 2009 Error Detection
 
Ian Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 KeynoteIan Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 Keynote
 
Xen.org Overview 2009
Xen.org Overview 2009Xen.org Overview 2009
Xen.org Overview 2009
 
Nakajima numa-final
Nakajima numa-finalNakajima numa-final
Nakajima numa-final
 
XS Oracle 2009 PVOps
XS Oracle 2009 PVOpsXS Oracle 2009 PVOps
XS Oracle 2009 PVOps
 
XS Oracle 2009 Vm Snapshots
XS Oracle 2009 Vm SnapshotsXS Oracle 2009 Vm Snapshots
XS Oracle 2009 Vm Snapshots
 
OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training
 
XS Japan 2008 Services English
XS Japan 2008 Services EnglishXS Japan 2008 Services English
XS Japan 2008 Services English
 
XS Japan 2008 Ganeti English
XS Japan 2008 Ganeti EnglishXS Japan 2008 Ganeti English
XS Japan 2008 Ganeti English
 
C3 Citrix Cloud Center
C3 Citrix Cloud CenterC3 Citrix Cloud Center
C3 Citrix Cloud Center
 
XS Japan 2008 Citrix English
XS Japan 2008 Citrix EnglishXS Japan 2008 Citrix English
XS Japan 2008 Citrix English
 
LCA13: Xen on ARM
LCA13: Xen on ARMLCA13: Xen on ARM
LCA13: Xen on ARM
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
 
µ-Xen
µ-Xenµ-Xen
µ-Xen
 
Ian Pratt Nsdi Keynote Apr2008
Ian Pratt Nsdi Keynote Apr2008Ian Pratt Nsdi Keynote Apr2008
Ian Pratt Nsdi Keynote Apr2008
 

Similar a XS 2008 Boston VTPM

Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The FieldDynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Amit Gatenyo
 
Tech Ed 2008 Israel Server Management 360
Tech Ed 2008 Israel   Server Management 360Tech Ed 2008 Israel   Server Management 360
Tech Ed 2008 Israel Server Management 360
Amit Gatenyo
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
vncson
 
DIPTI_RANJAN_BARIK(Wintel).doc
DIPTI_RANJAN_BARIK(Wintel).docDIPTI_RANJAN_BARIK(Wintel).doc
DIPTI_RANJAN_BARIK(Wintel).doc
Dipti Ranjan Barik
 
Licensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateLicensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) Update
Flexera
 
Pardeep Rana IT CV_Breif
Pardeep Rana IT CV_BreifPardeep Rana IT CV_Breif
Pardeep Rana IT CV_Breif
Pardeep Rana
 

Similar a XS 2008 Boston VTPM (20)

Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The FieldDynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
 
Qnap CMS Presentation 2015
Qnap CMS Presentation 2015Qnap CMS Presentation 2015
Qnap CMS Presentation 2015
 
PCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy WayPCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy Way
 
Tech Ed 2008 Israel Server Management 360
Tech Ed 2008 Israel   Server Management 360Tech Ed 2008 Israel   Server Management 360
Tech Ed 2008 Israel Server Management 360
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
DC Metro And Federal VMUG March 2009
DC Metro And Federal VMUG March 2009DC Metro And Federal VMUG March 2009
DC Metro And Federal VMUG March 2009
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
 
DIPTI_RANJAN_BARIK(Wintel).doc
DIPTI_RANJAN_BARIK(Wintel).docDIPTI_RANJAN_BARIK(Wintel).doc
DIPTI_RANJAN_BARIK(Wintel).doc
 
Licensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateLicensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) Update
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
µ-Xen
µ-Xenµ-Xen
µ-Xen
 
Pardeep Rana IT CV_Breif
Pardeep Rana IT CV_BreifPardeep Rana IT CV_Breif
Pardeep Rana IT CV_Breif
 
PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)
PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)
PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)
 

Más de The Linux Foundation

Más de The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

XS 2008 Boston VTPM

  • 2. Inform of TVMI project Discuss a new way to manage Virtual Machines (VMs) This is a report on ongoing research ◦ No releases will available in near term ◦ Output will most likely be specification, procedures, and architecture – minimal code Still in concept phase – so feedback is appreciated Xen Summit Boston 2008
  • 3. Trusted Virtual Machine (TVM) ◦ Does not subvert security policy ◦ Does not harm or tamper with other machines ◦ Is running on trusted platform with certified hypervisor Need way to detect and identify TVMs ◦ UUIDs can be modified and forged ◦ MAC’s and processor ID’s have same problem ◦ No physical binding to Trusted Platform Modules Xen Summit Boston 2008
  • 4. Many environments require tracking and auditing of information flow for legal, regulatory or policy reasons Untracked and unmanaged VMs provide security risk of losing control of data and access to network Assigning strong cryptographic identities to virtual machines provides a way to ensure all VMs are authorized and authenticated Xen Summit Boston 2008
  • 5. System Owners ◦ Information system departments, service providers ◦ Need assurance that VM will not harm other VMs and systems on network Data Owners ◦ Own the data that is on the VM ◦ Generally a company or agency ◦ Data any information used or created by VM Xen Summit Boston 2008
  • 6. Content Owners ◦ Providers of entertainment or other media ◦ Movies, Music, Books, Games, etc. ◦ Have an interest that content is not illegally distributed Users ◦ Need to trust a VM will not compromise privacy ◦ Need assurance that they can complete their jobs/mission. Xen Summit Boston 2008
  • 7. Must run on a Trusted Platform ◦ Physical TPM is required Must securely boot hypervisor (HV) and OS Protocols to attest and authenticate VM Someone must certify and accredit the VM and platform Nice to haves ◦ Reports of what else is running on platform ◦ Other VMs, applications, etc Xen Summit Boston 2008
  • 8. A Virtual Community of Interest Network (vCOIN) is a network of VM appliances for a specific task or community. ◦ Examples: Multi-agency Task Force, Operational Exercise or other Event Each member receives a preconfigured VM ◦ VM has preconfigured applications, licenses, and keys for VPNs, secure data stores ◦ VM should not be out of control of owner ◦ Be able to revoke VM if compromised Need to Identify and Authenticate VM Xen Summit Boston 2008
  • 10. VMs are just “files” that can be manipulated to alter configuration VMs are under full control of another entity ◦ Hypervisor ◦ Host OS HV can modify VM’s state at anytime ◦ Suspension ◦ Snapshot ◦ State Rollback HV can spoof system calls HV can eavesdrop VM’s communication and play “man-in-the-middle” attacks Xen Summit Boston 2008
  • 11. HV can maliciously manipulate Guest OS ◦ State Rollback/Storage/Migration ◦ Snapshot and modification of memory ◦ Suspension and power states manipulation Host OS/Device Emulation need to be trusted Virtual Machines can be duplicated and migrated easily ◦ Want to control VM duplication and distribution ◦ Migration to machine with unknown security properties Xen Summit Boston 2008
  • 12. Develop a mechanism for identifying and authenticating virtual machines ◦ What properties are required to be measured? ◦ How to interface with Policy Decision Points (PDPs) and Third Party Authenticators (TPAs)? Propose an Attestation Infrastructure Protect, detect and report changes to configuration ◦ Monitor for VMBRs and Blue Pills ◦ Unauthorized changes to configuration Xen Summit Boston 2008
  • 13. Trusted Computing Systems ◦ Secure Execution Technology ◦ Trusted Platform Modules Virtual Trusted Platform Module Special Purpose Service Domains ◦ Mini-OS ◦ vTPM, TPM Emulator Xen Summit Boston 2008
  • 15. Emulated TPM in a special driver domain ◦ Front-end driver in domU ◦ Back-end driver in domTPM ◦ Emulated TPM in domTPM Protected through binding to physical TPM One vTPM instance per domU Provides all TPM functionality for domU Xen Summit Boston 2008
  • 16. TPM does not have an Endorsement Key ◦ Cannot vouch for it’s authenticity ◦ Someone else needs to do it Need to bind to physical TPM Need to assure that TPM has valid EK ◦ A TPM emulator could be used to bind to a TPM How to handle migration How to handle duplication ◦ Do not want to have two machines with identical identities Xen Summit Boston 2008
  • 17. Problem: How does one “lift” the trust inherent in the hardware to the virtual machine? What are the identity requirements for the virtual machine? Proposed Solutions ◦ Remotely attest the VM’s configuration to a Policy Decision Point (PDP) or Third Party Authenticator (TPA) ◦ Assure that the configuration of the platform adheres to a specified security policy. ◦ Receive authorization to launch applications ◦ Enforce security policy and detect tampering through secure HV and hardware enforcement Xen Summit Boston 2008
  • 18. Architecture and specification for identifying TVMs Proof of concept implementation Part of larger Virtual Centurion Project ◦ Trusted Virtual Machine Environments ◦ high-integrity environments required for protecting information and privacy ◦ managing and operating VMs for use in vCOINs, multi-level security systems, and other applications Xen Summit Boston 2008
  • 19. Provide uniquely identifiable VMs for use in trusted environments Determine what is an acceptable attestation for verifying the configuration the machine ◦ Determine the identity parameters ◦ What parts of platform need to be identified? Show how the identity of the VM is generated, stored, and reported Develop protocol for vTPM to TPM binding Xen Summit Boston 2008
  • 20. Creates unique identity for each VM Two “identical” VMs could have same measurement ◦ Different than attestation identity ◦ vTPM is used to store identity ◦ The identity is provides an “experience” of the VM ◦ As each VM evolves, it’s identity tells something about it It’s migrations, duplications, configuration changes Performed through extending PCRs The identity provides a “genealogy” of the VM The identity can be associated to it’s ancestors, like DNA Xen Summit Boston 2008
  • 21. Hardware based VM Monitoring and Containment Trusted Computing Group Specifications ◦ Trusted Platform Module ◦ Trusted Reporting Mechanism Secure HV and virtual TPM ◦ Extend current work to support VM identification Xen Summit Boston 2008
  • 22. Each TVM should have an associated domTPM ◦ Machine should not function without vTPM presence ◦ TVM domain should not contain any other drivers domTPM must migrate/duplicate with TVM ◦ Tightly coupled ◦ Reassignment of keys should update identity Host platform must be able to attest it’s configuration to TVM ◦ Hypervisor Version ◦ OS Version, Patch levels Xen Summit Boston 2008
  • 23. Components used to build TVMI ◦ Dell Optiplex 755 vPro Intel VT, VT-d, TXT, and AMT Fedora 8 ◦ Xen 3.2 ◦ vTPM ◦ MiniOS ◦ sHype ◦ TrouSerS ◦ Trusted GRUB ◦ Xen Summit Boston 2008
  • 24. Create Unique Master Key (Identity) for vTPM ◦ Protects vTPM from malicious modification ◦ Seal other cryptographic keys in TVM with master key (VPN, Storage, etc.) Bind Master Key to physical TPM through seal ◦ Must have a-priori knowledge of TPM ◦ Must have ownership privileges of TPM Use vTPM to securely launch TVM ◦ TVM will only run on platform with bound TPM ◦ Migration possible by using migratable keys Machine is now truly identifiable and unique Xen Summit Boston 2008
  • 25. TVMI Provides Unique Identity for each TVM Detects migration and duplication Ensures proper host properly configuration Provides authenticated network connect Provides fine-grained control of TVM network No additional hardware required ◦ Runs on currently available COTS systems Xen Summit Boston 2008
  • 26. Value and feasibility of project Ways to improve project Collaboration and funding opportunities Send comments to ◦ jkrautheim@gmail.com ◦ http://cyberlab.cs.umbc.edu/feedback Registration required Xen Summit Boston 2008
  • 27. TVMI is a new method to identify and manage VMs Unique cryptographic identities enhance manageability of virtual networks ◦ vTPMs used to create and track identities ◦ Identities are fully migrateable and allows duplication Xen Summit Boston 2008