Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Securing Platform and Trusted Computing Model Abbie Barbir, Ph.D Web Services and Security Advisor   Nortel
Objectives of this Presentation <ul><li>Provide  an overview of “TC” and my impressions of some of its pros/cons </li></ul...
Technology History <ul><li>IBM pioneered technology (early 1990’s) </li></ul><ul><li>Founded Trusted Computing Platform Al...
TCG Trusted Computing Basic Concepts <ul><li>A trustable platform is one that behaves in the expected manner for the inten...
TCG Roots of Trust <ul><li>Trusted Platform Module (TPM): </li></ul><ul><li>Root of Trust for Reporting </li></ul><ul><li>...
Attestation Feature <ul><li>Attestation creates a shared secret between the application and remote party </li></ul><ul><ul...
Trusted Network Connect (TNC) <ul><li>Network Access Control </li></ul><ul><ul><li>Integrity </li></ul></ul><ul><ul><ul><l...
Security Design Principles dates <ul><li>Least Privilege:  Each principle is given the minimum access  </li></ul><ul><li>n...
Secure Computing Challenges 1/2 <ul><li>Security for whom ? </li></ul><ul><li>Can TCG solve SPAM, Malicious code etc. </li...
Secure Computing Challenges 2/2 <ul><li>In TCG TPM acts as a  notary </li></ul><ul><li>In real world, a  notary  issues a ...
Possible Study Items <ul><li>Security is about risk management </li></ul><ul><ul><li>Can we have a systematic approach for...
Conclusions <ul><li>Trusted Computing offers some good features </li></ul><ul><ul><li>Secure Data  </li></ul></ul><ul><ul>...
Acknowledgment dates <ul><li>Many thanks to my colleague Marcus Leech for his valuable input and insight that helped make ...
Q and A dates
References dates <ul><li>Anderson, J. P.,  Computer Security Technology Planning Study , ESD-TR-73-51, ESD/AFSC, Hanscom A...
Upcoming SlideShare
Loading in …5
×

Abbie Barbir Tcg Final

701 views

Published on

Securing Platform and Trusted Computing Model

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Abbie Barbir Tcg Final

  1. 1. Securing Platform and Trusted Computing Model Abbie Barbir, Ph.D Web Services and Security Advisor Nortel
  2. 2. Objectives of this Presentation <ul><li>Provide an overview of “TC” and my impressions of some of its pros/cons </li></ul><ul><li>Initiate a discussion (within ITU-T) as to what role/value this type of approach has in secure solutions </li></ul><ul><ul><li>Identify challenges / areas for further study ? </li></ul></ul>dates
  3. 3. Technology History <ul><li>IBM pioneered technology (early 1990’s) </li></ul><ul><li>Founded Trusted Computing Platform Alliance in 1999 </li></ul><ul><li>TPM 1.1b spec released early 2002 </li></ul><ul><li>Trusted Computing Group Formed in April 2003 </li></ul><ul><li>TPM 1.2 specification released February 2005 </li></ul><ul><li>In 2004, IBM, Intel, and NTT DoCoMo submitted a set of Trusted Mobile Platform specifications defining security features for mobile devices has been released for public </li></ul><ul><ul><li>Provides comprehensive end-to-end security architecture for mobile wireless platforms </li></ul></ul>dates
  4. 4. TCG Trusted Computing Basic Concepts <ul><li>A trustable platform is one that behaves in the expected manner for the intended purpose (e.g. from point of view of IT manager) </li></ul><ul><li>Achieved through the following technology </li></ul><ul><ul><li>Platform Authentication and Attestation </li></ul></ul><ul><ul><ul><li>Identify the platform and its properties to a challenging party </li></ul></ul></ul><ul><ul><li>Platform Integrity Reporting </li></ul></ul><ul><ul><ul><li>Ability to query and report on a platform software state in a reliable manner </li></ul></ul></ul><ul><ul><li>Protected Storage </li></ul></ul><ul><ul><ul><li>Protect secret data against subversion </li></ul></ul></ul>dates
  5. 5. TCG Roots of Trust <ul><li>Trusted Platform Module (TPM): </li></ul><ul><li>Root of Trust for Reporting </li></ul><ul><li>Tamper resistant </li></ul><ul><ul><li>RSA (default keys 2048 bit) </li></ul></ul><ul><li>Stores Platform Measurements </li></ul><ul><ul><li>Platform Configuration Registers (PCR) </li></ul></ul><ul><li>Signature key reports on PCR contents </li></ul><ul><li>Random Number Generator </li></ul><ul><li>SHA-1 Hash Computation Engine </li></ul><ul><li>Nonvolatile memory </li></ul>dates <ul><li>Serve as an anchor for a certificate verification chain </li></ul><ul><ul><li>Third parties can rely on this trust </li></ul></ul><ul><li>Core Root of Trust for Measurement </li></ul><ul><li>(CRTM) </li></ul><ul><li>Code that executes at boot time </li></ul><ul><ul><li>Example: Bios </li></ul></ul><ul><li>Trusted to properly report to the TPM on the software that executes later </li></ul><ul><li>Only authorized entities can rewrite the CRTM </li></ul>Hash CPU NV-memory RNG key generation Memory Digital signature & RSA Crypto I/O MAC PCR
  6. 6. Attestation Feature <ul><li>Attestation creates a shared secret between the application and remote party </li></ul><ul><ul><li>Prevents session hijacking </li></ul></ul><ul><li>Attestations are digitally signed </li></ul><ul><ul><li>Using various TPM/Platform bound CAs </li></ul></ul><ul><li>Each layer of the platform is checked </li></ul><ul><ul><li>Hardware attests what operating system is booted </li></ul></ul><ul><ul><li>OS attests on which applications it requires a key for </li></ul></ul><ul><ul><li>Report on the value of the PCR </li></ul></ul><ul><ul><li>Uses a challenge-response protocol </li></ul></ul>dates Server TPM Nonce Sign (nonce, PCR,..,log), Certificate ID
  7. 7. Trusted Network Connect (TNC) <ul><li>Network Access Control </li></ul><ul><ul><li>Integrity </li></ul></ul><ul><ul><ul><li>Access device is healthy </li></ul></ul></ul><ul><ul><li>Identity </li></ul></ul><ul><ul><ul><li>Tied to TPM identity </li></ul></ul></ul><ul><li>Endpoints Security Policy </li></ul><ul><ul><li>Protective S/W configured properly </li></ul></ul><ul><ul><li>Allows authorized users (Strong Identity) </li></ul></ul><ul><ul><li>Network Access policy compliance </li></ul></ul><ul><li>TPM functionality to thwart attacks </li></ul><ul><ul><li>Hardened client </li></ul></ul>dates <ul><li>Access Authorization dialog </li></ul><ul><ul><li>802.1X/ EAP Access </li></ul></ul><ul><li>TNC dialog protected </li></ul>Access Requester (Client) Dialog TNC Transport TNC Client TCG Integrity Measurement Access Server TCG Integrity Measurement PEP/PDP TNC Server
  8. 8. Security Design Principles dates <ul><li>Least Privilege: Each principle is given the minimum access </li></ul><ul><li>needed to accomplish its task </li></ul><ul><ul><li>Keep the Trusted Computing Base small </li></ul></ul><ul><ul><ul><li>OS parts that ensures proper system functioning </li></ul></ul></ul><ul><ul><ul><ul><li>e.g., the OS Kernel & Hardware </li></ul></ul></ul></ul><ul><li>Current trends </li></ul><ul><li>Today’s systems are large </li></ul><ul><ul><li>Win2k OS is over 50 MB </li></ul></ul><ul><li>Software is continuously updated on users devices </li></ul><ul><li>A hacker is your next door neighbor </li></ul><ul><li>May need to depend on infrastructure for trust </li></ul><ul><ul><li>TPM part of a small Kernel </li></ul></ul><ul><ul><ul><li>Today may be ideal for Mobile Devices </li></ul></ul></ul>
  9. 9. Secure Computing Challenges 1/2 <ul><li>Security for whom ? </li></ul><ul><li>Can TCG solve SPAM, Malicious code etc. </li></ul><ul><li>TPM is a cryptographic co-processor , with some trust anchors (issuer certificates) and private keys “wired in” at the factory </li></ul><ul><ul><li>Various cryptographic smart-card technologies, in both PCMCIA and ISO-7816 packaging have been around for nearly a decade </li></ul></ul><ul><ul><ul><li>Such technology has not measurably improved security </li></ul></ul></ul><ul><li>How much TCG will improve security in the real world? </li></ul>dates
  10. 10. Secure Computing Challenges 2/2 <ul><li>In TCG TPM acts as a notary </li></ul><ul><li>In real world, a notary issues a special type of signature and seal on a paper document merely attests to the existence and superficial contents of the document </li></ul><ul><ul><li>Notary seal cannot make any attestations to the underlying truth of the document </li></ul></ul><ul><ul><li>How can we enable the TPM to verify the underlying truth of statements that are handed to </li></ul></ul><ul><li>To improve the value of the attestation feature </li></ul><ul><ul><li>Do we need to have a small secure operating system, and application software that is moved into the TPM, and fixed at the factory </li></ul></ul>dates
  11. 11. Possible Study Items <ul><li>Security is about risk management </li></ul><ul><ul><li>Can we have a systematic approach for identifying un-trustworthy devices in a TCG environment </li></ul></ul><ul><li>How does TCG relate to Firmware in devices </li></ul><ul><ul><li>Would TCG force hackers to target Firmware instead of software </li></ul></ul><ul><li>It is all about NEAT : Non-Bypassable, Evaluate-able, Always Invoked, and Tamper-Proof 1 </li></ul>dates
  12. 12. Conclusions <ul><li>Trusted Computing offers some good features </li></ul><ul><ul><li>Secure Data </li></ul></ul><ul><ul><li>Secure Boot </li></ul></ul><ul><ul><li>Endpoint Security </li></ul></ul><ul><ul><li>Binding of trusted physical identity allows trusted network identity </li></ul></ul><ul><ul><li>Great forces behind it </li></ul></ul><ul><li>An interesting topic to follow </li></ul>dates
  13. 13. Acknowledgment dates <ul><li>Many thanks to my colleague Marcus Leech for his valuable input and insight that helped make this presentation possible. </li></ul>
  14. 14. Q and A dates
  15. 15. References dates <ul><li>Anderson, J. P., Computer Security Technology Planning Study , ESD-TR-73-51, ESD/AFSC, Hanscom AFB, Bedford, MA, October 1972 </li></ul><ul><li>Trusted Computing Website http://www.trustedcomputinggroup.org </li></ul><ul><li>Trusted Mobile http://www.trusted-mobile.org/ </li></ul><ul><li>Security Solutions http://www.nortel.com/solutions/securenet/index.html </li></ul>

×