SlideShare a Scribd company logo
Demo: Securing IoT with
Trustworthy Computing
l
© 2015 Trusted Computing Group 1
Agenda
• Introduction, problem statement and use case
• Description of the Demo
• Demo
© 2015 Trusted Computing Group 2
© 2015 Trusted Computing Group 3
Introduction, problem statement and use case
Introduction
• This demo is a proof of concept
• As a proof of concept, please let us know what you
think of what you see
Problem Statement
• Can we implement strong authentication between all
equipment in a network, not just of one endpoint to
another?
• By definition, single factor authentication is weak, two or more factors of
authentication is strong
© 2015 Trusted Computing Group 4
Demo Use Case
• General Use Case:
– A deployment of IoT devices (sensors and actuators)
– Central management for the IoT deployment is remote to the IoT
devices, over an Internet
– Can we show that all equipment in the use case is owned by the
customer and that the software on that equipment has not been
changed?
• Specific example: Smart buildings
– A smart building in Manhattan may have thousands of devices
like cameras, thermostats, HVAC actuators, etc.
– Central management for the building might be in a datacenter
in Dallas.
– What can be done to enhance the security and trustworthiness
of all of the devices, including network gear, in this example?
© 2015 Trusted Computing Group 5
© 2015 Trusted Computing Group 6
Description of the Demo
What the Demo Shows
• Strong authentication in Machine to Machine
(M2M) communications
– Uses certificate and integrity validation
• M2M authentication is point to point across a
network, including auth of routers to end points
– No implicit trust is required in this demo
• Authentication is policy-based, locally enforced
© 2015 Trusted Computing Group 7
The Demo Equipment & Layout
Raspberry Pi Cisco CGR 1120
Cisco UCS 240 Server
Our IoT deployment
Our network gear
Our management server
Authentication Flow Between rPi and CGR
© 2015 Trusted Computing Group 9
Raspberry Pi
Cisco CGR 1120
1. Start Session?
2. Who are you? Can I
trust you?
3. Here are my identity
and TPM-signed integrity
information
4. Verify identity and
integrity (done locally)
6. Open SSL session to
Server through CGR 5. Session authorized
Authentication Flow Between Server and CGR
© 2015 Trusted Computing Group 10
1. Start Session?
2. Who are you? Can I
trust you? Here are my
credentials
3. Verify identity and
integrity (done locally)
3. Verify identity and
integrity (done locally)
4. Session authorized 4. Session authorized
Cisco UCS 240 Server
Cisco CGR 1120
5. Open SSL session to rPi through CGR
Authentication Architecture for TNC
© 2015 Trusted Computing Group 11
Raspberry Pi
Cisco CGR 1120
Integrity Measurement
Collector
Integrity Measurement
Verifier
TNC IF-M (RFC 5792)
(Application layer)
TNC Client TNC Server
TNC IF-TNCCS (RFC 5793)
(Message Flow layer)
Network Access
Requestor
Network Access
Authority
TNC IF-T (RFC 6876)
(Packet flow layer)
Demo Network Topology
PT-TLS
Raspi 1
Raspi 6
Cisco CGR1120
…
UCS 7
UCS 9
HW TPM
IMA
PT-TLS
TNC Client
TNC Server
IMA
TNC Client
SW TPM
TBOOT
TNC Client
HW TPM
TBOOT
TNC Client
SW TPM
TBOOT
TNC Client
PT-TLS
PT-TLS
http
http
IoT Devices
TNC Mutual Attestation
Policy
DB
TNC 1-Way Attestation
Fake endpoint
OK, Fine. Enough slides.
SHOW IT!
© 2015 Trusted Computing Group 13
Sample Log Entries Showing System Start
© 2015 Trusted Computing Group 14
Linux IMA to measure the OS
© 2015 Trusted Computing Group 15
• Prior to OS Load, the CRTM measures BIOS & boot loader into PCRs on the TPM
• Early in OS Load, Linux Integrity Management Architecture measures (hashes) a
policy-based list of files and directories.
• Each new hash is then extended into PCR 10
• The final aggregate hash in PCR 10 is the record of the state of the measured
files/directories at time of boot
• The quote of PCRs 0-7 and PCR 10 is the basis for TNC PDP to decide if the
supplicant OS is trusted
Snip of syslog showing IMA measuring file and extending measurements into PCR 10:
(easiest to follow the numbers, read right to left)
PCR used (10) New value stored in PCR 10 Hash of file Hashed File
3. 2. 1.4.
TNC Client Authentication – Certificate
Exchange
© 2015 Trusted Computing Group 16
Snippet of normal TLS certificate processing at session start, raspberry Pi
requesting session with a CGR.
Integrity validation follows certificate validation.
Authentication continues with validation
of integrity report
© 2015 Trusted Computing Group 17
Snippet from syslog showing completion of integrity validation done by a
CGR against a raspberry Pi
TNC-based authentication of the rPi is now complete.
A normal TLS session can now be set up.
© 2015 Trusted Computing Group 18
Done with syslog, now the GUI view.
This screen shows the policy-defined
list of directories and files that IMA will
measaure into PCR 10 on the rPi.
When the rPi authenticates to the
CGR, it provides a signed report of the
values in its PCRs, including PCR 10.
This list is also kept in the validation
server on the CGR, along with
expected values for each file and each
PCR.
The CGR only validates PCR
measurements, not individual file
measurements
© 2015 Trusted Computing Group 19
Drill down on /bin directory, showing the files in /bin that are measured
into PCR 10.
The CGR will match the reported PCR 10 against the expected PCR to
decide if the CGR trusts the OS running on rPi.
© 2015 Trusted Computing Group 20
Final drill down – the SHA1 and SHA256 hash values that the CGR uses as golden values
(customer selects which algorithm to use).
Remember that on the rPi, all these files are individually hashed (measured), then the hash
extended into PCR 10 with all other hashes.
The CGR has a golden measurement for each file. It also has a golden measurement that
represents the consolidated measurements of all the files consolidated in PCR 10.
At authentication, the CGR validates either each file measurement or only the consolidated
set reported in PCR 10 by the rPi.
21
Next we look at the device report for devices currently connected to the CGR
This is a drill down on Raspi 2. Under Device Info, note the ID.
The ID is the SHA256 hash of Raspi 2’s AIK Public Key. The AIK private key is protected
within Raspi 2’s TPM.
This Proof of Concept uses the hash of the AIK public key as a unique, hardware protected
identity for Raspi 2.
Hash of Raspi 2’s AIK public key
Device report, next
General report for Raspi 2
© 2015 Trusted Computing Group 22
Click here to see details
of the last session
23
TPM IMA on the rPi reporting 299 measurements
Based on policy in the CGR,
The CGR is validating every file. It expects 288 and finds them to be correct
It finds 299 measurements and ignores the 11 unknown
“0 Failed” means that Raspi 2 is allowed to connect in this case
The “11 unknown” means there is a mismatch between what the Raspi 2 is reporting
and what the CGR is expecting. If CGR is matching only on PCR 10, this would have
been a “1 failed” condition and the session would not be allowed.
Connection attempt by Raspi
2 was allowed
Whoops! What happened here?
Here we are. One IMA
generated hash was found to be
different. Under the policy for
this device, that is not
acceptable.
What a server connection looks like on the CGR
© 2015 Trusted Computing Group 25
Measurements of Linux follows TBOOT,
assuming that the TPM quote is obtained
through TXT running on the server
Server measurements are in PCRs 17
and 18 for Linux, therefore 2 evidence
measurements are evaluated
Done & Summary
• This demo addresses a broad current of convergence occurring
between the IoT & Cloud markets.
• We’ve seen
– All devices in the demo employ multi-factor authentication to
decide whether a device can join the network or not.
– That dedicated HW protects authentication credentials from end
to end.
– Two implementations of this authentication –
• One-way, the rPi to the CGR, the rPi implicitly trusts the CGR
• Two-way, the CGR & the server – no implicit trust is required.
– A policy based mechanism for the customer to specify what
software on the devices must maintain integrity and what
happens when integrity is lost.
• The result is that devices in this network organize themselves into a
closed communication path based on validation of HW protected
identity and integrity information
© 2015 Trusted Computing Group 26

More Related Content

What's hot

Firewalls
FirewallsFirewalls
Firewalls
hemantag
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Canada
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
Lancope, Inc.
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
Warren Bent
 
Wi fi-security-the-details-matter
Wi fi-security-the-details-matterWi fi-security-the-details-matter
Wi fi-security-the-details-matter
DESMOND YUEN
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
Priyanka Aash
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
Fakrul Alam
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
NetProtocol Xpert
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
Lancope, Inc.
 
Rdmap Security
Rdmap  SecurityRdmap  Security
Rdmap Security
Sanjeev Kumar Jaiswal
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
Priyanka Aash
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
Omer Coskun
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
Marie-Agnès PONS
 
F5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transitionF5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transition
Dmitry Tikhovich
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
Babaa Naya
 
Transforming Security: Containers, Virtualization and Softwarization
Transforming Security: Containers, Virtualization and SoftwarizationTransforming Security: Containers, Virtualization and Softwarization
Transforming Security: Containers, Virtualization and Softwarization
Priyanka Aash
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
Alberto Rivai
 
Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting
Bangladesh Network Operators Group
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
 
RPKI Trust Anchor
RPKI Trust AnchorRPKI Trust Anchor
RPKI Trust Anchor
APNIC
 

What's hot (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Wi fi-security-the-details-matter
Wi fi-security-the-details-matterWi fi-security-the-details-matter
Wi fi-security-the-details-matter
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
 
Rdmap Security
Rdmap  SecurityRdmap  Security
Rdmap Security
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
F5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transitionF5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transition
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
 
Transforming Security: Containers, Virtualization and Softwarization
Transforming Security: Containers, Virtualization and SoftwarizationTransforming Security: Containers, Virtualization and Softwarization
Transforming Security: Containers, Virtualization and Softwarization
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
RPKI Trust Anchor
RPKI Trust AnchorRPKI Trust Anchor
RPKI Trust Anchor
 

Similar to Securing Internet of Things with Trustworthy Computing

PTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security PrimerPTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security Primer
PTC
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
naghamallella
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
Aruba, a Hewlett Packard Enterprise company
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
Sajid Marwat
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
Basim Aly (JNCIP-SP, JNCIP-ENT)
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
David Wallom
 
Analyzing RDP traffc with Bro
Analyzing RDP traffc with BroAnalyzing RDP traffc with Bro
Analyzing RDP traffc with Bro
Josh Liburdi
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
Brian A. McHenry
 
Bringing Learnings from Googley Microservices with gRPC - Varun Talwar, Google
Bringing Learnings from Googley Microservices with gRPC - Varun Talwar, GoogleBringing Learnings from Googley Microservices with gRPC - Varun Talwar, Google
Bringing Learnings from Googley Microservices with gRPC - Varun Talwar, Google
Ambassador Labs
 
LAS16-306: Exploring the Open Trusted Protocol
LAS16-306: Exploring the Open Trusted ProtocolLAS16-306: Exploring the Open Trusted Protocol
LAS16-306: Exploring the Open Trusted Protocol
Linaro
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
milkux
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
Maksim Djackov
 
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & WeaveworksSecure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Weaveworks
 
CCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptxCCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptx
HugoGamez7
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
Nika it consulting report
Nika it consulting  reportNika it consulting  report
Nika it consulting report
Rod Delwar
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo download
JeannieHeldt
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
Matrix
MatrixMatrix
Matrix
Sashank Dara
 

Similar to Securing Internet of Things with Trustworthy Computing (20)

PTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security PrimerPTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security Primer
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Analyzing RDP traffc with Bro
Analyzing RDP traffc with BroAnalyzing RDP traffc with Bro
Analyzing RDP traffc with Bro
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Bringing Learnings from Googley Microservices with gRPC - Varun Talwar, Google
Bringing Learnings from Googley Microservices with gRPC - Varun Talwar, GoogleBringing Learnings from Googley Microservices with gRPC - Varun Talwar, Google
Bringing Learnings from Googley Microservices with gRPC - Varun Talwar, Google
 
LAS16-306: Exploring the Open Trusted Protocol
LAS16-306: Exploring the Open Trusted ProtocolLAS16-306: Exploring the Open Trusted Protocol
LAS16-306: Exploring the Open Trusted Protocol
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & WeaveworksSecure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
 
CCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptxCCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptx
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Nika it consulting report
Nika it consulting  reportNika it consulting  report
Nika it consulting report
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo download
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
Matrix
MatrixMatrix
Matrix
 

More from The Security of Things Forum

Securing the Fog
Securing the FogSecuring the Fog
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
The Security of Things Forum
 
What is being exposed from IoT Devices
What is being exposed from IoT DevicesWhat is being exposed from IoT Devices
What is being exposed from IoT Devices
The Security of Things Forum
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
The Security of Things Forum
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
The Security of Things Forum
 

More from The Security of Things Forum (6)

Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
What is being exposed from IoT Devices
What is being exposed from IoT DevicesWhat is being exposed from IoT Devices
What is being exposed from IoT Devices
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Securing Internet of Things with Trustworthy Computing

  • 1. Demo: Securing IoT with Trustworthy Computing l © 2015 Trusted Computing Group 1
  • 2. Agenda • Introduction, problem statement and use case • Description of the Demo • Demo © 2015 Trusted Computing Group 2
  • 3. © 2015 Trusted Computing Group 3 Introduction, problem statement and use case
  • 4. Introduction • This demo is a proof of concept • As a proof of concept, please let us know what you think of what you see Problem Statement • Can we implement strong authentication between all equipment in a network, not just of one endpoint to another? • By definition, single factor authentication is weak, two or more factors of authentication is strong © 2015 Trusted Computing Group 4
  • 5. Demo Use Case • General Use Case: – A deployment of IoT devices (sensors and actuators) – Central management for the IoT deployment is remote to the IoT devices, over an Internet – Can we show that all equipment in the use case is owned by the customer and that the software on that equipment has not been changed? • Specific example: Smart buildings – A smart building in Manhattan may have thousands of devices like cameras, thermostats, HVAC actuators, etc. – Central management for the building might be in a datacenter in Dallas. – What can be done to enhance the security and trustworthiness of all of the devices, including network gear, in this example? © 2015 Trusted Computing Group 5
  • 6. © 2015 Trusted Computing Group 6 Description of the Demo
  • 7. What the Demo Shows • Strong authentication in Machine to Machine (M2M) communications – Uses certificate and integrity validation • M2M authentication is point to point across a network, including auth of routers to end points – No implicit trust is required in this demo • Authentication is policy-based, locally enforced © 2015 Trusted Computing Group 7
  • 8. The Demo Equipment & Layout Raspberry Pi Cisco CGR 1120 Cisco UCS 240 Server Our IoT deployment Our network gear Our management server
  • 9. Authentication Flow Between rPi and CGR © 2015 Trusted Computing Group 9 Raspberry Pi Cisco CGR 1120 1. Start Session? 2. Who are you? Can I trust you? 3. Here are my identity and TPM-signed integrity information 4. Verify identity and integrity (done locally) 6. Open SSL session to Server through CGR 5. Session authorized
  • 10. Authentication Flow Between Server and CGR © 2015 Trusted Computing Group 10 1. Start Session? 2. Who are you? Can I trust you? Here are my credentials 3. Verify identity and integrity (done locally) 3. Verify identity and integrity (done locally) 4. Session authorized 4. Session authorized Cisco UCS 240 Server Cisco CGR 1120 5. Open SSL session to rPi through CGR
  • 11. Authentication Architecture for TNC © 2015 Trusted Computing Group 11 Raspberry Pi Cisco CGR 1120 Integrity Measurement Collector Integrity Measurement Verifier TNC IF-M (RFC 5792) (Application layer) TNC Client TNC Server TNC IF-TNCCS (RFC 5793) (Message Flow layer) Network Access Requestor Network Access Authority TNC IF-T (RFC 6876) (Packet flow layer)
  • 12. Demo Network Topology PT-TLS Raspi 1 Raspi 6 Cisco CGR1120 … UCS 7 UCS 9 HW TPM IMA PT-TLS TNC Client TNC Server IMA TNC Client SW TPM TBOOT TNC Client HW TPM TBOOT TNC Client SW TPM TBOOT TNC Client PT-TLS PT-TLS http http IoT Devices TNC Mutual Attestation Policy DB TNC 1-Way Attestation Fake endpoint
  • 13. OK, Fine. Enough slides. SHOW IT! © 2015 Trusted Computing Group 13
  • 14. Sample Log Entries Showing System Start © 2015 Trusted Computing Group 14
  • 15. Linux IMA to measure the OS © 2015 Trusted Computing Group 15 • Prior to OS Load, the CRTM measures BIOS & boot loader into PCRs on the TPM • Early in OS Load, Linux Integrity Management Architecture measures (hashes) a policy-based list of files and directories. • Each new hash is then extended into PCR 10 • The final aggregate hash in PCR 10 is the record of the state of the measured files/directories at time of boot • The quote of PCRs 0-7 and PCR 10 is the basis for TNC PDP to decide if the supplicant OS is trusted Snip of syslog showing IMA measuring file and extending measurements into PCR 10: (easiest to follow the numbers, read right to left) PCR used (10) New value stored in PCR 10 Hash of file Hashed File 3. 2. 1.4.
  • 16. TNC Client Authentication – Certificate Exchange © 2015 Trusted Computing Group 16 Snippet of normal TLS certificate processing at session start, raspberry Pi requesting session with a CGR. Integrity validation follows certificate validation.
  • 17. Authentication continues with validation of integrity report © 2015 Trusted Computing Group 17 Snippet from syslog showing completion of integrity validation done by a CGR against a raspberry Pi TNC-based authentication of the rPi is now complete. A normal TLS session can now be set up.
  • 18. © 2015 Trusted Computing Group 18 Done with syslog, now the GUI view. This screen shows the policy-defined list of directories and files that IMA will measaure into PCR 10 on the rPi. When the rPi authenticates to the CGR, it provides a signed report of the values in its PCRs, including PCR 10. This list is also kept in the validation server on the CGR, along with expected values for each file and each PCR. The CGR only validates PCR measurements, not individual file measurements
  • 19. © 2015 Trusted Computing Group 19 Drill down on /bin directory, showing the files in /bin that are measured into PCR 10. The CGR will match the reported PCR 10 against the expected PCR to decide if the CGR trusts the OS running on rPi.
  • 20. © 2015 Trusted Computing Group 20 Final drill down – the SHA1 and SHA256 hash values that the CGR uses as golden values (customer selects which algorithm to use). Remember that on the rPi, all these files are individually hashed (measured), then the hash extended into PCR 10 with all other hashes. The CGR has a golden measurement for each file. It also has a golden measurement that represents the consolidated measurements of all the files consolidated in PCR 10. At authentication, the CGR validates either each file measurement or only the consolidated set reported in PCR 10 by the rPi.
  • 21. 21 Next we look at the device report for devices currently connected to the CGR This is a drill down on Raspi 2. Under Device Info, note the ID. The ID is the SHA256 hash of Raspi 2’s AIK Public Key. The AIK private key is protected within Raspi 2’s TPM. This Proof of Concept uses the hash of the AIK public key as a unique, hardware protected identity for Raspi 2. Hash of Raspi 2’s AIK public key Device report, next
  • 22. General report for Raspi 2 © 2015 Trusted Computing Group 22 Click here to see details of the last session
  • 23. 23 TPM IMA on the rPi reporting 299 measurements Based on policy in the CGR, The CGR is validating every file. It expects 288 and finds them to be correct It finds 299 measurements and ignores the 11 unknown “0 Failed” means that Raspi 2 is allowed to connect in this case The “11 unknown” means there is a mismatch between what the Raspi 2 is reporting and what the CGR is expecting. If CGR is matching only on PCR 10, this would have been a “1 failed” condition and the session would not be allowed. Connection attempt by Raspi 2 was allowed
  • 24. Whoops! What happened here? Here we are. One IMA generated hash was found to be different. Under the policy for this device, that is not acceptable.
  • 25. What a server connection looks like on the CGR © 2015 Trusted Computing Group 25 Measurements of Linux follows TBOOT, assuming that the TPM quote is obtained through TXT running on the server Server measurements are in PCRs 17 and 18 for Linux, therefore 2 evidence measurements are evaluated
  • 26. Done & Summary • This demo addresses a broad current of convergence occurring between the IoT & Cloud markets. • We’ve seen – All devices in the demo employ multi-factor authentication to decide whether a device can join the network or not. – That dedicated HW protects authentication credentials from end to end. – Two implementations of this authentication – • One-way, the rPi to the CGR, the rPi implicitly trusts the CGR • Two-way, the CGR & the server – no implicit trust is required. – A policy based mechanism for the customer to specify what software on the devices must maintain integrity and what happens when integrity is lost. • The result is that devices in this network organize themselves into a closed communication path based on validation of HW protected identity and integrity information © 2015 Trusted Computing Group 26