Secure your Docker images



Similar documents
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Cloud storage reloaded:

Intro to Docker and Containers

Building a Continuous Integration Pipeline with Docker

2014 IBM Corporation

USING SSL/TLS WITH TERMINAL EMULATION

Platform as a Service and Container Clouds

Getting Started Using Project Photon on VMware Fusion/Workstation

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Contents Jive StreamOnce

Public Key Infrastructure for a Higher Education Environment

TrustKey Tool User Manual

Agenda. How to configure

December P Xerox App Studio 3.0 Information Assurance Disclosure

Installation / Configuration Manual. TLS and srtp

The Virtualization Practice

Wireless Security Camera with the Arduino Yun

SBClient SSL. Ehab AbuShmais

Introduction to FileWave

YubiKey & OATH- TOTP Verification

Inside Dropbox: Understanding Personal Cloud Storage Services

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

How To Install Project Photon On Vsphere 5.5 & 6.0 (Vmware Vspher) With Docker (Virtual) On Linux (Amd64) On A Ubuntu Vspheon Vspheres 5.4

Getting Started With Halo for Windows

SysPatrol - Server Security Monitor

Linstantiation of applications. Docker accelerate

Document Digital Signature

CLEARPASS ONGUARD CONFIGURATION GUIDE

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

SAIP 2012 Performance Engineering

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

CHEF IN THE CLOUD AND ON THE GROUND

Final Year Project Interim Report

Simple Guide to Digital Signatures

TELNET CLIENT 5.0 SSL/TLS SUPPORT

Mobility Manager 9.0. Installation Guide

How to Configure Certificate Based Authentication for WorxMail and XenMobile 10

Server based signature service. Overview

Embedded System Deployment and Management

Uploading files to FTP server

WDM Security Guidelines

DevOoops Increase awareness around DevOps infra security. Gianluca

Configuring Outlook 2016 for Windows

Thales ncipher modules. Version: 1.2. Date: 22 December Copyright 2009 ncipher Corporation Ltd. All rights reserved.

How to configure SSL proxying in Zorp 3 F5

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

White Paper Server. SUSE Linux Enterprise Server 12 Modules

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

/ Preparing to Manage a VMware Environment Page 1

Installation Guide for contineo

SafeNet KMIP and Google Cloud Storage Integration Guide

XtreemFS Extreme cloud file system?! Udo Seidel

Dry Dock Documentation

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint

deploying meteor with meteor up

Digital Signatures in a PDF

How To Secure Your Computer With Libreware Libreroview (Windows) And Libreros (Windows 2) (Windows 3.5) (For Windows) (Powerpoint) (Networking)

WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security

SecureTransport. Version 5.3.0

Salesforce1 Mobile Security Guide

G-Lock EasyMail7. Admin Guide. Client-Server Marketing Solution for Windows. Copyright G-Lock Software. All Rights Reserved.

Shipping Services Files (SSF) Secure File Transmission Account Setup

VMware vrealize Operations for Horizon Security

Configuration Guide BES12. Version 12.2

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Best Practices for Deploying, Replicating, and Managing Real-Time and FPGA Applications. ni.com

Avira Update Manager User Manual

AAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

How to Pop to Outlook

XML Signatures in an Enterprise Service Bus Environment

Guidelines on use of encryption to protect person identifiable and sensitive information

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

How to configure SSL proxying in Zorp 6

MaaS360 Mobile Enterprise Gateway

Token User Guide. Version 1.0/ July 2013

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

MaaS360 Mobile Enterprise Gateway

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

HRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Yale Software Library

SAFE Digital Signatures in PDF

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

BlackBerry Enterprise Service 10. Version: Configuration Guide

Release Notes for Version

USER GUIDE WWPass Security for (Outlook) For WWPass Security Pack 2.4

Management, Logging and Troubleshooting

HOWTO. Configure Nginx for SSL with DoD CAC Authentication on CentOS 6.3. Joshua Penton Geocent, LLC

Shakambaree Technologies Pvt. Ltd.

Ryu SDN Framework What weʼ ve learned Where weʼ ll go

HTTPS is Fast and Hassle-free with CloudFlare

ADFS Integration Guidelines

Transcription:

Secure your Docker images With Notary and Yubikey Dr. Udo Seidel

Agenda Introduction The Update Framework Notary Yubikey Getting started Summary

Me :-) Teacher of mathematics and physics PhD in experimental physics Started with Linux in 1996 With Amadeus since 2006 Before: Linux/UNIX trainer Solution Engineer in HPC and CAx environment Now: Architecture & Technical Governance

Introduction

Docker for Dummies Set of Libraries Executables Other files Very image-based Separation via several namespaces

Docker work-flow $ docker pull $ docker run/start/stop/... $ docker commit/create/... $ docker push

Docker security Host Docker Daemon Docker Image Docker Instance

Docker work-flow security Store Upload Download Run

The Update Framework

Link to software management Source Target Download Content

Basic idea Plugin architecture Easier integration Easier to expand Digital signatures Proven technology Key management is crucial Meta data

Meta-Data Enhanced security Whom to trust Version system Cryptographic checksums Enhanced role model Delegation Separation of duties

TUF Roles I Root Delegates trust Uses keys Target What is trusted by clients Can delegate too

TUF Roles II Snapshot (latest) version of meta data Update info for clients Timestamp Prevent out-of-data attacks Keys kept online Mirror Optional

The two aspects of TUF Several implementations Python Ruby Haskell... Go :-) Specification!

Notary

Notary and TUF Go implementation Base of Docker Content Trust Not limited to docker

High level architecture Client-Server model 3 server components Server Signer Database TCP/IP based communication TLS possible... mandatory

High level architecture

Notary Server PoC for client REST API Port Default: 443 or 4443 Configurable Client need to know

Notary Signer Cryptographic operations Data store Database Memory PKCS#11 via softhsm2 Ports 4444 for HTTP 7899 for GRPC

Notary Database ATM: MySQL only Standard port: 3306 3 tables Private keys Timestamp keys Meta data

Roles and keys TUF specification 4 different roles See TUF before Mirror droped Keys per role Data format: JSON

Root The base/start/entry point Two kinds Global Local Like root-ca in SSL/TLS world

Target Main user interaction Corresponds to file, directory, repository Meta data Files File sizes Default validity: 3 years BASE64 coded SHA256 checksums Signed by target role

Snapshot Management of root target.json Consistent view of software repository Meta Data Files File sizes Default validity: 3 years BASE64 coded SHA256 checksums Signed by Snapshot role

Timestamp Management of snapshot.json Meta Data File File size Default validity: 14 days BASE64 coded SHA256 checksums Signed by Timestamp role Key stored on server only

The client notary $HOME/.notary/

Docker Content Trust (DCT) Since Engine version 1.8 Notary: foundation but 'hidden'

Docker Content Trust Interaction via docker Mixed repository content (De-)Activation $ DOCKER_CONTENT_TRUST=0 1 $ disable content trust=true false

Yubikey

Secure your (root) keys See root CA keys for SSL Secure and mobile How? Encrypted $HOME Encrypted USB sticks??? => Yubikey (4)

Yubikey 4 Personal Identity Verification Two-Factor-Authentication Different Standards Here: FIDO and U2F One-Time-Passwords Chip Card Interface Device

Yubikey-PIV and Docker/Notary Notary root key Storage 4 in total In addition to $HOME Access Docker-Speak Changing content of repository New/change docker images

Yubikey-U2F and Docker/Notary Enhance security Generation of root keys Access to root keys Humans no machines/robots Fine for manual tasks

Universal 2 Factor Authentication

Yubikey in Docker action

Yubikey 4 Beyond Docker Github Dropbox Gmail Google apps Disk encryption

Getting Started

Getting Started Notary (easy) Use official Docker Hub image :-) TLS quite tricky Drop docker and use notary Yubikey optional

Getting Started Notary (less easy) Setup GO build environment Download and compile notary Configure and startup Manually Via Docker Compose TLS quite tricky Yubikey optional

Getting Started Yubikey (easy) Yubikey mandatory :-) Test Repo on Docker Hub Enable DCT Insert Yubikey before pcscd $ docker pull/push

Getting Started Yubikey (less easy) Yubikey mandatory Setup own Registry Setup Notary (see before) Enable DCT Insert Yubikey before pcscd $ docker pull/push

Summary

Take Aways Good start Early days Only Docker Image security What is next? Other Yubikey functions? Other Tokens?

References http://www.docker.com http://theupdateframework.com http://www.yubico.com/docker http://github.com/docker/notary http://docs.docker.com/engine/security/trust

Thank you!

Secure your Docker images Linux?!? With Notary and Yubikey Dr. Udo Seidel