Trustworthy Computing



Similar documents
Hi and welcome to the Microsoft Virtual Academy and

Session ID: Session Classification:

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

UEFI on Dell BizClient Platforms

Penetration Testing Windows Vista TM BitLocker TM

Data At Rest Protection

Security Policy for FIPS Validation

UEFI Implications for Windows Server

Lifecycle Controller Platform Update/Firmware Update in Dell PowerEdge 12th Generation Servers

Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

DriveLock and Windows 8

Windows BitLocker Drive Encryption Step-by-Step Guide

DriveLock and Windows 7

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Encrypting with BitLocker for disk volumes under Windows 7

How to Encrypt your Windows 7 SDS Machine with Bitlocker

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

BitLocker Network Unlock & BitLocker support for Encrypted Drives

DELL. Unified Server Configurator Security Overview. A Dell Technical White Paper. By Raja Tamilarasan, Wayne Liles, Marshal Savage and Weijia Zhang

Cautions When Using BitLocker Drive Encryption on PRIMERGY

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

How to enable Disk Encryption on a laptop

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Acronym Term Description

Get Success in Passing Your Certification Exam at first attempt!

Operating System Security

MBAM Self-Help Portals

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Windows Server 2008 R2 Essentials

Embedded Trusted Computing on ARM-based systems

Check Point FDE integration with Digipass Key devices

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Enabling SSL and Client Certificates on the SAP J2EE Engine

Software-based TPM Emulator for Linux

Windows Embedded 7 E versus Windows Embedded 7 P

DIGIPASS CertiID. Getting Started 3.1.0

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Windows 7, Enterprise Desktop Support Technician

Windows BitLocker TM Drive Encryption Design Guide

Training Guide: Configuring Windows8 8

HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7

TPM for Dell Business Clients Using Self Contained Executable. A Dell Technical White Paper

User Guide Win7Zilla

Patterns for Secure Boot and Secure Storage in Computer Systems

Disk Encryption. Aaron Howard IT Security Office

70-685: Enterprise Desktop Support Technician

How to Secure Infrastructure Clouds with Trusted Computing Technologies

WINDOWS PROCESSES AND SERVICES

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website:

Sophos SafeGuard Disk Encryption for Mac Startup guide

Windows Phone 8 Security deep dive

HP BUSINESS NOTEBOOK PC F10 SETUP OVERVIEW

PARALLELS SERVER 4 BARE METAL README

BorderGuard Client. Version 4.4. November 2013

Computer Setup User Guide

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER

HP ProtectTools User Guide

Introducing etoken. What is etoken?

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

SSD Guru. Installation and User Guide. Software Version 1.4

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

MALWAREBYTES PLUGIN DOCUMENTATION

One-Stop Intel TXT Activation Guide

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

SecureDoc Disk Encryption Cryptographic Engine

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

FIPS Security Policy LogRhythm Log Manager

CCEVS Approved Assurance Continuity Maintenance Report

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

FIPS Security Policy LogRhythm or Windows System Monitor Agent

Enhancing Organizational Security Through the Use of Virtual Smart Cards

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

HP ProtectTools Security Manager Guide

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

Trusted Platform Module

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

1 Intel Smart Connect Technology Installation Guide:

Windows 7 BitLocker Drive Encryption Security Policy For FIPS Validation

Tuning U2 Databases on Windows. Nik Kesic, Lead Technical Support

Navigating Endpoint Encryption Technologies

Compatibility with Encryption Products

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Transcription:

Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing

Agenda Windows 8 TPM Scenarios Hardware Choices with Windows Windows 8 TPM Provisioning Platform Crypto Provider TPM Base Services Boot Measurements and Attestation PCP ToolKit 2

TPM Scenarios with Windows 8 3 Attestation Measurements are recorded during the boot process and proven to a 3 rd party BitLocker Drive Encryption - The OS volume is encrypted and booting it requires TPM boot measurements match and an optional PIN is provided during boot Platform Crypto Provider Certificates can be created with their private key bound to the TPM 3 rd party applications can use the TPM like any other Key Storage Provider in Windows 8 Virtual Smart Card The TPM acts like a permanently inserted Smart Card. 3 rd Party Applications Applications send TPM commands to the device through the TPM Base Services API in Windows

Windows 8 support for applications using TPM TPM Applications Direct TPM Commands Win32_TPM Class Key Storage Provider TPM Provisioning Virtual Smart Card Internal TPM 1.2/TPM 2.0 Abstraction Layer Attestation And BitLocker TPM Base Services API Microsoft TPM Stack (resource virtualization & power management) TPM 1.2 TPM 2.0 4

Windows Hardware Landscape Windows 8 Certified Windows 7 Logo x86/x64 CPU x86/x64 CPU Connected Standby Scenario ARM Processor 5

Getting the TPM Provisioned Windows (automatic) if things are configured correctly Administrators: Use tpm.msc and Prepare the TPM if the status is not Ready for use Launch tpminit.exe with administrator privileges from command line or an application Interactively does the process of provisioning for applications using the Windows 8 UX Might involve a reboot (or two) and actions during the boot process Use the Win32_TPM Class Provisioning Method Provision(Boolean ForceClear_Allowed, Boolean PhysicalPresencePrompts_Allowed) Your application controls the user experience and needs to do the interaction with users 6

Windows 8 Automatic TPM 1.2 Provisioning Not Ready Not Ready Ready Provisioning Flag = True Provisioning Flag = True Provisioning Flag = True Disabled Enabled Enabled Deactivated Activated Activated 7 Ownership Not Taken Ownership Not Taken Ownership Taken

Windows 8 Automatic TPM 2.0 Provisioning Not Ready Ready TPM Visible to OS TPM Visible to OS EmptyAuth Set EmptyAuth Set 8 EmptyAuth Set

Platform Crypto Provider (PCP) Requires the TPM to be in a Ready state Works with TPM 1.2 or TPM 2.0 and runs in-process Provides the standard Crypto Next Generation interface using the TPM May specify the Platform Crypto Provider in a certificate template Tracing Developers can trace PCP TPM commands by setting REG_SZ value ProviderTraces under the key HKLM\SYSTEM\CurrentControlSet\Services\TPM with a folder name The process needs write permissions for the directory 9

Bcrypt RNG Platform Crypto Provider Exposes the TPM random number generator through the CNG RNG interface Works with TPM 1.2 or TPM 2.0 and runs in-process Only uses the TPM as a source (unlike the default Windows provider that uses many sources) Depending how much entropy the TPM can generate in a single command it could take many TPM commands to generate entropy. The limit permitted is 4096 bytes per a call. You can stir the TPMs entropy with up to 256 bytes too. 10

NCrypt RSA Platform Key Storage Provider Supports a subset of the Microsoft software provider Fully supports all actions used by certificate enrollment Does not support exportable keys without any authorization Does support exportable keys that require a migration authorization for controlled export Supports a bunch of additional methods and properties allowing use of the TPM s functionality Keys bound to PCR values Having the TPM constrain the key usage for a specific purpose like encryption or signing Creating attestation information about a key to show it exists in a TPM May be used by custom enrollment agents 11

TPM Base Services API (TBS) Permits applications to send TPM 1.2 or TPM 2.0 commands directly Resource virtualization Available in kernel mode or user mode Methods: Tbsi_Context_Create Tbsip_Context_Close Tbsi_Get_TCG_Log Tbsi_Revoke_Attestation Tbsi_GetDeviceInfo Tbsip_Submit_Command 12

Trusted boot architecture 1 UEFI Boot 1 Boot Policy 3 2 Win 8 OS Loader AM Policy TPM 3 Windows Kernel ELAM Software 4 2 3rd Party Software 4 Windows Logon Anti- Malware Client Quote Healthy? Attestation Service

Boot Process up to Windows Boot Manager Unified Extensible Firmware Interface (UEFI) Boot UEFI Environment UEFI Drivers UEFI Windows Boot Manager Power On TPM Startup Specific Firmware Compatibility Support Module (CSM) Conventional BIOS Environment Option ROMs Conventional BIOS Boot Master Boot Record Boot Block Boot Sector 14 Windows Boot Manager

Boot Process from Boot Manager Boot from Hibernation Measured in TPM by Win8 WinResume Hibernation File Windows 8 Operating Running Hibernating Hibernation File Windows Boot Manager Windows Kernel WinLoad Measured in TPM by Windows 8 Full Boot Process Core Windows Kernel Early Launch Anti-Malware Drivers Early Launch Driver Policy Measured in TPM by Windows 8 Boot Drivers Anti-malware Runtime Driver Storage Driver Other Early Launch Anti-Malware Drivers Stopped Normal Drivers 15

Attestation for Full Boot TPM Startup Specific Firmware Full Boot Process UEFI BIOS An Attestation identity key is provisioned for the platform Windows Boot Manager WinLoad Kernel Startup Early Launch Anti-Malware Drivers Early Launch Driver Policy Anti-malware Runtime Driver Handoff Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement Proof is a Boot Log and a Quote of PCR values Provisioning process verifies the attestation key only exists in the TPM 16 Attestation keys are used to sign the current PCR values, the result is a Quote Can be reviewed by a remote verifier to determine if the client system is trustworthy

What executes in Hibernation/Resume Cycles Archive Boot Log with Quote of the PCRs Full Boot Process TPM Startup Increment TPM Restart Counter Increment TPM 17 Restart Counter Specific Firmware UEFI BIOS Windows Boot Manager Possible Extra Boot with Offline Event TPM Startup Increment TPM Restart Counter Another Boot Resuming from Hibernation TPM Startup Specific Firmware Specific Firmware UEFI BIOS UEFI BIOS Record TPM Restart Counter Something else booted? Windows Boot Manager Record TPM Restart Counter WinLoad Hibernation File Tampering? WinResume Kernel Startup Early Launch Anti-Malware Drivers Early Launch Driver Policy Anti-malware Runtime Driver Handoff Restored Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement Stored Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement

What if anti-malware stops enforcing policy? Anti-malware might not be able to continuously enforce policy Might need to do something it doesn t trust Event Counter skips value after calling RevokeAttestation Archive Boot Log with Quote of the PCRs Full Boot Process TPM Startup Specific Firmware UEFI BIOS Windows Boot Manager Event Counter Increment & Measurement WinLoad WinResume Kernel Start Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement 18 Can call Windows RevokeAttestation API Changes the value of PCR[12] so the boot log & quote don t match Increments the Event Counter the archive log doesn t match the value in the TPM on hibernation/resume Proof is a Boot Log and a Quote of PCR values PCR[12] Mismatch after calling RevokeAttestation

Attestation for Hibernation Resume Cycle Stored Hibernation File Another Boot Resuming from Hibernation TPM Startup Increment TPM Restart Counter Specific Firmware UEFI BIOS Windows Boot Manager Record TPM Restart Counter Event Counter Increment & Measurement WinResume Restored Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement Proof is a Boot Log and a Quote of PCR values Can be reviewed by a remote verifier to determine if the client system is trustworthy Continuous boot logs can be confirmed by successive TPM restart counter measurements in the archived logs If the Event Counter skips a value, the RevokeAttestation was called in previous boot Archived Boot Logs and Quotes from previous boots 19

Trust Boundary Trust Boundary Trust Boundary Separator Measurement Trust Boundary Boot Process Measurements Optional Revoke Attestation Action Power-on components through Boot Manager Boot Manager, WinLoad & Resume Configuration Restart Counter Event Counter WinLoad / Resume Config Kernel Options Early Launch Antimalware Data Invalidated BootMgr.mui WinLoad WinResume WinLoad.mui WinResume.mui Windows Kernel Boot Drivers Boot Mgr.mui WinLoad WinResume Boot Mgr.mui WinLoad WinResume 20 Restart Count++ Event Counter Incremented Event Counter Incremented

Creating AIKs 21

Resources TPM Platform Crypto Provider Toolkit: http://research.microsoft.com/enus/downloads/74c45746-24ad-4cb7-ba4b-0c6df2f92d5d/ TPM 2.0 Library Specification: https://www.trustedcomputinggroup.org/resources/tpm_library_specification Understanding and Evaluating Virtual Smart Cards: http://www.microsoft.com/enus/download/details.aspx?id=29076 Windows 8 TPM Base Services API documentation: http://msdn.microsoft.com/enus/library/windows/desktop/aa446796(v=vs.85).aspx Windows 8 Hardware Certification Requirements: http://msdn.microsoft.com/library/windows/hardware/hh748188 23

Q & A Stefan Thom (stefanth@microsoft.com) Rob Spiger (rspiger@microsoft.com) 24

2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.