Taking the Open Source Road



Similar documents
Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Ciphire Mail. Abstract

IoT Security Platform

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center

Certification Report

Department of Defense PKI Use Case/Experiences

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence

Clearswift SECURE File Gateway

IBM Rational Asset Manager

Attestation and Authentication Protocols Using the TPM

Patch Management Marvin Christensen /CIAC

White Paper. Enhancing Website Security with Algorithm Agility

Model-driven development solutions To support your business objectives. IBM Rational Rhapsody edition comparison matrix

Security Enhanced Linux and the Path Forward

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release July 2015

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

National Security Agency Perspective on Key Management

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

Packet Level Authentication Overview

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

A Draft Framework for Designing Cryptographic Key Management Systems

CA Aion Business Rules Expert r11

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Oracle Identity and Access Management 10g Release running on Red Hat Enterprise Linux AS Release 4 Update 5

Securing Data in a RHEL SELinux Multi-Level Secure Environment

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

Consolidated Afloat Networks and Enterprise Services (CANES)

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT

Security challenges for internet technologies on mobile devices

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

IBM Endpoint Manager for Server Automation

SGFS: Secure, Flexible, and Policy-based Global File Sharing

What is Really Needed to Secure the Internet of Things?

The IBM Cognos Platform for Enterprise Business Intelligence

Delivering a platform-independent based ESB for universal connectivity and transformation in heterogeneous IT environments.

Introduction to Computer Security

A PKI case study: Implementing the Server-based Certificate Validation Protocol

Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009

IBM Tivoli Service Request Manager

HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Confining the Apache Web Server with Security-Enhanced Linux

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Biometrics, Tokens, & Public Key Certificates

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

2007 Microsoft Office System Document Encryption

IBM Tivoli Endpoint Manager for Lifecycle Management

Module 1: e- Learning

Doctor of Philosophy in Computer Science

Master of Science in Computer Science

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

How To Write A Learning System Standard

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

Information and Communications Technology Courses at a Glance

EC-Council E C S P.NET. EC-Council. EC-Council Certified Secure Programmer (.NET)

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

Cloud Computing and Enterprise Services

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

MEng, BSc Applied Computer Science

Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3

Evaluation of different Open Source Identity management Systems

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Certification Report

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services

CS 356 Lecture 28 Internet Authentication. Spring 2013

Ahsay BackupBox v1.0. Deployment Guide. Ahsay TM Online Backup - Development Department

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

IBM Tivoli Directory Integrator

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

Axway Validation Authority Suite

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

CA SiteMinder SSO Agents for ERP Systems

Ensuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA

2009 ikeep Ltd, Morgenstrasse 129, CH-3018 Bern, Switzerland (

CA Nimsoft Service Desk

CipherShare Features and Benefits

Ex Libris Rosetta: A Digital Preservation System Product Description

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

IBM Tivoli Network Manager software

Build Clouds Without Limits Gordon Haff

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Protecting Database Centric Web Services against SQL/XPath Injection Attacks

CA Automation Suite for Data Centers

Transcription:

The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with CLIP Open Source Setting Software Free

NSA s Review of Emerging Technologies Letter from the Editor The Next Wave is published to disseminate technical advancements and research activities in telecommunications and information technologies. Mentions of company names or commercial products do not imply endorsement by the US Government. For more information, please contact us at TNW@tycho.ncsc.mil

CONTENTS FEATURES FOCUS

Taking the Open Source Road The direction is clear. Open-source software is paving a path to the information-centric future envisioned by the U.S. Department of Defense (DoD). In an address to Department personnel, the Pentagon s deputy chief information offi cer (DCIO), David M. Wennergren, explained the reason for taking this new direction. In today s world we have to share information with people we never even dreamed of, using tools and means we never thought of before, [in] non-traditional ways with non-traditional organizations. And that s the power of the information world.

FEATURE The Next Wave Vol 18 No 2 2009 5

6 Taking the Open Source Road

FEATURE The Next Wave Vol 18 No 2 2009 7

FEATURE Linux security experts are reporting a growing list of real-world security situations in which the US National Security Agency s SELinux security framework contains the damage resulting from a flaw in other software. SELinux: 2005 present Policy technology advances The Next Wave Vol 18 No 2 2009 9

10 Raising the Bar in Operating System Security Improved usability Figure 1: system-config-selinux screenshot Figure 2: setroubleshoot screenshot

FEATURE Enhanced security functionality Improved performance and scalability Figure 3: SLIDE screenshot The Next Wave Vol 18 No 2 2009 11

Meeting security criteria Growing adoption, use, and community 12 Raising the Bar in Operating System Security

FEATURE Platform for advanced R&D Influencing other systems The Next Wave Vol 18 No 2 2009 13

OpenSolaris FMAC: origin and goals FMAC status 14 Raising the Bar in Operating System Security

FEATURE Conclusion Resources NSA SELinux web site, http://www.nsa.gov/ research/selinux SELinux project wiki, http://selinuxproject.org Tresys Open Source Server, http://oss. tresys com OpenSolaris FMAC web site, http:// opensolaris.org/os/project/fmac References [1] Loscocco P, Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating System. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference; June 2001. [2] Marti D. A seatbelt for server software: SELinux blocks real-world exploits. Available from: http://www.linuxworld. comnews/2008/022408-selinux.html [3] Red Hat. NYSE Euronext Chooses Red Hat Solutions for Flexibility and Reliable, Fast-Paced Performance. Available from: http://customers.press.redhat. com/2008/05/12/nyse/ [4] Walsh E. Application of the Flask Architecture to the X Window System Server. In: Proceedings of the 2007 SELinux Symposium; March 2007. [5] Carter J. Using GConf as an Example of How to Create an Userspace Object Manager. In: Proceedings of the 2007 SELinux Symposium; March 2007. [6] Gregory M. Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls. In: Proceedings of the 2007 SELinux Symposium; March 2007. Trademarks FreeBSD is a registered trademark of the FreeBSD Foundation. Linux is a registered trademark of Linus Torvalds. Red Hat Enterprise Linux is a registered trademark of Red Hat, Inc. NetTop is a registered trademark of the National Security Agency. Secure Office is a registered trademark of Trusted Computer Systems, Inc. Solaris and OpenSolaris are trademarks of Sun Microsystems, Inc. The Next Wave Vol 18 No 2 2009 15

FEATURE What is CLIP? Need for a secure foundation Certification and Accreditation Reliance on proprietary hardware and software CLIP explained CLIP toolkit The Next Wave Vol 18 No 2 2009 17

SELinux as a basis System configuration 18 Providing A Secure Foundation

FEATURE New packages Future directions The Next Wave Vol 18 No 2 2009 19

Cryptographic Binding of Metadata As most people know, metadata is data about data. It may include security labels and discovery information, as well as user and environmental attributes. Metadata is intended to be used by human consumers or by autonomous processes such as access control mechanisms in the Global Information Grid (GIG), network-centric content discovery services, or automated information dissemination systems. As decisions are made based on metadata content, the assurance provided for the actual metadata must be considered. In many scenarios, the assurance provided to metadata and to the relationship between metadata and data is essential. Such scenarios range from simple discovery queries to enabling Assured Information Sharing (AIS) through Cross Domain Solutions (CDS).

FEATURE What is cryptographic binding? Cryptographic binding provides assurance to the relationship between data and its associated metadata. A binding also ensures that neither the data nor its associated metadata have been mali- detection. The binding does not ensure that the original data or metadata is accurate or correct prior to the binding. As the name implies, cryptographic binding uses cryptography as a technique to as- its associated metadata. The relationship established with a cryptographic binding is claimed valid if the bound data has integrity and the identity of the binder is authenticated. How does cryptographic binding work? Data formats, metadata standards, and cryptography are continually evolving within the Department of Defense (DoD) GIG and the Intelligence Commu- in many areas. With cryptographic binding depending on these evolving data standards and formats, it is important to as well as a validation model that meets the community s needs and can cope with this ever-changing operating environment. The design of cryptographic binding centers on several key assumptions: any discrete format (e.g., XML, HTML,.doc,.xls,.txt,.ppt,.pdf) must not modify the data or metadata for data (e.g., discovery metadata, IA metadata, user and environmental attributes) may exist as embedded applications or distributed services The cryptographic binding model offers two complementary functions, each with a distinct set of inputs and outputs. First, a binding function, often referred to as the binder, has the sole responsibility of creating cryptographic bindings. The and uses a cryptographic technique to create the binding. The binder produces the asserted relationship as a binding infor- often referred to as simply the validator, accepts the data, metadata, and previously cryptographic technique to verify the integrity and authenticity of the relationship. The validator produces a valid or not valid response indicating the validity of the binding. Figure 1 illustrates this model for creating and validating cryptographic bindings. ate a binding without modifying the data minimum data required for a validator to verify the integrity and authenticity of the but are not limited to: signature) Cryptographic binding builds upon underlying cryptographic techniques, such as digital signatures, to provide additional services and information. First, Figure 1: Cryptographic binding and validation service models The Next Wave Vol 18 No 2 2009 23

although the identity of the binder can be authenticated, the identity of the entity are indeed related must be captured for tographic binding can be thought of as the focal point of data aggregation, possibly bringing an increase of the security level to the binding. For example, imagine a ever, once the items are cryptographically the security level of the information could be increased due to the data aggregation. This modular architecture separates the functionality from the underlying cryptographic mechanism that provides the integrity and authenticity. Multiple interchangeable binding methods are de- cryptography (e.g., digital signatures), symmetric cryptography, and authenticated shared secrets (e.g., secure hashes). Providing these general binding methods enables cryptographic binding to seamlessly incorporate new cryptographic algorithms and techniques. Figure 2: Conceptual view of cryptographic binding Proving cryptographic binding concepts Two cryptographic binding proto- rity Technologies Division implement the cryptographic binding model and system architecture. These prototypes made use of existing technologies and services to demonstrate the cryptographic binding capability as a system integrated application and an enterprise service. The following are details of each prototype: Cryptographic binding using XML digital signatures architectures transmission optimization mechanism (MTOM) size Cryptographic binding using Abstract Syntax Notation 1 (ASN.1) and Cryptographic Message Syntax (CMS) preferred method architectures decode than XML tography (ECC) offering more bits of security using smaller key size and faster algorithmic processing encryption 24 Cryptographic Binding of Metadata

FEATURE - more control over memory allot- binding and validation of larger ing prototype was successfully integrated into several pilot, test, and experiment environments. Community feedback drove prototype to improve performance, size, and strength while maintaining core func- better where the bandwidth is limited and the end unit has minimum processing resource. Cryptographic binding in future net-centric environments In the DoD s prospective net-centric GIG, policies will be established throughout the enterprise granting authentication and access to resources. As shown in initiated by a binding requestor man or machine. In some instances the binding requestor may be the author of the data or by access control or policy enforcement services. A request is sent by the requestor to the binding service to create a.bif over The binding service utilizes enterprise services to authenticate and authorize the request. Next, the binder will use an enterprise retrieval service to gather the data and metadata from a storage repository. Once the binding service generates the.bif, the service will store the.bif in a storage repository. Future repositories may exist for each element one for data, in combination. A validation requestor (shown mechanism or cross domain solution that is required to make a decision based on the contents of the data and metadata. The validation requestor submits a request to the validation service to verify the integrity and authenticity of the binding. Enterprise services will authenticate the validation requestor. Once authenticated, the request will be submitted to the validation service. The validation service will use retrieval services to gather the data, have not been maliciously or accidentally or invalid) to the requestor. Depending on the implementation environment, the binding and validation services could be deployed locally with all authentication and authorization checks occurring within a single community of interest (COI). Future direction Cryptographic binding is an enabling technology for systems that must rely on the integrity of data and metadata to make critical mission decisions including information dissemination and access control. The immediate goal is to make this capability operational by coordinat- lots, experiments, and test environments within DoD, IC, allied/coalition, national, and international programs. These exercises will provide valuable feedback to improve this technology while allowing the capability to be used in controlled operational settings. In the near term, there are plans to conduct a security assessment proof of concept. The next steps are to complete a full, security-assessed reference implementation and standards pro- graphic binding concepts and techniques need to be expanded and further proven to address evolving GIG net-centric environment needs including methods for high assurance bindings and envisioned security domains. The Next Wave Vol 18 No 2 2009 25

FOCUS The libre years OSS taps into consumer markets The Next Wave Vol 18 No 2 2009 27