SlideShare uma empresa Scribd logo
1 de 21
Maemo 6
Platform Security
Overview

Elena Reshetova


1
Outline
• What is Platform Security?
• Maemo 6 Device modes & Boot process
• Access Control
      • Our criteria
      • Basic principles & concepts
      • Aegis Security Policy & SW distribution
      • Installation and Run-time views
      • Shared libraries case
• Integrity Protection
      • Aegis Validator
      • Aegis Protected Storage
• IPC Security



2   E.Reshetova FOSDEM 6.02.2010
What is Platform Security?

• Set of a mechanisms and
  techniques, which are used to
  protect the entire SW platform




3   E.Reshetova FOSDEM 6.02.2010
Device modes




    • Open source strategy                     • Bigger developer offering
    • The same functionality as earlier            • Optional copy protection (DRM)
         • Compile and flash your own kernel   • More use cases for a device usage
         • Made a low-level platform               • Games, Commercial applications
           development                         • More business models
                                                   • Ovi Store
                                                   • Comes with Music

4     E.Reshetova FOSDEM 6.02.2010
Hardware enablers & Boot process
• Trusted Execution
  Environment (TrEE) (for
  instance ARM Trust Zone)
  with two main keys:
      • Root public key             Restrict security
      • Root device specific key     functionality




* includes:
      • DRM keys are disabled
      • Content from the previous
        mode can’t be decrypted

                                                        Integrity isn’t OK




5   E.Reshetova FOSDEM 6.02.2010
Access Control



6
Access control in Linux
• Classical Unix AC
      • Based on multiuser model
      • Discretionary AC
      • POSIX capabilities aren’t really in use (root has all, others none)

• Our criteria:
      • Process level mandatory access control needed
      • Minimal changes to the current model (enforcement phase)
      • Good level of flexibility and granularity, easy to understand concept (KISS)

• Existing security extensions, no good match to criteria
      • FreeBSD AC, MLS, Biba, SELinux, RBAC, AppArmor, TOMOYO Linux, …

• Our approach:
      • Apply, and minimally extend Classical Unix AC to meet set criteria
      • Re-use multiuser-model for application-level access control
      • Architecture outlined in the next slides.


7   E.Reshetova FOSDEM 6.02.2010
Access Control – Principles & Concepts
• Principle of least privileges
      • Every application should be able to access only limited set of needed resources
• Protected resources
      • Things like Cellular functionality, Location information and so on
      • No final list yet – work in progress
• Resource token
      • Abstract name describing a protected resource
      • Cellular, Location, and etc.
• Application must declare resources, it needs
      • Aegis Manifest File


• No security APIs by default  Development is almost unchanged



8   E.Reshetova FOSDEM 6.02.2010
Aegis Manifest File
• An optional xml file inside Debian package
• Declares needed and provided credentials
      • Resource tokens
      • UIDs, GUIs
      • POSIX capabilities
• Should be generated automatically by SDK based on the source code
• A D-Bus policy can be generated from Aegis Manifest during installation phase
• May contain a package signature
• Used for authorized security policy updates


• Application Identifier
                                   AppID = {SWSourceID, PackageName, AppName}



9   E.Reshetova FOSDEM 6.02.2010
Software Distribution
• SW comes inside Debian packages
• Each package has SW source (known or unknown)
       • SW repository (based on the repository signing)
       • Any virtual entity (based on the package signing) as single developer, web page and etc.
• Each known SW source has a asymmetric key pair
       • Public key is known to a device
       • Private key is used to sign the packages
• Each SW source is assigned a trust level
       • Update of SW package is possible only from the same SW source or from a SW source with
         higher trust level
• SW source trust is based on the
  Quality Assurance level of the SW source




10   E.Reshetova FOSDEM 6.02.2010
Aegis Security Policy
• Contains mapping between SW sources and allowed credentials
• Accessible only to Installer
• Allows to create different security levels on the devices
• The allowed credential set for each SW source is based on the risk level
• Can be updated via authorized policy updates
• Special domains:
       • Unknown
       • Developer




11   E.Reshetova FOSDEM 6.02.2010
Components Interaction – Installation time
                                                    Aegis     Application
1. Application arrives to the                      Manifest

  Aegis Installer together                                                         1.
  with Aegis Manifest
2. Aegis installer checks the                                  Aegis
  Aegis Security policy for the     D-Bus    D-Bus Daemon     Security
                                                               policy                      Installer
  information                       policy       D-Bus
                                               extensions
3. Aegis installer modifies                                                                    User mode
  the Credentials’ possession
                                                                                      3.
  list according to the
  “Intersection rule”                                                                        Kernel mode

[4.] Aegis installer possibly
  modifies D-Bus policy                                                     Credentials’
                                                                            Possession
                                                                                list




12   E.Reshetova FOSDEM 6.02.2010
Intersection rule
                                                                        Example


                                                  SW source
 Aegis Manifest
                                                credentials set:
 credentials set:
                                               What credentials
                               intersection     application can
What application
                                              get, if it is certified
wants to access?
                                              by this SW source?


                       Result credentials set:

                  What credentials application
                     has during run-time?




13   E.Reshetova FOSDEM 6.02.2010
Components Interaction – Run-time
1. Process Credentials Assigner gets the                                Aegis        Application
   allowed credentials set from the                                    Manifest

   Credentials’ possession list
2. Process Credentials Assigner
   modifies process’ credentials
   (process task structure) according to                                              Aegis
                                                              D-Bus Daemon           Security
   the received credentials                      D-Bus
                                                                                      policy                      Installer
                                                 policy               D-Bus
3a. File AC                                                         extensions

       • No changes                                                                                                   User mode

3b. D-Bus
       • Additional process credentials are
         taken into consideration by the d-                                                                         Kernel mode
                                                                            Process
         bus daemon                               File’s AC lists
                                                                           credentials
3c. Application by itself                                                                          Credentials’
                                                                                                   Possession
       • Application calls libcreds library to                                                         list
                                                      “Linux Kernel
         get process credentials, and makes a      Reference monitor”
         decision based on its own policy                                          Process
                                                                                  Credentials
                                                                                   assigner




14   E.Reshetova FOSDEM 6.02.2010
Loading the shared libraries




                                                              No!




                                                              Yes
                             Cellular,
                             UserData
                                    Application   OK   Call




                                     Library A

15   E.Reshetova FOSDEM 6.02.2010
Integrity Protection



16
Integrity protection – Aegis Validator
• Ensures integrity of the
  executable components
  (binaries, libraries, ...)
                                      Yes
       • Run-time
       • Against Offline attacks
• Kernel module                                         Storage of
• Calculates a cryptographic                 Aegis      reference
  hash of the file (currently               Validator    hashes
                                      No!
  SHA-1)
• Reference hashes                           Get the
                                             policy
       • Stored in the Aegis
         Protected Storage
       • Come inside of the package
         or can be computed during
         installation time




17   E.Reshetova FOSDEM 6.02.2010
Privacy Protection - Aegis Protected Storage
• Ensures integrity of data and
  configuration files after
  installation                                                            Place the files
                                                                             Integrity
                                                                               Check
                                                            Application   into status
                                                                               Protected
• Additional features:                                                        integrity
                                                                             Storage
       • Data encryption inside the
         storage
       • Private, shared and global or      Data file
         externally signed storages                                           Aegis
                                                                            Protected
       • Interface to TrEE, which is used   Configuration                  Storage APIs
         to sign/verify, encrypt/decrypt         file
         the data
       • Access to a protected storage is
         defined by an application
         identifier or application group




18   E.Reshetova FOSDEM 6.02.2010
Secure IPC



19
Secure IPC inside device
     • Maemo Crypt API
     • Ensures integrity and
       confidentially of the
       transmitted data
            • Signing
            • Encryption
     • No key management from
       applications
     • Different levels
            • Based on application ID
            • Based on the resource token


                                            Check the signature




20     E.Reshetova FOSDEM 6.02.2010
Conclusions & QA
• Most of the Security FW will be open sourced
• Public project “Maemo 6 Platform Security”
    • http://maemo.gitorious.org/
• Your questions, feedback and reports are welcomed!
       • http://wiki.maemo.org/MaemoSecurity
       • http://talk.maemo.org/forumdisplay.php?f=45
       • https://bugs.maemo.org/
• More details will still follow…




                                      Thank you!

                                                       elena.reshetova@nokia.com



21   E.Reshetova FOSDEM 6.02.2010

Mais conteúdo relacionado

Mais procurados

Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04Niit Care
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsEduardo Castro
 
Ruckus BYOD whitepaper
Ruckus BYOD whitepaperRuckus BYOD whitepaper
Ruckus BYOD whitepaperMichal Jarski
 
Introduction to VMware Infrastructure
Introduction to VMware  Infrastructure  Introduction to VMware  Infrastructure
Introduction to VMware Infrastructure aktivfinger
 
Infraestructure WMWARE
Infraestructure  WMWAREInfraestructure  WMWARE
Infraestructure WMWAREaktivfinger
 
Getting Started with ESXServer3iEmbedded
Getting Started with  ESXServer3iEmbedded  Getting Started with  ESXServer3iEmbedded
Getting Started with ESXServer3iEmbedded aktivfinger
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15 Suraj Kumar.A.S
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Venafi
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersVenafi
 
Reviewing sql server permissions tech republic
Reviewing sql server permissions   tech republicReviewing sql server permissions   tech republic
Reviewing sql server permissions tech republicKaing Menglieng
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security ModeluniqueYGB
 
Ce Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersCe Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersKislaychd
 
Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Vinayak Hegde
 
Sql server 2008 r2 security datasheet
Sql server 2008 r2 security   datasheetSql server 2008 r2 security   datasheet
Sql server 2008 r2 security datasheetKlaudiia Jacome
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 

Mais procurados (19)

Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
Product Number: 0
Product Number: 0Product Number: 0
Product Number: 0
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
 
Ruckus BYOD whitepaper
Ruckus BYOD whitepaperRuckus BYOD whitepaper
Ruckus BYOD whitepaper
 
BranchOffice Szenarios
BranchOffice SzenariosBranchOffice Szenarios
BranchOffice Szenarios
 
Introduction to VMware Infrastructure
Introduction to VMware  Infrastructure  Introduction to VMware  Infrastructure
Introduction to VMware Infrastructure
 
Infraestructure WMWARE
Infraestructure  WMWAREInfraestructure  WMWARE
Infraestructure WMWARE
 
Getting Started with ESXServer3iEmbedded
Getting Started with  ESXServer3iEmbedded  Getting Started with  ESXServer3iEmbedded
Getting Started with ESXServer3iEmbedded
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15
 
Be2010 全功能 20100301
Be2010 全功能 20100301Be2010 全功能 20100301
Be2010 全功能 20100301
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
 
Reviewing sql server permissions tech republic
Reviewing sql server permissions   tech republicReviewing sql server permissions   tech republic
Reviewing sql server permissions tech republic
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
 
Ce Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersCe Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database Servers
 
Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)
 
Sql server 2008 r2 security datasheet
Sql server 2008 r2 security   datasheetSql server 2008 r2 security   datasheet
Sql server 2008 r2 security datasheet
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 

Semelhante a Maemo Platform Security Fosdem

Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Guellord Mpia
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container SecurityKsenia Peguero
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersSecuring the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersMassimiliano Mattetti
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHansFarroCastillo1
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security modelPragati Rai
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platformabelsonp
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesJPINFOTECH JAYAPRAKASH
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...Amazon Web Services
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security Sandeep Patil
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsDominic Haigh
 

Semelhante a Maemo Platform Security Fosdem (20)

Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container Security
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersSecuring the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
 
Websphere - Introduction to SSL part 1
Websphere  - Introduction to SSL part 1Websphere  - Introduction to SSL part 1
Websphere - Introduction to SSL part 1
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
 

Último

一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制uodye
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证wpkuukw
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一ougvy
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证wpkuukw
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证ehyxf
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理uodye
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxRishabh332761
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一uodye
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证tufbav
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...samsungultra782445
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryoyebolasonuga14
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证ehyxf
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHUREF2081syahirahliyana
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...drmarathore
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证ehyxf
 

Último (20)

一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 

Maemo Platform Security Fosdem

  • 2. Outline • What is Platform Security? • Maemo 6 Device modes & Boot process • Access Control • Our criteria • Basic principles & concepts • Aegis Security Policy & SW distribution • Installation and Run-time views • Shared libraries case • Integrity Protection • Aegis Validator • Aegis Protected Storage • IPC Security 2 E.Reshetova FOSDEM 6.02.2010
  • 3. What is Platform Security? • Set of a mechanisms and techniques, which are used to protect the entire SW platform 3 E.Reshetova FOSDEM 6.02.2010
  • 4. Device modes • Open source strategy • Bigger developer offering • The same functionality as earlier • Optional copy protection (DRM) • Compile and flash your own kernel • More use cases for a device usage • Made a low-level platform • Games, Commercial applications development • More business models • Ovi Store • Comes with Music 4 E.Reshetova FOSDEM 6.02.2010
  • 5. Hardware enablers & Boot process • Trusted Execution Environment (TrEE) (for instance ARM Trust Zone) with two main keys: • Root public key Restrict security • Root device specific key functionality * includes: • DRM keys are disabled • Content from the previous mode can’t be decrypted Integrity isn’t OK 5 E.Reshetova FOSDEM 6.02.2010
  • 7. Access control in Linux • Classical Unix AC • Based on multiuser model • Discretionary AC • POSIX capabilities aren’t really in use (root has all, others none) • Our criteria: • Process level mandatory access control needed • Minimal changes to the current model (enforcement phase) • Good level of flexibility and granularity, easy to understand concept (KISS) • Existing security extensions, no good match to criteria • FreeBSD AC, MLS, Biba, SELinux, RBAC, AppArmor, TOMOYO Linux, … • Our approach: • Apply, and minimally extend Classical Unix AC to meet set criteria • Re-use multiuser-model for application-level access control • Architecture outlined in the next slides. 7 E.Reshetova FOSDEM 6.02.2010
  • 8. Access Control – Principles & Concepts • Principle of least privileges • Every application should be able to access only limited set of needed resources • Protected resources • Things like Cellular functionality, Location information and so on • No final list yet – work in progress • Resource token • Abstract name describing a protected resource • Cellular, Location, and etc. • Application must declare resources, it needs • Aegis Manifest File • No security APIs by default  Development is almost unchanged 8 E.Reshetova FOSDEM 6.02.2010
  • 9. Aegis Manifest File • An optional xml file inside Debian package • Declares needed and provided credentials • Resource tokens • UIDs, GUIs • POSIX capabilities • Should be generated automatically by SDK based on the source code • A D-Bus policy can be generated from Aegis Manifest during installation phase • May contain a package signature • Used for authorized security policy updates • Application Identifier AppID = {SWSourceID, PackageName, AppName} 9 E.Reshetova FOSDEM 6.02.2010
  • 10. Software Distribution • SW comes inside Debian packages • Each package has SW source (known or unknown) • SW repository (based on the repository signing) • Any virtual entity (based on the package signing) as single developer, web page and etc. • Each known SW source has a asymmetric key pair • Public key is known to a device • Private key is used to sign the packages • Each SW source is assigned a trust level • Update of SW package is possible only from the same SW source or from a SW source with higher trust level • SW source trust is based on the Quality Assurance level of the SW source 10 E.Reshetova FOSDEM 6.02.2010
  • 11. Aegis Security Policy • Contains mapping between SW sources and allowed credentials • Accessible only to Installer • Allows to create different security levels on the devices • The allowed credential set for each SW source is based on the risk level • Can be updated via authorized policy updates • Special domains: • Unknown • Developer 11 E.Reshetova FOSDEM 6.02.2010
  • 12. Components Interaction – Installation time Aegis Application 1. Application arrives to the Manifest Aegis Installer together 1. with Aegis Manifest 2. Aegis installer checks the Aegis Aegis Security policy for the D-Bus D-Bus Daemon Security policy Installer information policy D-Bus extensions 3. Aegis installer modifies User mode the Credentials’ possession 3. list according to the “Intersection rule” Kernel mode [4.] Aegis installer possibly modifies D-Bus policy Credentials’ Possession list 12 E.Reshetova FOSDEM 6.02.2010
  • 13. Intersection rule Example SW source Aegis Manifest credentials set: credentials set: What credentials intersection application can What application get, if it is certified wants to access? by this SW source? Result credentials set: What credentials application has during run-time? 13 E.Reshetova FOSDEM 6.02.2010
  • 14. Components Interaction – Run-time 1. Process Credentials Assigner gets the Aegis Application allowed credentials set from the Manifest Credentials’ possession list 2. Process Credentials Assigner modifies process’ credentials (process task structure) according to Aegis D-Bus Daemon Security the received credentials D-Bus policy Installer policy D-Bus 3a. File AC extensions • No changes User mode 3b. D-Bus • Additional process credentials are taken into consideration by the d- Kernel mode Process bus daemon File’s AC lists credentials 3c. Application by itself Credentials’ Possession • Application calls libcreds library to list “Linux Kernel get process credentials, and makes a Reference monitor” decision based on its own policy Process Credentials assigner 14 E.Reshetova FOSDEM 6.02.2010
  • 15. Loading the shared libraries No! Yes Cellular, UserData Application OK Call Library A 15 E.Reshetova FOSDEM 6.02.2010
  • 17. Integrity protection – Aegis Validator • Ensures integrity of the executable components (binaries, libraries, ...) Yes • Run-time • Against Offline attacks • Kernel module Storage of • Calculates a cryptographic Aegis reference hash of the file (currently Validator hashes No! SHA-1) • Reference hashes Get the policy • Stored in the Aegis Protected Storage • Come inside of the package or can be computed during installation time 17 E.Reshetova FOSDEM 6.02.2010
  • 18. Privacy Protection - Aegis Protected Storage • Ensures integrity of data and configuration files after installation Place the files Integrity Check Application into status Protected • Additional features: integrity Storage • Data encryption inside the storage • Private, shared and global or Data file externally signed storages Aegis Protected • Interface to TrEE, which is used Configuration Storage APIs to sign/verify, encrypt/decrypt file the data • Access to a protected storage is defined by an application identifier or application group 18 E.Reshetova FOSDEM 6.02.2010
  • 20. Secure IPC inside device • Maemo Crypt API • Ensures integrity and confidentially of the transmitted data • Signing • Encryption • No key management from applications • Different levels • Based on application ID • Based on the resource token Check the signature 20 E.Reshetova FOSDEM 6.02.2010
  • 21. Conclusions & QA • Most of the Security FW will be open sourced • Public project “Maemo 6 Platform Security” • http://maemo.gitorious.org/ • Your questions, feedback and reports are welcomed! • http://wiki.maemo.org/MaemoSecurity • http://talk.maemo.org/forumdisplay.php?f=45 • https://bugs.maemo.org/ • More details will still follow… Thank you! elena.reshetova@nokia.com 21 E.Reshetova FOSDEM 6.02.2010