Documente Academic
Documente Profesional
Documente Cultură
Trusted Computing
Dan Boneh
Background
TCG consortium. Founded in 1999. Lots of companies.
Goals: Hardware protected (encrypted) storage: Only authorized software can decrypt data e.g.: protecting key for decrypting file system only authorized software can boot Attestation: Prove to remote server what software started on my machine.
Dan Boneh
TPM Chip vendors: (~.3$) Atmel, Infineon, Broadcom, STMicro, Intel INTC0102 Software changes: Hardware layer: BIOS, EFI (UEFI) Software: OS and apps
Dan Boneh
Dan Boneh
This lecture
What is the TPM?
Dan Boneh
Trusted Computing
Dan Boneh
PCR Registers
(16 registers)
Other Junk
Non-volatile storage
1. Endorsement Key (EK) (2048-bit RSA) Created at manufacturing time. Cannot be changed. Used for attestation (described later) 2. Storage Root Key (SRK) (2048-bit RSA) Used for encrypted storage. Created after running TPM_TakeOwnership( OwnerPassword, ) Can be cleared later with TPM_ForceClear from BIOS
3. OwnerPassword (160 bits) and persistent flags
ll
D )
(SRTM)
BIOS executes: Calls PCR_Extend( n, <MBR code> ) Then runs MBR (master boot record), e.g. GRUB.
MBR executes: Calls PCR_Extend( n, <OS loader code, config> ) Then runs OS loader and so on
Dan Boneh
In a diagram
Hardware
BIOS
OS loader
OS
Application
TPM
Root of trust in integrity reporting
Operating system
Running apps
Dan Boneh
Malicious OS could reset PCRs post-boot and then set them to a valid OS hash. PCRs would then look as if valid OS loaded.
Dan Boneh
TPM Counters
TPM must support at least four hardware counters Increment rate: every 5 seconds for 7 years. Applications: Provide time stamps on blobs. Supports music will pay for 30 days policy.
Dan Boneh
Dan Boneh
(some) Arguments:
Protected Storage
Embedding PCR values in blob ensures that only specific apps can decrypt data. Changing MBR or OS kernel will change PCR values data cannot be decrypted
Dan Boneh
BitLocker
Many options for VMK recovery: disk, USB, paper (enc. with pwd) Recovery needed after legitimate system change: Moving disk to a new computer Replacing system board containing TPM Clearing TPM (with TPM_ForceClear) At system boot (before OS boot) Optional: OS loader requests PIN or USB key from user TPM unseals VMK, only if PCR and PIN are correct
Dan Boneh
Suppose BIOS code is updated by a firmware update. How would the system enable access to blobs previously sealed to current BIOS version?
Patch process must re-seal all blobs with new PCR values
Dan Boneh
Trusted Computing
Security?
Dan Boneh
Security?
then extend PCRs arbitrarily Harder in TPM 1.2 due to locality
[Kauer 2007]
Attack 1: reset TPM after boot with a wire Connect LRESET pin to ground -- mimics TPM_Init on LPC bus
Attack 2: block TPM until after boot, then extend PCRs arbitrarily Root of trust: BIOS boot block resets PCRs (calls TPM_Startup) Defeated with one byte change to BIOS boot block !!
Dan Boneh
Other problems
Roll-back attack on encrypted blobs Example: undo security patches without being noticed.
Can be mitigated using Data Integrity Regs. (DIR) Need OwnerPassword to write DIR, anyone can read Stored in NV-RAM
Dan Boneh
Trusted Computing
Attestation
Dan Boneh
DRM:
Dan Boneh
Validate:
1.
2.
Cert issuer,
PCR vals in cert Remote Server
OS
TPM
PC
Attestation typically includes key-exchange App must be isolated from rest of system
Dan Boneh
What would go wrong if communication between app. and server were done in the clear?
User can reboot machine after attestation and run arbitrary software pretending to be app.
Dan Boneh
Trusted Computing
Using Attestation
Dan Boneh
[GPCRB03]
TVMM Provides isolation between attested applications sample app: secure login into a corporate network
Dan Boneh
Nexus OS
Problem: attesting to hashed application/kernel code Too many possible software configurations
Better approach: attesting to properties Example: application never writes to disk Nexus OS: General attestation statements: TPM says that it booted Nexus, Nexus says that it ran checker with hash X, checker says that isolation domain A has property P
Dan Boneh
TCG Alternatives
IBM 4758: Supports all TCG functionality and more. Tamper resistant 486 100MhZ PCI co-processor but expensive ~ $2000. TPM ~ $7.
AEGIS System: Arbaugh, Farber, Smith 97: Secure boot with BIOS changes only. Cannot support sealed storage. SWATT: Seshadri et al., 2004 Attestation w/o extra hardware Server must know precise HW configuration
Dan Boneh
Trusted Computing
Attestation: challenges
Dan Boneh
Does not say whether running code has been compromised. Problem: what if Quake vulnerability exploited after attestation took place?
Can we attest to the current state of a running system? or is there a better way?
Dan Boneh
2. Encrypted viruses
Suppose malicious music file exploits bug in video player. Video file is encrypted. TCG prevents anyone from getting video file in the clear. Can anti-virus companies study virus without seeing its code in the clear? How would you solve this?
Dan Boneh
3. TPM Compromise
Suppose one TPM Endorsement Private Key is exposed
Destroys all attestation infrastructure: Embed private EK in TPM emulator. Now, can attest to anything without running it.
Certificate Revocation is critical for TCG Attestation.
Dan Boneh
Trusted Computing
Dan Boneh
BIOS will start any bootloader: no authentication Example: Stoned Bootkit. Can be used to steal volume dec. pwd. UEFI 2.3.1 verifies bootloader digital signature:
UEFI
verified bootloader
OS start
Dan Boneh
In more detail
UEFI
(1) only load modules signed by a properly certified key (2) consult revocation list, ignore sigs by revoked keys
vendor sig
vendor sig vendor sig optional ROM #1
optional ROM #2
Windows OS loader
Computer manufacturer places signed firmware modules in Flash prior to shipping machine, including OS loader Vendors update modules by signing them with certified keys
Dan Boneh
Complaints
How do users install Linux? method 1: user disables verified boot and then install Linux method 2: Linux distro. asks every PC manufacturer to include its signing key in the UEFI KEK database method 3: (Fedora) get Microsoft to sign Fedoras KEK Manufacturer can control what HW devices are allowed: User cannot install signed optional ROMs from other vendors
2013: AMIs UEFI signing key leaked (Ivy Bridge)
Dan Boneh
Dan Boneh
ELAM: checks pre-ELAM PCRs Checks subsequent boot drivers Disallow network access if remote attestation fails.
pre-OS measurement
login
post-login
TPM
ELAM
Dan Boneh
THE END
Dan Boneh