Presents a brief overview on the building of a new security

20
Bodacion Technologies Presents a brief overview on the building of a new security technology: HYDRA

Transcript of Presents a brief overview on the building of a new security

Page 1: Presents a brief overview on the building of a new security

Bodacion Technologies

Presents a brief overview on the building of a new security technology:

H Y D R A

Page 2: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 2

HYDRA is touted as “unhackable” and “invulnerable”

Today I will show you:• What an embedded system actually is

• Why we created one over using more popular methods

• The steps in creating HYDRA that make it singularly secure

Introduction

Page 3: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 3

What Is “Embedded?”From the book “Embedded Systems Dictionary” by Jack Ganssle and Michael Barr

embedded system

n. A combination of computer hardware and software, and perhaps additional mechanical or other parts, designed to perform a dedicated function. In some cases, embedded systems are part of a larger system or product, as in the case of an antilock braking system in a car.

Page 4: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 4

What Isn’t “Embedded?”Confusing market-speak abounds:• “We rolled our own OS”

• “It’s an embedded appliance”

• “We use the (product-name) OS”

• These are typically modified Linux or BSD kernels

Back to the book:

general-purpose computer

n. A combination of computer hardware and software that serves as a general-purpose computing platform. PCs, Macs, and Unix workstations are the most popular modern examples.

Page 5: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 5

The Operating System SpectrumExec Loop μC/OS

VRTXVxWorksWinCEQNX

RT LinuxEmbedded Linux

LinuxBSD

Windows

Hard Real-time No Real-timeSome, or Soft Real-time

Page 6: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 6

Embedded is Often Talked About...Marketing knows it’s a great ideaIt is not dishonesty or subterfugeIt is a simple misunderstanding“Embedded” builds an association in a customer’s or user’s mind between headless systems and simplicityA recent example of the danger of this misunderstanding:

Nachi worm ↝SANS: “Bad design decisions here: Running a single purpose appliance

on a general purpose OS.”

Page 7: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 7

... But Embedded is Rarely DoneDisparate skill sets

Much longer road, requires a different discipline• Example - "favorite number" addressing

• Example - Memory deallocation

Think writing an OS, not modifying it or writing an application for it

Tool and library availability

Not typically considered enterprise scale

Page 8: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 8

Wanted lower maintenance• Windows has patches every week• Linux updates about every two weeks

Why We Chose the Path

1No other viable

choices given our requirements and the state

of current technology

Wanted more security• CERT advisories on the rise• Zero-day attacks growing

Wanted fewer bugs• Linux/BSD code too large for inspection• Windows - well, is Windows

2We already had

the skills, tools, and experience required todesign and implement

Page 9: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 9

HardwareSelected solutions used in Military and other demanding environments

cPCI - an industry standard card/backplane (“blade”) available from numerous vendors

PowerPC card for low power and heat without sacrificing performance

Page 10: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 10

BSPBoard Support Package• Loads code from firmware

• Virus proof!

• Encrypted

• At about 1.5 MB, it would fit on an old floppy

Started with a commercial RTOS• Hard-real time operating system

• Deterministic scheduling

• DO-178B Level A certified reliability

↺Decrypted and loaded into

RAM from Flash memory

Diagnostics constantly

compare code against a digital

signature

Page 11: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 11

Memory ManagementMonolithic memory model• Faster data sharing

• Reduced fragmentation

Proprietary memory model and manager features:• Canary values to prevent

buffer overruns

• Signed blocks for data caches

• Constantly scanned by internal diagnostics

• Hard real-time performance

System, Stacks, etc. User memory managed by EMM

Assigned buffer

Signature

Canary values

Page 12: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 12

Crypto FunctionsFIPS approved ciphers in HW and SWBiomorphics• The foundation of all the pseudo-random numbers for HYDRA

• Produces non-correlated, non-repeating sequences

DE5ZRU5

Q78BD27

9HNB561

I85NY21

5TGNE14

7XVB9RT

Virus Scanning

Random Number Generation

Content Signatures

TCP Initial Sequence Numbers

SSL/TLSSessions and

Certificates

Cryptographic Key Material

Session ID’s

Access Verification

Logging Signatures

Password Protection

Faster Hashing

More...

Page 13: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 13

Network and File SystemsCreated a TCP/IP stack• Commercial libraries had too many bugs and inadequate performance

• Most are designed for a trickle of packets, we needed a fire hose

• Allowed us to add security featuresCreated a file system • Commercial options were typically DOS-based

• We needed performance (which means anything but DOS)

• We needed robustness

• We needed security

User-to-user separationJournalingCaching+ +

Page 14: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 14

FTP ServerFTP(S) Server

• Grab the RFC, then start the state machine design

• Added features such as single-sign on

SSO FTP ServerHTTP Server

Traditional model uses an application that may be modified or exploited via either server or used to exploit the servers.

Embedded model couples the functions tightly into the kernel, which is subject to security scanning.

Page 15: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 15

HTTP Client and ServerGrab the RFC, then start the state machine design

• All the typical server features (e.g. virtual servers)

• Proxying and load-balancing

• Connectors to Application Servers

• Buffers entire request and scans for ANY anomaly

V I R U SV I R U S

SQL Injection • Intel Byte Codes • Source File ViewingCross Site Scripting • Illegal Navigation • Many More...

Page 16: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 16

Embedded OnlyReal-time rate monotonic analysis• Optimal task priority assignment in which higher priorities are accorded

to tasks that execute at higher rates

• Allows a processor as slow as 333 MHz to saturate a 100 Mb network

True Zero-copy from Multiple Sources• Tasks just pass pointers around

• Buffers can be check-summed or signed

Startup takes about four seconds

Watchdog Timers

Page 17: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 17

Success!Enterprise performanceSuccessful hacker challengeNSA SPOCK programSuccessful deploymentsSurprise and disbelief at the security and simplicity

Page 18: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 18

Embedded is not Automatically BetterHYDRA is embedded because we needed it to be better, it is not better because it is embedded

Operating system

App App

Internal IDS

No complex settings (e.g. NFS vs. Web server)

Anything that’s not “perfect” is considered an attack (e.g. Intel byte codes)

We know we’re a dishwasher, put in a TV dinner and we’ll complain! That’s what an appliance does

HYDRA

Page 19: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 19

Key PointsEmbedded is not a cure-all• HYDRA incorporates defenses from the driver level to the Web server

• Many of these defenses have nothing to do with being embeddedDevelopment is far more difficult and requires more time• Developer skill set is fundamentally different from Linux or Windows

• Applicable libraries are few and either buggy or (ahem) mature, so you’ll end up doing all the work yourself

Rewards are worth the effort if security is a concern• There is simply no other way to get the same level of securityAppliance ≠ EmbeddedUsually Embedded ≠ Embedded

Page 20: Presents a brief overview on the building of a new security

Bodacion Technologies H | Y | D | R | A 20

Thank You!

Contact: Eric [email protected] Technologies http://www.bodacion.com(847) 842-9008