TCPA’S Business Objectives
Total Page:16
File Type:pdf, Size:1020Kb
Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green c y p h e r p u n k s . t o TCPA’s Business Objectives | Prevent use of unlicensed software. | Digital Rights Management (DRM). z Prevent CD ripping and DivX creation. z Plug “analog hole.” z Enable information flow control. | Make PC the core of the home entertainment center, growing overall market. | Meet operational needs of law enforcement and intelligence services (FBI, Homeland, NSA, non-U.S. law enforcement). TCPA’s Technical Objectives | Prevent the owner of a computer from obtaining root access. | Enforce three levels of access privileges: z Privileged access [TCPA members only]. z Underprivileged access [platform owner]. z Unprivileged access [non-TCPA applications]. TCPA Heritage | To succeed where previous efforts have failed: z Processor ID (Intel, 1995-1998). z Encrypted CPU instruction sets (Intel, 1995-TCPA Phase II). z International Cryptography Framework (HP, 1996). z Smartcards on motherboard (IBM, ongoing). TCPA History | Founded in 1999 by: z Intel z Microsoft z HP z Compaq z IBM TCPA Membership Profile | The TCPA is a forum of platform product vendors. z CPU: • Intel, Advanced Micro Devices (AMD), Motorola. z BIOS/Chips: • Phoenix/Award, American Megatrends (AMI), National Semiconductor. z Security: • VeriSign, Wave Systems, RSA Security, Check Point, Certicom, Trend Micro, Symantec, Tripwire, Crypto AG [NSA]. z Applications: • Microsoft, Adobe. z Systems: • HP, IBM, Dell, Gateway, Fujitsu, Samsung, Toshiba. TCPA’s 170+ Member Companies 360 Degree Web Ethentica Microsoft Corporation SPYRUS, Inc. 3Com Corp. Excalibur Solutions, Inc Mitac International Corporation SSH Communications Security, Inc. Access360 FARGOS Development, LLC Mobile-Mind, Inc. Standard Microsystems Corporation Acer, Inc. ActivCard Inc. FINGLOQ AB Motorola STMicroelectronics Adhaero Technologies First Access, Inc. National Semiconductor Symantec Corporation Adobe Systems, Inc. Fortress Technologies Inc nCipher Inc. Symbol Technologies, Inc Advanced Micro Devices, Inc. Fujitsu Limited NDS Limited Texar Software Corp. Aesec Corporation Fujitsu-Siemens-Computers NEC Corporation Thales e-Security, Inc. Aladdin Knowledge Systems Algorithmic Research Ltd. Gateway, Inc. Net Nanny Software International TimeCertain, LLC American Express Company Gemplus Corporation NetActive Inc. Titan Systems Corporation American Megatrends Inc. GLOBEtrotter Software NetAtmosphere Inc. Toshiba Corporation Argus Security Corporation Hewlett-Packard Company NetOctave, Inc. Trend Micro, Inc. Atmel Corporation Hitachi, Ltd. PC Div. NetSecure Software Canada Tripwire, Inc. ATMEL Rousset Authentium, Inc. HyperSecur Corporation Network Associates, Inc. Trispen Technologies Autotrol Uruguaya S.A. I/O Software, Inc. New Trend Technology Inc. TrueTime Inc. Baltimore Technologies Ltd ICSA.net Novell, Inc. TruSec Solutions BERGDATA AG ID Tech nVidia Trustpoint Corporation BindView Development IdentAlink Limited O2Micro TVN Entertainment Corporation BitStream Technology Corporation Blueice Research Infineer Inc. Open Source Asia Ubizen Broadcom Corporation Infineon Technologies Corporation PC Guardian Utimaco Safeware AG Carraig Ltd Infineon Technologies Asia Pacific Pte Ltd Philips Semiconductors ValiCert Inc. Caveo Technology LLC InfoCore, Inc. Phoenix Technologies, Ltd. VeraSafe, Inc. Cavium Networks Insyde Software Corp. Pijnenburg Custom Chips B.V. Veridicom, Inc. CE-Infosys Pte Ltd Cerberus Information Security Limited Integrity Sciences, Inc. Precision Digital Hardware Verisign, Inc. Certicom Corp. Intel Corporation Pricewaterhouse Coopers Viewpoint Engineering Check Point Software Technologies Ltd Interlok Technologies L.L.C. Prism Resources, Inc. Voltaire Advanced Data Security Ltd CHECKFLOW International Business Machines Pro-Team Computer Corp. Wave Systems Corp. Chrysalis-ITS Cimarron Systems Incorporated Corporation Protect Data Security Inc. Wincor Nixdorf CipherKey Exchange Corporation International Service Consultants Ltd. Rainbow Technologies, Inc. WinMagic, Inc. Cloakware Corporation Internet Dynamics, Inc. Raytheon Company WinVista Corporation Communication Intelligence Corporation Internet Security Systems Raz-Net Inc. Compagnie Européenne de Développement SA InterTrust Technologies Redstrike B.V. Compal Electronics, Inc. Compaq Computer Corporation Iomega Corporation RSA Security, Inc. Computer Elektronik Infosys GmbH Kasten Chase Applied Research SafeNet, Incorporated Crypto AG. Keycorp Ltd. SAFLINK Corporation Cygate ESM Oy Keyware Technologies, Inc. SAGEM MORPHO, Inc. CYLINK Corporation Lanworks Technologies Co. SAGRELTO Enterprises, Inc. Dell Computer Corporation DICA Technologies Inc. Legend (SHENZHEN) R&D Center, Legend Group Ltd SAMSUNG ELECTRONICS CO. LTD DigiGAN, Inc Lexign SAS Institute Digital Innotech Co. Liquid Audio, Inc. Schlumberger, Smart Cards Digital Persona Inc. Litronic Inc. Science Applications International Co. Discretix Technologies Ltd. LOGISIL Consulting Scienton Technologies Inc. e-PCguard.com, Inc. M-Systems Flash Disk Pioneers SCM Microsystems eCryp, Inc. M3S Enterprises Sectra Communications AB Eltan Comm B.V. Macrovision Corporation Securant Technologies Enova Technology Corporation Massive Media Group Secure Computing Corporation Ensure Technologies Media DNA Incorporated Secure Systems Solutions Entrust Technologies Ltd. Medialogic Co., Ltd Siemens AG ERACOM Pty Ltd Miaxis Biometrics Co. Softex, Inc. Micron Electronics, Inc TCPA’s Technology (Phase I) | Trusted Platform Module (TPM), aka the “Fritz Chip.” z Tamper resistant chip to be included on all future motherboards. z Surface mount; either a separate part or integrated into the chipset. z Common Criteria EAL3 [augmented] certified. TPM Functionality Categories | Measurement | Reporting TPM Measurement | Cryptographic operations | Key store | Key management | Boot process hashing TPM Internals | Cryptographic operations: z Hashing (SHA-1, HMAC). z Random number generation (RNG), post- whitening output only. z Asymmetric key generation (2048-bit RSA). z Asymmetric key encrypt/decrypt (2048-bit RSA). z Symmetric encrypt/decrypt (3DES, AES). • Symmetric key operations may be performed off- chip. | Tamper-resistant hash and key store. TPM Key Management | Endorsement Key z Unique RSA key generated at time of manufacture. Signed by manufacturer’s key, which is signed by the TCPA master key. Used to prove that the TPM is genuine. | User Keys z One or more user RSA keys certified by a “Privacy CA” at time of TPM activation. Used to identify user. TCP pre-OS Boot Process BIOS boot block TPM BIOS Store hash Option Store hash ROMs DRM boot Store hash loader DRM kernel Store hash TCP OS Boot Process TPM OS Store hash Approved Hardware List (HCL), Serial AES RSA Number Load OS decrypt decrypt OS Revocation OS binary binary key List (SRL) Phase II: OS is running inside TPM TCP OS Known Initial State | BIOS is TCPA-approved. | PCI cards are TCPA-approved. | DMA devices do not enable unapproved access to operating RAM. | No kernel-level debugger is loaded. | Initial list of undesirable applications is available for processing. | Examples of TCPA operating systems: z Microsoft: Palladium (DRM OS patent). z HP: Linux. TCP OS Initial Tasks | Start secure time counter (no turning back the system clock). | Synchronize system time against authenticated online time servers. | Obtain HCL and SRL updates over the Internet. Pre-application Load | Two primary application loader protection modes: z Mandatory: OS will refuse to load a non-TCPA approved application. z “Voluntary”: OS will load a non- approved application, sending SIGCOMP to all loaded applications. Application Loader Protection Modes Comparison Mode Mandatory “Voluntary” OS hashes application, stores YES. YES. hash in TPM. OS loads TCPA-approved YES. YES. applications not listed on an SRL. OS loads application on SRL. NO. NO. OS loads non-approved NO. YES. TCP application. applications receive SIGCOMP, zeroize their operating RAM, and shut down. TCP Application Initial Tasks Verify Verify Verify Application hashes in platform license is loaded. DRL TPM. ID. duration. Servers DRL Servers Verify Obtain fresh mandatory Obtain Document SRL applications are fresh SRL. Revocation Application Server running List (DRL). is ready (Spyware). for user. Post-application Load | Application z Verifies hashes in TPM. z Verifies application is licensed for the current motherboard. z Checks secure time against application license duration. z Obtains application-specific SRL via the network. z Verifies required applications are running. (Enforces Spyware licensing). z Obtains current Document Revocation List (DRL) via the network. TCPA Stifling Competition | “We came at this thinking about music, but then we realized that e- mail and documents were far more interesting domains.” -- Bill Gates, Microsoft | “You could create Word documents that could be read only in the next week.” -- Steven Levy, MSNBC/Newsweek Quiz: How will the Law Help TCPA Stifle Competition? | Application vendors intend to wrap their file formats with DRM. | Question: What does a federal prosecutor call an application that is compatible with a proprietary DRM- wrapped file format? | Answer: An illegal infringement device. Consequences of Ubiquitous Digital Rights Management | Makes it illegal to create interoperable software in the U.S. | Subjects authors of interoperable software to penalties of up to $500,000 and 5 years in prison (and double that for subsequent offenses). | The