Wind River® Intelligent Device Platform XT

Total Page:16

File Type:pdf, Size:1020Kb

Wind River® Intelligent Device Platform XT Wind River® Intelligent Device Platform XT SECURITY GUIDE 2.0 EDITION 4 Copyright Notice Copyright © 2014 Wind River Systems, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without the prior written permission of Wind River Systems, Inc. Wind River, Tornado, and VxWorks are registered trademarks of Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc. Any third-party trademarks referenced are the property of their respective owners. For further information regarding Wind River trademarks, please see: www.windriver.com/company/terms/trademark.html This product may include software licensed to Wind River by third parties. Relevant notices (if any) are provided in your product installation at one of the following locations: installDir/product_name/3rd_party_licensor_notice.pdf installDir/legal-notices/ Wind River may refer to third-party documentation by listing publications or providing links to third-party Web sites for informational purposes. Wind River accepts no responsibility for the information provided in such third-party documentation. Corporate Headquarters Wind River 500 Wind River Way Alameda, CA 94501-1153 U.S.A. Toll free (U.S.A.): 800-545-WIND Telephone: 510-748-4100 Facsimile: 510-749-2010 For additional contact information, see the Wind River Web site: www.windriver.com For information on how to contact Customer Support, see: www.windriver.com/support 10 Dec 2014 Contents 1 Introduction to IDP Security ................................................................................... 5 Overview of Security Guide ................................................................................................ 5 Security Architect Tasks ..................................................................................................... 6 About Trusted Boot ............................................................................................................ 6 About Deployed Embedded Devices .................................................................................. 7 Embedded Terms ............................................................................................................... 7 Stakeholder Roles ............................................................................................... 7 Target Software System ...................................................................................... 8 Public Key Cryptography .................................................................................................... 9 The Chain of Trust .............................................................................................................. 9 Overview of the SRM Trusted Software Stack .................................................... 10 TMP OpenSSL Engine ........................................................................................ 11 SRM Workflow .................................................................................................................... 12 2 Security Planning .................................................................................................... 13 Security Planning Workflow ................................................................................................ 13 Initial Development Assessment ......................................................................... 14 Review Security Design Techniques ................................................................... 14 Run-time Security Assessment ........................................................................... 15 Application Security Assessment ........................................................................ 15 Lifecycle Planning ............................................................................................... 16 Certificate and Key Management ........................................................................ 16 3 Risks, Threats, and IDP Security Mechanisms ..................................................... 19 IDP Security Mechanisms .................................................................................................. 19 About Handling and Analyzing Attacks .............................................................................. 20 4 Security Best Practices .......................................................................................... 25 5 Keys and Certificates .............................................................................................. 27 Root Certificate Management ............................................................................................. 27 Fetching Certificates at Run Time ....................................................................... 28 Maintaining Certificate Security ........................................................................... 28 Vendor Key Lifecycle .......................................................................................................... 29 About Documentation for Device Users ............................................................................. 30 Verifying Packages Using OpenSSL .................................................................................. 30 iii Wind River® Intelligent Device Platform XT Security Guide, 2.0 6 Integrity Measurement ............................................................................................ 33 Integrity Measurement ........................................................................................................ 33 IMA Appraise ....................................................................................................... 33 McAfee Embedded Control ................................................................................. 34 7 Secure Repository ................................................................................................... 37 The Secure Repository ....................................................................................................... 37 Extended Signature in RPM Design ................................................................................... 38 IM Check Structure ............................................................................................................. 38 IM Tools Script Design ....................................................................................................... 39 8 Encrypted Data Storage .......................................................................................... 41 Encrypted Data Storage ..................................................................................................... 41 dm-crypt and cryptsetup ..................................................................................................... 41 TPM-Backed Encrypted Storage ........................................................................................ 42 iv 1 Introduction to IDP Security Overview of Security Guide 5 Security Architect Tasks 6 About Trusted Boot 6 About Deployed Embedded Devices 7 Embedded Terms 7 Public Key Cryptography 9 The Chain of Trust 9 SRM Workflow 12 Overview of Security Guide This document provides systems integrators and security architects with guidance on using Wind River Intelligent Device Platform XT to secure their products. IDP XT provides capabilities to help you secure your product throughout its life: • during design • during development • during deployment The security guide also provides guidance about best practices. 5 Wind River® Intelligent Device Platform XT Security Guide, 2.0 Security Architect Tasks The security architect plans and implements the owner's requirements for the security of the device. Tasks performed by security architects include the following: • Determining the overall security policy, including up-front security policy and periodic security policy reviews. • Determining the environment the device is placed in and the security threats that the device must mediate. • Determining the communication posture of the device, including choosing supported networks, networking devices, and protocols, as well as specifying the network topology if it is not determined by the choice of networks. • Defining procedures for handling attacks when they are discovered. (By definition, successful attacks are discovered after the attack, while unsuccessful attacks are discovered before or during the attack.) • Defining a forensics strategy to analyze data about possible attacks, successful or unsuccessful. This could both prevent or mitigate subsequent attacks and identify the attacker. • Determining the management strategy for the device. • Assisting with selection of device hardware and application vendors. • Monitoring the device vendor during development and deployment. • Monitoring the device vendor and software providers during device provisioning. • Monitoring the device vendor and software providers during device firmware and software updates. • Planning a schedule of device retirement, and monitoring the device vendor and software providers or special disposition teams at the time of device retirement. • Creating documentation for the end user, which defines the required security procedures and practices. About Trusted Boot A trusted platform must provide a high assurance that the system behaves as it is expected to behave. One of the challenges is ensuring that the entire executing software stack is of a known source and has not been tampered with. The IDP XT software stack consists
Recommended publications
  • Personenverzeichnis
    Personenverzeichnis Adelstein, T. 1101 Comer, D. E. 1102 Aho, A. V. 33 Conner-Sax, K. 1103 Albitz, P. 1103 Cooper, M. 46 Alkalay, A. 177 Cutler, E. 1102 Allaert, D. 422 Czyborra, R. 177 Almesberger, W. 477 Anderson, G. 30 Dalheimer, M. K. 1100, 1102 Andreasson, O. 764 Dalheimer, T. 1102 Anvin, H. P. 493 Dawson, T. 237, 1102, 1103 Arcomano, R. 308 Delorie, D. J. 451 Aubepin, F. 1100 Deutz, R. 1103 Aznar, G. 418, 797 Dietz, H. 895 Diffie, B. W. 270 Bach, M. J. 1100 Drake, J. 741 Bacon, J. 1101 Badach, A. 1103 Ebersbach, A. 1103 Barrett, D. J. 1104 Emery, V. 578 Barth, W. 1101 Ewing, L. 9, 10 Bauer, F. L. 586, 1104 Bautts, T. 1102 Fawcett, T. 496 Bayes, T. 817 Fenzi, K. 899 Bic, L. 1099 Frisch, Æ. 1101 Bigelow, C. 189 Bishop, A. M. 574 Garfinkel, S. 1100, 1104 Blaze, M. 582 Garrels, M. 46, 59, 1100 Bolsky, M. I. 1100 Ghosh, S. 304 Bourne, S. R. 33, 46, 1100 Goerzen, J. 290 Bovet, D. P. 679, 1100 Gortmaker, P. 722 Bradley, D. J. 36 Grägert, S. 1103 Brouwer, A. 387 Graham, P. 817 Brown, M. A. 238 Guérard, J.-P. 290 Burgiss, H. 223 Gulbins, J. 1100 Burrows, D. 644 Hahn, H. 1103 Buytaert, K. 890 Haible, B. 177 Cameron, J. 883, 1101 Hall, E. 1103 Card, R. 565 Hammers, C. 456, 900 Cesati, M. 679, 1100 Hards, B. 589 Christenson, N. 404 Hassell, J. 1101 Chuvakin, A. 867 Hattenhauer, R. 1100 Claus, V. 1099 Hazel, P. 802 1106 PERSONENVERZEICHNIS Heinlein, P.
    [Show full text]
  • Šifrované Souborové Systémy V Linuxovém Jádře
    Masarykova Univerzita Fakulta informatiky Šifrované souborové systémy v linuxovém jádře bakalářská práce Antonín Víteček Brno, 2008 Prohlášení Prohlašuji, že tato práce je mým původním autorským dílem, které jsem vypracoval samostatně. Všechny zdroje prameny a literaturu, které jsem při vypracování používal nebo z nich čerpal, v práci řádně cituji s uvedením úplného odkazu na příslušný zdroj. V Hustopečích dne 20. května 2008 ….......................................... Poděkování Děkuji Mgr. Václavu Lorencovi za pomoc, vstřícnost, trpělivost a odbornou pomoc při vedení této práce. Děkuji také svým blízkým za podporu a pochopení při vypracování bakalářské práce. Shrnutí Práce zachycuje současný stav nástrojů pro šifrování metodou OTFE pod operačním systémem GNU/Linux. Zabývá se bezpečností konkrétní implementace nástroje TrueCrypt 4.3a. V závěru pak shrnuje nejnovější poznatky o útocích na tyto nástroje. Klíčová slova TrueCrypt, Dm-Crypt, Device-mapper, Linux, Coldboot, Kryptografie, CryptoAPI Obsah 1 Úvod...................................................................................................................................... ..............6 2 Principy a popis použitých pojmů.................................................................................................... ....7 2.1 Kryptografie ± Šifrování................................................................................................ ..............7 2.2 Implementace šifrování ............................................................................................................
    [Show full text]
  • MASTERCLASS ENCRYPTION MASTERCLASS You Wouldn’T Want Other People Opening Your Letters and BEN EVERARD Your Data Is No Different
    MASTERCLASS ENCRYPTION MASTERCLASS You wouldn’t want other people opening your letters and BEN EVERARD your data is no different. Encrypt it today! CIPHERSHED: ENCRYPTION FOR EVERYONE TrueCrypt lives on as CipherShed, so it’s still really easy to protect your valuable data. verybody has something to hide. It might be a JOHN LANE little more mundane than what our Egovernments get up to but, to each of us, that something is important and valuable enough to protect. It could be your personal finances, or perhaps that new app or book you’ve been working on. If your laptop were stolen, it would be pretty useless if your precious data were encrypted. The good news is that it’s easy and, this month, we show you how. One of the best freely available encryption tools over the past decade was TrueCrypt. It provided on-the-fly filesystem encryption and was a cross-platform PRO TIP solution that worked, not only on Linux, but on Truecrypt / Cyphershed Windows and Mac OS X too. requires root privileges. If you can “sudo” then you’ll Back in May, TrueCrypt as we know it ceased to be ok. exist. Its SourceForge site was replaced with some basic pages claiming that it is “insecure and may CipherShed’s goals include a secure audited codebase contain unfixed security issues”. It now only provides that is released under an OSI-approved licence. guidance for migrating away, and the only download available is for version 7.2, a limited functionality can install the current development version from its version that can only decrypt.
    [Show full text]
  • Debian-Reference.En.Pdf
    Debian Reference i Debian Reference Osamu Aoki Debian Reference ii Copyright © 2013-2021 Osamu Aoki This Debian Reference (version 2.85) (2021-09-17 09:11:56 UTC) is intended to provide a broad overview of the Debian system as a post-installation user’s guide. It covers many aspects of system administration through shell-command examples for non- developers. Debian Reference iii COLLABORATORS TITLE : Debian Reference ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki September 17, 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Debian Reference iv Contents 1 GNU/Linux tutorials 1 1.1 Console basics .................................................... 1 1.1.1 The shell prompt ............................................... 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 The root account ............................................... 2 1.1.4 The root shell prompt ............................................. 3 1.1.5 GUI system administration tools ....................................... 3 1.1.6 Virtual consoles ................................................ 3 1.1.7 How to leave the command prompt ..................................... 3 1.1.8 How to shutdown the system ......................................... 4 1.1.9 Recovering a sane console .......................................... 4 1.1.10 Additional package suggestions for the newbie ............................... 4 1.1.11 An extra user account ............................................. 5 1.1.12 sudo configuration .............................................
    [Show full text]
  • Guía De Referencia De Debian I
    Guía de referencia de Debian i Guía de referencia de Debian Osamu Aoki Guía de referencia de Debian ii Copyright © 2013-2021 Osamu Aoki La Guía de Referencia de Debian (version 2.85) (2021-09-17 09:11:56 UTC) pretende aportar una visión amplia del sistema Debian y servir de guía al usuario después de la instalación. Se tratan diferentes aspectos de la administración del sistema, usando ejemplos en el intérprete de órdenes, para todo tipo de usuarios. Guía de referencia de Debian iii COLABORADORES TÍTULO : Guía de referencia de Debian ACCIÓN NOMBRE FECHA FIRMA ESCRITO POR Osamu Aoki 17 de septiembre de 2021 HISTORIAL DE REVISIONES NÚMERO FECHA MODIFICACIONES NOMBRE Guía de referencia de Debian iv Índice general 1. Tutoriales de GNU/Linux 1 1.1. Introducción a la consola ............................................... 1 1.1.1. El cursor del intérprete de órdenes ...................................... 1 1.1.2. The shell prompt under GUI ......................................... 2 1.1.3. La cuenta de superusuario (root) ...................................... 2 1.1.4. El cursor del intérprete de órdenes de superusuario ............................. 3 1.1.5. Herramientas gráficas para la administración del sistema .......................... 3 1.1.6. Consolas virtuales .............................................. 3 1.1.7. Cómo cerrar el intérprete de órdenes ..................................... 3 1.1.8. Cómo apagar el sistema ........................................... 4 1.1.9. Cómo recuperar la configuración normal de una consola .......................... 4 1.1.10. Paquetes complementarios recomendados para usarios sin experiencia ................... 4 1.1.11. Una cuenta de usuario adicional ....................................... 5 1.1.12. Configuración de sudo ............................................ 5 1.1.13. Hora de jugar ................................................. 6 1.2. Sistema de archivos tipo Unix ...........................................
    [Show full text]
  • A Worldwide Survey of Encryption Products
    A Worldwide Survey of Encryption Products Bruce Schneier Kathleen Seidel Saranya Vijayakumar Berkman Center for Internet Independent Researcher Harvard College and Society [email protected] [email protected] Harvard University [email protected] February 11, 2016 Version 1.0 Introduction Data security is a worldwide problem, and there is a wide world of encryption solutions available to help solve this problem. Most of these products are developed and sold by for-profit entities, although some are created as free open-source projects. They are available, either for sale or free download, all over the world. In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time putting US companies at a competitive disadvantage in the information security market. Seventeen years later, we have tried to replicate this survey. Findings We collected information on as many encryption products as we could find anywhere in the world. This is a summary of our findings: We have identified 865 hardware or software products incorporating encryption from 55 different countries. This includes 546 encryption products from outside the US, representing two-thirds of the total. Table 1 summarizes the number of products from each country. The most common non-US country for encryption products is Germany, with 112 products.
    [Show full text]