Ready made Recipes to add Security and Data Protection to a Yocto based Project reusing Tizen-Meta
Dominig ar Foll (Intel Open Source Technology Centre) dominig.arfoll@fridu.net
March 2015
Ready made Recipes to add Security and Data Protection to a Yocto - - PowerPoint PPT Presentation
Ready made Recipes to add Security and Data Protection to a Yocto based Project reusing Tizen-Meta Dominig ar Foll (Intel Open Source Technology Centre) dominig.arfoll@fridu.net March 2015 Tizen-Meta IoT and Security What is Tizen
Dominig ar Foll (Intel Open Source Technology Centre) dominig.arfoll@fridu.net
March 2015
2 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
3 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
3
4 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
4
Venture Beat News: “The Internet of Things will be vulnerable for years, and no
CMS Wire: “Top 5 IoT security concerns: Privacy, Authentication, Transport Encryption, Web Interface, Insecure Software” Wired: “The Internet of Things has Arrived – And so have Massive Security Issues” The Inquirer: “The Internet of Things needs a security model to protect user data” CSO: “Mainstream Internet of Things raising consumer security, privacy concerns”
5 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
New Security Boundary Traditional Security Boundary
6 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
7 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
8 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
Manufacturer Adaptation Interface
SMACK SMACK
9 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
* hardware dependent
10 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
11 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
12 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
users
labelled files
AppX alice AppY alice AppX bob AppY bob AppX alice YES NO (MAC) NO (DAC) NO (DAC+ MAC) AppY alice NO (MAC) YES NO (DAC+ MAC) NO (DAC) AppX bob NO (DAC) NO (DAC+ MAC) YES NO (MAC) AppY bob NO (DAC+ MAC) NO (DAC) NO (MAC) YES
13 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
14 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
System User rwx
This rule tells to allow read, write and execute access to objects labelled User for the processes labelled System.
What are labels? What are subjects? What are objects? How to set?
15 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
16 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
configure the system according to the manifest.
environment in agreement with the manifest and launch the application in the trusted environment.
Installed Applications (untrusted) Trusted System (installed, signed) Installer Installed Application with manifest launcher Trusted environment
Smack rules
process
Cynar a rules netfilte r rules
17 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
...
Web RunTime WebApp NativApp Services Service 1 Kernel Service 2
18 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
■ Enabled Daemon ■ D-Bus ■ Devices ■ Files
■ Access to the network using MAC and netfilter and name spaces ■ Shared Libraries ■ Name spaces
19 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
HMI
20 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
21 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
22 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
23 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
specific group.
requires following the cynara diagnostic
24 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
Intel Confidential 25
(IoTivity, Allseen, Thread etc...) Network, transport and even session layer security are less relevant
OIC Resource Layer
OIC Clients OIC
Servers
OIC Exchange Layer
COAP, DDS, XMPP, MQTT etc... Data Layer Protections (e.g. Encrypted JSON) Session Layer Protection (e.g. DTLS)
OIC Resources
Connectivity Abstraction Layer
UDP/IP BLE 802.15.4 ...
OIC
Intermediaries
Network, Transport, Physical Layers Application Layer
Secur ity Endp
Plumb ing
Security Resources
▪ Access control policies and access enforcement ▪ Credentials, roles, groups, pairing and identity ▪ ‘Device’ ownership ▪ Secure configuration of resources
▪ Stack instance isolation ▪ Resource layer ←→ app layer isolation ▪ Encryption key storage ▪ Stack instance integrity / secure boot
Encrypt ed Context
26 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
27 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
28 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
Gulf of Morbihan, south of Brittany, France
30 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
contexts of the current process, the running processes, the files.
31 Linux Embedded March 2015 Dominig ar Foll Intel Open Source Technology Centre
# chsmack --access label file # echo -n label > /proc/$$/attr/current # echo “subject object rwt” > /sys/fs/smackfs/load-self2 # echo “subject object rwt” > /sys/fs/smackfs/load2 # echo “subject object rwt” > smackload