The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning...

44
The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents joint research between the Air Force, Army, Navy, NSA, Boeing, Lockheed Martin, Objective Interface, Green Hills, Lynux Works, Wind River, GD, Rockwell Collins, MITRE, U of Idaho Kevin Buesing Objective Interface Systems Field Applications Engineer [email protected] Jeff Chilton Objective Interface Systems Senior Product Engineer [email protected]

Transcript of The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning...

Page 1: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

The MILS Partitioning Communication System + RT CORBA =

Secure Communications for SBC Systems

This presentation represents joint research between theAir Force, Army, Navy, NSA, Boeing, Lockheed Martin, Objective Interface,

Green Hills, Lynux Works, Wind River, GD, Rockwell Collins, MITRE, U of Idaho

Kevin BuesingObjective Interface SystemsField Applications Engineer

[email protected]

Jeff ChiltonObjective Interface Systems

Senior Product [email protected]

Page 2: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 2

PrivilegeMode

Processing

NetworkData

Wild Creatures of the Net, Worms, Virus, . . .

Foundational Threats

BufferOverflow

?

Page 3: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 3

PrivilegeMode

Processing

NetworkData

Under MILS Network Data and Privilege Mode Processing is Separated

Paradigm Shift

Foundational Threats(That MILS Protects Against)

Page 4: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 4

Page 5: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 5

MILS Overview

Page 6: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 6

The Whole Point of MILS

Really simple:

• Dramatically increase the scrutiny of security critical code

• Dramatically reduce the amount of security critical code

Page 7: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 7

Executive OverviewMILS Architecture Objectives

What does MILS do?

Enable the Application Layer Entities to Enforce, Manage, and Control

Application Level Security Policies

in such a manner that the Application Level Security Policies are

Non-bypassableEvaluatable

Always-InvokedTamper-proof

MILS = Multiple Independent Levels of Security/Safety

Reference MonitorConcept

Page 8: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 8

MILS Architecture Objectives

How does MILS achieve its objectives?Enforce an

Information Flow,Data Isolation,Periods Processing, andDamage Limitation Security Policy

between multiple address spaces:

First, in a Microprocessor Centric Manner, i.e., MILS RTOS Kernel,Second, in a Network Centric Manner, i.e., MILS Middleware,

in such a manner that the layered Security Policies are

N E A T

Page 9: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 9

CSCI(Main Program)Monolithic Applications

Partitioning Kernel

Middleware

Orange Book vs.MILS Architecture

Kernel

Privilege Mode

Monolithic KernelInformation FlowPeriods Processing

MathematicalVerification/Evaluation

UserMode

Device drivers

Auditing

File systems

MAC

DA

C

Network I/ODamage Limitation

Data isolation

Page 10: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 10

Executive OverviewMILS Three Layer Architecture

Three distinct layers (John Rushby, PhD)Partitioning Kernel

– Trusted to guarantee separation of time and space• Separate process spaces (partitions)• Time partitioning

– Secure transfer of control between partitions– Really small: 4K lines of code

1. Middleware– Secure application component creation– Secure end-to-end inter-object message flow– Most of the traditional operating system functionality

• Device drivers, file systems, etc.– Partitioning Communications System

• Extends the policies of Partitioning Kernel to communication• Facilitates traditional middleware

– Real-time CORBA, DDS, web services, etc.

2. Applications– Can enforce application-specific security functions– e.g., firewalls, crypto services, guards

Page 11: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 11

Layer Responsibilities

Partitioning Kernel Functionality– Time and Space

Partitioning– Data Isolation– Inter-partition

Communication– Periods Processing– Minimum Interrupt

Servicing– Semaphores– Timers– Instrumentation

And nothing else!

MILS Middleware Functionality

– RTOS Services• Device Drivers• CORBA• File System• …

– Partitioned Communication System

• Inter-node communication

Page 12: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 1245

S,TS

(MLS)

TS

(SL)

S

(SL)

Processor

Application (User Mode) Partitions

Supervisor ModeMMU, Inter-Partition

CommunicationsInterrupts

MILS - Multiple IndependentLevels of Security

MSL - Multi Single LevelMLS - Multi Level SecureSL - Single Level

NetworkInterface

Unit

(MSL)

File SysDeviceDriver

(MSL)

RT CORBART CORBART CORBAPCS

(MSL)

KeyboardDeviceDriver

(MSL)

RTOS Micro Kernel (MILS Partitioning Kernel)

Executive OverviewMILS Architecture – High Assurance

RunTime

Libraries

RunTime

Libraries

RunTime

Libraries

Page 13: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 13

Partitioning Kernel:Just a Start …

• Partitioning Kernel provides– Secure foundation for secure middleware

• Secure Middleware provides– Most of traditional O/S capabilities

• File system• Device drivers (not in the kernel, not special privileges)• Etc.

– Secure intersystem communication (PCS)– Secure foundation for building secure applications

• Secure Applications can– Be built!– Be trusted to enforce application-level security policies!!!

Page 14: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 14

Distributed Security

Page 15: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 15

Distributed Security Requirements

• Rely upon partitioning kernel to enforce middleware security policies on a given node– Information Flow– Data Isolation– Periods Processing– Damage Limitation

• Application-specific security requirements– must not creep down into the middleware (or kernel)– ensure the system remains supportable and evaluatable

• Optimal inter-partition communication– Minimizing added latency (first byte)– Minimizing bandwidth reduction (per byte)

• Fault tolerance– Security infrastructure must have no single point of failure– Security infrastructure must support fault tolerant applications

Page 16: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 16

Distributed Object Communication

• Partition Local – same address space, same machine• Machine Local – different address space, same machine• Remote – different address space, on a different machine

RACEway

VME

ATM1394

TCP/IP

MulticastSharedMemory

Rapid IO

Page 17: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 17

Partitioned Communication System

Page 18: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 18

Partitioned Communication System

• Partitioned Communication System– Part of MILS Middleware– Responsible for all communication between MILS nodes

• Purpose– Extend MILS partitioning kernel protection to multiple nodes

• Similar philosophy to MILS Partitioning Kernel– Minimalist: only what is needed to enforce end-to-end

versions of policies– End-to-end Information Flow– End-to-end Data Isolation– End-to-end Periods Processing– End-to-end Damage Limitation

– Designed for EAL level 7 evaluation

Page 19: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 19

PCS Objective

• Just like MILS Partitioning Kernel:• Enable the Application Layer Entities to

– Enforce, Manage, and Control • Application Level

– Security Policies • in such a manner that the Application Level Security

Policies are – Non-Bypassable, – Evaluatable,– Always-Invoked, and– Tamper-proof.

– An architecture that allows the Security Kernel and PCS to share the RESPONSIBILITY of Security with the Application.

• Extended:– To all inter-partition communication within a group of MILS nodes

(enclave)

Page 20: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 20

PCS Requirements

• Strong Identity– Nodes within enclave

• Separation of Levels/Communities of Interest– Need cryptographic separation

• Secure Configuration of all Nodes in Enclave– Federated information– Distributed (compared) vs. Centralized (signed)

• Secure Loading: signed partition images• Suppression of Covert Channels

– Bandwidth provisioning & partitioning – Network resources: bandwidth, hardware resources, buffers

Page 21: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 21

Executive OverviewMILS Network Security Policy

Example

PCS Provides End-to-End:

D1

D2

D3

BSRV

RPM

E1

E2

E3

RS BV

BPM

Red Network Black Network

Information FlowData IsolationPeriods ProcessingDamage Limitation

CPU & NetworkRegistersSwitches, DMA, …

Policy Enforcement Independent of Node Boundaries

System

Page 22: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 22

MILS Replaces Physical Separation

• MILS architecture allows computer security measures to achieve the assurance levels as “physically isolated” systems– All O/S code not necessary for performing Partitioning

Kernel functions moved out of privileged mode– O/S service code moved to middleware layer

• e.g. device drivers, file system, POSIX– Prevents software and network attacks from elevating a

partition privilege to an unauthorized level

Page 23: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 23

Best Security/Safety is Physical (Air Gap)

Processor R1

App

Processor B1

App

Intranet(Proprietary,Sensitive,Critical)

Internet(Public,Untrusted)

Processor R2

App

Processor Rn

App

Processor B2

App

Processor Bn

App

Page 24: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 24

Legacy Approach to Bridging the Air Gap

(Good, Expensive, Physical Solutions Exist)

Processor R1

AppRed(classified,Sensitive,Critical)

Processor R2

App

Processor Rn

App

Processor B1

App

Black(unclassified,Public,Untrusted)

Processor B2

App

Processor Bn

App

SNSOne-WayGate

Write-DownGuard

• Very high assurance• Off-the-shelf solution

• Office environment only• Extra hardware

Page 25: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 25

Modem

Modem

Modem

Modem

Channel A(Top Secret)Red Processor

Channel C(Confidential)Red Processor

Channel D(Unclassified)Red Processor

Channel B(Secret)Red Processor

Crypto Engine

Crypto Engine

Crypto Engine

Crypto Engine

This Is Current Stovepipe Technology That Is Expensive And Inflexible

Air Gap Solution to SDR –Separate Hardware

Page 26: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 26

Modem

Modem

Modem

Modem

Channel A(Top Secret)Red Processor

Channel C(Confidential)Red Processor

Channel D(Unclassified)Red Processor

Channel B(Secret)Red Processor

Crypto Engine

Crypto Engine

Crypto Engine

Crypto Engine

Need MILS SolutionHere!

Need MILS SolutionHere!

AND

Need MILSNon Real-Time

Operating EnvironmentSolution Here!

AND

A Simple Application of MILS to SDR –Separate Processor Resources

Page 27: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 27

Introduction – MLS/MSLS

Multi-Level Secure/Safe (MLS): Processes data of differing classifications/sensitivities securely/safely– down graders– data fusion– guards– firewalls– data bases

Multi-Single Level Secure/Safe (MSLS): Separates data of differing classifications/sensitivities securely/safely simultaneously– communications platforms – infrastructures

Page 28: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 28

MILS Can Handle MLS

– A Partitioning Kernel is ignorant of traditional Multi-Level Security (MLS)

• Requirement for military and intelligence systems– However, MILS is quite capable of supporting MLS systems– MILS can be used to construct MLS systems because of

• Strong separation guarantees • Certification process

Page 29: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 29

Applying MILS to Software Defined Radio

Page 30: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 30

Example – JTRSJoint Tactical Radio System

– Family of software programmable radios– Design around Software Communications Architecture– JTRS provides reliable multichannel voice, data, imagery,

and video communications– Eliminates communications problems of "stovepipe" legacy

systems– JTRS is:

• Modular, enabling additional capabilities and features to be added to JTR sets

• Scaleable, enabling additional capacity (bandwidth and channels) to be added to JTR sets

• Backwards-compatible, communicates with legacy radios• Allowing dynamic intra-network and inter-network routing

for data transport that is transparent to the radio operator

Page 31: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 31

MILS RoadmapMILS Crypto Engine & Emb

OE

Modem

Modem

Modem

Modem

TS Channel

S Channel

C Channel

U Channel

MLSCrypto Apps

MILSMiddleware

MILSRTOS

Microprocessor

MILSCryptoEngine

BLACK

RED

Page 32: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 32

Designing an MLS Component

Unclassified Network (Black)

Classified network (Red), labeled messages

MLS Middleware Component

Ex: Cryptographic downgrader, such as JTRS or trusted network interface unit

Page 33: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 33

Designing an MLS Component

Unclassified Network (Black)

Classified network (Red), labeled messages

Red NetworkInterface

Unit(MLS)

Encryption Engine(s)

(MLS)

Blk NetworkInterface

Unit

Decryption Engine(s)

(MLS)

Page 34: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 34

Designing an MLS Component

Unclassified Network (Black)

Classified network (Red), labeled messages

Red NIU(MLS) Blk NIU

RS

E1

E2

E3

BV

BS

D1

D2

D3

RV

MLS

Single Level Components (MSL)

Certified Downgrader

Page 35: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 35

Red NIU(MLS) Blk NIU

RS

E1

E2

E3

BV

BS

D1

D2

D3

RV

Unclassified Network (Black)

Classified network (Red), labeled messages

Designing an MLS Component

E1

E2

E3

Certification Requirements:

Incoming messages will be encrypted with the specified algorithm and key

Output is strongly encrypted

Each device downgrades from one specific level to unclassified

Certified Downgraders

Page 36: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 36

Red NIU(MLS) Blk NIU

RS

E1

E2

E3

BV

BS

D1

D2

D3

RV

Unclassified Network (Black)

Classified network (Red), labeled messages

Designing an MLS Component

Red NIU(MLS)

Certification Requirements:

Messages from either side will maintain labels and contents

Periods processing (transaction based) unit

MLS

Page 37: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 37

Red NIU(MLS) Blk NIU

RS

E1

E2

E3

BV

BS

D1

D2

D3

RV

Unclassified Network (Black)

Classified network (Red), labeled messages

Designing an MLS Component

MLS

RS

Certification Requirements:

Messages from NIU will be routed to appropriate encryption unit

Periods processing (transaction based) unit

Page 38: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 38

Red NIU(MLS) Blk NIU

RS

E1

E2

E3

BV

BS

D1

D2

D3

RV

Unclassified Network (Black)

Classified network (Red), labeled messages

Designing an MLS Component

MLS

RV

Certification Requirements:

Messages from decryption units will be labeled correctly before sending to NIU

Periods processing (transaction based) unit

Page 39: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 39

Designing an MLS Component

Red NIU(MLS) Blk NIU

RS

E1

E2

E3

BV

BS

D1

D2

D3

RV

Unclassified Network (Black)

Classified network (Red), labeled messages

Red Communication Links

Certification Requirements:

Tamperproof, Non bypassable, Evaluatable

Black Communication Links

Certification Requirements???:

Tamperproof, Non bypassable, Evaluatable

Page 40: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 40

The MILS Architecture Approach

• Describe the system in terms of communicating components– Designate the clearance of each component and label as

MLS or MSL– Determine the flow between components with respect to

policy– Install “boundary firewalls” that manage information up-flow

and down-flow • these are MLS components

Page 41: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 41

The MILS Architecture Approach

• For each MLS device, determine its type– Downgrader – will take data from one security level and

send data at a lower level– Transaction processor – will process data one message at a

time; stateless, may filter data or perform operation on single message

– Collator – will combine data from many inputs• Verification of each device may involve additional MILS

componentization

Page 42: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 42

Implementation

• Hierarchical Approach– Lowest level is separation kernel – enforces isolation,

information flow, periods process, damage limitation on a single processor

– Next level is middleware, to coordinate end-to-end separation

• Need to create “trusted” components.– Verification of the components utilizes architectural support of

lower layer– Next Level is application specific

Page 43: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 43

Acronyms

• MILS Multiple Independent Levels of Security/Safety• MSLS Multiple Single Level Security/Safety• MLS Multi-Level Secure/Safe• PCS Partition Communication System• CORBA Common Object Request Broker Architecture• NEAT Non-bypassable, Evaluatable, Always-invoked,Tamper-proof • NIU Network Interface Unit• ORB Object Request Broker• O/S Operating System• CC Common Criteria• EAL Evaluation Assurance Level• ARINC 653 Safety Community Standard for Time and Space Partitioning• DMA Direct Management Access• MMU Memory Management Unit

Page 44: The MILS Partitioning Communication System + RT CORBA ...€¦ · The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems This presentation represents

9/16/2004 SBC 2004 44

Partners

MILS Hardware Based Partitioning KernelAAMP7 Rockwell Collins

MILS Software Based Partitioning KernelIntegrity-178 Green Hills SoftwareLynxOS-178 LynuxWorksVxWorks AE Secure Wind River

MILS MiddlewarePCS and ORBexpress Objective Interface Systems, Inc.MILS TestBed University of IdahoMILS TestBed Naval Post Graduate School