+ All Categories
Home > Technology > Introduction to the ZeroTrust Initiative

Introduction to the ZeroTrust Initiative

Date post: 07-Apr-2017
Category:
Upload: pjdzt
View: 307 times
Download: 1 times
Share this document with a friend
54
CTO, Wheel Systems Founder of the ZeroTrust Initiative Paweł Jakub Dawidek <[email protected]> <[email protected]> <[email protected]> The ZeroTrust Initiative There is no Security without Transparency
Transcript
Page 1: Introduction to the ZeroTrust Initiative

CTO, Wheel SystemsFounder of the ZeroTrust Initiative

PawełJakubDawidek<[email protected]><[email protected]><[email protected]>

TheZeroTrustInitiativeThereisnoSecuritywithoutTransparency

Page 2: Introduction to the ZeroTrust Initiative

TheZeroTrustInitiativeaimstoimproveoverallITsecurityby

removingforcedtrust

Page 3: Introduction to the ZeroTrust Initiative

u weareforcedtotrustthevendors

Problems…

Page 4: Introduction to the ZeroTrust Initiative

u weareforcedtotrustthevendorsu nosourcecodeforproprietaryproducts

Problems…

Page 5: Introduction to the ZeroTrust Initiative

u weareforcedtotrustthevendorsu nosourcecodeforproprietaryproductsu noreproduciblebuildsforopen-source

Problems…

Page 6: Introduction to the ZeroTrust Initiative

u weareforcedtotrustthevendorsu nosourcecodeforproprietaryproductsu noreproduciblebuildsforopen-sourceu trustedbuildenvironment?u securedistribution?u reproducibleinstalls?

Problems…

Page 7: Introduction to the ZeroTrust Initiative

Whoisright?

Page 8: Introduction to the ZeroTrust Initiative

„Ifitcannotbeveri:ied,itcannotbesecure”

Page 9: Introduction to the ZeroTrust Initiative

Whyisthatimportant,exactly?

Page 10: Introduction to the ZeroTrust Initiative

„Besuspiciousofcommercialencryptionsoftware,especiallyfromlargevendors.MyguessisthatmostencryptionproductsfromlargeUS

companieshaveNSA-friendlybackdoors,andmanyforeignonesprobablydoaswell.It'sprudenttoassumethatforeignproductsalsohaveforeign-

installedbackdoors.Closed-sourcesoftwareiseasierfortheNSAtobackdoorthanopen-sourcesoftware.”

BruceSchneier

Nosourcecode

Page 11: Introduction to the ZeroTrust Initiative

„ThankstotherecentNSAleaks,peoplearemoreworriedthaneverthattheirsoftwaremighthavebackdoors.Ifyoudon'tbelievethatthesoftwarevendorcanresistabackdoorrequest,theonusisonyoutolookfora

backdoor.Whatyouwantissoftwaretransparency.”prof.EdwardW.Felten

Nosourcecode

Page 12: Introduction to the ZeroTrust Initiative

u compilersu compilationoptionsu headersu librariesu timeu buildenvironmentsmetadatau Lilesystemmetadatainarchivesu signaturesu proLile-guidedoptimizations

Noreproduciblebuilds:different…

Source:MikePerry,SethSchoen

Page 13: Introduction to the ZeroTrust Initiative

u Howsmallcanabackdoorbe?

Noreproduciblebuilds

Source:MikePerry,SethSchoen

Page 14: Introduction to the ZeroTrust Initiative

u Howsmallcanabackdoorbe?

Noreproduciblebuilds

OpenSSH3.0.2(CVE-2002-0083)-privilegeescalationtoroot

- if (id < 0 || id > channels_alloc) {

+ if (id < 0 || id >= channels_alloc) {

Source:MikePerry,SethSchoen

Page 15: Introduction to the ZeroTrust Initiative

u Howsmallcanabackdoorbe?

Noreproduciblebuilds

cmpl $0x0,0x8(%ebp)

js 16

mov 0x4,%eax

cmp %eax,0x8(%ebp)

jle 30

mov 0x8(%ebp),%eax

mov %eax,0x4(%esp)

movl $0x4c,(%esp)

call 25

Assembly

cmpl $0x0,0x8(%ebp)

js 16

mov 0x4,%eax

cmp %eax,0x8(%ebp)

jl 30

mov 0x8(%ebp),%eax

mov %eax,0x4(%esp)

movl $0x4c,(%esp)

call 25

Source:MikePerry,SethSchoen

Page 16: Introduction to the ZeroTrust Initiative

u Howsmallcanabackdoorbe?

Noreproduciblebuilds

39 45 08 7e 1a 8b 45

Binary

39 45 08 7c 1a 8b 45

Source:MikePerry,SethSchoen

Page 17: Introduction to the ZeroTrust Initiative

u Howsmallcanabackdoorbe?

Noreproduciblebuilds

39 45 08 7e 1a 8b 45

Binary

39 45 08 7c 1a 8b 45

01111110 01111100

Source:MikePerry,SethSchoen

Page 18: Introduction to the ZeroTrust Initiative

u Howsmallcanabackdoorbe?

Noreproduciblebuilds

39 45 08 7e 1a 8b 45

Binary

39 45 08 7c 1a 8b 45

01111110 01111100

Asinglebit!

Source:MikePerry,SethSchoen

Page 19: Introduction to the ZeroTrust Initiative

u HugeefforttoverifyTrueCryptu On-goingworkonreproduciblebuilds(Tor,Debian)u Moreawarenessamongdevelopersneededu ReLlectionsonTrustingTrust,1984KenThompsonu CounteringTrustingTrustthroughDiverseDouble-Compiling,DavidA.Wheeler

Noreproduciblebuilds

Page 20: Introduction to the ZeroTrust Initiative

u Howcanyoufeelsecurewithoutit?

Completeend-to-endindependentveriLication

Page 21: Introduction to the ZeroTrust Initiative

Development

Build

Distribution

Installation

Page 22: Introduction to the ZeroTrust Initiative

Developmenttrusteddevelopmentenvironment

Build

Distribution

Installation

trustedbuildenvironmentreproduciblebuildstrustedsigningenvironment

signedsourcesignedbinariesbinarytransparency

secureinstallationofkeyssignaturesveriLicationreproducibleinstallation

Page 23: Introduction to the ZeroTrust Initiative

u publiclyavailablealgorithmsu extensivepeerreviewu publiclyavailablecryptoanalysisresults

Cryptography

Page 24: Introduction to the ZeroTrust Initiative

u secret,home-growncryptouncommon

Cryptography:theresult?

Page 25: Introduction to the ZeroTrust Initiative

u secret,home-growncryptouncommonu thestrongestlinkinthechain

Cryptography:theresult?

Page 26: Introduction to the ZeroTrust Initiative

u agenciescanaskorforceorganizationstoputbackdoors

Whynottotrust?

Page 27: Introduction to the ZeroTrust Initiative

u agenciescanaskorforceorganizationstoputbackdoorsu peoplecanbecriminals

Whynottotrust?

Page 28: Introduction to the ZeroTrust Initiative

u agenciescanaskorforceorganizationstoputbackdoorsu peoplecanbecriminalsu peoplecanbebribed

Whynottotrust?

Page 29: Introduction to the ZeroTrust Initiative

u agenciescanaskorforceorganizationstoputbackdoorsu peoplecanbecriminalsu peoplecanbebribedu peoplecanbeintimidated

Whynottotrust?

Page 30: Introduction to the ZeroTrust Initiative

u agenciescanaskorforceorganizationstoputbackdoorsu peoplecanbecriminalsu peoplecanbebribedu peoplecanbeintimidatedu peoplecanbeincompetent

Whynottotrust?

Page 31: Introduction to the ZeroTrust Initiative

u agenciescanaskorforceorganizationstoputbackdoorsu peoplecanbecriminalsu peoplecanbebribedu peoplecanbeintimidatedu peoplecanbeincompetentu people’scomputerscanbehacked

Whynottotrust?

Page 32: Introduction to the ZeroTrust Initiative

u don’tdestroybusiness

TheSolution

Page 33: Introduction to the ZeroTrust Initiative

u don’tdestroybusinessu proposealicenseforauditing/reportingpurpose

TheSolution

Page 34: Introduction to the ZeroTrust Initiative

u don’tdestroybusinessu proposealicenseforauditing/reportingpurposeu encourageandpromotereproduciblebuilds

TheSolution

Page 35: Introduction to the ZeroTrust Initiative

u don’tdestroybusinessu proposealicenseforauditing/reportingpurposeu encourageandpromotereproduciblebuildsu talktotoolchainvendors

TheSolution

Page 36: Introduction to the ZeroTrust Initiative

u don’tdestroybusinessu proposealicenseforauditing/reportingpurposeu encourageandpromotereproduciblebuildsu talktotoolchainvendorsu talktoplatformvendorstomakeveriLicationpossible

TheSolution

Page 37: Introduction to the ZeroTrust Initiative

u don’tdestroybusinessu proposealicenseforauditing/reportingpurposeu encourageandpromotereproduciblebuildsu talktotoolchainvendorsu talktoplatformvendorstomakeveriLicationpossibleu proposewaystoprotectIP

TheSolution

Page 38: Introduction to the ZeroTrust Initiative

The Ultimate Goal

ZeroTrustasanaturalelementofsecurityhygiene

Page 39: Introduction to the ZeroTrust Initiative

Thoughquestions/Commomconcerns

Page 40: Introduction to the ZeroTrust Initiative

V:Wemakemoneybysellingoutsoftwareanddon’twanttodestroyourbusinessbygivingitawayforfree.

ZT:TheZTIdoesn’texpectyourcompanytostartgivingproductsforfree.ZTIwillproposealicensethatwillallowtoreleasethesourcecode,butonlyforauditingandreportingpurposes.

Commonconcerns

Page 41: Introduction to the ZeroTrust Initiative

V:Wedon’twantourcompetitorstouseourcodewhichwewillreleaseasOpenSource.

ZT:WithZTIlicensethatwouldbeillegal.Yourcompetitorwillalsohavedisadvantage,becauseofnotreleasingthecode.

Commonconcerns

Page 42: Introduction to the ZeroTrust Initiative

V:Ourcurrentcodeisamess.Wealsohavebinaryblobsfromothervendorsandnochancetogetthesourcecodeforthat.

ZT:Thendon’treleaseit.Wefullyunderstanditmightbetooexpensiveandtooriskytoreleasecurrentsourcecode.Butwhenyoustartbuildinganewproduct,doitaccordingtotheZTIideology.

Commonconcerns

Page 43: Introduction to the ZeroTrust Initiative

V:Itwon’twork,nobodywillbeinterested,wearetoobigtotry.

ZT:Startinsmallsteps.ReleaseZeroTrustversionofyourproduct,withlimitedfunctionalityandseewhatthemarketwillchoose.

Commonconcerns

Page 44: Introduction to the ZeroTrust Initiative

V:Howabout,toslowdownthecompetitors,wewillreleasethesourcecodesometimeafterreleasingthebinaries?

ZT:Badidea.Thismeanspeoplewhocare,willneedtowaitforyourproducttobecomepossibletoverify.

Commonconcerns

Page 45: Introduction to the ZeroTrust Initiative

V:Openingthesourcecodesolvesnothing!Noonewilleverbeabletoauditmyentirecodeanyway!

ZT:That’spossible,ofcourse,butthat’snotcrucial.Peoplemaywanttoauditthecodeoncetheysuspectsomething.IndependentpartiesmayauditthecodeandIcanchoosewhototrust.Itismuchmoreriskytoputabackdoorintoaproductwithopensource.

Commonconcerns

Page 46: Introduction to the ZeroTrust Initiative

V:Opensourcesoftwarelesssecure,becauseitiseasiertoLindsecuritybugs.

ZT:Yes,itiseasiertoLindbugs,but…

Commonconcerns

Page 47: Introduction to the ZeroTrust Initiative

TimetoLindasecuritybug

Open Source

Closed Source

0m 12m 24m 36m 48m

Agencies Cybercriminals Whitehat community

Commonconcerns

Page 48: Introduction to the ZeroTrust Initiative

TimethebugcanbeexploitedbyCybercriminals

Open Source

Closed Source

0m 12m 24m 36m 48m

Agencies Cybercriminals Whitehat community

Commonconcerns

12m

24m

12m<24m

Page 49: Introduction to the ZeroTrust Initiative

TimethebugcanbeexploitedbyGovernmentAgencies

Open Source

Closed Source

0m 12m 24m 36m 48m

Agencies Cybercriminals Whitehat community

Commonconcerns

18m

36m

18m<36m

Page 50: Introduction to the ZeroTrust Initiative

V:FormyproducttoworkeffectivelyIcannotdisclosethesourcecode.Forexamplespammerswillquicklylearnhowtobypassmyanti-spamsolution.

ZT:Sure,itisyourcall.ReleaseasmuchsourcecodeasyoucanandletyourcustomersdecideifthisexplanationconvincesthemormaybetheywillpreferZTalternative.Youmayalsodesignyoursoftwaresothatbinary-onlyfunctionalityisclosedinatightsandbox(lookoutforside-channelattacks).

Commonconcerns

Page 51: Introduction to the ZeroTrust Initiative

V:HowcantheZTIideologybeappliedtocloudserviceproviders?

ZT:Wedon’tknowyet,buttarsnap,sync.com.

Commonconcerns

Page 52: Introduction to the ZeroTrust Initiative

V:I’mavendorfromtheUSAandafterEdwardSnowdenleaksnobodytrustsmeanymore.WhatdoIdo?

ZT:Boy,dowehavegreatnewsforyou!JointheZTIandrebuildyourtrust!

Commonconcerns

Page 53: Introduction to the ZeroTrust Initiative

u don’tblindlytrustthevendorsu havingsourcecodeisalwaysbetter,butbesurethesourcecodematchesthebinaries

u startlookingforZeroTrustproductsu supportvendorsthatapplyZTIeveniftheyprovidealternativeversionsoftheirproducts-showthemthatyoucare

u imagineyourwholeITinfrastructurebuildontopofZeroTrustproductsanditwillbeso!

Tosumup…

Page 54: Introduction to the ZeroTrust Initiative

https://www.facebook.com/ZeroTrustInitiative


Recommended