Janet Lepanto - Tolerant Systems

Aegis Research Corporation
Survivability Validation Framework for
Intrusion Tolerance Using
Masking, Redundancy and Dispersion
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Janet Lepanto
William Weinstein
The Charles Stark Draper Laboratory, Inc.
Aegis Research Corporation®
Aegis Research Corporation
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 1
Overview
Aegis Research Corporation
•
Technology description and survivability problem addressed
•
Assumptions
•
Impairments: threats, attacks, vulnerabilities
– Design/implementation
– Configuration/operation
•
Survivability attributes
•
Comparison with other systems
•
Survivability mechanisms
•
Rationale
– Goal vs. impairment matrix
– Verification techniques
•
Residual risks, limitations, caveats
•
Cost/benefit analysis
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 2
Technology Description and Survivability
Problem Addressed
Aegis Research Corporation
•
Apply fault-tolerant design concepts to provide intrusion tolerance for
a “service” site that supports external clients with web-based access
to information, databases, and applications services
•
Minimize loss of data confidentiality and integrity in the face of a
successful attack on one of the servers
•
Tolerate attacks whose specific signatures are not known a priori
•
Employ only a small set of trusted components to protect a large set
of untrusted unmodified COTS servers and databases
•
Employ redundancy for both intrusion tolerance and performance
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 3
Nominal Site Configuration
Aegis Research Corporation
Configuration
Manager
Gateway
Server
(1)
Server
(2)
Switched IP
External
Firewall
Switched IP
External WAN
Authentication
Server
Transaction
Mediator
Data
Base
Server
(N)
Trusted
COTS
Other
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 4
Technical Approach
Aegis Research Corporation
•
Mask fingerprints of gateway and origin servers so that an attacker cannot
probe over network to determine
– OS of gateway, or origin servers
– Implementation of any origin server
•
Distribute each client’s transactions among origin servers such that the
client cannot predict which server will handle a transaction
•
Periodically inspect each origin server for configuration anomalies that
might indicate that attack transactions have occurred
– Reconfigure server to “clean” state if anomalies are detected
•
Log transactions to back-end database so that data written by a
compromised origin server can be reconstructed
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 5
Assumptions
Aegis Research Corporation
A1
A2
A3
A4
A5
Succ essful attack wil l mo st l ikely requi re mult iple transaction s bet weenthe
attacker and a particul ar origin server
Rate o f attack t ransaction s w il l be relatively low b ecau se anat tack erdo esno t
want to be de tected
The “trusted” Gateway, T ransaction Moni tor and Con figu ration Manage r
platforms are strongly resistant to comp romise byana ttacker
Attacks exhib itingh ight ransaction rates w il l be add ressed byo the r means
Attack a ctiv ity wil l r esult ina signa ture o r con fi gurationanom alyth at c anbe
detected vi a digi tal forens ics
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 6
Impairments: Threats, Attacks, Vulnerabilities
Aegis Research Corporation
Design / Implementat ion
TAV- 1.1
Vulne rabil ityino rigin serve r operatingsy stem
TAV- 1.2
Vulne rabil ityin web server explo itab le u sing log ic with inanapp lic ation
TAV- 1.3
Vulne rabil ityinC GI s crip ts exploi tabl e us inglogi c within a script
TAV- 1.4
Vulne rabil ityin web server explo itab le byin jecting a n ew execu tabl e
TAV- 1.5
Vulne rabil ityinC GI s crip ts exploi tabl e byinj ectinga ne w execut able
TAV- 1.6
Vulne rabil ityinb ack-end d atab ase pla tform OS
TAV- 1.7
Vulne rabil ityinb ack-end d atab ase appl ication
Conf igura tion / Operation
TAV- 3.1
Attacke r mayl earnde tailso f ar chi tecture and impl emen tationvia weakn ess
in server pla tformand web server finge rprint m askingo r via sid e chann el
TAV- 3.2
Attacke r mayobt aina ccount n ame and pa ssword (for web serve r and /or
databa se) of a leg itimate us er and i mpersonat e tha t us er. U sers are no t
iss ued a ccount s directlyonthe server pla tformo r the trusted Gateway.
TAV- 3.3
Attacke r mayobt ain root p assw ord o f a serve r and imp erson ate sys adm in
TAV- 3.4
Sys tem admin istrato r inco rrectly configu res ano rigin serve r
TAV- 3.5
Sys tem admin istrato r inco rrectly configu res one o f t he t rusted el emen ts
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 7
Survivability Attributes
Aegis Research Corporation
•
Protects the confidentiality (C) and integrity (I) of site data from stealthy
attacks emanating from an external network
•
Does not address authentication (AU)
•
Does not address non-repudiation (NR)
•
DoS attack considerations
– Redundancy of Origin Servers provides a second order benefit
– Taking servers off-line when an anomaly is detected creates a potential
vulnerability (which is mitigated by smart configuration management)
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 8
Comparison with Other Systems
Aegis Research Corporation
•
Existing systems/practices
– Address known threats, attack profiles and vulnerabilities to achieve
confidentiality, integrity, authentication and non-repudiation
– Require significant/costly modifications to COTS systems, (e. g., operating
system modifications, special network cards)
– Do not address vulnerabilities or attacks that are unknown a priori
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 9
Survivability Mechanisms
Aegis Research Corporation
Conta inment
M1
Employa trus ted pl atform (“the Gateway” ) to p roxy net work l aye r
communi cations b etween exte rnalc lien ts and front -end web server pla tforms
M2
Employa trus ted pl atform (“the Transaction Monito r”) to p roxy t rans actions
betweenth e web s erve rs and ba ck-end da taba se p latforms
M3
Con figu re the site ne twork to al low n etwork-lay er conne ctiv ityonlyb etween
spec if ied p airs of pla tforms
M4
Do not a llo w web s erve r platforms to init iate conne ction s to, o r through, the
Gateway
Iden tity Masking
M5
Mask TC P/IP finge rprint o f the Gateway
M6
Mask O S/web server finge rprint o f the fr ont -end web server pla tforms
Tran saction Dispersion
M7
Disperse ex terna l client transaction s across a redund ant set o f fun ctiona lly
id enti calo rigin serve rs
M8
Employa v arie tyo f origin server imp lementa tion s (different pl atforms,
ope rating systems, and w eb s erve r app lic ation s)
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 10
Survivability Mechanisms (cont’d)
Aegis Research Corporation
System Monitoring
M9
Monito r the con fi gurationo f the o rigin serve rs for ano malou s characteristics
M10
Log the a ction s of each web serve r platform onthe b ack-end d atab ase p latforms
Rollbac k
M11
Recons truct d atab ase transaction s fr om the l ast point that the sys tem was known
to b e uncomp romised
System Con figu ration Management
M12
Remove pot enti ally comp romised w eb s erve rs fr omope ration, analy ze th e
ano malies, and recons truct withco rrect con fi guration
M13
Employa trus ted pl atform (“the Con fi gurationM anage r”) f or man agem ent o f
the Gateway, the T rans actionMon itor, and the web serve r platforms
M14
Serve r conten t updat e exe cuted v ia C M agen t
Policy
M15
Con figu re specifi c OS and w eb s erve r parame ters to p revent a ccess to ce rtain
priv ileg ed ope ration s fr om with ina co mpromi sed appli cation
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 11
Rationale: Goal vs. Impairment Matrix
Aegis Research Corporation
Design
AV
I
C
TAV- 1.1
M1, M5, M15, A31
TAV- 1.2
M6-13, A1 -2, A52
TAV- 1.3
M7, M9 -13, A1-2, A52
TAV- 1.4
M3-4, M6 -13, A1-2, A52
TAV- 1.5
M3-4, M7, M9-13, A1-2, A5 2
TAV- 1.6
M23
TAV- 1.7
not e 4
Operation
AV
I
C
TAV- 3.1
M1-4, M7 -135
TAV- 3.2
not e 6
TAV- 3.3
M1, M4, M7-137
TAV- 3.4
M9, M14 8
TAV- 3.5
not e 9
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
AU
NR
AU
NR
Slide 12
Rationale: Verification
Aegis Research Corporation
•
Verification techniques
• Subjecting the system to known scanning tools to determine if the
mechanisms to thwart those scans are implemented properly
• Subjecting the system to known attacks to evaluate how it reacts to
various types of attacks (e. g., measuring the relative time to success
for an attack directly on server X vs. the same attack on server X
operating in our OASIS architecture).
• Subjecting the system to modifications of known attacks developed
to exploit knowledge of the architecture and operation of the system
•
Metrics
– Impact of Draper-Aegis OASIS mechanisms on resistance to attack
– Relative time to achieve successful attacks
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 13
Residual Risks, Limitations, Caveats
Aegis Research Corporation
•
Forms-based HTML provides external client access to back-end database,
and also can move files between clients and back-end file systems, and
support interactions between clients and back-end applications
– Significant system functionality and flexibility can be provided by the
HTTP protocol
– Utility of dispersion w.r.t. other protocols is TBD
•
Need to evaluate if/to what extent Gateway and the Transaction Mediator
could be bottlenecks for high performance sites
•
If rollback is done only for transactions from compromised server, no
guarantee that information in the database will remain self-consistent
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 14
Cost/Benefit Analysis
Aegis Research Corporation
•
Time
– Attacker is delayed
– Attacker must complete exploit within bounded window to avoid detection
•
Development
– One-time development cost of trusted elements and agent software for origin server platforms
•
Implementation
– Acquisition and implementation incur cost of redundant origin servers and trusted elements
(compared to cost of functionally equivalent site without our mechanisms)
•
Operation
– Maintenance cost of maintaining redundant origin servers and trusted elements scales with
number of redundant versions
•
Functionality Impact
– Development cost to accommodate additional protocols
•
Responsiveness of system
– Transaction delays induced by proxy operations have negligible impact due to hardware speed
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001
Not for Public Release
Slide 15