OCP L.O.C.K..pdf

編號:161247 PDF 37頁 765.94KB 下載積分:VIP專享
下載報告請您先登錄!

OCP L.O.C.K..pdf

1、OCP L.O.C.K.LayeredOpen-sourceCryptographicKey-managementJeff Andersen,Staff Software Engineer,GoogleEric Eilertson,Principal Engineer,MicrosoftOCP L.O.C.K.Security and Data ProtectionWho we areLife of a data center storage deviceDrive arrives from the supplierDrive is given user data to storeDrive

2、is decommissionedDecommissioning drivesThe physical drive is leaving the data centerUser data cannot be permitted to escapeDefault policy:destroy the driveSafest way to ensure bits on the drive dont escapeProduces significant e-wasteImpacts bottomline of drive ownerInhibits second-hand marketsOne te

3、chnique:overwriteWrite over every piece of data held within the driveEvery portion of the drive must be overwritten,before the drive is allowed to leave in one pieceMulti-pass overwriteProblem:drive failureIf any portion of the drive cannot be overwritten,erasure fails and the drive must be destroye

4、dErgo,we still destroy a lot more disks than wed likeMulti-pass overwriteProblem:NVMe page managementOn NVMe drives,bad pages are hidden from the hostThe host cannot even address such pagesHidden pages may have user dataMulti-pass overwriteSolution:drive encryptionEnsure all data on the drive is enc

5、rypted to a keySolution:drive encryptionEnsure all data on the drive is encrypted to a keyForget the keyNVMe self-encrypting drivesThe drive manages encryption keysAllows granular mapping of keys to address rangesNVMe self-encrypting drivesThe drive manages encryption keysAllows granular mapping of

6、keys to address rangesAllows granular mapping of keys to usersUser 1User 2Risk:drive theftKeys must be erased before the drive leaves the DCIf the drive is stolen,the keys surviveA determined adversary may obtain user dataMitigation:key material held outside the driveAll media keys protected with a

7、secret the drive does not haveIf the drive is stolen,the root secret remains safeBy extension,all media keys remain safeProtected byHow in practice:admin credentialsSet up a strong admin passwordHold the password off-drive,such as in a TPMRely on the drive to transitively protect all media keys with

8、 the admin passwordAdmin passwordUser 1User 2AdminMediaMedia keyMediaEncrypted media keyMedia keyA working implementationAdmin secretMedia keyMediaEncrypted admin secretEncrypted media keyDecryptDecryptEncryptAdmin passwordEncrypted media keyStored persistently within driveOver-simplified diagramMed

9、iaMedia keyMediaEncrypted media keyMedia keyBroken implementation#1Admin secretMedia keyMediaEncrypted media keyDecryptCompareEncryptAdmin passwordEncrypted media keyStored persistently within driveOver-simplified diagramStored persistently within drivePassword hashMediaMedia keyMediaMedia keyBroken

10、 implementation#2Media keyMediaCompareEncryptAdmin passwordStored persistently within driveOver-simplified diagramStored persistently within drivePassword hashMediaMedia keyMediaEncrypted media keyMedia keyBroken implementation#3Admin secretMedia keyMediaEncrypted admin secretEncrypted media keyDecr

11、yptDecryptEncryptAdmin passwordEncrypted media keyStored persistently within driveOver-simplified diagramExtractable via external interfaces(JTAG,UART,PCIe,etc.)or glitch attacksOverall problemStorage key management is critical to get rightThreat model is significantDrive theft,supplier infiltration

12、,hardware attacksImplementations vary in qualityAuditing implementations is a chorePost-deployment fixes are herculeanUser 1User 2AdminRecall:CaliptraSilicon roots of trust are critical components in data center hardwareCaliptra is an OCP specification for an internal root of trust IP block for SoCs

13、An open source implementation has been delivered at CHIPS AllianceEnsures consistency,transparency,openness and reusabilityAt this level,security should be boringIntroducing:OCP L.O.C.K.A project to deliver an open implementation at CHIPS Alliance,leveraging and following CaliptraScoped specifically

14、 to storage devicesProvides key management services to the drive and host,utilizing services from CaliptraUser 1User 2AdminL.O.C.K.LayeredOpen-sourceCryptographicKey-managementKMB:Key Management BlockAES crypto engineStorage controller firmwareComponentsKMB:Key Management BlockComponentsAES crypto e

15、ngine(existing)Performs line-rate encryption of data as it enters and exits the storage deviceStorage controller firmwareAES crypto engineKMB:Key Management BlockComponentsController firmware(existing)Manages users and wrapped keysAES crypto engineStorage controller firmwareAES crypto engineComponen

16、tsKMB(new)Generates keys and protects them at restBinds keys to externally-injected seedsStorage controller firmwareKMB:Key Management BlockComponentsKMB(new)Securely communicates media keysto the crypto engineStorage controller firmwareKMB:Key Management BlockAES crypto engineKMB:Key Management Blo

17、ckAES crypto engineComponentsCaliptraProvides attestation services for KMBProvides root secrets for media key encryptionStorage controller firmwareComponentsTrust boundaryCaliptra+KMB removes system management and control interfaces from the data-at-rest TCBStorage controller firmwareKMB:Key Managem

18、ent BlockAES crypto engineComponentsTrust boundaryL.O.C.K.enables I/O path innovation,while maintaining a common,minimal TCBStorage controller firmwareKMB:Key Management BlockAES crypto engineMedia keyMedia keyKMB key hierarchyStorage root keyKDFKDF:key derivation functionExternal root seedPersisten

19、tly-stored dataGenerated secret,visible only to KMBDecryptWrapped device secretDevice secretKDFDecryptWrapped media keyMedia key seedMedia keySecurely programmed into the AES crypto engineWrapped media keyWrapped media keyController firmwareExternal systemSummary and Call to ActionL.O.C.K.will deliv

20、er a common IP block for storage devicesL.O.C.K.ensures secure management of media keysCall to Action:Look for the 0.5 spec later this summerJoin CHIPS Alliance if interested in collaborating on the implementationL.O.C.K.Thank you!BackupMedia keyMedia keyKMB key hierarchy w/KPIOStorage root keyKDFKD

21、F:key derivation functionExternal root seedPersistently-stored dataGenerated secret,visible only to KMBDecryptWrapped device secretDevice secretKDFDeriveMedia key seedMedia keySecurely programmed into the AES crypto engineController firmwareExternal systemInjecting external seedsDICE Protection EnvironmentFresh wrapping keypairNoncePub key+nonceWrapping pub keyDICE signatureExternal seedWrap keyWrapped seedExternal seedUnwrap key23451Generated secret,visible only to KMBExternal systemVerify signature

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(OCP L.O.C.K..pdf)為本站 (張5G) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站