SlideShare a Scribd company logo
Introduction of Trusted
Network Connect
Houcheng Lee
houchen1@umbc.edu
May 9, 2007
What is Trusted Computing?
Trusted Computing Group
(TCG)
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Promoters
AMD
Hewlett-Packard
IBM
Intel Corporation
Microsoft
Sun Microsystems, Inc.
Contributors
Adaptec, Inc.
Agere Systems
American Megatrends, Inc.
ARM
Atmel
AuthenTec, Inc.
AVAYA
Broadcom Corporation
Certicom Corp.
Check Point Software, Inc.
Citrix Systems, Inc.
Comodo
Dell, Inc.
Endforce, Inc.
Ericsson Mobile Platforms AB
France Telecom Group
Freescale Semiconductor
Fujitsu Limited
Fujitsu Siemens Computers
Trusted Computing Group (TCG) Membership
170 Total Members as of January, 2007
Contributors
Funk Software, Inc.
General Dynamics C4 Systems
Giesecke & Devrient
Hitachi, Ltd.
Infineon
InfoExpress, Inc.
InterDigital Communications
iPass
Lenovo Holdings Limited
Lexmark International
Lockheed Martin
M-Systems Flash Disk Pioneers
Maxtor Corporation
Meetinghouse Data
Communications
Mirage Networks
Motorola Inc.
National Semiconductor
nCipher
NEC
Nevis Networks, USA
Nokia
NTRU Cryptosystems, Inc.
NVIDIA
OSA Technologies, Inc
Philips
Phoenix
Pointsec Mobile Technologies
Renesas Technology Corp.
Ricoh Company LTD
RSA Security, Inc.
Samsung Electronics Co.
SanDisk Corporation
SCM Microsystems, Inc.
Adopters
ConSentry Networks
CPR Tools, Inc.
Credant Technologies
Fiberlink Communications
Foundstone, Inc.
GuardianEdge
ICT Economic Impact
Industrial Technology Research Institute
Infosec Corporation
Integrated Technology Express Inc.
LANDesk
Lockdown Networks
Marvell Semiconductor, Inc.
MCI
Meganet Corporation
Roving Planet
SafeBoot
Safend
Sana Security
Secure Elements
Senforce Technologies, Inc
SII Network Systems, Inc.
Silicon Storage Technology, Inc.
Softex, Inc.
StillSecure
Swan Island Networks, Inc.
Symwave
Telemidic Co. Ltd.
Toppan Printing Co., Ltd.
Trusted Network Technologies
ULi Electronics Inc.
Valicore Technologies, Inc.
Websense
Contributors
Seagate Technology
Siemens AG
SignaCert, Inc.
Silicon Integrated Systems Corp.
Sinosun Technology Co., Ltd.
SMSC
Sony Corporation
STMicroelectronics
Symantec
Symbian Ltd
Synaptics Inc.
Texas Instruments
Toshiba Corporation
TriCipher, Inc.
Unisys
UPEK, Inc.
Utimaco Safeware AG
VeriSign, Inc.
Vernier Networks
Vodafone Group Services LTD
Wave Systems
Winbond Electronics Corporation
Adopters
Advanced Network Technology
Labs
Apani Networks
Apere, Inc.
ATI Technologies Inc.
BigFix, Inc.
BlueRISC, Inc.
Bradford Networks
Caymas Systems
Cirond
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TCG Key Players
Trusted Platform Module
(TPM)
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Trusted Platform Module (TPM)
Introduction
 What is a TPM?
 A Hardware
 What it does?
V1.2 functions, including:
•stores OS status information
•generates/stores a private key
•creates digital signatures
•anchors chain of trust for keys,
digital certificates, and other
credentials
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TPM – TCG Definition
 Asymmetric Key Module
 Generate, store & backup public/private key pairs
 Generate digital signatures, encrypt/decrypt data
 Trusted Boot Configuration
 Storage of software digests during boot process
 Anonymous Attestation
 Endorsement key used to establish properties of
multiple identity keys
 TPM Management
 Turn it on/off, ownership / configure functions, etc.
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TPM – Abstract Definition
 Root of Trust in a PC
 Operations or actions based on the TPM have measurable
trust.
 Flexible usage model permits a wide range of actions to be
defined.
 Doesn’t Control PC (About DRM)
 User still has complete control over platform. It’s OK to turn
the TPM off (it ships disabled).
 User is free to install any software he/she pleases.
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Why Not Software?
 Software is hard to secure.
 Ultimately, it is usually based on something stored in a
relatively insecure location (like the hard drive).
 Soft data can be copied.
 Lets an attacker take more time or apply more
equipment to the attack procedure.
 Security can’t be measured.
 Two users running same software operation may see
radically different risks.
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TPM Measurement flow
Trusted Network Connection
(TNC)
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
What is TNC?
 Open Architecture for Network Access
Control
 Suite of Standards
 Developed by Trusted Computing Group
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Network Endpoint Problem
 Sophisticated Attacks
 Viruses, Worms, Spyware, Rootkits, Botnets
 Zero-Day Exploits
 Targeted Attacks
 Rapid Infection Speed
 Exponential Growth
 > 40,000,000 Infected Machines
 > 35,000 Malware Varieties
 Motivated Attackers (Bank Crackers)
 Any vulnerable computer is a stepping stone
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Key Computing Trends Drive the Need
for TNC
TREND
 Increasing network span to
mobile workers, customers,
partners, suppliers
 Network clients moving to
wireless access
 Malware increasingly targeting
network via valid client
infection
 New malware threats
emerging at an increasing rate
IMPLICATION
 Less reliance on physical
access identity verification (i.e.
guards & badges)
 Remote access sequences
easily monitored, cloned
 Clients ‘innocently” infect
entire networks
 Client scanning demands
move from once/week to
once/login
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Network Integrity Architectures
 Several Initiatives are pursuing Network Integrity
Architectures
 All provide the ability to check integrity of objects
accessing the network
 [Cisco] Network Admission Control (NAC)
 [Microsoft] Network Access Protocol (NAP)
 [TCG] Trusted Network Connect (TNC)
 Support multi-vendor interoperability
 Leverage existing standards
 Empower enterprises with choice
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Trusted Network Connect Advantages
Open standards
 Open standards process
 multi-vendor compatibility
 Enable customer choice
 open technical review
 Integrates with established protocols like EAP,
TLS, 802.1X, and IPsec
Incorporates Trusted Computing Concepts
- guarding the guard
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
 Moving from “who” is allowed on the
network
 User authentication
 To “who” and “what” is allowed on the
network
 Adding Platform Integrity verification
Controlling Integrity of What is on the
Network
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Check at connect time
- Who are you -
- What is on your computer User DB
+
Integrity DB
Can I connect?
Access control dialog
Enterprise Net
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Quarantine and Remediation
No I am quarantining you
Try again when you’re fixed up
Remediation
Server
Access control dialog
data
User DB
+
Integrity DB
Can I connect?
Enterprise Net
Quarantine
Net
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TNC Architecture
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TNC Architecture
VerifiersVerifiers
t
Collector
Collector
Integrity Measurement
Collectors (IMC)
Integrity Measurement
Verifiers (IMV)
Network
Access
Requestor
Policy
Enforcement
Point (PEP)
Network Access
Authority
TNC Server
(TNCS)
Policy Decision
Point
TSS
TPM
Platform Trust
Service (PTS)
TNC Client
(TNCC)
Peer Relationship
Peer Relationship
(IF-TNCCS)
(IF-T)
(IF-M)
Policy Enforcement
Point
Access Requestor
(IF-IMC) (IF-IMV)
(IF-PTS)
(IF-PEP)
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Endpoint Integrity Policy
 Machine Health
 Anti-Virus software running and properly
configured
 Recent scan shows no malware
 Personal Firewall running and properly configured
 Patches up-to-date
 No authorized software
 Machine Behavior
 No porting scanning, sending spam, etc.
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Examples of Integrity Checks
 Virus scan
 Is virus scanner present/ which version
 Has it run “recently” / what is the result
 Spyware checking
 Is Spyware checker running/ what version
 Have programs been deleted/isolated
 What is your OS patch level
 Is unauthorized software present?
 Other - IDS logs, evidence of port scanning
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Network Operator Access Policy
 Define policy for what must be checked
 e.g. Virus, Spyware and OS Patch level
and
results of checks
 e.g. Must run
 VirusC- version 3.2 or higher, clean result
 SPYX- version 1.5 or higher
 Patchchk - version 6.2 or higher, patchlevel-3 or newer
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TNC Scenario (Anti-Virus)
Sequence
1) Harvesting
2) Policy authoring
3) Collection
4) Reporting
5) Evaluation
6) Enforcement
7) Remediation
TNC
Server
TNC
Client
Anti-Virus
Services
AV-IMC
Network Access
Requestor
Network Access
Authority
Other IMCs
AV-IMV
Other IMVs
Policies
2
AR PDP
Integrity
Measurements4
Control
Request
6
Policy
Decision
5
Baseline
Measurements
1
Embedded
AV
configuration
AV
engine
AV
definitions
3 Measured
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Anti-virus
Collector
Patch mgt
Collector
firewall
Collector
Platform trust
Collector
Anti-virus
Verifier
Patch mgt
Verifier
firewall
Verifier
Platform trust
Verifier
TNC Client TNC Server
IF-T
- Messages are batched by TNCC/ TNCS
- Either side can start batched exchange
- IMC/IMV may subscribe to multiple message
types - Exchanges of TNC batches called
handshake
TNC Model for Exchanging Integrity Data
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Authorized Access Only
JoeK
Guest
LynnP
Hacker_Cindi
Access Requestor
Policy Decision
Point
Policy Enforcement
Point
Authorized Users
JoeK
NoelC
KathyR
LynnP
Access
Denied
Access
Denied
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Corporate SW Requirements
Compliant System
Windows XP
SP2
OSHotFix 2499
OSHotFix 9288
AV - Symantec AV 10.1
Firewall
Non-compliant System
Windows XP
SP2
xOSHotFix 2499
xOSHotFix 9288
AV - McAfee Virus Scan 8.0
Firewall
Corporate Network
R
em
ediation
N
etw
ork
Access Requestor Policy Decision
Point
Policy Enforcement
Point
Client Rules
Windows XP
•SP2
•OSHotFix 2499
•OSHotFix 9288
•AV (one of)
•Symantec AV 10.1
•McAfee Virus Scan 8.0
•Firewall
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Customized Network Access
Ken – R&D
Guest User
Access Requestor Policy Decision
Point
Policy Enforcement
Point
Finance Network
R&D Network
Linda – Finance
Windows XP
OS Hotfix 9345
OS Hotfix 8834
AV - Symantec AV 10.1
Firewall
Guest NetworkInter net Only
Access Policies
•Authorized Users
•Client Rules
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Platform Trust Services PTS
 IF-PTS evaluates the integrity of TNC
components and makes integrity reports
available to the TNCC and TNCS
 The PTS establishes the integrity state of the
TNC framework and binds this state to the
platform transitive-trust chain
 PTS IMC collects integrity information about
TNC elements and sends to PTS IMV
 PTS IMV has information (probably from
vendors) on expected values for IMCs and other
TNC and verifies received values
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TPM Integrity Check
Compliant System
TPM verified
BIOS
OS
Drivers
Anti-Virus SW
Corp LAN
Access Requestor Policy Decision
Point
Policy Enforcement
Point
Client Rules
TPM enabled
•BIOS
•OS
•Drivers
•Anti-Virus SW
TPM – Trusted Platform Module
• HW module built into most of
today’s PCs
• Enables a HW Root of Trust
• Measures critical components
during trusted boot
• PTS-IMC interface allows
PDP to verify configuration
and remediate as necessary
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TNC Architecture – Existing Support
Endpoint
Supplicant/VPN Client, etc.
Network Device
FW, Switch, Router, Gateway
Access Requestor
Policy Decision
Point
Policy Enforcement
Point
AAA Server, Radius,
Diameter, IIS, etc
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TPM Use Cases - Government &
Regulatory
 National Security Agency
 Full drive encryption
 TCG for compatibility
 U.S. Army
 Network Enterprise Technology Command now
requires TPM 1.2 on new computers
 F.D.I.C.
 Promotes TPM usage to member banks
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
TPM Use Cases – Realistic Projects
 Pharmacy Company
 With VPN over public network, put TPMs on all clients
 Access dependent on digital certificate
 Verifies both user and machine
 Hardware and software from Lenovo
 Japanese Health Care Projects
 Obligation to preserve data; METI funded
 Fujitsu’s TNC deployment verifies HW and app config for
session of broadband telemedicine
 Hitachi’s TPM-based system for home health care
 IBM’s Trusted Virtual Domains
 MicroSoft Vista BitLocker
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Thank you
Question?
Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.
Reference
 Trusted Computing Group (TCG) -
https://www.trustedcomputinggroup.org/home
 Trusted Network Connection (TNC) -
https://www.trustedcomputinggroup.org/groups/ne

More Related Content

PPS
Comp tia a+_session_15
PDF
Knorr-Bremse Group Strong Authentication Case Study
PDF
C90 Security Service
PDF
Altiris IT Management Suite 7
PPT
ITE - Chapter 10
PDF
Air defense wireless_vulnerability_assessement_module_spec_sheet
PPTX
Check Point75 Makes3 D Security A Reality Q22011
PDF
Secure nets-and-data
Comp tia a+_session_15
Knorr-Bremse Group Strong Authentication Case Study
C90 Security Service
Altiris IT Management Suite 7
ITE - Chapter 10
Air defense wireless_vulnerability_assessement_module_spec_sheet
Check Point75 Makes3 D Security A Reality Q22011
Secure nets-and-data

What's hot (20)

PPS
Comp tia n+_session_09
PDF
Regulatory Compliance Financial Institution
PDF
Breakingpoint Application Threat and Intelligence (ATI) Program
PDF
NIST Definition of Cloud Computing
PDF
Reducing Cost and Complexity with Industrial System Consolidation
PPT
OCS LIA
PDF
Intel Gateway Solutions for the Internet of Things
PDF
BreakingPoint FireStorm CTM Datasheet
PDF
Symantec control compliance suite
PDF
Windows 7 security enhancements
PDF
SPS Enterprise Family
PDF
Comguard expanding-portfolio
PDF
Air defense services_platform_spec_sheet
PDF
VSD Infotech
PDF
BreakingPoint 3G Testing Data Sheet
PDF
Personal identity information protection
PDF
HyTrust-FISMA Compliance in the Virtual Data Center
PDF
Air defense ap_test_spec_sheet
PPTX
VMware vShield - Overview
PPTX
Hp Fortify Pillar
Comp tia n+_session_09
Regulatory Compliance Financial Institution
Breakingpoint Application Threat and Intelligence (ATI) Program
NIST Definition of Cloud Computing
Reducing Cost and Complexity with Industrial System Consolidation
OCS LIA
Intel Gateway Solutions for the Internet of Things
BreakingPoint FireStorm CTM Datasheet
Symantec control compliance suite
Windows 7 security enhancements
SPS Enterprise Family
Comguard expanding-portfolio
Air defense services_platform_spec_sheet
VSD Infotech
BreakingPoint 3G Testing Data Sheet
Personal identity information protection
HyTrust-FISMA Compliance in the Virtual Data Center
Air defense ap_test_spec_sheet
VMware vShield - Overview
Hp Fortify Pillar
Ad

Similar to Introduction of Trusted Network Connect (TNC) (20)

PDF
Secure Trustworthy Enterprise
PPT
Abbie Barbir Tcg Final
PPT
Trusted computing introduction and technical overview
PPT
Trusted _Computing _security mobile .ppt
PPT
Trusted Computing _plate form_ model.ppt
PDF
Introduction to Trusted Computing
PPT
trusted computing platform alliancee.ppt
PPT
trusted computing for security confe.ppt
PDF
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
PDF
Trusted computing for infrastructure
PPT
Trusted Computing security _platform.ppt
PDF
A modern approach to safeguarding your ICS and SCADA systems
PDF
Greg Brown - Intel Big Data & Cloud Summit 2013
PPTX
Trusted Platform Module (TPM)
PPT
Information Security
PPTX
stackArmor - Security MicroSummit - McAfee
PPTX
Cisco Security DNA
PDF
Solutions for PCI DSS Compliance
PDF
Broken by design (Danny Fullerton)
Secure Trustworthy Enterprise
Abbie Barbir Tcg Final
Trusted computing introduction and technical overview
Trusted _Computing _security mobile .ppt
Trusted Computing _plate form_ model.ppt
Introduction to Trusted Computing
trusted computing platform alliancee.ppt
trusted computing for security confe.ppt
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Trusted computing for infrastructure
Trusted Computing security _platform.ppt
A modern approach to safeguarding your ICS and SCADA systems
Greg Brown - Intel Big Data & Cloud Summit 2013
Trusted Platform Module (TPM)
Information Security
stackArmor - Security MicroSummit - McAfee
Cisco Security DNA
Solutions for PCI DSS Compliance
Broken by design (Danny Fullerton)
Ad

Recently uploaded (20)

PPTX
worship songs, in any order, compilation
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
water for all cao bang - a charity project
PDF
natwest.pdf company description and business model
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
Human Mind & its character Characteristics
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
lesson6-211001025531lesson plan ppt.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
fundraisepro pitch deck elegant and modern
PDF
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PPTX
nose tajweed for the arabic alphabets for the responsive
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
Relationship Management Presentation In Banking.pptx
PDF
Presentation1 [Autosaved].pdf diagnosiss
PPTX
Anesthesia and it's stage with mnemonic and images
PPTX
An Unlikely Response 08 10 2025.pptx
worship songs, in any order, compilation
The Effect of Human Resource Management Practice on Organizational Performanc...
Tablets And Capsule Preformulation Of Paracetamol
water for all cao bang - a charity project
natwest.pdf company description and business model
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
Human Mind & its character Characteristics
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
lesson6-211001025531lesson plan ppt.pptx
Emphasizing It's Not The End 08 06 2025.pptx
Instagram's Product Secrets Unveiled with this PPT
fundraisepro pitch deck elegant and modern
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
nose tajweed for the arabic alphabets for the responsive
Impressionism_PostImpressionism_Presentation.pptx
Relationship Management Presentation In Banking.pptx
Presentation1 [Autosaved].pdf diagnosiss
Anesthesia and it's stage with mnemonic and images
An Unlikely Response 08 10 2025.pptx

Introduction of Trusted Network Connect (TNC)

  • 1. Introduction of Trusted Network Connect Houcheng Lee houchen1@umbc.edu May 9, 2007
  • 2. What is Trusted Computing?
  • 4. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Promoters AMD Hewlett-Packard IBM Intel Corporation Microsoft Sun Microsystems, Inc. Contributors Adaptec, Inc. Agere Systems American Megatrends, Inc. ARM Atmel AuthenTec, Inc. AVAYA Broadcom Corporation Certicom Corp. Check Point Software, Inc. Citrix Systems, Inc. Comodo Dell, Inc. Endforce, Inc. Ericsson Mobile Platforms AB France Telecom Group Freescale Semiconductor Fujitsu Limited Fujitsu Siemens Computers Trusted Computing Group (TCG) Membership 170 Total Members as of January, 2007 Contributors Funk Software, Inc. General Dynamics C4 Systems Giesecke & Devrient Hitachi, Ltd. Infineon InfoExpress, Inc. InterDigital Communications iPass Lenovo Holdings Limited Lexmark International Lockheed Martin M-Systems Flash Disk Pioneers Maxtor Corporation Meetinghouse Data Communications Mirage Networks Motorola Inc. National Semiconductor nCipher NEC Nevis Networks, USA Nokia NTRU Cryptosystems, Inc. NVIDIA OSA Technologies, Inc Philips Phoenix Pointsec Mobile Technologies Renesas Technology Corp. Ricoh Company LTD RSA Security, Inc. Samsung Electronics Co. SanDisk Corporation SCM Microsystems, Inc. Adopters ConSentry Networks CPR Tools, Inc. Credant Technologies Fiberlink Communications Foundstone, Inc. GuardianEdge ICT Economic Impact Industrial Technology Research Institute Infosec Corporation Integrated Technology Express Inc. LANDesk Lockdown Networks Marvell Semiconductor, Inc. MCI Meganet Corporation Roving Planet SafeBoot Safend Sana Security Secure Elements Senforce Technologies, Inc SII Network Systems, Inc. Silicon Storage Technology, Inc. Softex, Inc. StillSecure Swan Island Networks, Inc. Symwave Telemidic Co. Ltd. Toppan Printing Co., Ltd. Trusted Network Technologies ULi Electronics Inc. Valicore Technologies, Inc. Websense Contributors Seagate Technology Siemens AG SignaCert, Inc. Silicon Integrated Systems Corp. Sinosun Technology Co., Ltd. SMSC Sony Corporation STMicroelectronics Symantec Symbian Ltd Synaptics Inc. Texas Instruments Toshiba Corporation TriCipher, Inc. Unisys UPEK, Inc. Utimaco Safeware AG VeriSign, Inc. Vernier Networks Vodafone Group Services LTD Wave Systems Winbond Electronics Corporation Adopters Advanced Network Technology Labs Apani Networks Apere, Inc. ATI Technologies Inc. BigFix, Inc. BlueRISC, Inc. Bradford Networks Caymas Systems Cirond
  • 5. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TCG Key Players
  • 7. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Trusted Platform Module (TPM) Introduction  What is a TPM?  A Hardware  What it does? V1.2 functions, including: •stores OS status information •generates/stores a private key •creates digital signatures •anchors chain of trust for keys, digital certificates, and other credentials
  • 8. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TPM – TCG Definition  Asymmetric Key Module  Generate, store & backup public/private key pairs  Generate digital signatures, encrypt/decrypt data  Trusted Boot Configuration  Storage of software digests during boot process  Anonymous Attestation  Endorsement key used to establish properties of multiple identity keys  TPM Management  Turn it on/off, ownership / configure functions, etc.
  • 9. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TPM – Abstract Definition  Root of Trust in a PC  Operations or actions based on the TPM have measurable trust.  Flexible usage model permits a wide range of actions to be defined.  Doesn’t Control PC (About DRM)  User still has complete control over platform. It’s OK to turn the TPM off (it ships disabled).  User is free to install any software he/she pleases.
  • 10. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Why Not Software?  Software is hard to secure.  Ultimately, it is usually based on something stored in a relatively insecure location (like the hard drive).  Soft data can be copied.  Lets an attacker take more time or apply more equipment to the attack procedure.  Security can’t be measured.  Two users running same software operation may see radically different risks.
  • 11. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TPM Measurement flow
  • 13. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. What is TNC?  Open Architecture for Network Access Control  Suite of Standards  Developed by Trusted Computing Group
  • 14. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Network Endpoint Problem  Sophisticated Attacks  Viruses, Worms, Spyware, Rootkits, Botnets  Zero-Day Exploits  Targeted Attacks  Rapid Infection Speed  Exponential Growth  > 40,000,000 Infected Machines  > 35,000 Malware Varieties  Motivated Attackers (Bank Crackers)  Any vulnerable computer is a stepping stone
  • 15. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Key Computing Trends Drive the Need for TNC TREND  Increasing network span to mobile workers, customers, partners, suppliers  Network clients moving to wireless access  Malware increasingly targeting network via valid client infection  New malware threats emerging at an increasing rate IMPLICATION  Less reliance on physical access identity verification (i.e. guards & badges)  Remote access sequences easily monitored, cloned  Clients ‘innocently” infect entire networks  Client scanning demands move from once/week to once/login
  • 16. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Network Integrity Architectures  Several Initiatives are pursuing Network Integrity Architectures  All provide the ability to check integrity of objects accessing the network  [Cisco] Network Admission Control (NAC)  [Microsoft] Network Access Protocol (NAP)  [TCG] Trusted Network Connect (TNC)  Support multi-vendor interoperability  Leverage existing standards  Empower enterprises with choice
  • 17. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Trusted Network Connect Advantages Open standards  Open standards process  multi-vendor compatibility  Enable customer choice  open technical review  Integrates with established protocols like EAP, TLS, 802.1X, and IPsec Incorporates Trusted Computing Concepts - guarding the guard
  • 18. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners.  Moving from “who” is allowed on the network  User authentication  To “who” and “what” is allowed on the network  Adding Platform Integrity verification Controlling Integrity of What is on the Network
  • 19. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Check at connect time - Who are you - - What is on your computer User DB + Integrity DB Can I connect? Access control dialog Enterprise Net QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 20. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Quarantine and Remediation No I am quarantining you Try again when you’re fixed up Remediation Server Access control dialog data User DB + Integrity DB Can I connect? Enterprise Net Quarantine Net QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 21. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TNC Architecture
  • 22. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TNC Architecture VerifiersVerifiers t Collector Collector Integrity Measurement Collectors (IMC) Integrity Measurement Verifiers (IMV) Network Access Requestor Policy Enforcement Point (PEP) Network Access Authority TNC Server (TNCS) Policy Decision Point TSS TPM Platform Trust Service (PTS) TNC Client (TNCC) Peer Relationship Peer Relationship (IF-TNCCS) (IF-T) (IF-M) Policy Enforcement Point Access Requestor (IF-IMC) (IF-IMV) (IF-PTS) (IF-PEP)
  • 23. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Endpoint Integrity Policy  Machine Health  Anti-Virus software running and properly configured  Recent scan shows no malware  Personal Firewall running and properly configured  Patches up-to-date  No authorized software  Machine Behavior  No porting scanning, sending spam, etc.
  • 24. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Examples of Integrity Checks  Virus scan  Is virus scanner present/ which version  Has it run “recently” / what is the result  Spyware checking  Is Spyware checker running/ what version  Have programs been deleted/isolated  What is your OS patch level  Is unauthorized software present?  Other - IDS logs, evidence of port scanning
  • 25. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Network Operator Access Policy  Define policy for what must be checked  e.g. Virus, Spyware and OS Patch level and results of checks  e.g. Must run  VirusC- version 3.2 or higher, clean result  SPYX- version 1.5 or higher  Patchchk - version 6.2 or higher, patchlevel-3 or newer
  • 26. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TNC Scenario (Anti-Virus) Sequence 1) Harvesting 2) Policy authoring 3) Collection 4) Reporting 5) Evaluation 6) Enforcement 7) Remediation TNC Server TNC Client Anti-Virus Services AV-IMC Network Access Requestor Network Access Authority Other IMCs AV-IMV Other IMVs Policies 2 AR PDP Integrity Measurements4 Control Request 6 Policy Decision 5 Baseline Measurements 1 Embedded AV configuration AV engine AV definitions 3 Measured
  • 27. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Anti-virus Collector Patch mgt Collector firewall Collector Platform trust Collector Anti-virus Verifier Patch mgt Verifier firewall Verifier Platform trust Verifier TNC Client TNC Server IF-T - Messages are batched by TNCC/ TNCS - Either side can start batched exchange - IMC/IMV may subscribe to multiple message types - Exchanges of TNC batches called handshake TNC Model for Exchanging Integrity Data
  • 28. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Authorized Access Only JoeK Guest LynnP Hacker_Cindi Access Requestor Policy Decision Point Policy Enforcement Point Authorized Users JoeK NoelC KathyR LynnP Access Denied Access Denied
  • 29. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Corporate SW Requirements Compliant System Windows XP SP2 OSHotFix 2499 OSHotFix 9288 AV - Symantec AV 10.1 Firewall Non-compliant System Windows XP SP2 xOSHotFix 2499 xOSHotFix 9288 AV - McAfee Virus Scan 8.0 Firewall Corporate Network R em ediation N etw ork Access Requestor Policy Decision Point Policy Enforcement Point Client Rules Windows XP •SP2 •OSHotFix 2499 •OSHotFix 9288 •AV (one of) •Symantec AV 10.1 •McAfee Virus Scan 8.0 •Firewall
  • 30. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Customized Network Access Ken – R&D Guest User Access Requestor Policy Decision Point Policy Enforcement Point Finance Network R&D Network Linda – Finance Windows XP OS Hotfix 9345 OS Hotfix 8834 AV - Symantec AV 10.1 Firewall Guest NetworkInter net Only Access Policies •Authorized Users •Client Rules
  • 31. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Platform Trust Services PTS  IF-PTS evaluates the integrity of TNC components and makes integrity reports available to the TNCC and TNCS  The PTS establishes the integrity state of the TNC framework and binds this state to the platform transitive-trust chain  PTS IMC collects integrity information about TNC elements and sends to PTS IMV  PTS IMV has information (probably from vendors) on expected values for IMCs and other TNC and verifies received values
  • 32. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TPM Integrity Check Compliant System TPM verified BIOS OS Drivers Anti-Virus SW Corp LAN Access Requestor Policy Decision Point Policy Enforcement Point Client Rules TPM enabled •BIOS •OS •Drivers •Anti-Virus SW TPM – Trusted Platform Module • HW module built into most of today’s PCs • Enables a HW Root of Trust • Measures critical components during trusted boot • PTS-IMC interface allows PDP to verify configuration and remediate as necessary
  • 33. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TNC Architecture – Existing Support Endpoint Supplicant/VPN Client, etc. Network Device FW, Switch, Router, Gateway Access Requestor Policy Decision Point Policy Enforcement Point AAA Server, Radius, Diameter, IIS, etc
  • 34. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TPM Use Cases - Government & Regulatory  National Security Agency  Full drive encryption  TCG for compatibility  U.S. Army  Network Enterprise Technology Command now requires TPM 1.2 on new computers  F.D.I.C.  Promotes TPM usage to member banks
  • 35. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. TPM Use Cases – Realistic Projects  Pharmacy Company  With VPN over public network, put TPMs on all clients  Access dependent on digital certificate  Verifies both user and machine  Hardware and software from Lenovo  Japanese Health Care Projects  Obligation to preserve data; METI funded  Fujitsu’s TNC deployment verifies HW and app config for session of broadband telemedicine  Hitachi’s TPM-based system for home health care  IBM’s Trusted Virtual Domains  MicroSoft Vista BitLocker
  • 36. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Thank you Question?
  • 37. Copyright© 2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Reference  Trusted Computing Group (TCG) - https://www.trustedcomputinggroup.org/home  Trusted Network Connection (TNC) - https://www.trustedcomputinggroup.org/groups/ne

Editor's Notes

  • #2: System behaved as expected
  • #5: Trusted computing is promoted by TCG (trusted computing group) The Trusted Computing Group (TCG) is an industry standards body, comprised of computer and device manufacturers, software vendors and others with a stake in enhancing the security of the computing environment across multiple platforms and devices.
  • #6: As you can see Cisco is not there
  • #8: Connected to Platform No dongles, keys or cards to lose or break. Lower implementation cost (included in PC). Few Limits Number of keys (users), secured data, etc. limited only by disk space Single ‘owner’ controls various policies of the TPM operation. Common Criteria Certification Third party measurement of security properties Random Number Generator Very high quality, can be used for many existing security and communications applications Standard Algorithms Can interoperate with software solutions running on existing platforms Confidence in algorithms due to long analysis by cryptographic community
  • #18: Security Requirements Interoperability Standards Permit only authenticated users and devices to connect to the network IEEE 802.1x, IETF RADIUS, IETF EAP Enable administrator to establish security policies for anti-virus, patch levels, software versions, etc. Measure device configuration against security policies before connection to the network is allowed Identify devices that are not compliant Quarantine non-compliant devices Remediate non-compliant devices to ensure compliance to security policies
  • #22: What the TNC Architecture adds to the field of AAA is the ability to measure and report on the security state of the endpoint platform as part of an authentication and authorization process. This measurement involves capturing the security-relevant operational state of the endpoint as integrity information that can be sent to a AAA Server. In communicating a client’s integrity information to a AAA Server, the TNC Architecture uses and extends existing protocols defined within the IETF so that it does not impact AAA architectures that are being deployed in the field today. Here, the TNC Architecture seeks to provide a richer set of security attributes for use in authorization policies. Thus, a Requestor can be given or denied network access based on a set of finer grain rules that peer deeper into the Requestor’s system state. In this way, a AAA Server can provide authorization to a Client not only on the basis of the Client’s network-related attributes (e.g. IP address, domain) and user-related attributes (e.g. user password, user certificate), but also on the Client platform integrity state (e.g. hardware configuration, BIOS, Kernel versions, OS patch level, Anti-Virus signatures, etc). The TNC Architecture seeks to enhance AAA-related architectures and protocols developed in the IETF with increased security functions that are provided by Trusted Platforms. As such, the TNC Architecture does not exist in a vacuum, but rather relies on other established technologies that have been standardized in the IETF in the area of AAA. The broad aim of the TNC efforts is the same as and builds upon those of the AAA-related efforts in the IETF, namely to provide network access to endpoints that have been successfully authenticated and meet network-access endpoint integrity policies. The work in the IETF in the area of AAA has proceeded for a number of years now, focusing on various aspects of AAA. These include efforts related to the architecture of a AAA system [15][16] and a AAA Authorization Framework [13] in the AAAARch Research Group [12], efforts in the AAA Working Group focusing on RADIUS, Diameter, the NAI and Network Access [14], as well as efforts in the Policy Framework Working Group
  • #23: Access Requestor (AR): Integrity Measurement Collector: Measures aspects of the AR's integrity (e.g. AV, etc). May use Platform Trust Services (PTS) to obtain integrity information regarding every component on the platform. TNC Client: Aggregates integrity measurements (from IMCs) Assists the management of the integrity check handshakes Assists in the measurement & reporting of platform and IMC integrity. Network Access Requestor: Network-layer negotiation & access onto a given network. Network layer transport protocol. End-to-end secure channel creation & management. Policy Decision Point (PDP) Integrity Measurement Verifier: Verifies AR’s integrity based on measurements received from IMCs, against network security policy. TNC Server: Manages IMV-to-IMC (peer) message flows. Gathers recommendations from IMVs. Provides action-recommendation to the NAA. Network Access Authority: Decides whether a Access Requestor should be granted network access. Network layer transport protocol. End-to-end secure channel creation & management.
  • #36: Ms vist bitlocker encrypted the whole disk, and when your laptop is stolen, the thieves cannot see the data in it