diff options
author | jaseg <git@jaseg.de> | 2021-11-23 17:18:40 +0100 |
---|---|---|
committer | jaseg <git@jaseg.de> | 2021-11-23 17:18:40 +0100 |
commit | 67395704d1b44def970b9395369cddbb49405bba (patch) | |
tree | ee68dff6dd193d5ddd816ca19d5a7e99ce7a4d85 | |
parent | a4184bb0c5364f0345f2dcc4414c4cdd57fa8cf4 (diff) | |
download | ihsm-67395704d1b44def970b9395369cddbb49405bba.tar.gz ihsm-67395704d1b44def970b9395369cddbb49405bba.tar.bz2 ihsm-67395704d1b44def970b9395369cddbb49405bba.zip |
Blog post WIPmain
-rw-r--r-- | blogpost/ihsm-hiig-blog.txt | 158 |
1 files changed, 158 insertions, 0 deletions
diff --git a/blogpost/ihsm-hiig-blog.txt b/blogpost/ihsm-hiig-blog.txt new file mode 100644 index 0000000..0591507 --- /dev/null +++ b/blogpost/ihsm-hiig-blog.txt @@ -0,0 +1,158 @@ +IHSMs for Grassroots Digital Autonomy +===================================== + +In today's digital age, all of us depend on a number of large companies to mean well with us. To guard our data, or at +least not to abuse it too much without asking. Even if we wanted, we cannot take things into our own hands and reclaim +our digital autonomy because too much depends on too many system operators. To help small-time users and sysadmins to +fight this dependence, Jan Götte and Björn Scheuermann from HIIG have developed Inertial Hardware Security Modules, or +IHSMs. IHSMs enable low-budget servers to provide high security anywhere, even outside of well-protected datacenters. + + +Digital Dependencies +-------------------- + +The rise of networked computers has revolutionized many aspects of our modern lives. However, in lock-step with all the +quality of life improvements that the internet brought us, today we can observe a worrying trend of increasing digital +dependency. *Opting out* of the digital life on social media or e-commerce platforms becomes increasingly difficult to +sustain all the while the power of these platforms over their users is steadily increasing. Anyone who has ever had +their Twitter or Facebook account suspended for an alleged Terms of Service violation or who has been locked out of +their Google or Amaazon account pending some complicated and frustrating “account verification” process for unnamed +“security reasons” will know how acute this dependency is. What the platform decides is law. There is no way for us as +users to meaningfully challenge its decisions because we are the platform's product, not its customers. + +Don't it Yourself +----------------- + +The obvious solution to this state of digital dependency is for us to take things into our own hands. On this premise, +open-source projects such as Nextcloud <https://nextcloud.com/> and Mastodon <https://joinmastodon.org/> have created +de-centralized alternatives to some of the big platforms. But DIY'ing has a drawback beyond the time spent on installing +and maintaining these solutions. While open-source software has made great strides over the last decades and offers +viable alternatives to many proprietary, centralized platforms today, this software has to run on someone's computer. +This underlying physical infrastructure is where things get complicated. Today, the only real option to run one's own +digital infrastructure is to rent a server (or part of one) from one of a number of large cloud providers. And in this +case, whoever runs the data center ultimately controls access to the data stored within. + +At first, this fact of life might not seem concerning. After all, a data center operator would risk a lot if it +compromised its customers' security. However, in the past we have seen several physical attacks targeting high-value +data <https://archive.md/QpvHA> <https://en.wikipedia.org/wiki/NSA_ANT_catalog>. Large companies can mitigate such +attacks by tightly controlling their entire infrastructure, from the application software down to the data center's +access control systems. For smaller organizations and private individuals, this option does not exist. + +Inertial Hardware Security Modules +---------------------------------- + +# Gaining back control over our digital lives is a monumental task. In software, through an ecosystem of open source +# projects, we have seen steady progress throughout the last decades. But all of that open source software needs to run +# somewhere, and today that usually means renting processing time at one of the large cloud providers. Avoiding them means +# buying your own hardware, and even then, that hardware needs to be put somewhere in a data center operated by yet +# another large company. Security-wise, this is not great since whoever runs the cloud or the datacenter can technically +# access everything running inside it. In the end it comes down to physical access: Even passwords or strong encryption +# cannot (yet) prevent someone with physical access to a machine from learning everything about its contents. + +At HIIG, Björn and I have asked ourselves if there might be ways to claw back control over our hardware. If we can find +a way for someone someone much smaller than an Amazon or Google to build a special physically secure server that is +invulnerable to physical attaks, this server can be put into any commercial data center while completely decoupling the +security of the data stored in it from the operator of the data center around it. + +With Inertial Hardware Security Modules (short, IHSMs) we believe we have developed a strong approach towards a solution +to this problem. You can read the full paper here <https://tches.iacr.org/index.php/TCHES/article/view/9290>. The gist +of our solution is that we are able to build an enclosure that physically protects a server from any attempt at +siphoning off its secrets, no matter who tries to attack it. IHSMs are similar to a type of device used in payment +processing applications called Hardware Security Modules. Both provide a similar level of security. The main difference +is that IHSMs allow much larger systems to be protected and bump both size and computing power from that of a smartphone +to that of a server, a difference of about 100 × in space, processing power and cooling capacity. IHSMs are simple to +construct and can be built with basic tools that can be found in most electronic labs. We envision a world where small +organizations can build their own secure servers that even a hostile secret service will not be able to compromise +physically. + +IHSMs work by putting the server's mainboard, CPU, and memory inside of a tamper detection “mesh.” This mesh is a very +delicate component that will sense when someone tries to cut, drill or poke through it. When tampering is detected, an +alarm is activated and all sensitive data inside the server is deleted. To make the tamper detection mesh itself hard to +tamper with, this mesh is spinning at around the speed of a washing machine during its spin cycle. + +Trusting and Un-trusting +------------------------ + +In computer security terms, what we are doing with IHSMs is that we are “untrusting” the server's physical environment. +Computer security has a funny definition of trust that is pretty much the opposite of everyone else. In computer +security, trust is a de-facto property of something that we de-facto rely on being good. In computer security, something +trusted should be trustworthy (but does not have to be). Contrast that to the common-sense meaning, where something +trustworthy should be trusted (but does not have to be). + +Untrusting the data center gives us the chance to decouple software security from physical security. Using an IHSM, a +small organization such as the HIIG, the Chaos Computer Club, or a small company can operate software on a physical +foundation that is as secure as that of the large cloud companies, but with no one but themselves holding the keys to +the data. + +Examples for applications where this increased security matters are group chat, cloud photo storage, and calendar and +contact synchronization systems. All of these already encrypt the network connection between their users phone or laptop +and the server, but only rarely encrypt the actual data stored on these servers. + +# In terms of computer security, these platform behemoths are trusted parts of our lives. Not trusted as in +# “Google/Facebook/Amazon is a trustworthy company”, but trusted in the computer security sense of the world: they are +# de-facto trusted. We act as if we trust them, without actually considering whether they really are worth our trust. We +# need them, and we depend on them not acting against our interests. But if they abuse our trust, there is nothing we can +# do about it if we even notice. +# +# Confusingly, this computer security meaning of trustedness is the exact opposite of our common-sense understanding of +# trust. In a common-sense world, a trustworthy thing should be trusted (but does not have to be). In the computer +# security world, a trusted thing should be trustworthy (but does not have to be). While the two seem close at first, +# there is a large difference in meaning. Understanding this difference is necessary to understand the things computer +# security people say. +# +# The computer security concept of de-facto trust is counter-intuitve. However, its complement, which has no common-sense +# counterpart, is very useful. In computer security, the opposite of a trusted component is an untrusted component. +# Untrusted does not mean untrustworthy. An untrusted part is simply one that does not *need to be* trusted for things to +# work. An example for an untrusted part is a coffeeshop wifi network. While we need it to get online, we do not have to +# trust it to guard our data in any way since all our connections are authenticated and encrypted anyway using the TLS +# protocol that underlies HTTPS. In this case, by basing everything on an authenticated and encrypted network protocol, we +# remove trust from the coffeeshop wifi. We still need the wifi, but because our connections on top of it are encrypted +# separately, we do not have to care anymore whether someone is snooping on it or not. +# +# From a computer security point of view, untrusting as many parts of a system as possible is highly desirable. The fewer +# parts you trust, the fewer you can concentrate your security engineering efforts on. Not only does this save time and +# money, the overall system will actually become more secure by doing this as more time is spent on less parts, leading to +# better-quality results. + +# opposite of what everybody else calls trust. Take the sentence “Riley trusts Alex to take care of his cat.” In an +# everyday, common-sense way this sentence parses quite easily. Apparently Riley is out of town for a vacation or +# work-related trip and needs someone to feed their cat. Among Riley's friends, Riley asked Alex because they are +# reliable. The key concept here is that this sentence implies that *because Alex is trustworthy*, Riley asked them to +# take care of their cat. +# +# In computer-land, trust means something very different. While in the common-sense interpretation trusting something +# implies that that thing is “trustworthy”, in computer security things are exactly backwards. In computer security, a +# trusted part of a system is one that has to be trusted because without it the system doesn't work. The distinction here +# is that this part *should* better be “trustworthy”, but that is not a given. +# +# Now, why should we care about this rather pedantic distinction? That is because we have to keep in mind this linguistic +# quirk to correctly understand what security people mean when they are talking about computers. If we interpret things a +# computer security person says in a common-sense way, they might seem to make sense at first, but this important detail +# can get lost in translation. +# +# There is a useful concept in computer security called “untrustedness”. In computer security, a thing is untrusted when +# we do not rely on it being trustworthy. + + +#The concept of a trusted thing as “something that must be trustworthy” is useful in computer security, but its +#complement is even more interesting. If there + + +# The rise of networked computers has revolutionized many aspects of our modern lives. For most of us, the internet has +# made everyday things more convenient and improved our overall quality of life. Large platform companies can serve +# millions or even billions of users with only a few hundred people in design and development. However, these same +# economies of scale that have brought us incredibly polished software products that improve our lives in many ways, also +# have a dark side. +# +# Through the last few decades, we can observe a shift in how we use computers in our lives. The computer systems we use +# have become increasingly complex and have proliferated throughout all aspects of our modern lives. At the same time, the +# internet's economies of scale have led to the operators of these systems consolidating. For instance, while in the 2000s +# an online business would have had to operate its own physical servers in a datacenter somewhere, today the entire +# internet rests on a small number of cloud computing providers. +# +# On one axis, there is the shift towards increasing integration of digital systems into our lives. On the other axis +# there is the shift towards large centralized operators providing the infrastructure for most of these systems. These two +# effects compound each other to produce a steeply rising dependence towards system operators. On a national level, this +# is seen as a threat of an emerging concept dubbed “digital sovereignty”, and is perceived to be an acute issue. However, +# on an individual level, things are not better in any meaningful way--they are just talked about less. +# |