That is correct, the variety of versions, components and patches is the
first thing
that comes to everyone's mind with this approach.
But the idea is not to have a trusted third party/CA that would be able to
assess _all_ combinations.
With both approaches, the 'assessment' is left out as a stub or
"assumption" (whichever you prefer).
In this case it doesn't actually matter who does the assessment - the IaaS
provider or a CA,
since the assessment criteria are the unsolved issue.

The use case we're examining here is when a certain IaaS provider is
contracted to supply
IaaS to a client with "special requirements", let's call it C. That would
mean, e.g:
1. Potentially not all hosts would be used to deploy VMs for C
2. Potentially patches and versioning might go through a separate upgrade
flow for those hosts

To summarize and address your concerns here:
* imo once a client  is concerned enough to require "trusted hosts", the
use of using external assessment case becomes valid
(and assessment by the IaaS provider becomes useless)
* wrt to variation of the software stack, the big issue is the assessment
criteria rather than the assessing party.


Cheers,
/Nico.



On 14 November 2012 04:27, Tian, Kevin <kevin.t...@intel.com> wrote:

>  I would see the major blocking issue on this:****
>
> ** **
>
> “However, imo an IaaS provider that claims to offer trusted hosts but
> hesitates to reveal the software stack of it's hosts to an external auditor
> (CA in this case) would have issues with credibility”****
>
> ** **
>
> every IaaS provide has its own software stack, picking different
> components, with different versions, possibly adding different patches. The
> stack can be changed frequently. Rackspace says they can publish a build in
> less than 1hrs to deploy a new stack. Having an external CA to hold
> credentials for such large uncertain combos is almost a mission impossible.
> J****
>
> ** **
>
> Thanks****
>
> Kevin****
>
> ** **
>
> ** **
>
> *From:* Nicolae Paladi [mailto:n.pal...@gmail.com]
> *Sent:* Tuesday, November 13, 2012 11:46 PM
> *To:* Dugger, Donald D
> *Cc:* openstack; Tian, Kevin; Li, Susie; Wei, Gang; Maliszewski, Richard L
>
> *Subject:* Re: [Openstack] Plans for Trusted Computing in OpenStack****
>
>  ** **
>
> Hi, ****
>
> ** **
>
> I agree that the use case of a trusted IaaS provider (with possibly
> compromised nodes) is a valid one and should have support in the openstack
> codebase, although it seems rather dicey to trust the IaaS provider which
> does not trust it's own hosts.****
>
> And your understanding is correct, the idea is to add a 3rd party 'CA'
> with the aim to assess the integrity of the hosts based on the data
> produced by the TPM.****
>
> ** **
>
> What I am advocating here is the scenario where the IaaS can not be
> trusted.  ****
>
> In this case the CA would only gain information about the software stack
> of the IaaS provider's hosts, necessary to perform the attestation.
> However, imo an IaaS provider that claims to offer trusted hosts but
> hesitates to reveal the software stack of it's hosts to an external auditor
> (CA in this case) would have issues with credibility.****
>
> ** **
>
> Wrt complexity, this would require:****
>
> ** **
>
> * sending the attestation information externally to the 'CA' and taking a
> launch/not launch decision based on the result of the attestation. Even if
> the untrusted IaaS launches the VM, the client can easily detect the fraud.
> ****
>
> ** **
>
> * on the compute host, decrypting the nonce provided by the client (and
> _sealed_ by the CA to the trusted configuration of the host). That will add
> up to the codebase but is rather trivial (involves mostly interacting with
> the TPM).****
>
> ** **
>
> Now, there are some design choices to be made, e.g. whether the host
> communicates its attestation credentials directly to the CA in an https
> session or the scheduler does that. However, it does not change the
> important point that the client can verify that the VM was started on a
> trusted host, without having to rely on the IaaS provider.****
>
> ** **
>
> A common topic to both models (trusted or untrusted IaaS provider) is the
> question of "security profiles" for the hosts -- are you considering binary
> values (trusted/untrusted) or some finer-grained scale?****
>
> ** **
>
> Happy to hear your opinions and continue the discussion;****
>
> ** **
>
> cheers, ****
>
> /Nico.****
>
> ** **
>
> ** **
>
> On 12 November 2012 21:23, Dugger, Donald D <donald.d.dug...@intel.com>
> wrote:****
>
> Nicolae-****
>
>  ****
>
> We’ve been working under the assumption you have trust the IaaS provider
> (individual nodes might have been compromised somehow but you trust the
> provider itself).  I think what you are looking at is adding a 3rd party
> CA which is significantly increasing the complexity of the solution and
> potentially exposing the IaaS’s infrastructure to a 3rd party, probably
> not desirable to the IaaS provider.****
>
>  ****
>
> I’ve added some others to the thread who can chime in with their opinions.
> ****
>
>  ****
>
> --****
>
> Don Dugger****
>
> "Censeo Toto nos in Kansa esse decisse." - D. Gale****
>
> Ph: 303/443-3786****
>
>  ****
>
> *From:* Nicolae Paladi [mailto:n.pal...@gmail.com]
> *Sent:* Wednesday, November 07, 2012 7:42 AM
> *To:* Dugger, Donald D
> *Cc:* openstack
> *Subject:* Re: [Openstack] Plans for Trusted Computing in OpenStack****
>
>  ****
>
> Hi, ****
>
>  ****
>
> so basically my questions/thoughts about support for TC in OpenStack are
> based on a****
>
> somewhat different attack model where the IaaS is actually not trusted.***
> *
>
>  ****
>
> That is in contrast with the Trusted Compute Pools, where the
> scheduler/trusted_filter****
>
> is assumed to reject the host as a candidate for running the VM if it does
> not have a ****
>
> corresponding "trust value". However, nothing prevents a really evil IaaS
> deployment****
>
> to ignore this trust value and go ahead, launch the VM and return it to
> the client. So****
>
> there's an improvement suggestion focusing on that part.****
>
>  ****
>
> The model that I have in mind assumes both no trust in the IaaS
> setup/provider.****
>
>  ****
>
> So the gist is that:****
>
>  ****
>
> 1. Client could upload a secret encrypted with the public key of the
> authentication service ****
>
> (possible to include in the extra_specs)****
>
>  ****
>
> 2. The Attestation Service, after verifying the compute host could bind
> the secret to the****
>
> hosts trusted configuration, so that the host can inject the secret into
> the VM****
>
>  ****
>
> With this approach, a malicious IaaS provider can still launch the VM on
> an untrusted host, but****
>
> now he client can verify that the VM has been started on a 'trusted' host.
> ****
>
>  ****
>
> So the questions around this are -- ****
>
> 1. Is the scenario of an untrusted IaaS deployment considered for Trusted
> Compute Pools?****
>
>  ****
>
> 2. Is there any work ongoing to extend Trusted Compute Polls for storage
> as well? Or otherwise****
>
> put, what about the storage, is the solution to encrypt all data on the
> compute host prior to****
>
> storing it in the object store?****
>
>  ****
>
> 3. Is there any work ongoing on the evaluation side, namely the evaluation
> of the trust attributes****
>
> obtained from the host -- and do Trusted Compute Pools consider a binary
> value (trusted/untrusted)****
>
> or a scale of security profiles?****
>
>  ****
>
> Cheers, ****
>
> /Nico.****
>
>  ****
>
>  ****
>
> On 6 November 2012 19:07, Dugger, Donald D <donald.d.dug...@intel.com>
> wrote:****
>
> Nico-****
>
>  ****
>
> This is the appropriate place for discussions about Trusted Compute Pools
> under OpenStack.  Feel free to send out any ideas you have, I know I and
> others would be very interested in what you have.****
>
>  ****
>
> --****
>
> Don Dugger****
>
> "Censeo Toto nos in Kansa esse decisse." - D. Gale****
>
> Ph: 303/443-3786****
>
>  ****
>
> *From:* 
> openstack-bounces+donald.d.dugger=intel....@lists.launchpad.net[mailto:
> openstack-bounces+donald.d.dugger=intel....@lists.launchpad.net] *On
> Behalf Of *Nicolae Paladi
> *Sent:* Tuesday, November 06, 2012 8:35 AM
> *To:* openstack
> *Subject:* [Openstack] Plans for Trusted Computing in OpenStack****
>
>  ****
>
> Hi, ****
>
>  ****
>
> I am involved in a project that aims to use TPM modules to ensure that****
>
> the compute nodes run a 'trusted' software stack in a public IaaS
> deployment.****
>
>  ****
>
> I've read about trusted computing pools (
> http://wiki.openstack.org/TrustedComputingPools)****
>
> checked out the OpenAttestation project and seen a presentation from the
> OpenStack****
>
> summit (Putting Trust in 
> OpenStack<http://www.openstack.org/summit/san-diego-2012/openstack-summit-sessions/presentation/putting-trust-in-openstack>)
> in order to get a better understading of where****
>
> OpenStack is heading towards wrt TPM support.****
>
>  ****
>
> Are there any more resources, discussions, mailing lists that I could
> check out and****
>
> where I could potentially bounce ideas?****
>
>  ****
>
> Cheers, ****
>
> /Nico.****
>
>  ****
>
> ** **
>
_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to