SlideShare a Scribd company logo
1 of 55
"We used to leak kilobytes,
then megs, then even gigs.
                        Cloud Computing
Now, we leak EC2 instances.
Someday, we'll leak
entire datacenters."
                - @Dymaxion
        
            This term means absolutely nothing.
        
            $variable + vague generic term
OpenStack
                   Security Brief



ShmooCon 2013
http://www.secstack.org/shmoocon2013.ppt
Yes, this is me.
This is also me.
Part I – OpenStack Structure
Cloud Computing is a terrible term.
Investopedia defines it as...




     ... this is why it was referred to as
  'Clown Computing' for a very long time.
A Better Term :
              Elastic Design

Scale horizontally rather than vertically


    Distributed services

    Standard Orchestration APIs

    All States are Ephemeral
So.. it's an Open Stack?


    Elastic Cloud

    Open Source ( Apache License )

    Open Standards ( Foundation )

    Written in Python

    REST APIs

    Shared Nothing, Message Oriented
Gaming the Foundation
   A fun tangent




https://www.music-piracy.com/?p=750
OpenStack Membership 2011
Top Companies by Commits
Votes by Source
Components of OpenStack
                      ( Folsom – 2012.2 )

Core                 Clients                     Incubated

    Nova         
                     python-novaclient       
                                                 Oslo

    Swift        
                     python-swiftclient      
                                                 Ceilometer

    Keystone     
                     python-keystoneclient   
                                                 python-ceilometerclient

    Glance       
                     python-glanceclient     
                                                 HEAT API

    Quantum      
                     python-quantumclient    
                                                 python-heatclient

    Cinder       
                     python-cinderclient     
                                                 python-openstackclient

    Horizon
Good Reading



Ken Pepple's Folsom Architecture Post
http://ken.pepple.info/openstack/2012/09/25/openstack-folsom-architecture/
http://ken.pepple.info/openstack/2012/09/25/openstack-folsom-architecture/
Not getting into hypervisor security.
OpenStack supports many hypervisors.
Some supported hypervisors:
 
     KVM
 
     Xen / XCP
 
     HyperV
 
     VMWare
 
     Physical Provisioning ( in Grizzly )
 
     etc, etc, etc. sky's the limit, bob's your uncle.
Keystone – Identity Manager

    REST API, Admin API

    Service Catalog

    Backend to sqlite by default

    Supports MySQL, LDAP, Active Directory
    ( with patches ).

    Token generation and shared
    authentication endpoint in OpenStack
    software.
Nova – Elastic Compute ( EC2 )

    REST API, Metadata API, EC2 API

    Integrates with many hypervisors

    Defaults to libvirt

    Integrated volume and network
    orchestration in Folsom ( deprecated )

    Security Groups, Quotas, Zones, Flavors..

    Config Drive

    Ugliest, oldest, most complex code in
    project.
Glance – Image Store


    REST API

    Backed my MySQL

    Stores to local volumes

    Optionally stores to object storage
Quantum – SDN


    Replaces nova-network

    REST API

    Can interact directly with hardware

    Pluggable networking extensions

    MySQL backend
Cinder – Volumes

    Replaces nova-volume

    REST API

    MySQL backend

    LVM management on nova-volume nodes

    Direct hardware interaction with NAS

    Direct interaction with soft block stores
Swift – Object Storage ( S3 )


    REST API

    HA-Proxy Load balancer

    Block Manipulation on Nodes

    Soft Replication between Nodes
Horizon – Web GUI ( Django )

    Integrates with REST APIs

    Integrates with Client APIs

    Uses standard Keystone token
    authentication

    Django based

    Does not use EC2 APIs, solely OpenStack
Message Buses



    RabbitMQ

    ZeroMQ
Development Workflows

    Continuous Integration

    Gerrit

    Jenkins

    Launchpad

    GitHub

    Packaging
Packaging

    Core packages are built from release
    tarballs

    Client packages are built from pypi tarballs

    Git releases are PGP signed

    Efforts are being made to ensure all
    dependencies are PGP signed properly

    Ubuntu / RedHat / SuSE among many
    vendors with signed releases
Good Reading


China GitHub and Man in the Middle
https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle
Part II – Targetting OpenStack
Layer 3 Model
Layer 2 Model
Nested Model
The ZeroMQ Message Bus

    Fuzzing attacks in 2.1

    “ØMQ does not deal with security by
    design but concentrates on getting your
    bytes over the network as fast as possible.”

    The question of encrypting 0mq
    communications is difficult in cloud
    environments.

    Message Signing
Good Reading



Status of Secure Messaging
http://lists.openstack.org/pipermail/openstack-dev/2013-
   February/005614.html
The RabbitMQ Message Bus

    Supports SSL

    Supports Authentication ( SASL )

    Public / Private Queues

    No encryption at rest ( who cares? )


    Not as horizontally scalable
The REST APIs and other HTTP Targets


    Backend ( wsgi )

    Admin ( wsgi )

    Client ( requests )

    SDKs ( there are many )

    Horizon ( django )
Config Drive

    CVE-2012-3447

    https://blueprints.launchpad.net/nova/+spec/config-drive-v2

    Compromise of Compute Hosts WITHOUT hypervisor escape
    possible
Volumes, Block Storage, and Memory


    Volume zeroing is a recurring vulnerability

    Volume encryption coming

    Shared Memory space presents the
    possibility for attackers to sniff memory
    allocated to other virtual hosts

    DMA access is a continual source of
    hypervisor escape attacks
Authentication

    Auth Tokens – UUID v4 / dev urandom

    PKI Certs – Grizzly*

    Multifactor Auth – Grizzly*

    Token Sizes... Enormous 40bytes to 3k.
    Potential for DDOS and Failure in Horizon

    Authn/z – Grizzly*
Analysis of Past Vulnerabilities
Lines of Code per Project
Vulnerability Reports by
      Company
Part III – Defense against the
            Dark Arts
Intrusion Detection
Intrusion Detection

    Security APIs ( ceilometer, marconi? ) -
    event logging

    Precursor Indicators – Homogeneity makes
    anomalies easy to spot. Standard methods
    as well.

    External Reporting

    Security Services ( SaaS )

    Infrastructure Knowledge ( This Preso )
Intrusion Response
You guys know this better than I

    Have a plan.

    Consumers must have a workflow that is
    known and supported for response.

    Disclosure of breach and other issues
    should be planned for ahead of time.

    Don't Panic.
Forensics ( Chain of Custody )
 
     Ephemeral Design means interruption is
     usually expected as part of SLA
 
     OpenStack has no mechanism for
     migrating instances between tenants.
 
     You may want to provide SOC teams
     tenant access to monitor compromised
     instances.
 
     Instances can be snapshotted and
     exported for controlled testing in sandbox.
 
     Logs should be isolated in one way DMZ
Reporting to OpenStack
    
        Open a bug in Launchpad and mark it as a
        'security bug'. This will make the bug
        Private and only accessible to the
        Vulnerability Management Team.
    
        If the issue is extremely sensitive, please
        send an encrypted email to one of the
        Team’s members. Their GPG keys can be
        found below, and are also available from
        popular public GPG key servers.

http://www.openstack.org/projects/openstack-security/
Good Reads on Inc Response


Handling Compromised Components in an IaaS Cloud Installation
Aryan TaheriMonfared (aryan@uninett.no)
Martin G Jaatun (Martin.G.Jaatun@sintef.no)


http://www.journalofcloudcomputing.com/content/1/1/16/abstract
Object Storage Pain Points

    Overwriting Data is Difficult, no stock
    methods.

    In event of aggressive evidence collection,
    difficulty in identifying physical resources.

    Potential loss of data in evidence
    collection.
TPM + OpenStack = Trusted Pools
Zoned by Exposed Surface Area



    SaaS is most secure

    PaaS less so

    IaaS least secure


Duh
Good Reading

Trusted Computing Pools
http://wiki.openstack.org/TrustedComputingPools



Putting Trust in OpenStack
http://www.openstack.org/summit/san-diego-2012/openstack-summit-
   sessions/presentation/putting-trust-in-openstack
Parting thought
Consider public cloud vendors as you would
 a Chinese fabrication supply chain.


    They are cheap.

    They are untrusted.

    They are probably going to be around for
    the foreseeable future.
Good Reading



A multi-level security model for partitioning
  workflows over federated clouds
http://www.journalofcloudcomputing.com/content/1/1/15

More Related Content

What's hot

Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudSetting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudFernando Lopez Aguilar
 
OpenStack keystone identity service
OpenStack keystone identity serviceOpenStack keystone identity service
OpenStack keystone identity serviceopenstackindia
 
Automated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-AnsibleAutomated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-AnsibleMajor Hayden
 
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio TavillaOpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio TavillaLorenzo Carnevale
 
Fiware cloud capabilities_and_setting_up_your_environment
Fiware cloud capabilities_and_setting_up_your_environmentFiware cloud capabilities_and_setting_up_your_environment
Fiware cloud capabilities_and_setting_up_your_environmentMiguel García González
 
Keystone - Openstack Identity Service
Keystone - Openstack Identity Service Keystone - Openstack Identity Service
Keystone - Openstack Identity Service Prasad Mukhedkar
 
Setting up your virtual infrastructure using fi-lab cloud
Setting up your virtual infrastructure using fi-lab cloudSetting up your virtual infrastructure using fi-lab cloud
Setting up your virtual infrastructure using fi-lab cloudFernando Lopez Aguilar
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...Cisco DevNet
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
Equifax cyber attack contained by containers
Equifax cyber attack contained by containersEquifax cyber attack contained by containers
Equifax cyber attack contained by containersAqua Security
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractkey aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractSanjana Yemajala
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudSetting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudFernando Lopez Aguilar
 

What's hot (20)

Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudSetting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab Cloud
 
OpenStack keystone identity service
OpenStack keystone identity serviceOpenStack keystone identity service
OpenStack keystone identity service
 
Automated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-AnsibleAutomated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-Ansible
 
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio TavillaOpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
 
Container Security
Container SecurityContainer Security
Container Security
 
Zdlra copy to cloud
Zdlra copy to cloudZdlra copy to cloud
Zdlra copy to cloud
 
Join FIWARE Lab
Join FIWARE LabJoin FIWARE Lab
Join FIWARE Lab
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Fiware cloud capabilities_and_setting_up_your_environment
Fiware cloud capabilities_and_setting_up_your_environmentFiware cloud capabilities_and_setting_up_your_environment
Fiware cloud capabilities_and_setting_up_your_environment
 
Keystone - Openstack Identity Service
Keystone - Openstack Identity Service Keystone - Openstack Identity Service
Keystone - Openstack Identity Service
 
FIWARE Lab
FIWARE LabFIWARE Lab
FIWARE Lab
 
Setting up your virtual infrastructure using fi-lab cloud
Setting up your virtual infrastructure using fi-lab cloudSetting up your virtual infrastructure using fi-lab cloud
Setting up your virtual infrastructure using fi-lab cloud
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Equifax cyber attack contained by containers
Equifax cyber attack contained by containersEquifax cyber attack contained by containers
Equifax cyber attack contained by containers
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractkey aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
 
Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudSetting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab Cloud
 

Viewers also liked

ChaosVPN 5mof
ChaosVPN 5mofChaosVPN 5mof
ChaosVPN 5mofopenfly
 
Troll5mof
Troll5mofTroll5mof
Troll5mofopenfly
 
Blue Skin, Red Heart
Blue Skin, Red HeartBlue Skin, Red Heart
Blue Skin, Red Heartopenfly
 
Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626aedocw
 
Art of Trolling Defcon 19
Art of Trolling Defcon 19Art of Trolling Defcon 19
Art of Trolling Defcon 19openfly
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongRobert Clark
 
OpenStack-Ansible Security
OpenStack-Ansible SecurityOpenStack-Ansible Security
OpenStack-Ansible SecurityMajor Hayden
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 

Viewers also liked (8)

ChaosVPN 5mof
ChaosVPN 5mofChaosVPN 5mof
ChaosVPN 5mof
 
Troll5mof
Troll5mofTroll5mof
Troll5mof
 
Blue Skin, Red Heart
Blue Skin, Red HeartBlue Skin, Red Heart
Blue Skin, Red Heart
 
Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626
 
Art of Trolling Defcon 19
Art of Trolling Defcon 19Art of Trolling Defcon 19
Art of Trolling Defcon 19
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong Kong
 
OpenStack-Ansible Security
OpenStack-Ansible SecurityOpenStack-Ansible Security
OpenStack-Ansible Security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Similar to Shmoocon 2013 - OpenStack Security Brief

OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeCybera Inc.
 
OpenStack for VMware Administrators
OpenStack for VMware AdministratorsOpenStack for VMware Administrators
OpenStack for VMware AdministratorsTrevor Roberts Jr.
 
Openstack days taiwan 2016 0712
Openstack days taiwan 2016 0712Openstack days taiwan 2016 0712
Openstack days taiwan 2016 0712Naoto Gohko
 
Workshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationWorkshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationJayaprakash R
 
Openstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamOpenstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamBeny Raja
 
Open stack in sina
Open stack in sinaOpen stack in sina
Open stack in sinaHui Cheng
 
OpenStack: Why Is It Gaining So Much Traction?
OpenStack: Why Is It Gaining So Much Traction?OpenStack: Why Is It Gaining So Much Traction?
OpenStack: Why Is It Gaining So Much Traction?mestery
 
Openstack: security beyond firewalls
Openstack: security beyond firewallsOpenstack: security beyond firewalls
Openstack: security beyond firewallsGARL
 
OpenStack Day Italy: openATTC as an open storage platform for OpenStack
OpenStack Day Italy: openATTC as an open storage platform for OpenStackOpenStack Day Italy: openATTC as an open storage platform for OpenStack
OpenStack Day Italy: openATTC as an open storage platform for OpenStackit-novum
 
Openstack Global Meetup
Openstack Global Meetup Openstack Global Meetup
Openstack Global Meetup openstackindia
 
Building an open source cloud storage platform for OpenStack - openATTIC
Building an open source cloud storage platform for OpenStack - openATTICBuilding an open source cloud storage platform for OpenStack - openATTIC
Building an open source cloud storage platform for OpenStack - openATTICit-novum
 
OpenStack & OpenContrail in Production
OpenStack & OpenContrail in ProductionOpenStack & OpenContrail in Production
OpenStack & OpenContrail in ProductionEdgar Magana
 
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWSAmazon Web Services Korea
 
Weave User Group Talk - DockerCon 2017 Recap
Weave User Group Talk - DockerCon 2017 RecapWeave User Group Talk - DockerCon 2017 Recap
Weave User Group Talk - DockerCon 2017 RecapPatrick Chanezon
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsBeMyApp
 
Building Your Docker Tech Stack
Building Your Docker Tech StackBuilding Your Docker Tech Stack
Building Your Docker Tech StackBret Fisher
 
Building your production tech stack for docker container platform
Building your production tech stack for docker container platformBuilding your production tech stack for docker container platform
Building your production tech stack for docker container platformDocker, Inc.
 
Swift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex YangSwift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex YangHui Cheng
 

Similar to Shmoocon 2013 - OpenStack Security Brief (20)

OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information Exchange
 
OpenStack for VMware Administrators
OpenStack for VMware AdministratorsOpenStack for VMware Administrators
OpenStack for VMware Administrators
 
Openstack days taiwan 2016 0712
Openstack days taiwan 2016 0712Openstack days taiwan 2016 0712
Openstack days taiwan 2016 0712
 
Workshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationWorkshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, Virtualization
 
Openstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamOpenstack workshop @ Kalasalingam
Openstack workshop @ Kalasalingam
 
Open stack in sina
Open stack in sinaOpen stack in sina
Open stack in sina
 
OpenStack: Why Is It Gaining So Much Traction?
OpenStack: Why Is It Gaining So Much Traction?OpenStack: Why Is It Gaining So Much Traction?
OpenStack: Why Is It Gaining So Much Traction?
 
Openstack: security beyond firewalls
Openstack: security beyond firewallsOpenstack: security beyond firewalls
Openstack: security beyond firewalls
 
OpenStack Day Italy: openATTC as an open storage platform for OpenStack
OpenStack Day Italy: openATTC as an open storage platform for OpenStackOpenStack Day Italy: openATTC as an open storage platform for OpenStack
OpenStack Day Italy: openATTC as an open storage platform for OpenStack
 
Openstack Global Meetup
Openstack Global Meetup Openstack Global Meetup
Openstack Global Meetup
 
Building an open source cloud storage platform for OpenStack - openATTIC
Building an open source cloud storage platform for OpenStack - openATTICBuilding an open source cloud storage platform for OpenStack - openATTIC
Building an open source cloud storage platform for OpenStack - openATTIC
 
OpenStack & OpenContrail in Production
OpenStack & OpenContrail in ProductionOpenStack & OpenContrail in Production
OpenStack & OpenContrail in Production
 
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
 
Weave User Group Talk - DockerCon 2017 Recap
Weave User Group Talk - DockerCon 2017 RecapWeave User Group Talk - DockerCon 2017 Recap
Weave User Group Talk - DockerCon 2017 Recap
 
OpenCms Days 2012 - OpenCms on open clouds
OpenCms Days 2012 - OpenCms on open cloudsOpenCms Days 2012 - OpenCms on open clouds
OpenCms Days 2012 - OpenCms on open clouds
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond Firewalls
 
Building Your Docker Tech Stack
Building Your Docker Tech StackBuilding Your Docker Tech Stack
Building Your Docker Tech Stack
 
Building your production tech stack for docker container platform
Building your production tech stack for docker container platformBuilding your production tech stack for docker container platform
Building your production tech stack for docker container platform
 
Open stackapac swift_alexyang
Open stackapac swift_alexyangOpen stackapac swift_alexyang
Open stackapac swift_alexyang
 
Swift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex YangSwift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex Yang
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Shmoocon 2013 - OpenStack Security Brief

  • 1. "We used to leak kilobytes, then megs, then even gigs. Cloud Computing Now, we leak EC2 instances. Someday, we'll leak entire datacenters." - @Dymaxion  This term means absolutely nothing.  $variable + vague generic term
  • 2. OpenStack Security Brief ShmooCon 2013 http://www.secstack.org/shmoocon2013.ppt
  • 5. Part I – OpenStack Structure
  • 6. Cloud Computing is a terrible term. Investopedia defines it as... ... this is why it was referred to as 'Clown Computing' for a very long time.
  • 7. A Better Term : Elastic Design Scale horizontally rather than vertically  Distributed services  Standard Orchestration APIs  All States are Ephemeral
  • 8. So.. it's an Open Stack?  Elastic Cloud  Open Source ( Apache License )  Open Standards ( Foundation )  Written in Python  REST APIs  Shared Nothing, Message Oriented
  • 9. Gaming the Foundation A fun tangent https://www.music-piracy.com/?p=750
  • 11. Top Companies by Commits
  • 13. Components of OpenStack ( Folsom – 2012.2 ) Core Clients Incubated  Nova  python-novaclient  Oslo  Swift  python-swiftclient  Ceilometer  Keystone  python-keystoneclient  python-ceilometerclient  Glance  python-glanceclient  HEAT API  Quantum  python-quantumclient  python-heatclient  Cinder  python-cinderclient  python-openstackclient  Horizon
  • 14. Good Reading Ken Pepple's Folsom Architecture Post http://ken.pepple.info/openstack/2012/09/25/openstack-folsom-architecture/
  • 16. Not getting into hypervisor security. OpenStack supports many hypervisors. Some supported hypervisors:  KVM  Xen / XCP  HyperV  VMWare  Physical Provisioning ( in Grizzly )  etc, etc, etc. sky's the limit, bob's your uncle.
  • 17.
  • 18. Keystone – Identity Manager  REST API, Admin API  Service Catalog  Backend to sqlite by default  Supports MySQL, LDAP, Active Directory ( with patches ).  Token generation and shared authentication endpoint in OpenStack software.
  • 19. Nova – Elastic Compute ( EC2 )  REST API, Metadata API, EC2 API  Integrates with many hypervisors  Defaults to libvirt  Integrated volume and network orchestration in Folsom ( deprecated )  Security Groups, Quotas, Zones, Flavors..  Config Drive  Ugliest, oldest, most complex code in project.
  • 20. Glance – Image Store  REST API  Backed my MySQL  Stores to local volumes  Optionally stores to object storage
  • 21. Quantum – SDN  Replaces nova-network  REST API  Can interact directly with hardware  Pluggable networking extensions  MySQL backend
  • 22. Cinder – Volumes  Replaces nova-volume  REST API  MySQL backend  LVM management on nova-volume nodes  Direct hardware interaction with NAS  Direct interaction with soft block stores
  • 23. Swift – Object Storage ( S3 )  REST API  HA-Proxy Load balancer  Block Manipulation on Nodes  Soft Replication between Nodes
  • 24. Horizon – Web GUI ( Django )  Integrates with REST APIs  Integrates with Client APIs  Uses standard Keystone token authentication  Django based  Does not use EC2 APIs, solely OpenStack
  • 25. Message Buses  RabbitMQ  ZeroMQ
  • 26. Development Workflows  Continuous Integration  Gerrit  Jenkins  Launchpad  GitHub  Packaging
  • 27. Packaging  Core packages are built from release tarballs  Client packages are built from pypi tarballs  Git releases are PGP signed  Efforts are being made to ensure all dependencies are PGP signed properly  Ubuntu / RedHat / SuSE among many vendors with signed releases
  • 28. Good Reading China GitHub and Man in the Middle https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle
  • 29. Part II – Targetting OpenStack
  • 33. The ZeroMQ Message Bus  Fuzzing attacks in 2.1  “ØMQ does not deal with security by design but concentrates on getting your bytes over the network as fast as possible.”  The question of encrypting 0mq communications is difficult in cloud environments.  Message Signing
  • 34. Good Reading Status of Secure Messaging http://lists.openstack.org/pipermail/openstack-dev/2013- February/005614.html
  • 35. The RabbitMQ Message Bus  Supports SSL  Supports Authentication ( SASL )  Public / Private Queues  No encryption at rest ( who cares? )  Not as horizontally scalable
  • 36. The REST APIs and other HTTP Targets  Backend ( wsgi )  Admin ( wsgi )  Client ( requests )  SDKs ( there are many )  Horizon ( django )
  • 37. Config Drive  CVE-2012-3447  https://blueprints.launchpad.net/nova/+spec/config-drive-v2  Compromise of Compute Hosts WITHOUT hypervisor escape possible
  • 38. Volumes, Block Storage, and Memory  Volume zeroing is a recurring vulnerability  Volume encryption coming  Shared Memory space presents the possibility for attackers to sniff memory allocated to other virtual hosts  DMA access is a continual source of hypervisor escape attacks
  • 39. Authentication  Auth Tokens – UUID v4 / dev urandom  PKI Certs – Grizzly*  Multifactor Auth – Grizzly*  Token Sizes... Enormous 40bytes to 3k. Potential for DDOS and Failure in Horizon  Authn/z – Grizzly*
  • 40. Analysis of Past Vulnerabilities
  • 41. Lines of Code per Project
  • 43. Part III – Defense against the Dark Arts
  • 45. Intrusion Detection  Security APIs ( ceilometer, marconi? ) - event logging  Precursor Indicators – Homogeneity makes anomalies easy to spot. Standard methods as well.  External Reporting  Security Services ( SaaS )  Infrastructure Knowledge ( This Preso )
  • 46. Intrusion Response You guys know this better than I  Have a plan.  Consumers must have a workflow that is known and supported for response.  Disclosure of breach and other issues should be planned for ahead of time.  Don't Panic.
  • 47. Forensics ( Chain of Custody )  Ephemeral Design means interruption is usually expected as part of SLA  OpenStack has no mechanism for migrating instances between tenants.  You may want to provide SOC teams tenant access to monitor compromised instances.  Instances can be snapshotted and exported for controlled testing in sandbox.  Logs should be isolated in one way DMZ
  • 48. Reporting to OpenStack  Open a bug in Launchpad and mark it as a 'security bug'. This will make the bug Private and only accessible to the Vulnerability Management Team.  If the issue is extremely sensitive, please send an encrypted email to one of the Team’s members. Their GPG keys can be found below, and are also available from popular public GPG key servers. http://www.openstack.org/projects/openstack-security/
  • 49. Good Reads on Inc Response Handling Compromised Components in an IaaS Cloud Installation Aryan TaheriMonfared (aryan@uninett.no) Martin G Jaatun (Martin.G.Jaatun@sintef.no) http://www.journalofcloudcomputing.com/content/1/1/16/abstract
  • 50. Object Storage Pain Points  Overwriting Data is Difficult, no stock methods.  In event of aggressive evidence collection, difficulty in identifying physical resources.  Potential loss of data in evidence collection.
  • 51. TPM + OpenStack = Trusted Pools
  • 52. Zoned by Exposed Surface Area  SaaS is most secure  PaaS less so  IaaS least secure Duh
  • 53. Good Reading Trusted Computing Pools http://wiki.openstack.org/TrustedComputingPools Putting Trust in OpenStack http://www.openstack.org/summit/san-diego-2012/openstack-summit- sessions/presentation/putting-trust-in-openstack
  • 54. Parting thought Consider public cloud vendors as you would a Chinese fabrication supply chain.  They are cheap.  They are untrusted.  They are probably going to be around for the foreseeable future.
  • 55. Good Reading A multi-level security model for partitioning workflows over federated clouds http://www.journalofcloudcomputing.com/content/1/1/15