Microsoft Cloud Computing Research Centre CloSe Workshop, Apr 16, 2014 Cloud Panopticon: Technical History Jon Crowcroft jon.crowcroft@cl.cam.ac.uk 1 Brief History of Surveillance Immune System • We’ve been here before – mid 1990s lawful intercept agencies pressured Internet Community to weaken its tech – Response was (aptly numbered) rfc1984 • http://tools.ietf.org/html/rfc1984 – IAB/IESG/Internet Society/IETF • Attacks included – Weakened keys, Key escrow • Weaknesses included – “Conflicting International Policies – Use of multiple layered encryption 2 What happened next? IETF “won” 1. TLS/HTTPS started to become routine 2. DNSSec & Certifcates 3. Cryptography 4. Better securing of infrastructure 3 Surveillance and DPI • Tech for deep packet inspection, e.g. Endace – Initially developed for traffic engineering • to reveal popular application sest and traffic matrix – Became widely used for full packet capture at IXPs • Port mirrors all the data to security agency • Response: accelerate default use of HTTPs/TLS – Together with NATs, makes network intercept worthless – Even for “meta-data” 4 4 What happens next? • Around this time, dominant traffic became • Mobile Device (many) <-> Cloud provider (few) • Key changes are: – Even more obfucasted (and secure) end points, but – Far far less, highly visible end points • instead of 100M NATd desktops talking to 100M websites, – we have a billion smart phones talking to a dozen cloud providers, almost all of latter in the US – Attack surface very very obvious 5 5 Surveillance on Cloud • Was easy because: – Easy to find cloud data centers – Data stored in plain, so that analytics can work – Data between cloud machines was txferred in plain – Data is processed in the plain, so that targeted adverts can work • i.e. the main (2 sided) business model of cloud makes them idea to be weaponised. 6 6 What happened next • • • • Those revelations… Embarrassed & annoyed “libertarian” tech cloudsters Vancouver IETF plenary response vehement http://paravirtualization.blogspot.co.uk/2014/10/big-brother20debateconversazione-lady.html • Wes Hardaker’s story… • Tech “solutions” 1. Crypt data between data centers (google) 2. Crypt data in storage (most) 3. Client side decrypt (apple) 4. Research in cryptic processing is ongoing 7 7 Future • Securing key distribution (see RFC1984) • Viable solutions for cloud service on crypted data • Search, targeted ads, solutions exist • Analytics – could use trusted 3rd party now • Later, we’ll see 8 8 What happens to lawful intercept? • Two extremes 1. They lose 2. They have to do their job properly and 1. Have probable cause 2. get warrants 3. Do intelligence… 3. Law mandates client side trapdoors (against RFC1984) 9 9 Conclusion • The arms race between – security agencies and bad guys on the one hand – And the public on the other • Is not new • Is not over • Is not transparent • or informed by good cost benefit analysis; • see for example this Cato report – Responsible Counterterrorism Policy – http://www.cato.org/publications/policy-analysis/ 10 10 Refs Hon, W. Kuan and Millard, Christopher and Reed, Chris and Singh, Jatinder and Walden, Ian and Crowcroft, Jon, Policy, Legal and Regulatory Implications of a Europe-Only Cloud (November 21, 2014). Queen Mary School of Law Legal Studies Research Paper. Available at SSRN: http://ss&+rn.com/abstract=2527951 @TechReport{UCAM-CL-TR-863, author = {Singh, Jatinder and Bacon, Jean and Crowcroft, Jon and Madhavapeddy, Anil and Pasquier, Thomas and Hon, W. Kuan and Millard, Christopher}, title = year = month = url = {{Regional clouds: technical considerations}}, 2014, nov, {http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-863.pdf}, institution = {University of Cambridge, Computer Laboratory}, number = {UCAM-CL-TR-863} } 11 11 Microsoft Cloud Computing Research Centre CloSe, Apr 16, Part Deux Regional clouds: technical considerations Jon Crowcroft Jat Singh jon.crowcroft@cl.cam.ac.uk jatinder.singh@cl.cam.ac.uk 12 Regional Clouds • Hard to define, many outstanding issues • Management and control underpins the rhetoric – Who has the power (capability), who is trusted. • Technical mechanisms for management – Offerings in a regional-cloud context • Implications - does this make sense? – Research, improving industrial ‘best-practices’ 13 Outline Explore different levels of the technical stack Focus: 1. Network-level routing 2. Cloud provisioning 3. Cryptography 4. Flow controls (‘data tagging’) 14 Internet & Routing Controls • Autonomous Systems (AS): ‘sections’ of the network • Internet exchange points: exchange between AS • Border Gateway Protocol encapsulates the routing policy between networks • In practice, routing policy reflects peering/service/business arrangements 15 15 Internet & routing controls (regional clouds) • Cloud providers manage their infrastructure – Many already account for geography for better service provisioning (performance, latency, etc.) – Bigger providers already involved in peering arrangements • Technically feasible with right incentives to ensure that data is routed within a geographical boundary E.g. economic benefits, regulation, … • But such an approach is blunt – applies to all traffic, regardless 16 16 Cloud provisioning: service levels SaaS Speci ic application services PaaS Maybe Illustrate Tenants/users Speci ic languages and tools Speci ic libraries and services (e.g. storage) Middleware: Inter-process communication Operating system IaaS Security Management Monitoring Accounting Audit … Hypervisor: Supports VMs and possibly VM IPC Hardware: data center facilities (machines, disks, network) Routing / peering arrangements • Provider manages that below, tenants above • Different management concerns for each service offering 17 17 Cloud provisioning: service offerings • Already work on tailoring services to particular constraints – Differential privacy: tailor query results to not reveal too much private information • Already offer services based on user/tenant locale – Not only for performance, but also security, rights management, etc. (e.g. iPlayer) • Providers already manage their infrastructure – Customising service and content for regional concerns • Thus, already the capability to tailor services for particular regional and/or jurisdictional concerns 18 18 Cloud provisioning: Unikernels • Cloud exists to leverage shared infrastructure • Isolation is important: – VMs – Separate for tenants, complete OS, managed by hypervisor – Containers – shared OS, isolated users • Deployment heavy, isolation overheads, … • Future? Unikernels: – library OS, build/compile a VM with only that required – Hypervisor managed, removes user-space isolation concerns 19 19 Cloud provisioning: Unikernels (2) • Very small, lightweight easily deployed VMs: – Easily moved around the infrastructure • Deploy in locales/jurisdictions when/where relevant – Facilitates customised services • Specific unikernels for particular services • Encapsulating specific jurisdictional requirements? • Transparency: Natural audit trail – “Pulls” that what is required to build, on demand 20 20 Data-centric controls 21 Cryptography • Range of purposes: – Data protection: storage, transit, comm. channels – Authentication, certification, attestation, etc. • Encryption – Unintelligible, except those with the keys • encrypt(plaintext, key) => ciphertext • decrypt(ciphertext, key) => plaintext • Regional Q: Who can (potentially) access the keys? 22 22 Client-side encryption C P Cloud provider Client • Cloud services – Computation generally on plaintext – Fully homomorphic encryption not practicable (yet) – Encrypted search, privacy-preserving targeted ads 23 23 Encryption and keys • Who could access the keys? – Trust and legal regime(s) • Client-held keys • Cloud providers holding client keys • Providers now (internally) use crypto provisioning • Trusted third-parties: CAs, Key-escrows • Key management isn’t easy • Vulnerabilities: compromised keys, broken schemes and/or implementations • Transparency: when was data decrypted? 24 24 Flow controls: data tagging • ‘Tag’ data to – track, and – control where it flows • Metadata ‘stuck’ to data to effect data management policy • Cloud benefits: – Management within the provider’s realm – Control and/or assurance, transparency • Various approaches – E.g. CSN @ Imperial: tenants collaborate to find leaks – Information Flow Control (IFC) 25 25 IFC: Regional isolation at application-level • Entities run in a ‘security context’ (tagged) • Tags: <concern, specifier> <zone, EU> Service X <zone, EU> <zone, EU> Application 1 <zone, EU> ✔ ✔ Database <zone, EU> <zone, EU> ✖ Service X <zone, US> • All context and flows audited • Mechanisms for EU->US, but trusted, privileged (audited!) 26 26 IFC: Ongoing work • Experimenting at the OS level, all application-level I/O – System-calls within, messaging across machines • Requires a trusted-computing base – Protects at levels above enforcement • Much more to do! – Enforcement: Small as possible, verifiable, hardware – Policy specification • Privilege management • Tag specifications and naming 27 27 IFC in the cloud • Control and transparency – Within the realm of the cloud provider – Data-centric, fine-grained isolation • Enforcement naturally leads to audit • Aims at compliance/assurance, generally not spooks • Potential for virtual jurisdiction? – Cloud isolates/offers services for specific jurisdictions 28 28 Conclusion • Regional cloud issues concern data management • Technical mechanisms for control, and transparency – Different mechanisms at different technical levels • Different capabilities, visibility • Developments in this space – Improve cloud best practice – May address concerns underpinning the balkanisation rhetoric 29 29 To summarise • Nearly 20 yrs ago, CALEA asked us to colludge in weaker security for everyone – This would be bad for civil society, so – We said no! • Now Snowden reveals that we were ignored – Tit-for-tat is optimal strategy: – This time we will make it no! 30 30 Technical workshop CLaw: Legal and technical issues in cloud computing IC2E: IEEE International Conference on Cloud Engineering (Mar 2015) http://conferences.computer.org/IC2E/2015 31 31 Information Flow Control: Regional example (2) • Only privileged, trusted, entities may change context – Encrypt EU data before sending Audit Context change Application 1 <zone, EU> US> <zone, US> ✔ Application 2 <zone, US> 32 32 Information Flow Control: Regional example (2) • More accurate… <zone, EU> ✔ Audit zone-mixer <zone, EU> <zone, US> NB this isn’t “application 1”, as it’s previous outputs would have had US and EU tagged outputs… Context change Application 2 <zone, US> <zone, US> ✔ zone-mixer <zone, US> 33 33