|
|
Subscribe / Log in / New account

A high-level view of the MeeGo security landscape

By Jake Edge
November 17, 2010

Several members of the MeeGo security team were on hand at the 2010 MeeGo conference to talk about what kinds of threats they will be trying to address—and why—as well as a security framework to enable MeeGo integrators and application developers to handle security tasks. MeeGo security architect Ryan Ware of Intel looked at the what and the why, while Elena Reshetova and Casey Schaufler of Nokia presented on the Mobile Simplified Security Framework (MSSF). As might be guessed from the presence of Schaufler, the Smack kernel security module plays a prominent role in the access control portion of MSSF. This week, we'll cover Ware's presentation and look at Reshetova and Schaufler's next week.

Ware started with a look back at 1990 by way of a justification of the need for MeeGo security solutions. In 1990, Intel had 25MHz 386 processors, the Simpsons were on TV, and there were all of 12 CERT security alerts for the year. All of those alerts "fit on one slide easily" and contain some amusing entries like "rumor of alleged attack" and "security probes from Italy". He listed, again on one slide, the conferences and other notable computer security news for the year. Things have changed just a little bit since then.

Fast-forwarding to the present, there have been 4221 CVEs so far this year, Intel has 3+GHz chips, and the Simpsons are still on TV. When looking at the growth of malware, there is an inflection point in 1996, which is probably associated with wider usage of the internet. "The internet is a petri dish" where all kinds of malware can grow and change. If you put a stock Windows XP system on the internet today without a firewall, it will be infected before you can get the updates installed; it only takes an average of four minutes before that happens, he said.

There is a huge financial incentive these days for those who write malware, which has changed the landscape significantly. You can now get "malware as a service" or rent botnets ($8-90/1000 bots "depending on quantity", he said). In the pwn2own contest at CanSecWest, someone with a working iPhone exploit was unwilling to release it for the $15,000 prize as they believed they could get more elsewhere—and did, with rumors of a six-figure sum.

There are also "spearphishing" efforts like Aurora that targeted Google and 30 other companies, including Intel, last year. It targeted specific individual employees, sending them an email that looked it came from someone they knew. When the PDF or JPG inside was opened, it appeared to be an innocuous file of that type, but actually infected their machine with a worm that looked for source code repositories. Once found, the contents of those repositories were slowly—so that intrusion detection systems weren't alerted—sent elsewhere. The Stuxnet worm/virus is another example of this new kind of "persistent" threat.

With MeeGo, there are new usage models where desktop data is migrating to mobile phones, which are much more easily lost, for example. People are doing banking from their phones as well. When Ware asked how many in the audience had used their phone for banking, he got quite a few hands; "you're all screwed", he said. Those credentials are stored somewhere in the phone for an attacker (or thief) to find. There are also various efforts to publish your location or turn your phone into a credit card, all of which have various dangers.

Because the number of Linux devices is growing quickly, it is becoming more of a target. For reference, he said there are more than a billion Windows-installed systems—some botnets have more than a million bots—but the smartphone market is growing at a rate (35.5%/year) that will go beyond that soon. At that rate, the expected sales of smartphones in 2014 is 506 million. In addition, the smartphone market is getting less fragmented and he sees iOS and Linux as likely to be the only players before too long.

The focus on mobile Linux security is growing, he said. He noted the recent Coverity study of the Android kernel that found 88 high-risk defects and there were "some interesting things in there". The report will not be available for a bit as Coverity gave Google 60 days to fix the problems before the report will be released. Ware noted that the study found that the defect rate for the code written for Android was "significantly higher than for the rest of the kernel".

MSSF was originally developed for smartphones, but has been broadened to support all of the MeeGo vertical markets (netbook, connected TV, in-vehicle-infotainment (IVI), ...). At a high level, the goals for MSSF are to provide protections for users of devices, the device itself, and for new services that are envisioned for MeeGo devices.

For users, that includes protecting things like login credentials and cookies, but also to try to prevent malicious software from being able to do things like making expensive phone calls without the knowledge or consent of the device owner. Protecting the device entails protecting the SIM lock and ensuring that regulatory requirements (for things like radio frequency emissions) are strictly adhered to. New services like mobile payment also need protection, he said.

The MeeGo security team is doing things beyond just MSSF. It ensures that the external facing MeeGo infrastructure is kept secure. That includes things like source code repositories and open build service packages. The team also ensures that MeeGo images are secure by not having insecure defaults on network services, patching packages for security vulnerabilities, and issuing MeeGo advisories.

MeeGo "can't be secure without you guys", he said. The team could do static analysis and code reviews for 80 hours a week and still not find everything. He asked that folks keep an eye out and point out any flaws they find to security@meego.com. There is also a new MeeGo-security-discussion mailing list and weekly IRC meetings of the security team are planned in the near future.

In answer to some audience questions, Ware said he was concerned about security issues surrounding "cloud" applications, but hadn't looked at it specifically yet. It is "something to look at in the future". He also was not interested in talking about DRM solutions, though some in the audience clearly were. He worked on DRM five years ago and was glad to not be working on it any more. "I don't want to fix someone's broken business model", he said. Others who need those kinds of "solutions" will undoubtedly come up with them.

Index entries for this article
SecurityDistribution security
ConferenceMeeGo Conference/2010


to post comments

security for whom?

Posted Nov 18, 2010 14:09 UTC (Thu) by wingo (guest, #26929) [Link] (1 responses)

A link to the discussion of Maemo Platform Security. back in february seems appropriate.

I haven't tracked the project since then, but things were not looking very good for the user at that time. It seemed to be more about the traditional "don't hack the device we just sold you" sort of security...

security for whom?

Posted Nov 23, 2010 2:42 UTC (Tue) by rrware (guest, #71420) [Link]

I understand why you might jump to that conclusion. However, keep in mind that we have a Developer mode where you can do whatever you want including using your own kernel. Aside from the aspect that I personally think anyone should be able to do whatever they want with their own hardware, it makes sense from a security perspective. Just look at the console market. Consoles that allowed alternative operating systems took much of the incentive out of hacking the security subsystem of those consoles.

Wot, no spell check?

Posted Nov 18, 2010 15:05 UTC (Thu) by tsr2 (subscriber, #4293) [Link] (1 responses)

"I don't wnat to fix someone's broken business model"

Wot, no spell check?

Posted Nov 18, 2010 15:08 UTC (Thu) by corbet (editor, #1) [Link]

When I was going over that article I just assumed he'd actually said it that way :)

Fixed. For future reference, we (still) prefer to receive typo reports via email; there's no need to clutter the comment stream forever with this kind of stuff.

A high-level view of the MeeGo security landscape

Posted Nov 18, 2010 16:54 UTC (Thu) by xav (guest, #18536) [Link] (1 responses)

> Protecting the device entails protecting the SIM lock and ensuring that regulatory requirements (for things like radio frequency emissions) are strictly adhered to.

Why do I think that this means protecting the device against it's owner, instead of protecting the owner's data ?

A high-level view of the MeeGo security landscape

Posted Nov 23, 2010 2:59 UTC (Tue) by rrware (guest, #71420) [Link]

I understand your concerns and why you might assume that. I would just point out that I did specifically talk about protecting user data and privacy. Yes, there some ways we do have to protect the device because of regulatory requirements and I did point those out specifically as well. It is a reality of delivering a device to market that includes software controlled radios and modern battery technology.

A high-level view of the MeeGo security landscape

Posted Nov 18, 2010 19:34 UTC (Thu) by jimparis (guest, #38647) [Link] (2 responses)

> With MeeGo, there are new usage models where desktop data is migrating to mobile phones, which are much more easily lost, for example. People are doing banking from their phones as well. When Ware asked how many in the audience had used their phone for banking, he got quite a few hands; "you're all screwed", he said. Those credentials are stored somewhere in the phone for an attacker (or thief) to find.

Screwed? Unless I tell it to save passwords, I really doubt that Firefox on my phone is storing my bank login credentials. And any particular session cookie will expire pretty quickly. I don't think existing phone manufacturers have gotten this as wrong as they suggest.

> $8-90/1000 bots "depending on quantity"

I'm not quite sure how to parse that. Is it "between $8 and $90 per 1000 bots, depending on the total quantity"? Those numbers are strangely specific for covering such a large range. Or was "between $80 and $90" the intended interpretation, which could make sense if observed averages are within that small range.

A high-level view of the MeeGo security landscape

Posted Nov 19, 2010 11:50 UTC (Fri) by niner (subscriber, #26151) [Link]

Could be that you would simply get some extremely nice discounts for large quantities. Like paying $90 for 1000 bots vs. $8000 for 1000000 bots.

A high-level view of the MeeGo security landscape

Posted Nov 23, 2010 2:51 UTC (Tue) by rrware (guest, #71420) [Link]

> Screwed? Unless I tell it to save passwords, I really doubt that Firefox on my phone is storing my bank login credentials. And any particular session cookie will expire pretty quickly. I don't think existing phone manufacturers have gotten this as wrong as they suggest.

It was actually a joke to help wake people up after lunch. :-) I should have clarified that they were screwed because their phone's were already rooted anyway. ;-)

> I'm not quite sure how to parse that. Is it "between $8 and $90 per 1000 bots, depending on the total quantity"? Those numbers are strangely specific for covering such a large range. Or was "between $80 and $90" the intended interpretation, which could make sense if observed averages are within that small range.

Strangely enough, it actually is $8-$90 per 1k. It is a large range and there is a number of reasons for it; quality of the botnet client, size of the botnet being leveraged, popularity of the botnet in the news and geographic location/prevalence.

Participate

Posted Nov 23, 2010 3:06 UTC (Tue) by rrware (guest, #71420) [Link]

First, for anyone interested, my slides are posted here: http://conference2010.meego.com/session/meego-security-wh...

I also appreciate some of the more critical comments. If you truly have concerns, as I also said in the talk, I will be starting weekly MeeGo Security Team Community meetings where anyone who wants to contribute can do so. Just subscribe to the MeeGo Security Discussion list since I'll be coordinating there.


Copyright © 2010, Eklektix, Inc.
This article may be redistributed under the terms of the Creative Commons CC BY-SA 4.0 license
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds