Komoku

 

One aspect of an Information Assurance "Defense in Depth" strategy is robust configuration management. Applications such as Tripwire can assist in such management, but these tools are usually difficult to operate, and may provide incorrect results, i.e. a false negative as was the case with the authors of the Internet Auditing Project. The problem with integrity applications is that they depend on the integrity and proper operation of the operating system, i.e. these applications assume that the operating system always operates correctly. When this assumption is not valid the integrity applications cannot provide a reliable result, and as a result the applications provide a false negative. Tools such as those that can be found at RootShell.com provide novice attackers with the capability to defeat integrity tools that rely on the operating system. Additionally, most integrity applications require a database of pre-computed values. The maintenance and protection of this database presents several challenges to effective and secure management on a wide scale.

Komoku provides a solution to the traditional problems, described above, with integrity and configuration management using what we call Out-of-Band Cryptographic Configuration Management. The solution leverages digital signature technology to provide integrity protection for file systems with an out-of-band verification process that does not depend on the underlying operating system. The resultant system provides extremely strong integrity guarantees and configuration management- detecting modifications to approved and objects as well as detecting the existence of unapproved and thus unsigned objects. This is accomplished without ANY modifications to the host operating system. As a result, the system is equivalent to an independent auditor- detecting problems in near real-time.

A "defense in depth" strategy presumes that an adversary will successfully penetrate some defenses, but not ALL of the layered defenses before detection. A key element in such a strategy is to detect when an adversary has a breached a layer in the defense as quickly as possible and take the appropriate action to counter the attack. Intrusion detection systems (IDS) for the host and the network are one detection means. Unfortunately, an intrusion detection approach is not one hundred percent reliable as such systems can only detect known anomalies. Furthermore, intrusion detection systems in practice usually suffer from a high rate of false positive and false negative reports. Integrity detection systems, on the other hand, can reliably detect the un-authorized changes made by an intruder provided that the host operating system has not been modified to return misleading information. The fact that current integrity detection systems can be misled is the fundamental problem with an otherwise sound approach. Komoku's goal is to eliminate that fundamental problem.

1. Komoku is currently funded by DARPA.


Komoku

Komoku, in Japanese myth, is one of the four guards of the cardinal directions. Komoku is the guard for the west.

 

Interesting Links

IBM's embedded cryptographic co-processor: IBM 4758

Intel's StrongARM development board: EBSA-285

 An OpenSource embedded OS: eCOS

Linux running on ARM processors: ArmLinux