Upload
gordon-booth
View
225
Download
2
Embed Size (px)
Citation preview
Security Issues in OpenStack
Rostyslav Slipetskyy’s Maste’s thesisSubmission date: June 2011
Presenter: 陳傑威
Agenda
陳傑威 2
Introduction to OpenStack• Definition• History• Projects
Security Issues in OpenStack (thesis)• Objective• Contribution• Conclusion
3
OpenStack is open source cloud operating system.
NIST(National Institute of Standards and Technology, 美國國家技術標準局 ):
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction
Definition
user
SaaS
PaaS
IaaS
Physical layer
(e.g. Salesforce)
(e.g. Hadoop)
(e.g. OpenStack)
6
Security Issues in OpenStack (thesis)
• Main Objective: Analyze how various security issues are handled in OpenStack
7
Security Issues IdentifiedCSA (Cloud Security Alliance 雲端安全聯盟 )
ENISA (European Network and Information Security Agency 歐洲網路資訊安全局 )
NIST (National Institute of Standards and Technology 國家標準技術研究所 )
8
Security Issues Identified (2)
• 1. OpenStack Object Storage• 2. Security issues:– Identity and Access Management– Data Management
10
Security Isseus:
• Identity and Access Management Security Issues– Identity
Provisioning/Deprovisioning– Identity Federation– Authentication– Authorization and Access
Control
• Data Management Security Issues– Data Location– Isolation– Backup and Recovery– Deletion– Encryption and Key
Management– Integrity Verification
11
Identity Provision/Deprovisioning
• Overview– 2 back-end system:
• Devauth: user data are stored in SQLite database.
• Swauth: user data are stored as files in Object Storage.
– 4 roles: • User: has no permissions relative to user management.
• Admin: can add users to an account where he is an administrator. In swauth can delete users from administered accounts.
• Reseller Admin: has Admin permissions on all the accounts. Cannot add other Reseller Admins.
• Super Admin: the most powerful user, who can perform all user management procedures, including adding Reseller Admins.
14
Authentication Systems: Swauth
• User data (passwords, groups) are stored as JSON-encoded data in text files in Object Storage
15
Authentication: Security Token Generation
• Session ID Analysis:1. Set token expiration time to 0 seconds .
2. Obtain 10000 tokens generated for the same user.
3. Analyze tokens with WebScarab to check patterns.
4. Analyze generated tokens with Burp Sequencer tool.