The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
With reference now to the figures and in particular with reference to
With reference now to the figures,
In the depicted example, server 104 and server 106 connect to network 102 along with storage unit 108. In addition, clients 110, 112, and 114 connect to network 102. These clients 110, 112, and 114 may be, for example, personal computers or network computers. In the depicted example, server 104 provides data, such as boot files, operating system images, and applications to clients 110, 112, and 114. Clients 110, 112, and 114 are clients to server 104 in this example. Network data processing system 100 may include additional servers, clients, and other devices not shown.
In the depicted example, network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, governmental, educational and other computer systems that route data and messages. Of course, network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN).
With reference now to
In the depicted example, data processing system 200 employs a hub architecture including a north bridge and memory controller hub (MCH) 202 and a south bridge and input/output (I/O) controller hub (ICH) 204. Processing unit 206, main memory 208, and graphics processor 210 are coupled to north bridge and memory controller hub 202. Processing unit 206 may contain one or more processors and even may be implemented using one or more heterogeneous processor systems. Graphics processor 210 may be coupled to the MCH through an accelerated graphics port (AGP), for example.
In the depicted example, local area network (LAN) adapter 212 is coupled to south bridge and I/O controller hub 204 and audio adapter 216, keyboard and mouse adapter 220, modem 222, read only memory (ROM) 224, universal serial bus (USB) ports and other communications ports 232, and PCI/PCIe devices 234 are coupled to south bridge and I/O controller hub 204 through bus 238, and hard disk drive (HDD) 226 and CD-ROM drive 230 are coupled to south bridge and I/O controller hub 204 through bus 240. PCI/PCIe devices may include, for example, Ethernet adapters, add-in cards, and PC cards for notebook computers. PCI uses a card bus controller, while PCIe does not. ROM 224 may be, for example, a flash binary input/output system (BIOS). Hard disk drive 226 and CD-ROM drive 230 may use, for example, an integrated drive electronics (IDE) or serial advanced technology attachment (SATA) interface. A super I/O (SIO) device 236 may be coupled to south bridge and I/O controller hub 204.
An operating system runs on processing unit 206 and coordinates and provides control of various components within data processing system 200 in
Instructions for the operating system, the object-oriented programming system, and applications or programs are located on storage devices, such as hard disk drive 226, and may be loaded into main memory 208 for execution by processing unit 206. The processes of the illustrative embodiments may be performed by processing unit 206 using computer implemented instructions, which may be located in a memory such as, for example, main memory 208, read only memory 224, or in one or more peripheral devices.
The hardware in
In some illustrative examples, data processing system 200 may be a personal digital assistant (PDA), which is generally configured with flash memory to provide non-volatile memory for storing operating system files and/or user-generated data. A bus system may be comprised of one or more buses, such as a system bus, an I/O bus and a PCI bus. Of course the bus system may be implemented using any type of communications fabric or architecture that provides for a transfer of data between different components or devices attached to the fabric or architecture. A communications unit may include one or more devices used to transmit and receive data, such as a modem or a network adapter. A memory may be, for example, main memory 208 or a cache such as found in north bridge and memory controller hub 202. A processing unit may include one or more processors or CPUs. The depicted examples in
In situations where computer records are routinely and automatically generated, the current standard required for showing chain-of-custody for computer records in a court of law is for a forensics collector to generate hash values for the computer records and show that the records shown in court have the same hash value as the collected records. However, the reliability and believability of current chain-of-custody evidence is based on the credibility of the forensics collector, since the records and the hashes may be tampered with by anyone who touches the records both during collection and after collection but before they are presented in court. Thus, the hashes may be validated only by assertion that everyone in the chain of custody acted honorably.
The illustrative embodiments address the problems in the current art by providing a computer implemented method, data processing system, and computer program product for authenticating or “notarizing” wiretaps of electronic communications. In particular, the illustrative embodiments enable network sniffers to apply a validation to computer records at the point of record collection, thereby allowing one to verify the authenticity of the packet traces for court proceedings. A sniffer is a program which monitors and captures data being transmitted on a network. With the illustrative embodiments, the reliability of the records may be increased by utilizing a hardware device, such as a Trusted Platform Module (TPM), in conjunction with a network sniffer to provide the capability of “notarizing” wiretaps. The hashing of the computer records in the illustrative embodiments is performed at record collection time, thereby allowing one to compare, at a later date, a running hash against the stored hash to verify that the records are authentic. In addition, as the hash values are stored in the TPM, the values cannot be tampered without subverting the hardware. For instance, when a quote is taken, the quote is signed with the TPM key, and the signing key never leaves the TPM. If the quote is altered, the signature will not validate the new (altered) quote.
A TPM is a microcontroller affixed to the motherboard of a PC which stores keys, passwords, and digital certificates and performs all cryptographic functions on the chip. Alternatively, the TPM may be implemented in software. The TPM validates the stored data packets in the wiretap using integrity measurements which require a root of trust within the computing platform. In order to determine the integrity of the stored data packets, a hardware or firmware component, called the Trusted Building Block (TBB) component, takes integrity measurements at the initial boot process of the sniffer to create the Core Root of Trust for Measurement (CRTM). The CRTM is the basis of the chain of trust. All software that is executed on the sniffer is then measured and becomes part of the chain of trust. The TBB component provides trusted measurement functions (e.g. Secure Hash Algorithm-1 (SHA-1)) to the rest of the platform. A packet measurement is a hash of the complete packet, including packet headers and payload. These measurements are stored in the TPM. The hashes are stored in protected registers called Platform Configuration Registers (PCRs). For example, when a packet is received at the sniffer, the sniffer measures the entire packet. The sniffer then extends a particular PCR. The TPM extends the PCR by appending the hash value taken from the packet to the current hash value of the PCR. The extended value is then rehashed to form a composite hash value for the PCR. These extended PCR values obtained at the time of packet collection may then be used to validate the authenticity of the stored packets in the packet log.
The sniffer is located at some point in the communications path between the sender and the receiver. The sniffer comprises wiretap software that is used to determine which packets traveling on the network match interest criteria and should be retained. The interest criteria used by the sniffer to determine which packets traveling on the network should be captured may include, but is not limited to, source or destination Internet Protocol addresses of the packets, keywords or phrases within the packet, as well as other packet attributes. The sniffer must have a TPM implementation and may operate either on the network with its network interface in promiscuous mode, or the sniffer may serve as the router or bridge.
During sniffer start-up time, a quote (measurement) of the initial PCR values signed by the key stored in the TPM is taken by the sniffer. This initial quote is the starting PCR values hashed together to form a composite initial PCR value. For example, the initial value of a PCR is normally either “0000000000000000000000000000000000000000” or “FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF”. Alternatively, if the PCR was previously extended, an example value may comprise “ea1a3901c085941efde6f198f4b62e2fc2a6ea94”. The initial quote is signed by the TPM to allow one to verify through a digital signature that the content of the packet log is accurate and has not been tampered with. As packets arrive at the sniffer, the sniffer identifies packets which match the interest criteria. If the sniffer makes a determination that a packet should be stored, the packet may be measured by the sniffer individually, or the sniffer may group packets of interest together for speed and measurement. The measurement is stored by extending a PCR with the hash value. Intermediary quotes may be taken of the PCR values. In this manner, a PCR may be extended as many times as necessary while maintaining the packet log. When the sniffer is shut down, a final quote is taken of the PCR values, which comprises the values hashed together to form a composite final PCR value. The final quote contains the measurement of the entire packet log.
When the packets are to be used as evidence in a court proceeding, the packets may be authenticated by re-running the packet log and validating that the resulting final PCR values match those from the final quote. If the calculated PCR value does not match the final quote value, then either the packet log or the quote has been tampered with since the time of collection. If the log has been tampered with, the packet log cannot be introduced as evidence in a court of law.
With reference now to
System 300 supports execution of software components, such as operating system 302, applications 304, and drivers 306, on its platform 308. The software components may be received through a network, such as network 102 shown in
Motherboard 316 also comprises trusted building block (TBB) 328. Motherboard 316 is supplied by a manufacturer with TBB 328 and other components physically or logically attached and supplied by the manufacturer. TBB 328 comprises the combination of CRTM 330, TPM 332, the connection of CRTM 330 to motherboard 316, and the connection of the TPM 332 to motherboard 316. CRTM 330 is an immutable portion of the platform's initialization code that executes upon a platform reset event.
Turning now to
TPM 400 comprises input/output component 402, which manages information flow over communications bus 404 by performing appropriate protocol encoding/decoding operations and routing of messages to appropriate components. TPM 400 contains cryptographic processing capabilities. TPM 400 may also be implemented on a cryptographic co-processor 406, such as PCI-X Cryptographic Coprocessor (PCIXCC). Key generator 408 creates symmetric keys and RSA asymmetric cryptographic key pairs. HMAC engine 410 performs HMAC (Keyed-Hashing for Message Authentication) calculations, whereby message authentication codes are computed using secret keys as integrity checks to validate information.
Random number generator 412 acts as a source of randomness for the computation of various values, such as keys or other values. SHA-1 engine 414 implements the SHA-1 hash algorithm. Power detector 416 manages the power states of TPM 400 in association with the power states of the platform. Opt-in component 418 maintains the state of persistent and volatile flags and enforces semantics associated with those flags such that TPM 400 may be enabled and disabled. Execution engine 420 runs program code to execute commands that TPM 400 receives through input/output component 402. Non-volatile memory 422 stores persistent identity and state associated with TPM 400. Non-volatile memory 422 may store static data items but is also available for storing dynamic data items by entities that are authorized by the TPM owner. Volatile memory 424 stores dynamic data items, including the Platform Configuration Registers, which are extended with the measurements of the packets of interest.
Similar to
In this illustrative example, a data packet may be transmitted from computer 1602 to computer 2604 or computer 3606 via ISP routers 608 and 610. All packets transmitted between computer 1602 and computers 2604 and 3606 are intercepted by sniffer 612. Sniffer 612 is a secure non-repudiable sniffer in that sniffer 612 allows packet trace measurements to be taken when the packets are collected, thereby increasing the reliability of the computer records for evidence purposes. It should be noted that although sniffer 612 is an active sniffer in the particular wiretapping configuration in
TPM 614 is an example of a trusted platform module, such as TPM 400 in
If the sniffer determines the packet is of interest (‘yes’ output of step 808), the sniffer then measures the packet by taking a hash of the entire packet (step 810). This hashed value measurement is then stored in a PCR by extending the current PCR value with the hashed value of the packet (step 812). The packet of interest is then stored in the packet log (step 814). The packet is then sent to its intended destination computer (step 816).
Turning back to step 808, if the sniffer determines that the packet is not of interest (‘no’ output of step 808), the sniffer skips to step 816 and sends the packet to its intended destination.
The sniffer then makes a determination as to whether an intermediary quote should be taken of the stored packets (step 818). Intermediary quotes of the stored packets may be taken periodically and appended to the packet log. If the sniffer determines that an intermediary quote should not be taken (‘no’ output of step 818), the process continues to step 822. However, if the sniffer determines that an intermediary quote should be taken (‘yes’ output of step 818), the sniffer instructs the TPM to take a quote of the PCR values and stores that quote in the packet log (step 820). A determination is then made as to whether the sniffer has been shut down (step 822). If the sniffer is not shut down (‘no’ output of step 822), the process loops back to step 806 and the sniffer waits for another packet to arrive. If the sniffer is shut down (‘yes’ output of step 822), then a final quote is taken (step 824), with the process terminating thereafter. The final quote of the stored packets may be appended to the packet log.
The process begins with the validator reading a first quote in the log (step 902). The validator verifies the signature of the quote using the sniffer TPM key to determine if the signature is valid (step 904) via standard digital signature technique. If the signature does not validate using the sniffer TPM key (‘no’ output of step 904), the validator determines that the log has been tampered with (step 906), and the process terminates thereafter.
If the signature validates using the sniffer key (‘yes’ output of step 904), the validator obtains the PCR values from the quote read from the log (step 908). The PCR values from the quote are then extended for each packet in the log (step 910). Subsequently, the next quote in the log is read by the TPM (step 912). The validator compares the signature of the next quote against the sniffer TPM key to determine if the signature is valid (step 914). If the signature does not validate using the sniffer key (‘no’ output of step 914), the TPM determines that the log has been tampered with (step 906), and the process terminates thereafter.
If the signature validates using the sniffer TPM key (‘yes’ output of step 914), a determination is made as to whether the PCR values of the first quote after having been extended with the each packet in the log up to the next quote is the same as the PCR values of the next quote (step 916). If the PCR values are different (‘no’ output of step 916), the validator determines that the log has been tampered with (step 906), and the process terminates thereafter.
If the PCR values are the same (‘yes’ output of step 916), then a determination is made as to whether the quote is the final quote in the log (step 918). If the quote is not the final quote (‘no’ output of step 918), the process loops back to step 910 where the PCR values are calculated for each packet in the log up to the next quote. If the quote is the final quote in the log (‘yes’ output of step 918), the validator determines that the entire log is valid (step 920), with the process terminating thereafter.
The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.