• Aucun résultat trouvé

Ovalyzer: an OVAL to Cfengine Translator

N/A
N/A
Protected

Academic year: 2021

Partager "Ovalyzer: an OVAL to Cfengine Translator"

Copied!
3
0
0

Texte intégral

(1)

HAL Id: hal-00747656

https://hal.inria.fr/hal-00747656

Submitted on 2 Nov 2012

HAL

is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire

HAL, est

destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Ovalyzer: an OVAL to Cfengine Translator

Martín Barrère, Rémi Badonnel, Olivier Festor

To cite this version:

Martín Barrère, Rémi Badonnel, Olivier Festor. Ovalyzer: an OVAL to Cfengine Translator.

IEEE/IFIP Network Operations and Management Symposium (NOMS’12), Ph.D. Student Demo Con-

test of the IFIP/IEEE Network Operations and Management Symposium (NOMS’12), Apr 2012, Maui,

Hawaii, United States. �hal-00747656�

(2)

Ovalyzer: an OVAL to Cfengine Translator

(IEEE NOMS 2012 - Demo Abstract)

Mart´ın Barr`ere Ph.D Student Madynes Research Team

LORIA - INRIA Nancy Grand Est, France martin.barrere@inria.fr

Topic.Vulnerability Management for Safe Configurations in Autonomic Networks and Systems.

Background. The continuous growth of networks as well as the diversification of their services have considerably increased the complexity of their management. Traditional network management approaches are not suitable for supporting this sustained dynamics because they do not scale. Au- tonomic computing [7] provides new perspectives with respect to this issue, through the automation of the management tasks. Autonomic networks and systems are responsible for their own manage- ment. They have to adapt their configurations with respect to their environment, to protect them- selves against security attacks, to repair their own failures, and to optimize their various parameters.

When autonomic related operations are performed, the environment is modified in order to achieve specific objectives. However, such operations may lead to potential vulnerable states and increase the exposure to security threats. Indeed, as systems and technologies evolve, new space for vulnerabil- ities comes into scene. Autonomic networks and systems should therefore integrate support mecha- nisms for preventing vulnerabilities. As happens in the real world, autonomic elements coexist within dynamic environments, interacting with others autonomic and non-autonomic elements. If an auto- nomic element is compromised, its functions and abilities become untrustworthy and eventually dis- abled; thus autonomic elements that use services of the former become compromised as well. This inevitably leads to distrust and failure of the autonomic environment. Thus, vulnerability awareness constitutes a fundamental property that must be present in self-governed entities. Autonomic elements unable to support this capability will age with time, becoming more vulnerable, insecure and useless.

Fig. 1.High level architecture [6]

Vulnerability management is a crucial activ- ity for ensuring safe configurations and re- ducing the exposure of such autonomic sys- tems. It consists in checking their configura- tions, identifying the presence of vulnerable states and performing the required maintenance op- erations (typically, modification of configura- tion parameters and/or application of security patches).

Objectives.In order to integrate vulnerabil- ity descriptions in the management plane of au- tonomic networks and systems, we have taken advantage of external knowledge sources such as OVAL repositories enabling the ability of highly increasing vulnerability awareness in such self- governed environments. Cfengine [1], a widely de- ployed configuration and administration system, has been taken as the autonomic part of this ap- proach while the OVAL language is the resource that provides support for vulnerability descrip- tions. We have chosen the IOS platform for Cisco devices as a case study, generating Cfengine policy rules capable of analyzing and detecting vulnera- bilities over such platform, thus increasing vulner- ability awareness in an autonomic manner.

(3)

Ovalyzer.In order to provide a computable infrastructure to the proposed approach we have devel- oped Ovalyzer, an extensible plugin-based OVAL to Cfengine translator. The translator is responsible for the translation of OVAL documents to Cfengine policy rules that represent them. The translator takes as input the content of OVAL documents and produces Cfengine code that is structured as Cfengine policy files that can be later consumed by a Cfengine running instance [6]. Figure 2 describes Ovalyzer main components and the high-level interaction between them.

Fig. 2.Ovalyzer - High level operation [6]

At step 1, an OVAL document is consumed as the input of the translator. An OVAL pre- processor is in charge of parsing the content of the specification, adjusting some configuration as- pects and feeding the OVAL analyzer module at step 2 with a memory representation of the spec- ified input. The OVAL analyzer module is the component that orchestrates the translation flow and provides the required directives for generating Cfengine code at step 3.i. Several calls are made by the OVAL analyzer module to the Cfengine pol- icy writer depending on the content of the OVAL document. The Cfengine policy writer is in charge of generating the main Cfengine policy entries at step 4.1 and delegating at step 4.2, specific platform rules to plugins specifically designed for generating this type of Cfengine code. Plugins will produce the required Cfengine code that will be included at step 5 inside the generated Cfengine policy files. In brief, the translator core is in charge of managing every high-level aspect of the OVAL documents it processes while available plugins provide the required functionality for generating the appropriate Cfengine code. Ovalyzer has been purely written in Java 1.6 [5] over Fedora Core [3]. The data model used by Ovalyzer is automatically generated using the JAXB technology [4]. JAXB provides means not only for modeling XML documents within a Java application data model but also for automatically reading and writing them. Such feature provides to Ovalyzer the ability to evolve with new OVAL versions with almost no developing cost. While declarative extensibil- ity of the translator is achieved by automatic code generation using the JAXB technology, functional extensibility is supported by a plugin-based architecture.

The demo. In this demo we will show how we can increase the vulnerability awareness of self- governed environments, by feeding the autonomic system Cfengine with security advisories taken from OVAL repositories and automatically translated by Ovalyzer. During the presentation, we will first in- troduce the background as well as the key concepts of this work by using a small set of slides. Then we will present an scenario where an emulated Cisco router using Dynamips [2] is controlled by an autonomous Cfengine agent, and how Ovalyzer increases the vulnerability awareness of such agent by translating OVAL vulnerability descriptions into Cfengine policy rules. We will show how the approach is capable of assessing and detecting security threats by considering different vulnerable situations over the IOS platform. Vulnerability management integration into autonomic environments poses hard chal- lenges and supporting vulnerability awareness constitutes the first step towards secure self-managed infrastructures capable of detecting and remediating potential security breaches. As to the requirements for this presentation, there are no special needs, power supply and a projector are sufficient enough.

References

[1] Cfengine. http://www.cfengine.org/. Last visited on February 7, 2012.

[2] Dynamips/Dynagen Cisco Router Emulator. http://www.dynagen.org/. Last visited on February 7, 2012.

[3] Fedora Core. http://fedoraproject.org/. Last visited on February 7, 2012.

[4] Java Architecture for XML Binding. http://java.sun.com/developer/technicalArticles/WebServices/

jaxb/. Last visited on February 7, 2012.

[5] Java technology. http://www.sun.com/java/. Last visited on February 7, 2012.

[6] M. Barrre, R. Badonnel, and O. Festor. Supporting Vulnerability Awareness in Autonomic Networks and Sys- tems with OVAL.Proceeding of the 7th IEEE International Conference on Network and Service Management (CNSM’11), October 2011.

[7] Autonomic Computing. An Architectural Blueprint For Autonomic Computing. IBM White Paper, 2006.

2

Références

Documents relatifs

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

The eect of the interactions within isolated clusters of a few such localized physical states must corre- spond to some computation-universal Few-body Au-

Proposition Une matrice A (resp. un endomorphisme u d’un espace de di- mension finie E) est diagonalisable si et seulement si il existe un poly- nôme annulateur de A (resp.

The phasing of precession and obliquity appears to influence the persistence of interglacial conditions over one or two in- solation peaks: the longest interglacials are

This conjecture, which is similar in spirit to the Hodge conjecture, is one of the central conjectures about algebraic independence and transcendental numbers, and is related to many

ERRATUM ON “ENTROPY-ENERGY INEQUALITIES AND IMPROVED CONVERGENCE RATES FOR NONLINEAR..

The alias modes proposed by Noble et al. Here we only describe how the modes have been interpreted for the purpose of Figure 7. The rep mode denotes a reference belonging to an

The objectives that have been proclaimed many times have never been achieved, the best known being the commitment of states to devote 15 per cent of their national