Vikings: World's first libre-friendly data center

Header image
Watch video
Filed on 23 / 01 / 2017
Arquivado...
Atingidos
€ 2.412
Minimum
€ 520.000
ótimo
€ 805.000
39 Apoiadores
Channel
  • Contributing € 12

    Libre VPS 1 GB RAM, 1 núcleos de CPU, 25 GB armazenamento SSD, 1 mês de assinatura

    1 TB de transferência, 100 Mbps de rede de saída, rede de entrada ilimitada.

    > 03 Apoiadores
  • Contributing € 15

    Libre VPS 2 GB RAM, 2 núcleos de CPU, 50 GB armazenamento SSD, 1 mês de assinatura

    2 TB de transferência, 125 Mbps de rede de saída, rede de entrada ilimitada.

    > 05 Apoiadores
  • Contributing € 15

    E-mail seguro Vikings 2 GiB, 1 ano de assinatura

    2 GB de armazenamento para e-mail, 5 aliases personalizados, 75MiB de anexos. Hospedade em software 100% libre e hardware compatível com libre. Dê uma olhada na seção de "Serviços" para mais detalhes.

    > 04 Apoiadores
  • Contributing € 15

    Faça upgrade para 64 GB ECC RAM para o Servidor dedicado Vikings D16 - 1 CPU - 1 mês de assinatura

    Escolha esse upgrade se você deseja aumentar sua RAM. Funciona apenas com a assinatura de 1 mês e o sistema com 1 CPU.

    > 00 Apoiadores
  • Contributing € 17

    Libre VPN, 1 mês de assinatura

    Para mais detalhes, dê uma olhada na seção de "Serviços".

    > 03 Apoiadores
  • Contributing € 20

    Libre VPS 4 GB RAM, 2 núcleos de CPU, 100 GB armazenamento SSD, 1 mês de assinatura

    3 TB de transferência, 250 Mbps de rede de saída, rede de entrada ilimitada.

    > 01 Apoiadores
  • Contributing € 25

    Libre VPS 8 GB RAM, 4 núcleos de CPU, 200 GB armazenamento SSD, 1 mês de assinatura

    4 TB de transferência, 500 Mbps de rede de saída, rede de entrada ilimitada.

    > 03 Apoiadores
  • Contributing € 30

    E-mail seguro Vikings 5 GiB, 1 ano de assinatura

    5 GB de armazenamento para e-mail, 15 aliases personalizados, 75MiB de anexos. Hospedade em software 100% libre e hardware compatível com libre. Dê uma olhada na seção de "Serviços" para mais detalhes.

    > 04 Apoiadores
  • Contributing € 30

    Faça upgrade para 128 GB ECC RAM para o Servidor dedicado Vikings D16 - 2 CPUs, SSD - 1 mês de assinatura

    Escolha esse upgrade se você deseja aumentar sua RAM. Funciona apenas com a assinatura de 1 mês e o sistema com 2 CPU.

    > 00 Apoiadores
  • Contributing € 37

    Libre VPN, 3 meses de assinatura

    12,33 EUR/mês. Para mais detalhes, dê uma olhada na seção de "Serviços".

    > 01 Apoiadores
  • Contributing € 37

    Faça upgrade para 128 GB ECC RAM para o Servidor dedicado Vikings D16 - 1 CPU - 3 meses de assinatura (13.33 EUR/mês)

    Escolha esse upgrade se você deseja aumentar sua RAM. Funciona apenas com a assinatura de 3 mês e o sistema com 1 CPU.

    > 00 Apoiadores
  • Contributing € 40

    Libre VPS 16 GB RAM, 6 núcleos de CPU, 300 GB armazenamento SSD, 1 mês de assinatura

    8 TB de transferência, 1000 Mbps de rede de saída, rede de entrada ilimitada.

    > 01 Apoiadores
  • Contributing € 50

    E-mail seguro Vikings 25 GiB, 1 ano de assinatura

    25 GB de armazenamento para e-mail, 25 aliases personalizados, 75MiB de anexos. Hospedade em software 100% libre e hardware compatível com libre. Dê uma olhada na seção de "Serviços" para mais detalhes.

    > 00 Apoiadores
  • Contributing € 50

    Ajude-nos!

    Obrigado por ajudar a tornar o Vikings realidade! Você será recompensado com bom carma e atualizações regulares para apoiadores. Ajude a aumentar o ecossistema e expandir a liberdade!

    > 03 Apoiadores
  • Contributing € 57

    Libre VPN, 6 meses de assinatura

    9,50 EUR/mês. Para mais detalhes, dê uma olhada na seção de "Serviços".

    > 01 Apoiadores
  • Contributing € 75

    Libre VPS 32 GB RAM, 8 núcleos de CPU, 500 GB armazenamento SSD, 1 mês de assinatura

    10 TB de transferência, 1000 Mbps de rede de saída, rede de entrada ilimitada.

    > 00 Apoiadores
  • Contributing € 75

    Faça upgrade para 128 GB ECC RAM para o Servidor dedicado Vikings D16 - X CPU - 3 meses de assinatura (25 EUR/mês)

    Escolha esse upgrade se você deseja aumentar sua RAM. Funciona apenas com a assinatura de 3 mês e o sistema com 2 CPU.

    > 00 Apoiadores
  • Contributing € 97

    Libre VPN, 12 meses de assinatura

    8,08 EUR/mês. Para mais detalhes, dê uma olhada na seção de "Serviços".

    > 02 Apoiadores
  • Contributing € 135

    Colocação - 1/3 rack de servidor, 11U, 1 mês de assinatura

    Incl. acesso 24/7. Para mais detalhes, dê uma olhada na seção de "Serviços". Preço especial da campanha.

    > 00 Apoiadores
  • Contributing € 180

    Colocação - 1/2 rack de servidor, 23U, 1 mês de assinatura

    Incl. acesso 24/7. Para mais detalhes, dê uma olhada na seção de "Serviços". Preço especial da campanha.

    > 00 Apoiadores
  • Contributing € 295

    Servidor dedicado Vikings D16 - 1 CPU, 1 mês de assinatura

    Firmware Libre boot (por exemplo, Libreboot), CPU 1x AMD Opteron 16 núcleos com pelo menos 2.1GHz, 16 GB DDR3 ECC RAM, 2x 1 TB SATA HDD 7200rpm, software RAID, /64 endereços IPv6. 1 IPv4 address, uplink 1x 1000 Mbps, 15 TiB de transferência de dados inclusos.

    > 00 Apoiadores
  • Contributing € 300

    Colocação - rack completo de servidor, aprox. 45U, 1 mês de assinatura

    Incl. acesso 24/7. Para mais detalhes, dê uma olhada na seção de "Serviços". Preço especial da campanha.

    > 00 Apoiadores
  • Contributing € 375

    Colocação - 1/3 rack de servidor, 11U, 3 meses de assinatura (125 EUR/mês)

    Incl. acesso 24/7. Para mais detalhes, dê uma olhada na seção de "Serviços". Preço especial da campanha.

    > 00 Apoiadores
  • Contributing € 395

    Servidor dedicado Vikings D16 - 2 CPUs, SSD, 1 mês de assinatura

    Firmware Libre boot (por exemplo, Libreboot), CPU 2x AMD Opteron 16 núcleos com pelo menos 2.1GHz, 64 GB DDR3 ECC RAM, 2x240 GB SSD, 2x 1 TB SATA HDD 7200rpm, software RAID, /64 endereços IPv6. 1 IPv4 address, uplink 1x 1000 Mbps, 30 TiB de transferência de dados inclusos.

    > 00 Apoiadores
  • Contributing € 495

    Colocação - 1/2 rack de servidor, 23U, 3 meses de assinatura (165 EUR/mês)

    Incl. acesso 24/7. Para mais detalhes, dê uma olhada na seção de "Serviços". Preço especial da campanha.

    > 00 Apoiadores
  • Contributing € 500

    Ajude-nos!

    Obrigado por ajudar a tornar o Vikings realidade! Você será recompensado com bom carma e atualizações regulares para apoiadores. Ajude a aumentar o ecossistema e expandir a liberdade!

    > 01 Apoiadores
  • Contributing € 825

    Servidor dedicado Vikings D16 - 1 CPU, 3 mês de assinatura (275EUR/mês)

    Firmware Libre boot (por exemplo, Libreboot), CPU 1x AMD Opteron 16 núcleos com pelo menos 2.1GHz, 16 GB DDR3 ECC RAM, 2x 1 TB SATA HDD 7200rpm, software RAID, /64 endereços IPv6. 1 IPv4 address, uplink 1x 1000 Mbps, 15 TiB de transferência de dados inclusos.

    > 00 Apoiadores
  • Contributing € 840

    Colocação - rack completo de servidor, aprox. 45U, 3 meses de assinatura (280 EUR/mês)

    Incl. acesso 24/7. Para mais detalhes, dê uma olhada na seção de "Serviços". Preço especial da campanha.

    > 00 Apoiadores
  • Contributing € 1.125

    Servidor dedicado Vikings D16 - 2 CPUs, SSD, 3 mês de assinatura (375 EUR/mês)

    Firmware Libre boot (por exemplo, Libreboot), CPU 2x AMD Opteron 16 núcleos com pelo menos 2.1GHz, 64 GB DDR3 ECC RAM, 2x240 GB SSD, 2x 1 TB SATA HDD 7200rpm, software RAID, /64 endereços IPv6. 1 IPv4 address, uplink 1x 1000 Mbps, 30 TiB de transferência de dados inclusos.

    > 00 Apoiadores

Securing the Datacenter with FlexVer and Vikings

01 | 01 | 2017

Would you like to protect yourself or your business from espionage, corrupt governments and other malicious third parties? Have you heard of the secret workshops where some three letter agencies demonstrably intercept your hardware shipments and tamper with them, without your knowledge [0]? FlexVer is the answer!

Raptor Engineering

What is FlexVer?

FlexVer is a new, owner-controlled security technology designed to safeguard critical data and applications in the event of software or hardware tampering. FlexVer allows a system to be provisioned in a trusted physical environment, then deployed to an untrustworthy physical location while retaining system integrity. Provided that OS-level attack avenues are properly mitigated, for example through the use of TRESOR and similar technologies, FlexVer allows deployment of provisioned systems without concern of hardware and/or software tampering and subsequent extraction of sensitive material -- a provisioned system can be guaranteed to be answering only to its previously configured owner, not the owner of the physical space in which the system resides. This is a major departure from prevailing security models, which largely assume that either the possibility of physical access by a malicious actor must result in loss of trust of the affected system, or that trust must be delegated to the system vendor in all situations.

 

What systems is FlexVer available for?

FlexVer will be be available for the Vikings D16 (based on the ASUS KGPE-D16) in 2017.
Raptor Engineering hopes to see FlexVer technology integrated into other systems in the future. If you or your company would like to integrate FlexVer into an upcoming product or use FlexVer internally on custom hardware, please contact Raptor Engineering directly;  all interested parties from small organizations to large corporations are welcome.

 

How is FlexVer different than Intel Boot Guard and related technologies?

Unlike existing security technologies, FlexVer does not depend on a fully trustworthy vendor for the root of system trust. Recent events have shown that this trustworthy vendor assumption is not valid, and in fact there is strong pressure on all vendors to compromise their root of trust for financial gain, warrant-related data extraction, industrial espionage, and related purposes. Any given security technology is only as secure as the weakest link in the chain; Boot Guard and related technologies operate by permanently locking the hardware to a vendor-controlled signing key, not only keeping the vendor in complete control of the hardware at all times, but also creating a single point of failure by which millions of systems could potentially be compromised with a single hack or leaked key. Effectively, the vendor and their partners' software, data security processes, and key handlers have become the weakest link in the chain, offering a large attack surface and severely weakening all systems based on this security model.

In contrast, FlexVer abandons this centralised security model, using a distributed, locally- verified model instead. FlexVer becomes the local root of trust for each protected system, removing the possibilty of a single data breach compromising all systems simultaneously and eliminating the capability for a vendor or its affiliates to access protected data on your system. Under the FlexVer security model, each system is provisioned in a secure, trusted physical environment by trusted members of an organization. The FlexVer hardware definition files and resultant bitstream are verified to be trustworthy, and this trusted bitstream is then loaded into the FlexVer hardware. Immediately upon FlexVer startup, a unique internal key is generated to protect the system from any form of tampering; this key allows FlexVer to operate in conjunction with a standard TPM, and to only allow the TPM to unseal if the FlexVer hardware and system firmware have not been modified. Critical data, such as disk or application encryption keys, are then loaded into the TPM, completing the provisioning process. FlexVer continues to guard against any unauthorised modification to hardware, firmware, or software, and will render all data stored withing the TPM permanently inaccessible if the FlexVer hardware is tampered with in any way.

FlexVer

How does FlexVer protect my data against physical attack?

FlexVer introduces a shielded area onto the system board; this shielded area contains the main FlexVer control FPGA, temporary storage (SRAM), and the system's root TPM. This shielded area is highly resistant to physical attack, and any attempt to physically penetrate this area will result in key destruction and immediate loss of the sensitive data stored within Figure 1 : FlexVer Architecture the TPM. Unlike existing solutions, the logic used to implement FlexVer inside the shielded area is completely open; not only can FlexVer be completely audited, but if any flaw is found within the FlexVer system, all affected systems may be reprovisioned using an updated copy of FlexVer.

Placement of the root TPM within the shielded area is vital. A standard TPM is generally secure against offline (cold) attack; if a TPM is powered down and removed from the mainboard extraction of key material is nearly impossible. However, the same TPM is not secure against online (warm) attack; there are multiple attack vectors that rely on hardware access to extract key material, override the TPM, hijack the root of trust, and otherwise compromise the integrity of the secure platform.

Finally, the internal storage is critical to preventing timing attacks on the system firmware. By loading the CRTM from the external firmware storage device prior to cryptographic validation, it is not possible to bypass verification with an authorised copy of the firmware, then substitute an unauthorised version at runtime. All three devices within the shielded area handle highly sensitive data vital to assuring the integrity of the system platform, therefore FlexVer has been designed to "fail safe" and erase its internal key at the first sign of trouble. It is far easier to physically pull, verify, and reprovision a system than it is to clean up after a data breach or rebuild a compromised system!

 

How do I provision FlexVer?

FlexVer is provisioned in several stages to ensure full integrity. Depending on the value of the stored data, steps may be skipped or bypassed based on a given organization or individual's requirements. Provisioning should always start with the machine powered down in a physically trusted environment, and a previously validated FlexVer bitstream, platform firmware image(s), and operating system. The machine should be physically inspected, focusing on the FlexVer shielded area and looking for any signs of damage or tampering. The system CMOS battery should also be checked at this time and replaced if necessary. If physical inspection passes, the FlexVer bitstream should be loaded into the FlexVer control FPGA, and the platform firmware image(s) should be loaded into the appropriate Flash storage device(s). At this point the system can be powered on, and the operating system installed. After installation, the TPM may be provisioned, and sensitive data stored within the TPM via the appropriate standard utilities. Once this process is complete, the system is fully provisioned, and is ready for deployment outside of the physically trusted provisioning environment. This provisioning process may be repeated at any time if desired.

 

What happens if FlexVer detects tampering?

FlexVer immediately deletes its internal key and issues a system reset, rendering all data previously stored within the TPM permanently inaccessible. If a tampering event is detected in error, for instance if the system is unplugged with a discharged CMOS battery, the system may be inspected, reprovisioned, and put back into service. If the FlexVer shielded area was in fact physically tampered with, as evident during visual inspection, that particular system should no longer be used for secure purposes.

 

Where can I find more information on the design of FlexVer?

A whitepaper detailing the security features of Talos™, including FlexVer, is available at https://www.raptorengineering.com/TALOS/security_features.php

 

[0] http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html

Comments

Inicia sesión para dejar un comentario