Category Archives: Security

Beware: Townsend Key Management HSM for SQL Server

Today I received an email “newsletter” from the CEO of Townsend that announced a new product for database encryption:

Today we are excited to announce the availability of our new Alliance Key Manager for SQL Server (AKMSS). AKMSS is a Hardware Security Module (HSM) for encryption key management that protects access your encryption keys.

A quick look at the specifications, however, and an odd gap appeared between the marketing language and the actual product.

First, they seem to have stretched the phrase “Hardware Security Module” (HSM) to mean software running on a standard Linux x86 system. It used to be that an HSM had a specific meaning for cryptography. Wikipedia, a general reference, gives us this:

[HSM] are physical devices that traditionally come in the form of a plug-in card or an external TCP/IP security device that can be attached directly to the server or general purpose computer. […] The tamper evidence, resistance, and response — tamper protection — are the key and major differences HSMs have from usual server computers acting as cryptographic accelerators.

The Townsend product does not appear to meet the basic definition of an HSM.

Second, Townsend themselves say on their product specification page they have achieved validation only to NIST FIPS 140-2 Level 1. So they only use software-based security to protect the keys. FIPS 140-2 Level 1 by definition implies a software-based crypto-module since crypto-hardware certification begins at Level 2. A quick check of the NIST FIPS Validated Modules list page reveals item #1449 has the following text:

When operated with the Red Hat Enterprise Linux 5 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #1320 operating in FIPS mode (approved algorithms retested on listed operating environment)

Townsend’s “HSM” thus derives its FIPS security from an open-source OpenSSL software module, which previously achieved FIPS certification due to open-source community efforts — an OpenSSL crypto-module is their source of FIPS certification. That’s a good start but use of this crypto-module when not in FIPS mode would negate their FIPS-certified security.

Note: search for the string 1320 on the NIST list page will show many companies derive their FIPS certification from OpenSSL, including IBM (see #1433).

Townsend Security makes a good case for the need for an HSM in the market, and that does not yet appear to be what they are offering to sell from their own product specification. It reads like a software-based key-management system, offering OpenSSL for FIPS security, running on a Linux system. That does not rise to the same level of security that even a TPM would provide, let alone a FIPS 140-2 Level 2 or above certified cryptographic hardware security module.

They suggest this product is a solution for compliance, but buyer beware. I find their marketing material to mislead by equating low and high security levels:

Certified Solutions Ensures the Highest Level of Compliance with Regulations

Alliance Key Manager for SQL Server 2008 is certified to the FIPS 140-2 Level 1 specification.

Level 1 is the highest level? Um, no. Level 1 provides the lowest level of compliance with regulations. And they say it ensures…let’s not even go there.

AWS Splits Up Cloud to Achieve Compliance

A recent interview I gave has turned up in a SearchCloudComputing.com column:

…GovCloud is an admission by Amazon that it cannot modify its entire cloud so it will isolate data and applications completely. Instead, it has to carve it up.

History shows us that most breaches come from out of scope, “isolated” systems that are not truly separate. The attackers enter through a back door, a system that’s connected to the backplane for emergency use only but gets them into the rest of the network. Could a contractor who is not a U.S. citizen get in under ITAR? Is Amazon hiring separate administrators to run GovCloud?

AWS itself admitted that the major outage of its Elastic Block Storage service in April happened because it did not have good separation of systems. Has it just created a false sense of separation between the GovCloud secure zone and the rest of AWS? It’s certainly given potential attackers something to look for.

I actually said Amazon chose not to modify its entire cloud. They probably had the option to make AWS secure enough to comply with ITAR but apparently it was not worth the expense, so they chose to reduce exposure to the compliance requirements through segmentation. The first thing that jumped into my mind is whether they will charge a premium to be in GovCloud — charge more money to guarantee that employees are U.S. citizens. Otherwise, who in the U.S. wouldn’t want to move all their workloads into GovCloud?

Meal Worm Tacos

The fresh tacos served by Don Bugito in San Francisco are delicious:

Monica Martinez plans to start an insect food cart in San Francisco through an incubator that helps mainly women and immigrant food entrepreneurs start up businesses. Ms. Martinez wants to feature insect dishes based on Hispanic foods but grown locally, such as a ceviche-like cricket dish and soft tortilla tacos with meal worms and green salsaDon Bugito's Incubator

I am told worms are far more sustainable source of nutrition, with “protein content as much as twice that of beef“; and they are a “centuries-old” traditional meal. Above all that context I was hungry, so I didn’t mind buying them for lunch.

As I munched down my second worm taco on the street a cameraman walked up and said he needed a quote from my mealy mouth for an AP story.

I stared into the camera and said “…much better than meat!”

I wonder if the footage will pop up somewhere.

Later I realized I should have said something more like “feels great to be the early bird” or “I guess now I know what it’s like to have baited breath” or “it doesn’t bug me at all” or “tastes like butter…fly” or “finally, here’s some global worming we can feel good about”.

Anyway, they really are delicious without needing much more thought.

Update: Insect cuisine puts a whole new spin on agricultural risk management.

Farmers on the outskirts of Mexico City were spending large amounts of money on pesticides to kill grasshoppers, Garcia Oviedo said, until they found they could get more money for the edible bugs than for their crops.

“Now, these farmers are planting a cheap kind of corn, just to serve as a trap to catch grasshoppers,” he noted. “They’ve seen that it’s better to have a crop with pests.”

Better to have pests? Now that’s a twist.