PCIe Security Webinar_Aug 2020_PDF
PCIe Security Webinar_Aug 2020_PDF
David Harriman
PCI-SIG® Protocol Workgroup (PWG) Chair
Senior Principal Engineer, Intel
2
Disclaimer
3
Outline
4
Key Computational Security Needs
• Protection of key assets
• Consumers: data integrity, confidentiality
• Businesses & suppliers: reputation, revenue-stream, intellectual property, business continuity
• Governments: national security, defense, elections, infrastructure
• Fully secured infrastructure “edge-to-core”
• Must protect against supply chain attacks, physical attacks, persistent attacks, malicious
components, etc
• Must secure entire component lifecycle (manufacturing, installation, initialization, operation,
addition & replacement)
5
PCI-SIG® & DMTF Specifications for Security
Security Protocol and Data Model – SPDM • SPDM defines a “toolkit” for
(DSP0274) authentication, measurement,
Component Measurement and Authentication (CMA) and other security capabilities
IDE key programming protocol • CMA defines how SPDM is
Integrity applied to PCIe devices/systems
SPDM over MCTP Binding and Data
(DSP0275) Encryption • DOE supports Data Object
Secured MCTP Messages over MCTP Binding
(IDE) transport between host CPUs &
(DSP0276) Data Object PCIe components over PCIe
Exchange (DOE)
MCTP over SMBus MCTP over PCIe • Various MCTP bindings support
Binding Binding Data Object transport over
(DSP0237) (DSP0238) different interconnects
• IDE will typically use this toolkit
Legend: DMTF PCISIG
for key exchange, but can use
other mechanisms for keys
6
PCI-SIG® and DMTF Specifications – Status
IDE D-ECN to Base 4.0/5.0 is in Review Zone – Member Review ends 7 Sept 2020
7
Overview: PCIe® Technology Integrity and Data
Encryption (IDE)
• Goals: Provide confidentiality, integrity, and replay
protection for PCIe Transaction Layer Packets (TLPs) Legend:
• Support wide variety of use models Link IDE Stream – Applies to all TLP
• Broad interoperability Root Complex traffic not in a Selective IDE Stream
and does not pass through Switches
• Aligned to industry best practices & extensible Root
Port
Root
Port Selective IDE Stream – Applies to
A C
TLPs selectively and can pass
• Security model - Physical attacks on Links, to read through Switches
confidential data, modify TLP contents, & reorder B
Port Port
D
Port
Port
Switch Endpoint
• purpose-built interposers
Port
• malicious Extension Devices F
8
IDE TLPs
Integrity Protected
Encrypted
Sequence
Number
Local
Prefix(es)
IDE TLP
Prefix
Other End-End
Prefix(es)
Header Data PCRC
ECRC
IDE TLP
MAC
LCRC Single IDE TLP
Sequence Local IDE TLP Other End-End Sequence Local IDE TLP Other End-End IDE TLP
Number Prefix(es) Prefix Prefix(es)
Header Data PCRC
ECRC LCRC
Number Prefix(es) Prefix Prefix(es)
Header Data PCRC
ECRC
MAC
LCRC
9
Streams & Sub-Streams
• Each IDE Stream includes Sub-Streams
distinguished by TLP type and direction No
10
IDE Use Models – Link vs. Selective
• IDE establishes an IDE Stream between two Ports
• Can use Link IDE and/or Selective IDE between two Legend:
directly connected Ports (e.g. A & B, C & D) Link IDE Stream – Applies to all TLP
Root Complex traffic not in a Selective IDE Stream
• Desirable if, e.g., different security policies are Root Root
and does not pass through Switches
Port
Port
Switch Endpoint
between Ports G and H, are secured as they pass
through the Switch F
Port
Port
Port
Switch Endpoint
active/dynamic approaches
Port
F
Legend:
G
Port
PCIe Link
Management Endpoint
IO bus/link
12
System Level Considerations
13
Device’s Responsibilities in Maintaining Security
14
IDE Draft ECN – Few Remaining Opens
15
Conclusions and Call to Action
16
Questions
17
Thank you for attending the PCI-SIG
Q3 2020 Webinar
18