Airgaps-Schneier
changeset 145 279fa5a06231
equal deleted inserted replaced
144:fdd0c7fa1b65 145:279fa5a06231
       
     1      Air Gaps
       
     2 
       
     3 
       
     4 
       
     5 Since I started working with Snowden's documents, I have been using a 
       
     6 number of tools to try to stay secure from the NSA. The advice I shared 
       
     7 included using Tor, preferring certain cryptography over others, and 
       
     8 using public-domain encryption wherever possible.
       
     9 
       
    10 I also recommended using an air gap, which physically isolates a 
       
    11 computer or local network of computers from the Internet. (The name 
       
    12 comes from the literal gap of air between the computer and the Internet; 
       
    13 the word predates wireless networks.)
       
    14 
       
    15 But this is more complicated than it sounds, and requires explanation.
       
    16 
       
    17 Since we know that computers connected to the Internet are vulnerable to 
       
    18 outside hacking, an air gap should protect against those attacks. There 
       
    19 are a lot of systems that use -- or should use -- air gaps: classified 
       
    20 military networks, nuclear power plant controls, medical equipment, 
       
    21 avionics, and so on.
       
    22 
       
    23 Osama Bin Laden used one. I hope human rights organizations in 
       
    24 repressive countries are doing the same.
       
    25 
       
    26 Air gaps might be conceptually simple, but they're hard to maintain in 
       
    27 practice. The truth is that nobody wants a computer that never receives 
       
    28 files from the Internet and never sends files out into the Internet. 
       
    29 What they want is a computer that's not directly connected to the 
       
    30 Internet, albeit with some secure way of moving files on and off.
       
    31 
       
    32 But every time a file moves back or forth, there's the potential for attack.
       
    33 
       
    34 And air gaps *have* been breached. Stuxnet was a US and Israeli 
       
    35 military-grade piece of malware that attacked the Natanz nuclear plant 
       
    36 in Iran. It successfully jumped the air gap and penetrated the Natanz 
       
    37 network. Another piece of malware named agent.btz, probably Chinese in 
       
    38 origin, successfully jumped the air gap protecting US military networks.
       
    39 
       
    40 These attacks work by exploiting security vulnerabilities in the 
       
    41 removable media used to transfer files on and off the air-gapped computers.
       
    42 
       
    43 Since working with Snowden's NSA files, I have tried to maintain a 
       
    44 single air-gapped computer. It turned out to be harder than I expected, 
       
    45 and I have ten rules for anyone trying to do the same:
       
    46 
       
    47 1. When you set up your computer, connect it to the Internet as little 
       
    48 as possible. It's impossible to completely avoid connecting the computer 
       
    49 to the Internet, but try to configure it all at once and as anonymously 
       
    50 as possible. I purchased my computer off-the-shelf in a big box store, 
       
    51 then went to a friend's network and downloaded everything I needed in a 
       
    52 single session. (The ultra-paranoid way to do this is to buy two 
       
    53 identical computers, configure one using the above method, upload the 
       
    54 results to a cloud-based anti-virus checker, and transfer the results of 
       
    55 *that* to the air gap machine using a one-way process.)
       
    56 
       
    57 2. Install the minimum software set you need to do your job, and disable 
       
    58 all operating system services that you won't need. The less software you 
       
    59 install, the less an attacker has available to exploit. I downloaded and 
       
    60 installed OpenOffice, a PDF reader, a text editor, TrueCrypt, and 
       
    61 BleachBit. That's all. (No, I don't have any inside knowledge about 
       
    62 TrueCrypt, and there's a lot about it that makes me suspicious. But for 
       
    63 Windows full-disk encryption it's that, Microsoft's BitLocker, or 
       
    64 Symantec's PGPDisk -- and I am more worried about large US corporations 
       
    65 being pressured by the NSA than I am about TrueCrypt.)
       
    66 
       
    67 3. Once you have your computer configured, never directly connect it to 
       
    68 the Internet again. Consider physically disabling the wireless 
       
    69 capability, so it doesn't get turned on by accident.
       
    70 
       
    71 4. If you need to install new software, download it anonymously from a 
       
    72 random network, put it on some removable media, and then manually 
       
    73 transfer it to the air-gapped computer. This is by no means perfect, but 
       
    74 it's an attempt to make it harder for the attacker to target your computer.
       
    75 
       
    76 5. Turn off all autorun features. This should be standard practice for 
       
    77 all the computers you own, but it's especially important for an 
       
    78 air-gapped computer. Agent.btz used autorun to infect US military computers.
       
    79 
       
    80 6. Minimize the amount of executable code you move onto the air-gapped 
       
    81 computer. Text files are best. Microsoft Office files and PDFs are more 
       
    82 dangerous, since they might have embedded macros. Turn off all macro 
       
    83 capabilities you can on the air-gapped computer. Don't worry too much 
       
    84 about patching your system; in general, the risk of the executable code 
       
    85 is worse than the risk of not having your patches up to date. You're not 
       
    86 on the Internet, after all.
       
    87 
       
    88 7. Only use trusted media to move files on and off air-gapped computers. 
       
    89 A USB stick you purchase from a store is safer than one given to you by 
       
    90 someone you don't know -- or one you find in a parking lot.
       
    91 
       
    92 8. For file transfer, a writable optical disk (CD or DVD) is safer than 
       
    93 a USB stick. Malware can silently write data to a USB stick, but it 
       
    94 can't spin the CD-R up to 1000 rpm without your noticing. This means 
       
    95 that the malware can only write to the disk when you write to the disk. 
       
    96 You can also verify how much data has been written to the CD by 
       
    97 physically checking the back of it. If you've only written one file, but 
       
    98 it looks like three-quarters of the CD was burned, you have a problem. 
       
    99 Note: the first company to market a USB stick with a light that 
       
   100 indicates a write operation -- not read *or* write; I've got one of 
       
   101 those -- wins a prize.
       
   102 
       
   103 9. When moving files on and off your air-gapped computer, use the 
       
   104 absolute smallest storage device you can. And fill up the entire device 
       
   105 with random files. If an air-gapped computer is compromised, the malware 
       
   106 is going to try to sneak data off it using that media. While malware can 
       
   107 easily hide stolen files from you, it can't break the laws of physics. 
       
   108 So if you use a tiny transfer device, it can only steal a very small 
       
   109 amount of data at a time. If you use a large device, it can take that 
       
   110 much more. Business-card-sized mini-CDs can have capacity as low as 30 
       
   111 MB. I still see 1-GB USB sticks for sale.
       
   112 
       
   113 10. Consider encrypting everything you move on and off the air-gapped 
       
   114 computer. Sometimes you'll be moving public files and it won't matter, 
       
   115 but sometimes you won't be, and it will. And if you're using optical 
       
   116 media, those disks will be impossible to erase. Strong encryption solves 
       
   117 these problems. And don't forget to encrypt the computer as well; 
       
   118 whole-disk encryption is the best.
       
   119 
       
   120 One thing I didn't do, although it's worth considering, is use a 
       
   121 stateless operating system like Tails. You can configure Tails with a 
       
   122 persistent volume to save your data, but no operating system changes are 
       
   123 ever saved. Booting Tails from a read-only DVD -- you can keep your data 
       
   124 on an encrypted USB stick -- is even more secure. Of course, this is not 
       
   125 foolproof, but it greatly reduces the potential avenues for attack.
       
   126 
       
   127 Yes, all this is advice for the paranoid. And it's probably impossible 
       
   128 to enforce for any network more complicated than a single computer with 
       
   129 a single user. But if you're thinking about setting up an air-gapped 
       
   130 computer, you already believe that some very powerful attackers are 
       
   131 after you personally. If you're going to use an air gap, use it properly.
       
   132 
       
   133 Of course you can take things further. I have met people who have 
       
   134 physically removed the camera, microphone, and wireless capability 
       
   135 altogether. But that's too much paranoia for me right now.
       
   136 
       
   137 
       
   138 Yes, I am ignoring TEMPEST attacks.  I am also ignoring black bag 
       
   139 attacks against my home.
       
   140 
       
   141 My previous advice:
       
   142 https://www.schneier.com/essay-450.html
       
   143 
       
   144 Bin Laden had an air gap:
       
   145 https://www.schneier.com/blog/archives/2011/05/bin_laden_maint.html
       
   146 
       
   147 agent.btz:
       
   148 http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html 
       
   149 or http://tinyurl.com/cjqxphd
       
   150 
       
   151 TrueCrypt:
       
   152 http://www.truecrypt.org/
       
   153 
       
   154 BleachBit:
       
   155 http://bleachbit.sourceforge.net/
       
   156 
       
   157 People plugging in found USB drives:
       
   158 https://www.schneier.com/blog/archives/2012/07/dropped_usb_sti.html
       
   159 
       
   160 Tails:
       
   161 https://tails.boum.org/