RECON SECURITY MECHANISM DEVELOPMENT PROJECT (CONCLUSION OF INITIAL PHASE)
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84-00933R000100170009-6
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
97
Document Creation Date:
December 15, 2016
Document Release Date:
October 14, 2003
Sequence Number:
9
Case Number:
Publication Date:
May 19, 1981
Content Type:
MF
File:
Attachment | Size |
---|---|
![]() | 3.47 MB |
Body:
Approved For Release 20
84-00933R0001 0011'0009-6
19 May 1981
MEMORANDUM FOR: Distribution
STAT FROM:
Information Systems Research Division
Processing and Analysis Technology Group
Office of Research and Development
SUBJECT: RECON Security Mechanism Development Project
(Conclusion of Initial Phase)
1. The initial phase of the RECON/COINS security mechanism
development has resulted in the preparation of two reports.
Security problems involved with connecting the Agency's RECON
system to COINS network were defined, discussed, and examined.
STAT were
tasked to examine the RECON/COINS problem.
is under contract to OS/ISSG while the Anderson Co. is asce by
myself as COTR for this project.
2. The findings of this effort were that while no security
mechanism can be devised for a classified data base/network hook-
up (i.e., RECON/COINS) which completely eliminates the probabil-
ity of spillage or unauthorized data dissemination, the method
STAT proposed by represents a reasonable approach to
reducing this rlsc. THE nature of such risk is defined in the
attached reports. The certification for use of this approach for
RECON/COINS is under review by OS/ISSG.
Attachments:
1. Initial Phase Project Report
STAT 2. Idtd
23 December 1980
3. Frey Technical Memo dtd
27 January 1981
STAT 4. Copy of memo
(Government comments)
STAT 5. 1
Approved For Release 2MP84-00933R000100170009-6
Approved For Release 2009'/?$' . 84-00933R000100170009-6
SUBJECT: RECON Security Mechanism Development Project (Conclusion
of Initial Phase)
Distribution:
1 - Clarus W. Rice, D/OCR
1 - Bruce Johnson, D/ODP
STAT 1 - C/ISSG
1 F ,
- /IHS
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
UNCLASSIFIED
STAT Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Initial Phase Project Report
Approved For Release 2002,/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Project Report
RECON Security Mechanism Development
(Initial Phase)
Objective
The purpose of this report is to summarize the activities of
this initial phase of the RECON/COINS security mechanism develop-
ment effort. These activities included problem definition and
examination of possible solutions to the security aspects of a
proposed RECON/COINS hook-up.
Problem Definition Phase
The primary focus of this effort was problem definition,.
Connection of any classified data base to a network raises
certain security issues. The connection of the Agency's RECON
data base to the COINS network and the proposed implementation of
the RECON data base as the SAFE central index file are examples
of such connections.
During the course of this study, pertinent security issues
were defined and discussed. Several approaches to the solution
of these security problems were examined and compared. Final
reports of thel are attached. A
brief summary of each report is provided in section III of this
report.
Of the approaches considered, the Guard Device concept
offers the greatest flexibility, lowest overall cost, least
system impact, and the most reliable protection from spillage and
unauthorized dissemination.
Although the Guard Device approach offers much and suggests
a wide range of possible application, there exists some limita-
tions to the protection it can provide. These few, but signi-
ficant, limitations are discussed in detail below.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
It is my technical opinion, and study results indicate, that
the RECON system cannot be connected to any network (i.e., COINS)
without some i2robability of spillage or unauthorized dissemination
due to guard malfunction. Additionally, the Guard Device approach
will require some change to RECON data base maintenance and
update procedures. The requirement for an authenticator attached
to each releasable-record will increase the total data base size
by about 5 percent.
Summary
The security methods examined during this effort were compared
on the basis of the requirements for correct operation of the associ-
ated computer systems, the feasibility of implementation, the cost
(dollars, resources required), and the system operation impact. The
guard device concept offers the best solution under these criteria,
and also the highest reliability. It could be implemented with off-
the-shelf components, and the complexity of the device would be mini-
mal. This is significant because an increase in device complexity
is accompanied by increased difficulty in verification of correct
device operation.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
STAT
STAT
STAT I
STAT
STAT
The approach proposed byl has a large
assumption set.- Many elements must wort correctly and be trusted
for this approach to work properly. Thus, I Iwas
requested to document these assumptions. e resu is the
attached "Technical Memorandum" dtd 27 January 1981. The
approach will increase the reliability of the communication
process between the front-end (COMTEN) and RECON host processor
(IBM 370/168). This approach does not address the releasability
problem in the event of RECON system compromise or compromise of
the COMTEN front-end processor. This is a prime constraint.
The approach offers a method for controlling the
synchronization of trusted processes. It does not address the
problem of dissemination control, which is the purpose of this
project.
(Guard Device)
The Guard Device approach offers the most coverage of all
suggested methods. Its assumption set contains only one element
(proper operation of the authenticator subsection of the guard
device). The structure of this subsection is outlined in the
appendix to the attached report. The guard device
approach moves the security problem from the RECON system to the
guard device authenticator subsection. Malfunction or compromise
of this subsection can defeat the security effort (only if
accompanied by a simultaneous failure or compromise of RECON or
the RCC network). The uses the figure of 5/1020 as
the probability of guessing the proper cypher-block-chaining (DES)
key. The vendor supplied MTBF data for components implementing a
guard device would provide a more meaningful measure of the total
system reliability. Generally speaking, MTBF figures are higher
(greater malfunction probability) than the DES compromise figures
of 5/1020.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
I was asked to comment on thel STAT
approach. These comments are found in the first section of the
attached report. Also attached is an additional copy of the
Frey report with my handwritten comments. The findings of this,
the initial phase of the Recon Security Mechanism Development
project, have shown no method can be devised which does not offer
some probability of spillage and/or unauthorized dissemination
due to security mechanism malfunction and/or compromise. Also,
the implementation of any security mechanism must increase data
base size and maintenance requirements.
STAT
Approved For Release 2003/11/06: CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Technical Memorandum
23 December 1980
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Technical Memorandum
AN ALTERNATE APPROACH
TO SOLVING THE
RECON "SECURITY PROBLEM"
23 December 1980
prepared by:
Submitted to:
OS/ISSG
Document No. 2102-1123E-10.
STAT
Approved For Release 2003/1 1/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
This paper addresses the RECON "Security Rrohlemn, as
described in the document "An Approach to Solving the RECON
'Security Problem"' by
dated 1 November, 1980. It is assumed t at the reader is
familiar with the contents of this document, as well as the
overall environment characterizing RECON and COINS.
The purpose-of this paper is two-fold: first, to provide
certain comments concerning the approach proposed in the
paper, and second, to propose a general approach for
the connection of various Customer applications to the COINS
network in a secure manner. This paper does not directly
address, in any manner, various internal security aspects of
RECON which were identified in thel paper.
aAtI;r. Re4ee,-2083/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
STAT
1. The front-end processor approach transfers the
identified risk of processor manipulation and
accidental spillage away from the RECON processor, but
provides the same exposure in the-front-end
processor. While it is expected that the logic
involved in the front-end processor will be
considerably simpler than that in RECON, and therefore
more "trustable", it is contended that the same,
logical risks apply. The possiblity of accidental
spillage-' due to program error or.-hardware malfunction
remains present in the front-end processor, and it
should be noted that most small computers (as would
generally be chosen for the front-end processor)
possess very limited error detection and correction
mechanisms as compared to the processor supporting
RECON.
2. The assignment of an authenticator to a citation is
addressed from the standpoint of new data entry
through specialized input authentication devices, but
does not directly address the assignment of
authenticators to any existing data bases, nor does it
address possible future automatic input of citations
from other computerized systems.
3. It appears that the authenticator approach serves to
directly prevent the release of "special" information,
but does not directly address the possiblity of a user
obtaining control of the RECON system through
exploitation of a program flaw, etc. It is assumed
that if a user could do this, he could not obtain any
information since release of the information would be
denied by the front-end system. However, in this case
compromise could occur if there were any software
routine which assigned authenticators available on the
RECON system, as might be the case if any "conversion"
of existing data bases were attempted.
CO1MENTS ON THE APPROACH
The approach proposed in thel paper suggests use of
a "front-end" processor to determine the releasability of a
RECON citation. It appears that such an approach is feasible,
and would provide a higher degree of security than that
provided by direct connection of COINS to RECON,, and we know of
no technical impediment or limitation to the general approach.
However, an analysis of the proposed approach suggests that
several comments are in order:
Approved For Release _2003/1M6 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
ILLEGIB
Following the logic in (3) above, direct compromise of
the RECON system itself could possibly allow the user
to obtain releasable citations and their corresponding
authenticators, which could be conveyed to the user
through a covert channel (the citation would appear
directly). As the same DES key would apparently be
used for all citations, it appears that cryptographic
analysis could then be used to determine the DES key
in use.
5. A single DES key appears to be postulated, and this
if This aD roach
p
6. Following the general approach of authentication keys,
the s stem support
same key would be used "forever.
provides only a single level of security (releasable
C versus non-releasable) and does not directly address
the periodic changing of the security key. While this
periodic changing of the key is possible through
re-routing all of the citations through the
authentication device, this would imply that the
authentication device was accessible to the RECON
computer, and could therefore possibly be compromised
through a compromise of the RECON computer system.
it would appear desirable to have y
multiple authentication keys, in order to support
additional functions such as multiple security levels
or-the selective release of information to
specifically identified COINS users. However, a
system supporting multiple keys will have to
thbeRECON
probably
concerned with key management,
system itself, which would be subject to direct
compromise under the premises which prevent direct
connection of COINS to RECON.
While the. above comments should not be construed as
indicating that the Anderson approach does not enhance the
security of a COINS-RECON connection, it*suggests that
alternate approaches should be considered in order to attempt
to address the above issues. In particular, the authors feel
that the approach to this problem should address the following
issues:
1. Usability on an in-house basis
2. Multiple-level security support
3. Applicability to other applications than RECON
The remainder of this paper sets forth a general approach to
supporting connection of application systems to COINS which
provide a considerable degree of enhanced security.
Approved For Release 2003/11/0
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
THE "TRUSTED APPLICATION" APPROACH
One of the options set forth in thel paper is
described as "Modify RECON Option," which involves modification
of the RECON application to limit releasability of information
based upon applications program conventions, as' is used in the
SOLIS system. The apparent problems with this'approach is that
the modified application is still subject to potential
manipulation by a COINS user, and that performance in the face
of a_hardware or software error is uncertain.
It is the contention of this paper that modification to
RECON to control releasability of citations is a feasible
solution, provided that special considerations are taken to
ensure that the underlying system cannot be compromised by the
COINS user, and that error conditions will not result in
leakage of information. A potential method of obtaining these
results is the use of a "trusted applications communications
'protocol" as described herein.
For purposes of this discussion, it is assumed that
execution of the RECON application consists of a "session,"
with the RECON software "interacting" with the user to solicit
his request and provide the desired output;. Such a session
concept is valid even for batch applications, where the user
supplies a "card deck" and the system supplies a printed
listing. It is further assumed that applications modifications
to RECON can support an adequate security system, provided that
the applications execute without error, and that the underlying
computer system is not manipulable by the COINS user.
The problems associated with the use of a modified RECON
therefore seem to be reduced to:
1. Preventing the COINS user from obtaining control of the
underlying system.
2. Protecting RECON in the face of hardware and software
errors.
In order to meet these goals, we propose the use of a
front-end processor, connected in a manner similar to the
connection proposed in the aper. However, the
functions of this processor is not to perform a security
release function, but is rather to manage applications sessions
Approved For Release 2003111/i
STAT
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
with a trusted applications program. It is assumed that a
modified.RECON application is prepared according to the
architecture proposed herein, and that the application, as
modified, can be trusted.
In this proposal, reference is made to encrypted
transmissions between the front-end processor and the RECON
processor. It has been assumed that DES will be used as the
encryption method, although this is not significant.
Encryption need not be provided by a hardware device; software
encryption is sufficient.
A COINS to RECON session would begin with a session
initiation request sent from the front-end processor to the
RECON applications software. This would be done by an
initiation message, containing a predefined password. This
message would be encrypted by a standard key known as the RECON
session master key (RSM) so that the authenticity of the
session initiation request can be verified-(the RSM key is
"secret" to the COINS world). In addition to the password-
supplied as part of this message, the front-end processor will
supply an initial session key (ISK), which is derived through a
random process, as well as an initial sequence verification
number (ISV), also derived at random.
During the session initiation,. the RECON application can
accept or reject the connection, based upon the identity of the
user requesting the session. This serves as an additional
access check beyond those checks provided automatically by
COINS.
The RECON application responds with an accept/reject
message, which is encrypted by the ISK, in order to allow the
front-end processor to know that it is talking to trusted
software, and not an imposter routine. This message also
establishes the initial transmission direction for use with the
session protocol described below. Initial transmission
direction can be either COINS to RECON or RECON to COINS, at
the selection of the RECON applications software. Note that
all keys described herein are used only between the front--end
and RECON, and the COINS user does not deal directly with the
At this point, all remaining communication is assumed to be
half-duplex, demand-response communication in which messages
are interchanged between the two computers on a one-for-one
basis. This interchange will utilize the special conventions
described below.
STAT
Approved For Release 2003/1 1/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Prior to each message transmission, there will exist both a
current session key (SK) and sequence verifier (SV). Prior to
the first message transmission, the ISK is the SK, and the ISV
is the SV. Each of these numbers is used to ensure that all
communication takes place with the trusted RECON application,
and that intervening hardware or software errors do not allow
security breaches.
Each message transmitted (in both directions) contains a
sequence verification number, SV. The proper value of an SV is
derived from its previous value through a mathematical
transformation known to both processors. Prior to sending a
message, each processor will append its calculated "next" SV to
the message, with a similar calculation being used by the other
processor to check for the proper value. An improper SV in any
message will immediately terminate the RECON session, and will
be recorded in an audit trail for later analysis.
The purpose of the SV is to provide one level of check that
the COINS user and the applications program (RECON) are
synchronized with'one another. If a hardware or software
failure occurs in the RECON processor which requires a restart
of the system, no further communication can take place using
the same session identifier, as the SV information will be lost
and all messages will be rejected.
Each message, which contains both message text and the SV,
is encrypted prior to transmission using the current SK. As a
result, the message can only be processed by an authorized
receiver in posession of the current SK.
In order to guard further against errors resulting in the
inadvertent spillage of data, the SK is changed for each
message transmission, by defining a new SK which is calculated
by applying a block-type cypher (as described in thel STAT
paper) to the preceeding message. This new SK would then be
used for the subsequent transmission.
Because both the SV and the SK change (in a pseudo-random
fashion due to the nature of DES) with each message, in an
independent fashion, there is no way for either processor to
"predict" subsequent keys. As a result, complete secure
message synchronization can be maintained between the front-end
processor and the trusted application (RECON). At any point at
which a hardware or software error disrupts this process,'
synchronization will be lost and no further communication will
be possible.
STAT
Approved For Release 200/r 1/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The security afforded by this approach depends upon the
fact that the front-end processor will only be able to
communicate with a trusted application in the host processor,
as all communications from the front-end processor will be
encrypted. If through some error the front-end processor were
to be communicating directly with the host operating system, no
meaningful communication could occur, as all the host operating
system would see was a meaningless encrypted message.
In this manner, it is possible to ensure that the front-end
processor can communicate only with trusted applications
programs which are prepared to accomodate the special session
protocol defined herein. Communications with non-trusted
applications is impossible due to the encryption which is
performed. Security of the overall approach is maintained by
keeping all key management functions transparent to the COINS
user, so that-there is no way that a user could "spoof" the
system.
The use of varying keys and SV numbers is to guard against
interruption of one session with a resulting--inadvertent
"connection" of the COINS user to other software (or other
sessions). Any such error will be detected by invalid SVs or
inability to communicate due to a missing or invalid SK.
Of course, the RECON application must still be trusted to
enforce its appropriate security policy, and significant errors
in the RECON application could result in compromise of
information. However, since the RECON application would be
responsible for verification of all communication, it would
appear to be reasonable to trust its security mechanisms if
other "attacks" on the system were closed. This proposed
mechanism provides a method of closing all other attack routes
through COINS, although other attack routes through RCC would
not be closed by this approach.
It should be noted that any errors which occur in the RECON
application will not be transmitted to the COINS user, since it
is assumed that any error messages (i.e. messages generated by
the host operating system) could not be transmitted to COINS,
as they would not be properly encrypted for transmission to the
front-end. As a result, if any such error occurred, the
front-end would receive an apparently meaningless transmission,
and would withhold this message from COINS, automatically
terminating the session. This check eliminates a considerable
number of-programming error conditions from the list of
possible compromises.
STAT
Approved For Release 2003/11V06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
In this discussion, it has been assumed that the software
in the front-end processor can be "secure," along the lines set
STAT forth in thel paper. This application may be a target
use of systems such as KSOS or SCOI1P. While we have not
performed a security analysis of the effects of. penetrating the
front-end processor, this is not felt to be a significant risk,
since encrypted communications would still be required to talk
to RECON. The only potential compromise appears to be limited
to the case where the front-end processor is compromised and
the RECON system is simultaneously compromised, a probably
unlikely event.
Approved For Release 2003/11
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The method proposed above allows the development of a COINS
to RECON connection which provides a significant level of
security. The front-end computer will only be able to "talk"
to the trusted RECON application, as any other program on the
host computer will see a meaningless stream of encyphered
information. The key change and sequence verification
architecture insures that all accepted communications are part
of a single session, and that "restarts" or "error recoveries"
cannot participate in the session due to a lack of sequence or
key information. All encryption and-key management is
transparent to COINS, and is never a part of the COINS network,
but is confined to the host computer and the local front-encl.
Direct communications between the COINS user and the host
operating system is prevented due to the encrypted nature of
all transmissions.
While this overall architecture has been proposed to solve
the COINS to RECON connection problem, it should be noted that
it is equally applicable to communications with any other
"trusted applications" which have been coded to obey this
proposed session protocol. Individual applications .would have
unique session master keys (RSM equivalents), and the'
specification of these keys would control the subsequent SV
generation procedure, in order to guard against "crossed wires"
in a multi-application environment. In this manner, it would
be possible to make other RCC applications available to COINS,
as desired, without causing increased security risks.
STAT
Approved For Release 2003/11/6 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
27 January 1981
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
STAT Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
INTRODUCTION
On 23 December 1980,
submitted a document entitled, "An Alternate Approach to Solving
the RECON 'Security Problem,'" (Document No. 2102-1123B-1.0)
which proposed use of a "trusted applications" communications
protocol as a possible method of allowing direct connection of
the RECON system to the COINS network. This document made a
number of assumptions concerning both RECON and COINS which were
critical to the viability of the suggested approach. These
assumptions were not documented, and the purpose of this paper
is to document these assumptions, as well as to provide certain
observations about the implications of these assumptions.
Approved For Release 200~/11~
STAT
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
ASSUMPTIONS CONCERNING COINS AND RECON
The success of the "trusted applications" approach assumes
that all of the following assumptions are reasonable:
1. A releasability indicator can be assigned to each
RECON citation.
This assumption merely states that there
is some reliable method of assigning a
releasability indicator to all citations
contained in the RECON/COINS data base.
If human judgment is involved in this
operation, it is subject to both risks
and errors. If, alternatively,
RECON/COINS users may see the collateral
files but not the codeword files,
then this assumption may be valid.
As the conditions specifying the
releasability of RECON citations are
unknown to the authors, we merely
present this assumption and cannot
comment-on any risk involved.
2. It is possible to "dedicate" communications lines
between the proposed RECON front-end processor and the
RECON applications system.
The proposed approach assumed that
there was a dedicated set of
communications channels between the
front-end processor-and the processor
supporting RECON. While this approach
was not mandatory, as we saw it, from a
security standpoint, it vastly
simplified some of the security issues.
If, in fact, communications would
be over secured facilities,.such as the
existing COMTENS;- then it would appear
to be necessary to have the front-end
processor enter the existing characters
("REC") required to establish a
communication to RECON. As this would
be done in plain-text, a compromise of
the front-end processor could possibly
allow connection to systems other than
RECON, thereby presenting a significant
potential security risk.
ILLEGIB,
STAT
Approved For Release 2903/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
3. The modified RECON applications system can be
"trusted" as regards security.
Implicit in the trusted application
approach is the assumption that
an applications system can be
approved from a security standpoint.
Obviously, given the state of the art
as it sits today, such an approval
,_cannot be placed on a formal
methodology, absent the use of some
properly-secured technology.
4. The COINS system can be "trusted" to only allow
connection of an appropriately cleared COINS user.
A further implicit assumption of the
trusted applications approach was that
the security features of COINS could be
trusted to allow only properly-
authorized users to obtain access to
the RECON front-end processor. "COINS
contains logic structures designed to
limit access to properly-authorized
individuals. As it is not sufficient,
to rely upon the security features `.?
supplied by COINS, then it would appear
necessary to have the front-end processor
explicitly validate the access rights of
each COINS user. Such a requirement
would introduce a potential exposure
through compliance of the front-end
processor.
STAT
Approved For Release 200/11106 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The trusted applicaL?ions approach implicitly requires each
of the assumptions set north above, or modifications to counter
exposures introduced if the above assumptions are invalid.
It must be noted that if either assumption 2 or assumption
4 is incorrect, a significant security compromise could occur
in the event.-that a COINS user were able to compromise the
front-end processor. As a result, it would be necessary to
"certify" such software system. Given the current state of
technology in both trusted computer systems and their formal
proof, it would appear to be rather difficult to perform such
certification on a formal basis.
STAT
Approved For Release 200I1106 : CIA-RDP84-00933R000100170009-6
STAT Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
S~I4T
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
COMMENTS ON THE APPROACH
The approach proposed in the Anderson paper suggests use of
a "front-end" processor to determine the releasability of a
RECON citation. It appears that such an approach is feasible,
and would provide a higher degree of security than that
provided by direct connection of COINS to RECON, and we know of
no technical impediment or limitation to the general approach.
However, an analysis of the proposed approach suggests that
several comments are in order:
1. The front-end processor approach transfers the
identified risk of processor manipulation and
accidental spillage away from the RECON processor, but
provides the same exposure- in t-he front--end
processor. While it is expected that the logic
inve`d-in the front-end processor will be
consiCerably simpler than that in RECON, and therefore
more "trustable", it is contended that the same
logical risks apply. The possiblity of-accidental
spillage due-to program error or hardware malfunction
remains present in the front-end processor, and it
should be noted that most small computers (as would 9eoc
generally be chosen for the front-end processor) P cLv%
possess very limited error detection and correction
mechanisms as compared to the processor supporting
RECON.
2. The assignment of an authenticator to a citation is
addressed from the standpoint of new data entry
through specialized input authentication devices, but
d oes not di reEt T addr_ess. -the a-ssIgnment of
authent, Qa rS to . Yr__e_ _i-stin a_ta__baS__Qs, nor does it
address possible future atztomaic input of citations
from other computers d systems.
---------------
3. It appears that the authenticator approach serves to
directly prevent the release of "special" information,
but does not directlyaddress the possth1Lt-y-o-f- ---u-sser
ob inning conkx_o f the RECON system through
exploitation of a program flaw, etc. It is'assumed
that if a user could-71n t is he could not obtain any
information since release of the information would be 1
denied by the front-end system. However, in this case.
camprom se cowl d occ.u.r i. there. ere any sof twaze
routine which assigned authenticators available on the
RECONTsystem^, as might be the case if aT- ny-"conversion" /11-1r,
of exing data bases were attempted.
Approved For Release 2003
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
5. A single_ES ke appears to be postulated, and this
~yvo; same key would e "forever. This approach
provides only a si gle leve o security (releasable
- ,?'O`1 versus non-releasable) and doesroot directly address
,-L- the periodic changing of the security key. While this
X!e
,v periodic changing of the key is possible through
'~ / re-routing all..of the citations-through the
authentication device, this would imply that the
authentication device was accessible to the RECON
computer, and could therefore Possibly be c?mpromised
through a compromise of~ie RECON computer "ystem.
6. Following .the general approach of authentication keys,
it would appear desirable to have the system support
multiple authentication keys, in order to support
additional functions such as multiple security levels
or the selective release of information to
specifically identified COINS users. However, a
system supporting multiple keys will have to be
concerned with key management, probably on he RECON
system itself, which would be subject to direct
compromise under the premises which prevent direct
connection of COINS to RECON.
While the above comments should not be construed as
indicating that the Anderson approach does not enhance the
security of a COINS-RECON connection, it suggests that _
alternate approaches should be considered in order to attempt
to address the above issues. In particular, the authors feel
that the approach to this problem should address the following
issues:
1. Usability on an in-house basis
2. Multiple-level security support
3. Applicability to other applications than fFCON
The remainder of this paper sets forth a general approach to
supporting connection of application systems to COINS which
provide a considerable degree of enhanced security.
4. Following the logic in (3) above, direct compromise of
the RECON system itself could possibly allow the user
to obtain releasable citations and their corresponding
authenticators, which could be conveyed to the user
through a covert channel (the citation would appear
directly). As the same DES key would apparently be
used for all citations, it appears that cryptographic
analysis could then be used to determine the DES key
in use.
Approved For Release 2003/
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
THE "TRUSTED APPLICATION" APPROACH
One of the options set forth in thel paper is
described as "Modify RECON Option," which involves modification
of the RECON application to limit releasability of information
based upon applications program conventions, as is used in the
SOLIS system. The apparent problems with this approach is that
the modified application is still subject to potential
manipulation by a COINS user, and that performance in the face
of a hardware or software error is uncertain.
It is the contention of this paper--hat modification to
RECON to control releasability_ o -Ea t i on is-a----feasible
s" ution, prove e that special considerations are taken to
en-s-are` that the underlying system cannot be compromised by the
COINS user, and that error conditions will not result in
leakage of information. A potential method of obtaining these
Y-esults is the use of a "trusted applications communications
ntotocol" as described herein.
For purposes of this discussion, it is assumed that
execution of the RECON application consists of a "session,"
with the RECON software "interacting" with the user to solicit
his reques,. ate' nT-prc>de~Fiedesired output. Such a session
concept is valiTeven for batch applications, where the user
supplies a "card deck" and the system supplies a printed
listing. It is further assumed that applications modifications
t6-RECON can support an adequate security system, provided that
the applications execute without error, and that the underlying
c^mputer system is not manipulable by the COINS user.
The problems associated with the use of a modified RECON
therefore seem to be reduced to:
1. Preventing the COINS user from obtaining control of the
underlying system.
2. Protecting RECON in the face of hardware and software
errors.
In order to meet these goals, w, e propose the use of
front-end ~rocessor, connected in a manner s milar_ to the
connection proposed in the Andersotap-aper. However, tthe
functions of this processor is not to erform security
~clease function, but is rather to manage applications sessions
Approved For Release 2003/
STAT
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
with a trusted applications r am. It is assumed that a
architecture proposed herein, and tFiat the application, as
o ?ied ,CON application is prepared according to the
modified, can be trusted.
In this proposal, reference is made to encrypted
transmissions between the front-end processor and the RECON
processor. It has been assumed that DES will be used as the
encryption method, although this is not significant.
Encryption need not be provided by a hardware device; softward
encryption is sufficient.
A COINS to RECON session would begin with a session
initiation request sent from the front-end processor to the
RECON applications software. This would be done by an
initiation message, containing a predefined password. This
ILLEGIB
message would be encrypted by a standard key known as the RECON
session master key (RS-M) so that the authenticity of the
session initiation request can be verified (the RSM key is,
"secret" to the COINS world). In addition to the password
supplied as part of this message, the front-end processor will
supply an initial session key (ISK), which is derived through a
random process, as well as an initial sequence verification
number (ISV), also derived at random.
During the session initiation, the RECON application can
accept or reject the connection, based upon the identity:,,of._the
user requesting the session. This serves as an additional
access check beyond those checks provided automatically by
COINS..
establishes the initial transmission direction for use with the
session protocol described below. Initial transmission
direction can be either COINS to RECON or RECON to COINS, at
the selection of the RECON applications software. Note that
software, and not an imposter routine. This message also
front-end processor to know that it is talking to trusted
The RECON application responds with an accept/reject ILLEGIB
message, which is encrypted by the ISK, in order to allow the
basis. This interchange will utilize the special conventions
described below.
all keys described herein are used only between the front-end
and RECON, and the COINS user does not deal directly with the
keys.
At this point, all remaining communication is assumed to be
half-duplex, demand-response communication in which messages
are interchanged between the two computers on a one-for-one
Approved For Release 200~/J
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Prior to each message transmission, there will exist both a
current session key (SK) and sequence verifier (SV). Prior to'
the first message transmission, the ISK is the SK, and the ISV
is the SV. Each of these numbers is used to ensure that all
communication takes place with the trusted RECON application,
and that intervening hardware or software errors do not allow
security breaches.
Each messag transmitted in both directions) contains a
e
sequence veri iaation number The proper value of an SV is
derive rom i s Previous value through a mathematical
transformation known to both processors. Prior to sending a
message, each processor will append its calculated "next" SV to
the message, with a similar calculation being used by the other
processor-to check for the proper value. An im ro er SV in iv
message will immediately--termii-ate the RECON session, and will--
be recorded in an audit trail for later analysis.
The purpose of the SV is to provide one level of check that
the COINS user and the aQolications pros ram__('..ECON~ are
nchronize_a__wzth one`anot.lie-r:--- If a hardware-or software
faECire occurs in the RECON processor which requires a restart:
of the system, no further communication can take place using
the same session identifier, as the SV information will be lost
and all mess ag_es_will.--be rejected.
aar,h mas se, which contains both message text and the..SV,
is encrypted prior to transmission using the current SK. As a
resultt,the message can only be processed by an authorized
receiver in posession of the current SK.
In order to guard further against errors resulting in the
inadvertent spillage of data, the SK is changed for each
-messae transmi_9,-i_an, by defining a -new SK which is ca culated
by applying a block-type cypher (as described in the Anderson
paper) to the preceeding message. This new SK would then be
used for the subsequent transmission.
Because both the SV and the SR change (in a pseudo-random
fashion due to the nature of DES) with each message, in an
independent fashion, there is no way for either processor to
_'pre !c-t-"s-ubs-equent-_keys. As a result, complete secure
message synchronization can be-nrarntain ed-between-the-"-f-ront-end
processor and the trusted application (RECON). At any point at
which a hardware or software error disrupts this process,
synchronization will be lost and no further communication will
be possible.
Approved For Release 2003/11
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
in the front-end processor can be "secure," along'the lines set \
S.11 T forth in thel paper. This application may be a target
use of systems such as KSOS or SCOMP. While we have not
performed a security analysis of the effects of penetrating the
front-end processor, this is not felt to be a significant risk,
since encrypted communications would still be required to talk
to RECON. The only potential compromise appears to be limited
to the case where the front-end processor is compromised and
the RECON system is simultaneously compromised, a probably
unlikely event.
STAT
Approved For Release 200,
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
SUMMARY
The method proposed above allows the development of a COINS
to RECON connection which provides a significant level of
security. The front-end computer will only be able to "talk"
to the trusted RECON application, as an other program on-the
host computer ..w ill s~e_a-meanin9les~-stream o_f ennhered
information. The key change and sequence verification
architecture insures that all accepted communications are part
of a single session, and that "restarts" or "error recoveries"
cannot participate in the session due to a lack of sequence or
key information. All encryption and key management is
transparent to COINS,.and is never a part of the COINS network,
but is confined to the host computer and the local front-end.
Direct communications between the COINS user and the host
operating system is prevented due to the encrypted nature of
all transmissions.
While this overall architecture has been proposed to solve
the COINS to RECON connection problem, it should be noted that
it is equally applicable to communications with any other
"trusted applications" which have been coded to obey this
proposed session protocol. Individual applications would have
unique session master keys (RSM equivalents), and the
specification of these keys would control the subsequent SV
generation procedure, in order to guard against "crossed .wires"
in a multi-application environment. In this manner, it would
be possible to make other RCC applications available to COINS,
as desired, without causing increased security risks.
STAT
Approved For Release 2001/11
STAT Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Next 1 Page(s) In Document Exempt
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
TABLE OF CONTENTS
1. INTRODUCTION .............................................. 1
2. THE RECON SYSTEM ........................................... 2
3. THE RECON SECURITY PROBLEM ................................ 4
3.1 The RECON Security Environment 4
3.2 Operative Aspects of the Security Problem ................. 5
4. COINS 7
5. SUMMARY OF PREVIOUSLY CONSIDERED
APPROACHES TO THE PROBLEM ...........i .:.................... 10
5.1 Separate Systems .......................................... 10
5.2 Multi-Level Secure Operating Systems ...................... 10
5.3 Filters ................................................... 11
6. AUTHENTICATED RELEASABILITY ............................... 12
6.1 Technical Approach ........................................ 12
6.2 Concept of Operation ...................................... 12
6.3 Properties of the Cryptographic Checksum .................. 13
6.4 Security Properties of the Approach ....................... 17
6.5 Security-Derived Modifications to RECON .................. 19
6.5.1 The Need for Batch Access for External Network Users ...... 20
6.5.2 Implementing "Batch RECON" ................................ 21.
6.5.3 Whole RECON Records .................................. ... 22
6.5.4 Implementing Filters in RECON ............................. 23
6.5.5 Bandwidth of Covert Signaling Using Error Messages ........ 23
6.6 Extensions of the Authenticated Releasability Concept 25
6.6.1 Summary of Key Notions ..................................... 25
6.6.2 Handling Multiple Protected Categories ..................... 25
7. OPERATIONAL IMPACT ......................................... 35
7.1 RECON Operations ....................................:....,. 35
7.2 Increased Data Storage ..................................... 38
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Page
Appendix A - COINS Security Summary ............,. ............ ........,.. A-1
Appendix B - Adding Filters to RECON ................................. B-1
Appendix C - GUARD Implementation Example C-1
Appendix D - Application of GUARD to SAFE ........................... D-1
Appendix E - Comparison of Alternatives to Solving
RECON Security Problem ................................. E-1
Illustrations
Figure 1
- COINS II Ring Architecture Concept: ....................
8
Figure 2
- Technical Approach to RECON Security Problem ............
14
Figure 3
- Block Chaining ..........................................
16
Figure 4
- Symbolic Representative of Basic Capability
26
Figure 5
- Two or More (Disjoint) Categories .......................
28
Figure 6
- Consolidated GUARD Functions ............................
30
Figure 7
Controlling Access to Two or More Groups ................
31
Figure 8
- Controlling Hierarchical Dissemina?4?.on ..................
33
Figure 9
- Configuration of GUARD and Checksum Generators ..........
36
Figure 10
- On-Line GUARD Detail .............. L.....................
C-2
Figure 11
- Update GUARD Detail ......................................
C-3
Figure 12
- GUARD Handling Multiple Dissemination Categories ........
C-5
Figure 13
- SAFE (GUARD) ICC Configuration ..........................
D-2
Figure 14
- SAFE (GUARD) WBC Configuration ...J ......................
D-3
Approved For Release 200P/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The idea of using a cryptographic checksum to authenticate
a decision regarding releasability was originally conceived by
Lt. Col. Roger R. Schell, USAF, in connection with another application.
STAT
Lt. Col. Schell was consulted on the conceptual development of the approach.
ORD/ISRD, to the implementation
method of permitting data records to "belong" to two or more use groups
and in providing the functional hardware design examples in the appendices
is cheerfully acknowledged.
The contribution of Mr.
Approved For Release 2003/11/06 :.CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
1. INTRODUCTION
.This report describes the results of a feasibility study of
an approach to solving the security problems associated with attaching the
RECON bibliographic system to an external network. The problems were sur-
faced in considering the attachment of RECON to the COINS network in order
to extend the services of RECON to the Intelligence Community as a whole.
While the study has concentrated on the technical aspects of the problem,
it has addressed some of the procedural aspects as well.
In the balance of this report, we will briefly review the RECON
application, identify the security problem, discuss the COINS network,
review other approaches considered, and then describe the recommended
approach.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 CIA-RDP84-00933R000100170009-6
STAT
STAT
2. THE RECON SYSTEM
RECON is an on-line interactive bibliographic reference system
maintained and operated by the sponsor at his headquarters. Its host
computer is a 370/168 system which is one element of the
Center complex. (RCC). The RECON data base is a subject file index of
intelligence reports from all over the Community. The data base contains
citations for both raw and finished intelligence reports including collateral
and SCI.
The RECON system is complemented by an in-house Automated Document
Storage and Retrieval System, ADSTAR, which stores source documents in
digitized form on microfilm. RECON currently serves approximately 130
terminals in the sponsor's organization through two COMTEN front-ends.
The data base contains two kinds of records: collateral and SCI.
A RECON user may specify which file(s) he wishes to search (collateral, SCI,
or All (meaning both)).
The RECON user interacts with the application through 20 commands,
one of which is an implied SEARCH. The RECON implied SEARCH command produces
a set of records that meet the search criteria. The result sets are asso-
ciated with a user's work space and can be combined or limited in various
ways after a search has taken place. It is possible to combine the results
in two or more sets through logical operations (e.g., one can create a set
then logically combin3 the
sets 1 AND 2 instead of having to specify that intention in the initial
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
RECON has the ability to manipulate sets to create combined sets
which may then be edited to print records or any selected fields of a RECON
record.
The RECON application is interactive, although an overnight batch
and a canned query capability exists.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
3. THE RECON SECURITY PROBLEM
3.1 The RECON Security Environment
In the RECON files, there are broadly speaking two kinds of
titles, those,.-Which can be widely distributed and those whose distribution
is restricted because they are compartmented, proprietary, or originator-
controlled.
The type of distribution accorded to the "restricted" group is
complex because of a desire to avoid the absurdities that can arise from
an originator being denied access to a title that he created and contributed
to the system under an originator-controlled label because the system applies
a rule preventing distribution of originator-controlled titles. Thus, the
problem cannot be solved merely by denying all external access to the
restricted group of titles.
Presently in RECON, access is controlled to:
a. The RECON application (via logon-id and password).
b. The collateral or codeword (sub)files (via authority
presumably contained in the user's identification
record).
c. Modify ani/or update commands (via authority contained
in a separate SECURITY data set).
No other access control is provided.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
3.2 Operative Aspects of the Security Problem
Due to limited resources, the sponsor makes no attempt to
validate manufacturer-supplied changes to the operating systems (MVS, VM,
JES3) or vendor-supplied software packages. As a consequence, it must be
prudently assumed that trapdoors exist in some or much of the sponsor"s
software or operating systems. The degree of threat this poses is a function
of how much trust one has in the user population and the accessibility of
the systems.
The sponsor has what appears to be unlimited trust in its own
personnel due in part to the high standards established for clearance and
a program for updating personnel investigations at nominal five-year intervals.
In connection with making RECON available to Community personnel,
the sponsor correctly asserts that not all Community organizations apply the
same clearance standards for access to SCI. In particular, the Military
Departments apply substantially different investigative standards for
clearances and SCI access. The Military Departments do not require
an extended background investigation of its personnel for Top Secret
clearance, and they do not use polygraph examination to verify background
and investigative information about an individual.
Because of this, the sponsor asserts that the reliability of that
segment of the Community is unknown and that the sponsor cannot fu.L-Eill its
obligations to protect highly classified and sensitive information 13y giving
unrestricted access to one of its systems to Community personnel.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
With regard to the accessibility issue, it is obvious that putting
RECON on a Community network increases its accessibility. What is less
obvious is that RECON is on an internal network of substantial dimensions.
If RECON is compromised to permit manipulation of the system upon which it
resides, the compromise could be used to compromise the entire sponsor's
internal network.
Thus, the sponsor's concerns are twofold. First, if RECON becomes
accessible to user population of essentially unknown reliability, it could
be_potentially subject to external penetration by activating a trapdoor in
the RECON application, or the underlying operating system that could be used
to recover information, manipulate information, or deny service to RECON or
otr.er parts of the sponsor's internal network. Second, there is a corre-
sponding concern that hardware or software failure in the sponsor's internal
network would increase the risk of accidental exposure of sensitive informa-
tion-due to spillage on the external network.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
4. COINS
The COINS network has the structure show; in Figure 1. The packet
switched nodes are ARPANET IMPS, interconnected by full period link-encrypted
channels of the Tetrahedron communications network.' At the next level,
a series of interface processors is found that interfaces terminal users,
server-hosts, and other networks to COINS. The interface processors, known
collectively as CAS's (for COINS Access Systems), are PDP-11's running UNIX
and special network software. All CAS's have network protocol software
(currently NCP), software to perform logging of CAS activity for network
management purposes, and access-control software. -
Depending on the principal function of the CAS (terminal/user
support, server-host interface, network interface), function-specific software
is also found. In the case of Host Access Systems (HAS), the HAS's host
interface is further specialized to interface to the specific hardware of
the server-host. (It will emulate the environment expected by the server-host
(e.g., a channel of a specific transfer rate, etc., and the minimal protocols
needed to coordinate transfer of information betty=.en systems.)
COINS users interface to COINS from terminals, either through
a user's local host or through a Terminal Access System (TAS). COINS users
have a restricted functionality both with respect to the data bases they query
and with respect to the TAS's and hosts through which they access the network.
With respect to the data bases, COINS users cannot do more than request data.
A COINS-based analyst can frame queries either in the native language of the
query system or, if he or she accesses COINS through a TAS, the queries will
be able to be stated in a network virtual query language known as ADAPT.
The ADAPT query is translated into the native language of the target system
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
COINS II
LEGEND:
CC COMMUNICATIONS
CENTER
IMP INTERFACE MESSAGE
PROCESSOR
RING ARCHITECTURE CONCEPT
USER RING
";AS TERMINAL ACCESS SYSTEM
HAS HOST ACCESS SYSTEM
IIAS NETWORK ACCESS SYSTEM
V. COINS PMO ZONE OF CONTROL
(_A. TERMINALS
Approved For Release 200 /11/WgCtA-I$DP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
for the user. Once at the target system application, a COINS user's query
is treated just the same as any other query; it is interpreted by the appli-
cation's software to produce the requested data. The COINS user cannot affect
the software or the data base. He is unable to change anything in the server-
host system since the server-host is interpreting the request.
All analysts and their terminals in COINS are cleared Top Secret
SI/TK as are all computer sites. The 'network operates in a Top Secret SI/TK
System High mode (as defined in DCID 1/16).
The access systems provide the capability of enforcing NTK in two
forms. First, an agency may wish to restrict access by some of its personnel
to some of the data on the COINS (or other attached) network. It can do so
by omitting the access privilege when the user is made known to the CAS.
Second, access systems can control access to applications or hosts that they
support through use of a host-agency supplied access list identifying by name
those users who may execute the application or access the host. The HAS can
also (if directed by the server-host/agency) grant access by Agency or other
smaller organizational groups.
Additional detail about COINS security can be found in Appendix A.
Approved For Release 200J11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
5. SUMMARY OF PREVIOUSLY CONSIDERED APPROACHES TO THE PROBLEM
A number of approaches have been previously advanced for solving
or avoiding the RECON security problem. This section will review them.
5.1 Separate Systems
In an earlier examination of the problem, it was proposed by the
sponsor that a separate computer system be provided to store and make
accessible to the Community those bibliographic entries not deemed "special"
as discussed above. Several subsets of this approach were considered;
however, the approach was rejected because of the cost of maintaining
duplicate facilities. The approach protected the sponsor's assets from
penetration and exposed that portion of the data base, even if the system were
penetrated, only to individuals who would be authorized to access the informa-
tion under any circumstances.
5.2 Multi-Level Secure Operating Systems
As a way of defeating internal penetration by programming users,
the notion of applying multi-level secure operating system technology
(e.g., KSOS) to the host supporting RECON was considered.
This approach, in principle, would go far to defeat direct attacks
and, if the software change controls proposed to assure the continued
security properties of such systems were in place, it would defeat the
placement of trapdoors and Trojan Horses. Note, however, that if a trapdoor
were placed in KSOS, it would be vulnerable to external attack in the same
way as the existing RECON system.
Approved For Release 2003,J11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
However, the realities of the technology are such that KSOS cannot
currently be applied to large existing systems such as 370/158's without
changing the operating system and programming interface to produce totally
incompatible (with anything!) systems. Coupled with.costs estimated in the
millions, the,approach is not feasible in this environment.
5.3 Filters
The addition of filters to the RECON system software has been
examined as a means of using the inherent capabilities of RECON to limit
access to just tho,e.records deemed releasable.based on security, dissemina-
tion, and codeword codes located in the RECON records.
If the classification, codeword, and dissemination codes are used
in'combination to identify material that is not to be released to external
(i.e., network) users, the preferred approach is to (invisibly to the user)
apply a filter consisting of a series of AND NOT < dissemination codes and
codeword codes > to each (implied) SEARCH command issued by a user to exclude
restricted material from the search.
(A similar scheme involving canned
queries is currently used by OCR personnel who now perform RECON searches
for the Community.)
The filter approach provides the granularity of access control
needed to restrict access to the subset of the RECON data base considered
releasable; it does nothing to control the threats of internal or external
penetration. Nevertheless, the application of filters to queries originating
from network users will greatly simplify the design and operation of the
GUARD system discussed below. An approach to implementing filters for RECON
is outlined in Appendix B.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
clearances. The general approach in sanitizing systems is to permit arbitrary
queries by all users, but to route the results of the queries of uncleared
users to a sanitization officer who would manually examine the output before
releasing it.
At one level, the RECON security problem is akin to the problem
"sanitizing" SCI in order to release it to activities without the proper
Approved For Release 2003/11/06 CIA-RDP84-00933R000100170009-6
6. AUTHENTICATED RELEASABILITY
6.1 Technical Approach
in low-volume situations, all sanitization officer activity could
be manual. In higher-volume situations, the use of a computer-based GUARD
station to support the sanitization officer (W0079) has been developed.
While the sanitization officer/GUARD station approach would work
in principle, it is not a practical solution for RECON because of the
excessive delays that would be imposed by the sanitizing officer. These
delays would cascade to produce response times that border on the infinite.
What is proposed to solve the RECON problem is to adopt the idea
of a GUARD station, but to automate the identification of releasable citations
6.2 Concept of Operation
For the purpose of exposition, we will first consider all citatio:s
in RECON categorized either as releasable (to external network users who do
not possess access approvals for the "special" citations) or NOT releasable
to those individuals. For each RECON entry designated by the originator as
Approved For Release 2004/11/06 CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
releasable to external users, a cryptographic checksum, which is a function
%f the entire record, is computed by a special authentication device as the
data is entered into the system. The checksum is appended to the record and
stays with the record forever.
Upon being selected for output, all records for a specific destination
are routed to a dedicated system (the GUARD processor) where the cryptographic
checksum is recomputed. If the recomputed value is identical to the checksum
appended to the record when it entered the data base, the entry can be
released without further review. If the checksum check fails, the item will
not be forwarded to the requestor and the record, destination, etc., will be
Each RECON entry designated as "releasable" (i.e., NOT "special")
will be processed through one of a set of input terminals that cause the entry
to be routed through the input checksum generation device (see Figure 2) as
part of preparing it for entry into the data base. The input checksum
generator computes a unique, non-forgeable checksum which is appended to the
entry before it is entered into the RECON system. If the entry and its
checksum are subsequently forwarded to the GUARD interface for release,
the checksum value is recomputed at the GUARD.
6.? Properties of the Cryptographic Checksum
The principal problem that this approach raises is assuring that
thp: checksum cannot be forged. This is solved by using a modern cryptographic
techn6que, the National Bureau of Standards Data Encryption Standard (DES),
and performing the checksum function outside of the RECON host on dedicated
systems, one for computing checksums on input entries, the other for the
Approved For Release 2003111/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06-: CIAfDP84-00933R000100170009-6
SPECIAL' CITATIONS
I
RELEASABLE CITATIONS
CTLR
RECON (7)
SYSTEM
0 AUDIT
FILE
COMTEN
3
U
A S
R Y
D So
. HAS
(COINS
OR
OTHER
EXTERNAL
(NETWORK
TERMINALS
130-INTERNAL
TECHNICAL APPROACH
TO RECON SECURITY PROBLEM
Approved For Release 2003/11/06 : CAA-RDP84-00933R000100170009-6
Figure
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
GUARD function.
The crypto checksum of the original entry is produced using
a secret key known only to the input checksum device,and to the GUARD inter-
face processor(s). The key is NEVER available within the RECON system per se.
The crypto checksum is produced by block-chained encipherment of
the releasable entry (see Figure 3). In block-chained encipherment, the
ciphertext of each block of the item being enciphered is dependent on the
contents of all previous blocks. The last block of 'an item is dependent on
the entire entry and is used as the checksum. The secret key for this mode
of use is 120 bits long (64 bits for the IV (the Initial Variable, used to
provide the first value exclusive OR'd to the first block of plain text),
56 bits for the DES key).
The DES has a particularly attractive property for use within
an application. As little as a one-bit change of the data being encrypted
(or decrypted) will result in approximately 50% of the ciphertext (plaintext)
bits being changed. This provides an excellent error (or tampering) detection
quality to the scheme.
With the cryptographic checksum keys physically isolated from RECON
and other RCC computers, the only other method of forging a checksum is to
pick a 64-bit number at random and attach it to a RECON record. The probability
1
of picking a "correct" checksum by accident is 24 (the size of the checksum)
or 5.24x10-20..
Approved For Release 2003,11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06?: CIA-RDP84-00933R000100170009-6
Data
Bloc
k 1
Data
Bloc
k 2
Data
Bloc
k N
(used as
her
Ci
Cipher
the RECON
Cipher
Block 1
p
~k N-1
+
Block N
checksum)
The secret key(s) are the
Initial Variable (IV) and
the KEY.
BLOCK CHAINING
Figure 3
TDi
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
In summary, the protection against forgery is provided by protecting
the key. Key protection is provided by:
a. Physically separating the input and GUARD authentication
machines from the retrieval processor.
b. Hard-wiring the key on the DES-board so that it is not
even readable by the GUARD or input checksum generator.
c. Providing a security "kernel" in the GUARD and input
checksum generator to control their operation. Because
of the single-function nature of these devices, this
kernel is simple in structure and offers no technical risk.
6.4 Security Properties of the Approach
Assuming that the GUARD system works as described and it is inter-
posed between RECON (and its internal network) and an external network as
shown in Figure 2, this approach has several interesting properties with
respect to the RECON security problem. First, no failure or compromise of
hardware or programs in the RECON host or its network will permit data to
spill from the Agency internal network to the Community network. Second,
no manipulation of RECON or its host processor (or the internal network) will
release special or other material across the GUARD interface.
This is because the GUARD system will be designed to only deal with
what it thinks are RECON records, and to escape the GUARD, a cryptographic
checksum is recomputed from the just to be released record. if this checksum
does not identically match the checksum computed when the record entered the
RECON application, the record does not get released.
Approved For Release 2001/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
If a checksum gets detached from its citation at any time
subsequent to its creation, the only loss will be that the entry which was
considered releasable will NOT be available to Community analysts. The scheme
is fail-safe. It should also be obvious that the approach will not spill
special data if a checksum gets attached to a "special" citation, or either
the citation or checksum is manipulated by accident or design since the change
of as little as one bit of either component will result in a different checksum
being recomputed on output.
The approach does not directly address the threat of manipulating
a system through activating trapdoors from external users to manipulate data
or deny service. Manipulating data through an essentially one-way trapdoor
(since the GUARD permits NO unauthorized data transmission out of RECON) is
a question of how much detailed information it is assumed the manipulator has
(or is able to get) from internal sources to guide his attempt at manipulation.
Nevertheless, such manipulation will not cause the release of unauthorized
data.
The threat of denial of service through activating trapdoors is
more realistic since not too much has to be known about the target in order
to foul it up. Since the threat cannot be countered by the GUARD approach,
the only solution evident at this time is to shut down the external network
connection when and if denial of service attempts are detected.
The single remaining security question is what happens if the GUARD
system fails? While of itself no guarantee, the simple function of the GUARD
will reduce the opportunity for design and implementation errors. In addition,
advanced design techniques, such as formal specification, can be applied to
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
the GUARD design to further increase the confidence in the reliability of the
system. Since it is envisioned that the GUARD will be implemented in
an advanced microprocessor (see Appendix C), once the program has been
thoroughly checked out, it can be placed in a Read-Only Memory (ROM).
If the hardware of the GUARD fails, it must fail in such a way as
to bypass the recomputation of the cryptographic checksum. Even then, the
only real risk is if the GUARD fails and RECON fails or is subverted at the
same time. The interface between the GUARD and RECON is simple enough that
there does not appear, at this point, any way in which the RECON system can
induce a failure of the GUARD.
Finally, the GUARD can be designed in such a way as to permit RECON
to test the correct operation of the GUARD by addressing various kinds of
records to itself. The only records that should return are those whose
checksum is correctly recomputed. (If there is a concern that a subverted
RECON could use this facility to generate and test "random" checksums, it
might be noted that it would take about 58,494 years to systematically try
all possible 264 checksums against a single record. At the rate of 10,000,000
trials/second (100 ns/trial) on average, one could expect to find the correct
checksum in one-half the time, or 29,247'years.)
6.5 Security-Derived Modifications to RECON
It would be nice if the GUARD approach could be applied as is,
with no effect on RECON, and while providing the same interface to all users.
Unfortunately, due to the concern for covert (and direct) channels that would
permit transmission of unauthorized data outward to an external network,
this is not the case.
Approved For Release 2003,/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Because of these concerns, it appears that the following changes
will be necessary in the user's interface to RECON (and to RECON itself).
a. The external network users will not have an interactive
interface to RECON. They will only be able to supply
fully specified batch queries (or query procedures using
the QUERY command).
b. The external network users will not be able to select
fields of the RECON record to be returned. Only the
entire releasable RECON record will be returned to the
external network user.
c. The filter capability (outlined in Appendix B) will
be implemented for external network users.
6.5.1 The Need for Batch Access for External Network Users
The reason for eliminating interactive working with RECON for
external network users is that there is no way to subject the informational
messages generated by RECON to the same checksum test applied to data records
because the message conte:Lts are dynamic-(counts of the number of records,
lists of "adjacent" keywords, and the like). If RECON were subverted, these
messages could be replaced with unauthorized data for an external user-agent.
There is no sa~,e;way to permit such messages. As a consequence,
it is concluded that running RECON in batch mode is the only feasible way to
circumvent the problem.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The major problem found with error messages is that they are applied
dynamically; i.e., as errors are encountered. With very few exceptions
however, they do not contain dynamic data. Even in the cases where the
error message repeats information (e.g., an accession number, file name),
the error message could be recast to be static. Under these conditions,
the error messages sent to external users could be checksummed to permit
their transmission to external users. Coupled with some additional separate
messages such as "OCCURRING IN FIRST COMMAND LINE," "OCCURRING IN SECOND
COMMAND LINE," etc. (up to the maximum of 50 command lines RECON can store
as a canned query), that can also be checksummed and sent with the substantive
error message to help a user localize his error.
(An alternative considered earlier would be to replace the
standared RECON error messages with about six generic messages, locate them
in the GUARD, and permit RECON to request the transmission of from one to six
of them to a designated external user. However, the additional complexity
introduced to the GUARD, changes to RECON to map existing error message
numbers into one of those approved, and the reduced help provided to users
over the simpler changes outlined above have led to the rejection cf that
approach.)
6.5.2 Implementing "Batch RECON"
The first constraint does not appear to require any functional
change to RECON to support. There is a "canned" query capability already
built into RECON that could be used to execute a query sequence entered by
an external network user. The external user would use the COINS TAS with
or without ADAPT to create the RECON query. When the query is formed., he can
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
direct it to RECON just like he now does for other COINS batch applications.
The query will be staged in the HAS interfacing RECON to the network.
When RECON accepts a query from the HAS, it passes the query
as a canned query (probably in Query execute mode) to the canned query
processor. If the filter recommendation is implemented, RECON may attach
a filter to the query appropriate to the dissemination authorized to the
particular user (or Agency, or group, etc.).
RECON will maintain a user control block for the external network
connection(s) that will relate a query to a particular originator.
The exact interface between RECON and the GUARD has not been defined
in this study. Whether each single RECON record that satisfies an external
query will have the destination address attached and sent to the network,
or whether the GUARD will be able to accept groups of records destined for
a single user is a function, in part, of the amount of Random Access memory
available in the GUARD, as well as whether there will be a requirement for
the GUARD and HAS to multiplex responses from RECON in order to maintain
throughput. It is sufficient for now to indicate that these issues will have
to be resolved at the detailed design level.
The change that delivers only whole RECON records to external
network users can be handled administratively (by not telling external
network users of the DISPLAY, TYPE, etc.), or by extending the use of the
"SECURITY" file to indicate commands not allowed to specified users. This
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
change is only to minimize the complexity of the GUARD. Working in COINS,
the external users have editing and storage facilities available to them
in the TAS's to provide selection and formatting of various data fields.
6.5.4 Implementing Filters in RECON
Implementing the filter approach outlined in Appendix B offers
no particular technical challenge. The filter is important since it relieves
the GUARD of having to handle unauthorized records except when there is
a failure or error of some kind in the RECON system itself. Thus, the GUARD
will act as a check on the correct operation of RECON rather than as a
guarantor of its correct operation. This shift in perspective is important
in minimizing the complexity of the GUARD.
6.5.5 Bandwidth of Covert Signaling Using Error Messages
By permitting any error messages at all to be returned to
a designated user, there is created a covert signaling path from RECON to
that user. In the absence of any additional constraints, it would be possible
for a subverted RECON to pass the content of unauthorized RECON records to
an external user as a binary stream merely by adopting the convention that
one error message stands for a binary 1, and some other error message stands
for a binary 0.
Since the method recommended of generatinrj checksums for all error
messages along with a number of messages to help localize errors is designed
to permit virtually arbitrary error messages to be returned to external users,
there is no way for the GUARD to easily determine whether the messages being
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
passed are legitimate or signals without increasing the awareness of the
GUARD about its environment and, incidentally, increasing its complexity.
To determine the covert signaling rate if RECON were connected to
COINS, measurements were made of the actual time to send messages of various
lengths between two processes in different access systems. The measurements
were taken under normal operating conditions in that both access systems
were actively supporting normal network operations. These measurements
approximate the signaling rate that would be available between RECON through
its HAS to a process (file) on another TAS in the network.
The results of this quick study are shown in Table 1.
Effective
Character Covert Signaling
Message Length Transmission Rate Rate Bits/Sec.
in Characters (Char./Sec.) (Err. Msg. = 100 Char.)
100 8.5 .085
1982 150 1.5
31777 1000 10.0
Effective Data Transmission Rates Between
Access Systems
While the table shows the effects of a relatively high fixed
overhead to handle network and I/O protocols, what is of interest to us is
the expected covert signaling rates under the assumption that the error
messages will be 100 characters long (or shorter).
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Since COINS does not accumulate traffic for a specific destination
but rather forwards messages as received, the .085 bits/sec. covert signaling
rate is on the order of what one could expect if the RECON error messages
were used to encode unauthorized information. At this rate, a 300-character
record would take approximately 7.8 hours to transmit.
Any further reduction(s) will require incorporating an error
message rate detector in the GUARD to raise an alarm if error messages are
being sent more frequently than a specified rate.
6.6 Extensions of the Authenticated Releasability Concept
6.6.1 Summary of Key Notions
The principal conceptual notion of the proposal outlined in this
paper is the fact that the design of the GUARD is predicated on the concept
of checking on the correct operation of the guarded resource. The GUARD
is not made an integral part of the application. Because of this simplicity,
it becomes easy to extend the concept to more realistic conditions than
twice postulated at the beginning of this section to explain the concept.
6.6.2 Handling Multiple Protected Categories
In Figure 4, we represent the approach outlined in section 6.2.
There is the superset A, corresponding to all RECON records, and the subset B,
corresponding to those which can be released to external network users.
The users of the system correspond to these two sets. There is no GUARD
processor intervening between RECON and the users authorized access; to all
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06'f CIA-RDP84-00933R000100170009-6
Figure 4
Symbolic Representation of Basic Capability
Approved For Release 2003/11/06 : CIA-RDP84-00933,2000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
of the data base because it is not required. Symbolically, the key associated
with the materials releasable by the GUARD is shown in the block representing
that function.
In this section, we will show symbolically how various protection
configurations can be handled by straightforward extension of the GUARD
concept.
DIA to just DIA-produced items, etc.).
Figure 5 shows the arrangement of two (or more) disjoint categories
(for a far-fetched example, limiting NSA access to just NSA-produced items,
The role of the GUARD is still to check on the correct operation
of RECON, which is supposed to route B category material to the B-GUARD
and the C category material to the C-GUARD. The dotted end-to-end crypto
boxes shown are optional depending on the degree of trust the various groups
have in the correct functioning of the network. If the groups must protect
their material from possible misroute to another, then the end-to-end crypto
function will provide that protection. Note, however, that in the COINS
network, the network is protected by full-period crypto on all links. The
only protection that the end-to-end crypto would provide is against possible
misaddressing in the HAS or misrouting in the COINS imps.
The categories B and C are distinguished on input in some fashion
(in this example, by Agency of origin), and the checksum computed for
a record is keyed based on the information distinguishing the records.
That is, B records are checksummed using the B key and C records are check-
summed using the C key. The generation of the input checksums is not shown
in theA15igmFor Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/de. CIA=RDP84-00933R000100170009-6
le-
Two or more (Disjoint) Categories
END TO I
S ~
END
(MCRYPTO
O
j
OR B- .GROUPS
S s
END TO
SEND
RYPTO ~-~
,FOR C-
GROUP
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The GUARD's are shown as separate boxes, one for each group or
Community of interest involved. The cost of the GUARD is expected to be
small enough that for application to the RECON-COINS case there can be a GUARD
for each category (group of users).
One can imagine attempting to put all of the GUARD function in
a single machine, using a group indicator of some kind to instruct the GUARD
to select the appropriate key to farm the checksum, and if it checks, route
the record through the appropriate end-to-end crypto function as shown in
Figure 6. However, this raises the level'of'complexity of the. GUARD by
requiring it to discriminate correctly among the various categories and to
not only perform the checksum correctly but to select the proper end-to-end
channel as well. If the costs permit it, separate GUARD's are preferred.
Figure 7 shows the arrangement where two or more categories are
involved with a superset shared. This form illustrates an arrangement that
could give an Agency unrestricted access to the generally releasable material
(B), as well as access to ORCON material produced by the Agency (group)
making the request (e.g., C).
The degree of control this arrangement provides for ORCON material
is a function of how fine a discrimination is possible among originating
'groups or Agencies. For instance, if the discriminant is based on Agency
of origin (e.g., DIA) and the fact that it is ORCON material, then it is
possible to respond to requests from DIA and return all general records and
DIA's (only) ORCON records. If DIA or the sponsor needs to break the access
down further, it is necessary to further qualify the Agency of Origin (in
this case) (e.g., DIA-MS4 or DIA-MS1) in order to select the correct: checksum
key whppt-rtbveEPF8F*A* @a9&tSd61 +/b ?: 8I''C-F A00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
B GROUP
END TO
END
CRYPTO
C GROUP
END TO
END
RYPTO
FROM
RECON
X GROUP
END TO
END
RYPTO
Figure 6
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/04 - CIA-RDP84-00933R000100170009-6
A -- USERS
Figure 7
END TO
END
CRYPTO
FOR "B"
END TO
AND
RYPTO
POR "C"
Controlling Access to Two or More Groups (Compartmentation)
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Thus, each record in the system would still have a single checksum,
the key for which is a function of the Agency of origin only for otherwise
restricted distribution material. That is, if the record being entered into
RECON is generally releasable (based on classification, dissemination, and
codeword values), it is checksummed using the B key (in the diagram). If
the record being entered requires restricted distribution based on the
classification, etc., but would be releasable to the Agency or group that
originated it, it would be checksummed using the appropriate key (e.g., C).
All queries from external users are filtered as suggested in
section 5.3. Ordinary external users would have a filter that permits access
to B records only. Extended access users would have filters that permit access
to B or C records, or B or D records, etc.
To get the appropriate (allowed) record set past the GUARD
processor, checking the releasability will require a small change to the
GUARD's functionality. In the previous examples, if the recomputed checksum
did not match, the record was not transmitted and an alarm raised. In the
present case, the GUARD is provided with a set of keys corresponding to the
access categories permitted to the users associated with that GUARD. The
GUARD computes the checksum with each key in turn until either an exact match
is found or all keys have been tried. If all keys have been tried and no
match results, the record is not transmitted and an alarm is raised.
Finally, Figure 8 shows how the scheme could be used to control
dissemination based on the hierarchical classification scheme of Top Secret,
Secret, Confidential, and Unclassified. This example is not shown in the
context of RECON and COINS because COINS runs in a System-High mode and is
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06: CIA-RDP84-00933R000100170009-6
GUARD
Figure 8
MULTI-LEVEL
RETRIEVAL
SYSTEM
TOP SECRET
USERS
SECRET
USERS
CONFIDENTIAL
USERS
UNCLEARED
USERS
Controlling Hierarchical Dissemination
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
provided merely to illustrate the potential this technique has.
Here, records entering the retrieval system are checksummed with
a key which is selected based on the classification of the record. Requests
against the data base are filtered based on the clearance of the requestor.
Thus, Top Secret users would be able to retrieve everything, while Uncleared
users would be able to retrieve only Unclassified records.
As in the previous example, the GUARD's compute checksums until
a match is found or all keys have been used.
This case raises a performance question that was not a factor in
the earlier examples. In particular, if the GUARD would have to compute
checksums through all stored keys until a match was found, it could reduce
the throughput of the GUARD significantly. There are two possible approaches
to this problem depending on its severity. First and simplest, the keys
could be arranged in GUARD's in order of expected frequency of occurrence.
Thus, if 80% of the data base is Unclassified, 10% Confidential, 8% Secret,
and 2% Top Secret, the keys would be placed in the GUARD's so the Unclassified
key was used first, then the Confidential key, and so forth.
If the checksum function really becomes a bottleneck in this mode
of operation, it would be possible to compute two or more checksums in parallel
by merely supplying additional DES cards. If the number of DES cards were
less than the total number of checksums that had to be computed, the control
for the additional parallel operation would be complicated slightly. However,
it is not expected that it would be very difficult to design.
Approved For Release 2003/11/06 :-CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 CIA-RDP84-00933R000100170009-6
7. OPERATIONAL IMPACT
7.1 RECON Operations
The degree of operational impact this approach will have depends
on how much the, present automated hold file and RECON preprocessor are
trusted to correctly extract classification, codewords, and dissemination
codes from incoming electrical traffic.
RECON now operates this way with no problems mentioned. If the
software which attaches these labels is trusted to do so properly, then
a program can read-the labels and divert the traffic into one or more
(depending on the number of categories involved) subfiles for later computa-
tion of the input checksum. If such an arrangement is acceptable, then the
impact on RECON indexing operations is nil, since RECON records will be
handled by OCR personnel in exactly the same way they are now.
If all records are checksummed with a key appropriate to their
releasability (i.e., releasable to network users, releasable only to sponsor
personnel, etc.), and the.checksum generator is placed in the RCC network
as indicated in Figure 9, then if the checksum generator remains a dedicated
single-function machine as described in the previous section, it could be
programmed to automatically analyze the codeword, classification, and dis-
semination codes of each record, and select a key appropriate to the
dissemination policy implied by the combination of values.
This arrangement depends critically only on the correct analysis
and assignment of the classification, codeword, and dissemination codes for
each record. If such assignments can be made correctly (as they apparently
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
INCOMING
ELECTRICALS
COMMO
INTERFACE
Approved For Release 2003/11/0E ' CIA-RDP84-00933R000100170009-6
HOLD FILE FOR
INCOMING
ELECTRICALS
COMTEN
t I
ti I
/
1INPUT
ICHECISUM
FFENS{ ATION
RECON
GUARD
(INTERNAL
USERS)
GUARD
(NETWORK USERS)
Figure 9 (130 TERMINAL
A Possible Configuration of Guards and Checksum Generators
to Minimize Impact of RECON Operations
Showing Flow of Data
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
ACCESSION
HOLD FILE
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
are now), then the checksum generator and GUARD'S can meet the protection
objectives of the sponsor.
The data flows of the diagram are:
A. _.Incoming messages are processed by COMMO and released
to the RCC network to be processed for RECON.
B. The incoming data is held in a buffer file for pro-
cessing.by OCR index/,5 personnel.
C. Prior to indexing, the message is scanned and a RECON
record is partially filled out. The classification,
codeword, and dissemination codes are entered in the
skeleton record.
D. The skeleton RECON record is processed by the OCR analyst
and subject codes, etc., are coded as the situation
requires.
E. The record is released by the OCR analyst for routing
F. The record is released to the checksum generator where
the classification, codeword, and dissemination codes
are analyzed to select the proper checksum key.
G. The checksummed record is placed in a hold file.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
H. The RECON data base is updated with the records in the
I. A RECON record is keyed in directly (from first
,_principles) by an OCR analyst. It is routed to E.,
from which it follows the steps outlined above.
Note that if the checksum generator is-bypassed by the RECON
records processor, the affected records will not ever be released to either
internal or external users.
7.2 Increased Data Storage
The checksum is eight bytes long. If the average size of a record
is 150 characters or so, this will add about to the storage required.
If all 3.5 million RECON records currently had checksums, the total storage
increase would be about 28 million bytes, or about 10% of a 3,350 disk.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
1.
ANDSO An Approach to Solving the RECON Security Problem,
1
'
1 November 1980
2.
KIN80 The < sponsor's > RECON System as a COINS Host,
a
3.
REC80 RECON IV, An ON-LINE Intelligence Information Retrieval
System USERS Manual,
NFAC OCR/SSD
April 1980
4.
W0079 Applications for Multi-Level Secure Operating Systems,
a
1979 AFIPS Proceedings, pp. 319-328
Approved For Release 200P/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 CIA-RDP84-00933R000100170009-6
APPENDIX A
COINS SECURITY SUMMARY
INTRODUCTION
Much of the present COINS access control functionality is placed
in COINS Access Systems (CAS's). This appendix outlines the CAS security
architecture, with the exposition being given in terms of a Terminal Access
System (TAS). It should be noted that the security functions described for
the TAS are available for the other CAS's as well.
The TAS architecture is responsive to the diverse and dynamic
nature of the COINS network. It provides a coherent interface to server-host
computers of different manufacture and to data base applications of widely
varying design. It was conceived of as a means of insulating its users from
much of the differences that exist in the different server-host systems
and the data base query languages.
The TAS security architecture has been designed to provide maximum
protection to the sensitive data in the network while keeping the end-user's
interface as simple as possible.
in addition, the TAS security architecture has addressed the
problem of security administration. It provides the user organizations with
considerable flexibility in how the security is managed. It also allows
a single TAS to support more than one organization, each of which can exercise
full control over their own security management, yet be isolated from and
non-interfering with other co-resident user organizations.
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Specific security features of the TAS are discussi-d below.
1. Structured Network Identifiers (SNI)
All TAS users are uniquely identified with an 8-character identifier
of the form:
TAAGGUUU
T is the user's home TAS.
AA is an Agency designator representing the user's agency.
GG is a group within an Agency.
UUU is the user within the group.
The structured identifier uniquely identifies all COINS users
entering through TAS and permits both activity and security logging of
an individual's network activity. A user requires an SNI and a password to
logon to a TAS.
2. Access Authorization
Each user known to a TAS (i.e., who has an SNI) has an access
authorization record in the Access Authorization (AA) file. The record
contains the following basic information:
a) User's name
b) Clearance level
c) Logon (to TAS) password
d) SSN
e) Agency identification
f) Organization within Agency
g) Address
Approved For Release 2003/11/06 CIA-RDP84-00933R000100170009-6
A-2
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
h) Telephone number
i) User type (student, crisis, operational)
j) Compartments (other than SI or TK which are included as
part of the clearance data)
In addition, the record contains a list of the COINS applications
(e.g., RYETIP, SOLIS, DIAOLS, ADCOM, etc.) and for those applications that
provide files, a list of files authorized to the user by the user's home
organization.
If the application is interactive (SOLIS, NDS), the user's access
authorization record contains the interactive system logon information in
the form required by the interactive system. This usually includes an iden-
tifier and password. The information is used to perform a user-invisible logon
to the server-host supporting an interactive application. This "surrogate
logon" service of TAS insulates COINS end-users from the considerable
variability in logon protocols from one kind of computer system to another.
Application and file access controls are applied to terminals as
well. Each terminal connected to TAS is logically identified by TAS and has
an AA record defining which applications and files within the applications
may be accessed by the terminal.
A "session security level" is logically established based on the
user's authorization and his terminal's authorizations. This (conceptual)
level controls what data may be accessed in a session.
Approved For Release 2003/11/06 :-CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The user and terminal AA files are used by TAS to implement the
major functions of TMA-3:
Control of user access to a data base.
. -_.Verification that a user/terminal is cleared to receive
As will be seen in a later section, the AA files and the TAS
security architecture are expected to play increasingly important roles in
further extending COINS services'tn the Community.
3. Server-Host Access Authorization
When TAS was upgraded from a user-host to include server-host
functions in 1978, the access authorization function was expanded to include
application access authorization data.
Interactive or batch applications hosted or front-ended by
a particular TAS or HAS are registered in an access authorization file on
that TAS or HAS. The access authorization file contains for each application
a list of terminals and user's identifiers (SNI) and passwords authorized to
access the particular application. Terminals are identified by a host-id/
terminal-id combination (i.e., from what Agency an access is attempted).
Within an application, the user's type of access (retrieve or update) can be
restricted to specific files.
4. Decentralized Security Management
The TAS security management design was influenced by the following
major considerations:
Approved For Release 2003/11/06 :.CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Each using Agency would be responsible for managing
the security information and access authorizations
of its own users.
b) A large using Agency may wish to delegate some of the
security management to functional organizations within
the Agency.
c) A single TAS may be shared by two or more independent
Agencies.
To meet these somewhat diverse requirements, the TAS security
architecture includes three kinds of users:
TASMASTER A single user who "owns" the TAS and
creates and directly or indirectly (see
Administrative User) creates all other
users.
Administrative User A user who has the delegated authority
to create and administer a specified
set of ordinary users.
Ordinary Users Users authorized to use TAS and the
An Administrative User can add, modify, or delete users within the
group that can be "named" with the same single "SNI-prefix" as assigned to
the Administrative User. That is, the up to 1,000 users who have the same
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
'M C
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
TAAGG (TAS, Agency, group within the Agency) prefix in their SNI.
Administrative Users CANNOT affect any records other than those
belonging to them.
The TASMASTER establishes the basic access authorizations for
Administrative Users. The Administrative User can further subdivide his
access authorizations among users within his domain. He cannot give any
user more privileges than he has himself. It is not required to give
an Administrative User ALL TAS or network privileges.
Approved For Release 2003/11/06 :.CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The.classification, codeword, and dissemination codes of the RECON
records can be used in combination to identify material that is not to be
released to external (i.e., COINS or other) users. This fact can be used.
to (invisibly to the user) apply a filter consisting of a series of AND NOT
< dissemination codes and codeword codes > to each (implied) SEARCH command
issued by a user to exclude restricted material from the search.
In general, the RECON implied SEARCH command produces a set of
STAT.
STAT
records that meet the specified search criteria. The result sets are asso-
ciated with a user's work space and can be combined or limited in various
ways after a search has taken place. It is possible to combine the results
in two or more sets through logical operations (e.g., one can create a set
on 0 (1) and another set on (2), then logically combine the
sets 1 AND 2 instead of having to specify that intention in the initial search
Because of the ability to manipulate sets to create combined sets
which may then be edited to print records or any selected fields, it is
necessary for the filter to be applied at the point where the total request
is essentially satisfied. Since it is expected that external users of RECON
will only be entering batch queries, the filter should be applied just before
the output set is to be transmitted to the requestor.
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
mechanics
The mechanics of using the filter approach to limit access to parts
of the RECON data base involves the following three steps:
a) Recognizing external users.
b) _.Identification of the appropriate filter.
c) How (when) to apply the filter.
Each of these elements will be discussed below.
Recognizing External Users and Identification of Filters
This is as simple as setting a'single bit in the user's logon
identification record to identify that the specified user is to have restricted
access to the file(s) that he is authorized to search. A one-byte designator
of which filter is to be applied to this user whould be more. than adequate
for the foreseeable future.*
These two pieces of information will have to be included in the user
control block established as part of the session. (The exact sponsor's jargon
for this control block is not known; it is the data kept by RECON during
a session that identifies the user, his terminal address, and holds the
threads to his workspace and files.)
Above, the filter was described as a series of AND NOT < restricted
dissemination codes > . It would also be possible to define the filter as
*This model is predicated on each user, by name, being registered in the RECON
data base. A less burdensome (to RECON) approach would be to register by name
only those external users who are granted extended access (perhaps to ORCON
material) and treat the rest of the user opoulation by generic names (e.g.,
NSAUSER, DIAUSER, STATEUSER). The most restrictive filter would apply to
the generic users.
Approved For Release 200/11/06 :. CIA-RDP84-00933R000100170009-6
STAT
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
AND < permitted dissemination codes > . Which form is better is a function
of which would lead to the smaller specification.
How (When) to Apply the Filter
The-best way to apply the filter would be to prespecify the set
corresponding to the filter and then apply that set invisibly to the set that
is generated by the user's operand specifications. Thus, in the hypothetical
example:
would result in:
NO_ RECORDS OCC. DESCRIPTION OF SET
n+2 15 15 n AND n+l (AND NOT FF)
where FF is an invisible set number used to identify the prespecified filter
n 25 25
n+l 60 60
The mechanics of applying a filter are relatively straightforward.
Whenever an output command is activated, it tests the bit in the user control
block to see if this is a user to whom a filter is to be applied. If the
test passes, the command extracts the one-byte filter-id and then takes
an EXIT EXIT that allows it to apply the filter before returning to continue
the normal output processing for external users.
Summary
This appendix has outlined a method of restricting access to RECON
records based on the dissemination and compartment codes assigned to the
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
n_o
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
records at their type of creation. The technique provides as much control
as desired based on labels assigned to the records. The modifications required
of RECON to accommodate these additional controls are minimal (probably less
than one-half a man-year of one of the system programmers maintaining the
application)
Adding filters to RECON is a necessary adjunct to making RECON
available to the Community if the simplicity of the GUARD is to be maintained.
Approved For Release 2003/11/06 :.CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Configuration
The basic components of the on-line GUARD device, Figure 10, and
the update GUARD device, Figure 11, which implement the cryptographic checksum
function(s) are the UNIBUS-compatible 11/23 CPU and the "n" DES1100DSM
printed circuit boards (PCB's). The other PCB's shown in the diagrams are
used to implement the I/O and communications function for the GUARD device.
The cryptographic checksum functions are critical. The components of the
checksum subsection must operate correctly.
The configuration shown allows the on-line GUARD to handle multiple
compartments (categories of releasability). The number of categories a GUARD
device can handle is determined by how many DESliU DSM modules can be attached
to the 11/23. Each DES1100DSM, operating under a separate (possibly 'hard-wired)
key increases the problems and increases the complexity of a key management
system. The categories handled by a single GUARD device can be altered by
simply replacing/exchanging DES110ODSM PCB's. The GUARD device could fit
within one DEC rack if constructed as indicated above.
The update GUARD device could generate "n" separate checksums by
use of the Delta Data 7a4o or Delta 5000 function keys. The function keys
would be used to select one of the "n" DES110ODSM modules to calculate the
cryptographic checksum for a given RECON record.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
AUDIT
FILE
On Line Guard Device Structure
UNIBUS 11/23 (GUARD CPU)
AUDIT
FILE
ON-LINE GUARD DETAIL
Figure 10
"On-Line Guard
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
RECON
370/
168
EACH LINE REPRESEI'
ONE PRINTED CIRCUI
BOARD
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
RECORD DESIGNATED AS
RELEASABLE. KEY USED TO
GENERATE CHECKSUM MUST BE
SELECTED UNDER PROGRAM CONTROL.
DATA
72607
REMOVABLE
MEDIA
DATA
72607
KMC11-A
UPDATE
GUARD
UPDATE GUARD STRUCTURE
D711-A/B
: Dzll-A/B 6
UNIBUS 11/23
DES i
NOTE: The COMM IOP-n2 is an asynchronous DMA line controller. It consists
of a KMC11-A auxiliary processor and up to six DZll asynchronous
multiplexers. The DZ11 modules can each handle eight communications
lines. The DMA capability relieves the update Guard CPU.of the burden-
some line handling functions. Flexibility and expandability are
inherent in the configurations shown.
NOT
CONVERTED
TO ON-LINE
SYSTEM
?EMOVABLE DISK
MEDIA TAPE
Update Guard
Approved.For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
The number "n" of theoretically possible categories (compartments)
that could be handled with this approach isa function of the DES modules
used. The DES1100DSM is suitable for UNIBUS addresses 760000 through
777770 (octal). The DSM requires three contiguous 16-bit buffers. Thus,
in the address range above, 2,728 three-word blocks are available. Obvious
limitations on space, power, and I/O requirements will reduce the number of
DSM's one UNIBUS can handle. However, each GUARD processor can obviously
handle many categories.
Functional Description
The concept of operation is simple. As illustrated in Figure 12,
the on-line GUARD device, monitoring a given channel, would contain DES1100DSM
PCB's for each dissemination category designated for that channel. For a RECON
record slated for output, the cryptographic checksum would be recomputed in
parallel. If a match occurs with the checksum stored with the record, the
data is transmitted.
This approach allows multiple categories with a single checksum
field attached to each releasable RECON record. Non-releasable records would
contain a blank or null checksum.
The use of the null checksum will standardize the data base structure.
Dynamic data base update is then possible. However, all releasable records
must have their checksums generated off-line by the update GUARD device.
This'can be achieved by an additional off-peak-time procedure.
Since all automatic changes to the data base will have null checksums and are
thus not releasable, the following procedure could be used:
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
370/168
RECON
Figure 12
Approved For tb"6%u~W--kb 0 > 4 ~8~1
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
1. All dynamically entered releasable records are extracted
from the RECON data base at off-peak hours and stored on
tape or removable disk packs.
2. -..The tape/disk containing the null checksummed releasable
records is passed through the off-line checksum generator
process of the update GUARD device.
3. The resultant output of RECON records with active checksums
is then merged with the RECON data base during normal update.
The procedure for records entered via the Delta Data terminals would
be identical to steps 2. and 3., above. The update GUARD device will accept
input from the Delta Data terminals and the peripheral device containing the
null checksummed releasable records from the RECON data base. The checksum
subsection of the GUARD device is standard for each GUARD application (update
or on-line).
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
APPENDIX D
The?GUARD device approach is applicable to controlled
dissemination in the SAFE system. The checksum subsection (UNIBUS 11/23 CPU,
and "n" DES1100DSM's) would be unchanged. The peripheral interface of the
GUARD would be structured to interface with the SAFE Processor Interface
Units (PIU's) and/or Network Adaptors (NA's) instead of the COINS HAS computer.
The PIU's provide the interface to the Hyperchannel (WBC). The NA's provide
the interface to the Inter-Computer Channel (ICC). The diagram, Figure 13,
illustrates a simple example of a SAFE connection. Figure 14 shows the
detail for a SAFE GUARD WBC connection.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
GL i
GLOBAL SUPPORT LEVEL
COMPUTER
MULTI-COMPARTMENT
CP,PABILITY
(ON-LINE)
GUARD
ICC
NETWORK ADAPTERS
V
NA
Figure 13
Safe (Guard) ICC Configuration
Approved For Release 200/11/06 : CIA-RDP84-00933R000100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
GL GLOBAL SUPPORT
COMPUTER
MULTI-
PROCESSOR
CPU
I/O
CHANNELS
(ON-
LINE)
GUARD
NOTE: In the ICC or WBC configuration, the structure and function of the
Guard checksum subsection is identical to that of the Guard
device proposed for the present RECON system. The only change
is in the I/O interface structure of the Guard.
Figure 14
Approved For Release 2003/11/06): CIA-5p X43800100170009-6
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
APPENDIX E
COMPARISON OF ALTERNATIVES
TO SOLVING RECON SECURITY PROBLEM
A summary of the advantages and disadvantages of the various
methods proposed for the solution of the RECON security problem is attached.
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
Approved Fo Release 2003/11/06 : CIA-RDP84-00933R000100170009-6
A COMPARISON OF VARIOUS ALTERNATIVES
TO SOLVING THE RECON SECURITY PROBLEM
Present
RECON
Separate
Systems
Direct (internal)
No defense
Good defense
Zero risk
No defense
No defense,,
.Penetration
Very low risk
Best defense
Trapdoor (external.)
No defense
No defense
Probability of unauthorized
release is 5.24 x 10-20
Penetration
Spillage
No defense
No defense
No defense
Very low risk
Very low risk
(guard machine fails and
of software
RECON processor fails)
error
Change of
None
could be
No change for internal users,
Functionality
large
external users see a batch-
only system
Modification to
Substantial
None - some
RECON ?
minor new
software
New Hardware
Yes
Substantial
None
Yes - guard processor and
Required ?
(whole new
input citation
system)
authenticator
Number of
One
Unknown-
Unlimited
Access Classes
(Agency
should be
Permitted
internal)
unlimited
Very high
Highest
Under
$250,000 - $300,000
2 million +
2-5 million
$100,000
3-5 years
1 - lls years
Approved For Release 2003/11/06 : CIA-RDP84-00933R000100170009-6