back to article Kaspersky launches its own OS on Russian routers

Kaspersky Lab has finished building its eponymous operating system after four years of quiet development. Little information about the OS has made it onto the English-speaking side of the internet. Kaspersky Labs Russia told Vulture South to wait a few weeks for the English press release for information. What we do know is …

  1. Sgt_Oddball

    Lofty goals

    <quote>To achieve a guarantee of security it must contain no mistakes or vulnerabilities whatsoever in the kernel, which controls the rest of the modules of the system. As a result, the core must be 100 percent verified as not permitting vulnerabilities or dual-purpose code.</quote>

    Even if there's no mistakes, that doesn't mean there aren't vulnerabilities. Flaws that haven't even been thought of yet may still come out, also since no router is an island it may well still get compromised in the future.

    That's not to say it isn't worth the attempt, it is. It's just I'd never be so arrogant as to assume that just because my own team can't find a flaw, that it means it doesn't exist. (Oh and the dual-purpose code, doesn't that fly in the face of 'keeping it small' since that pretty much bans code reuse or having a function that achieves a few different things, Or have I missed something?)

    1. James 51

      Re: Lofty goals

      Keep it small might allow reuse , single purpose modules but Swiss knife utility classes are broken down.

    2. Anonymous Coward
      Thumb Up

      Re: Lofty goals

      Flaws that haven't even been thought of yet may still come out, also since no router is an island it may well still get compromised in the future.

      Quite. Even the external protocols and their specifications can be defective or malicious.

      Nevertheless, also agree that it's still worth the effort.

    3. martinusher Silver badge

      Re: Lofty goals

      Thanks to Windows and the like people have got used to the notion of an operating system as a huge hunk of code that does everything from task and storage management to rendering web pages. In the real-time world everything is a lot more modular so kernels are compact and essentially provable with other subsystems being added as components only where necessary. A kernel can be only a few hundred bytes of code, it just depends on what you want it to do.

      Of course, this doesn't stop MSFT from pushing Windows as a real-time and process control system. Its the sort of thing that's attractive to executive decision makers and lazy system designers but it will result in five storey BSODs and Stuxnet infections (you also end up with people telling you with a straight face that 20-40uSec packet jitter on an isosynchronous industrial control network is perfectly normal and acceptable...its what you get when you use "real time" Windows!)

      Incidentally, Intel used to sell a pretty 'hard' kernel back in the day, they called iRMX. It actually used the x86 protection model properly -- if task and segment management is done properly on one of these processors its quite difficult to break the system, let alone break into it.

  2. Paul Crawford Silver badge

    True microkernel approach?

    "As a result, the core must be 100 percent verified as not permitting vulnerabilities or dual-purpose code"

    That sounds very much like the old goal of a true micro-kernel where the ring-0 stuff is REALLY SIMPLE and thus possible to have near-perfect verification of it. I say near-perfect because you can't rule out buggy CPUs or tools, etc. For example:

    http://www.theregister.co.uk/2014/07/28/aussie_droneprotecting_hackerdetecting_kernel_goes_open_source/

    The past objection to the micro-kernel approach was the performance penalty of switching in/out of ring-0 to do serious stuff. That is why MS abandoned the pure vision of Dave Cutler original VMS inspired NT3.5 and stuffed video drivers in there, etc, for NT4 (and thus BSOD became a much bigger issue) and Linux never even went there. For a bit more on that debate:

    http://www.cs.vu.nl/~ast/reliable-os/

    1. Charles 9

      Re: True microkernel approach?

      If the description is accurate, it would only be the SECOND formally-proven kernel written (after seL4). The thing is, how well can such a microkernel perform when latency (such as high-throughput networking) is an issue?

    2. Duncan Macdonald

      Re: True microkernel approach?

      Is the performance penalty of a micro-kernel a problem for industrial systems ? The available CPU power has increased so much over the last 2 decades that inefficient but secure systems are probably better for industrial control as most industrial systems do not do a huge amount of number crunching.

      (A control system hand coded in C on a 486 could be replaced by an interpreted system running on a modern CPU and still be over 10 times faster.)

      1. Sgt_Oddball
        Black Helicopters

        Re: True microkernel approach?

        In that instance do we know we can trust the cpu? The whole Intel borked rng (coz it was the nsa wot dunn it) springs to mind though I suppose there are ways and means around that.

        Surely thoughly custom processors would be required to ensure its secure all the way down?

        Hang on, i think I hear helicopters........

        1. Anonymous Coward
          Anonymous Coward

          Re: True microkernel approach?

          "In that instance do we know we can trust the cpu?"

          You would think by know someone would've figured out the knock sequence if one existed, if not by analyzing the CPU's I/O for an extended period then by getting a hint from an insider.

          1. heyrick Silver badge

            Re: True microkernel approach?

            "You would think by know someone would've figured out the knock sequence if one existed,"

            Didn't we already? Something to do with wiggling data in DRAM to corrupt adjacent bits?

      2. Charles 9

        Re: True microkernel approach?

        But these same industrial systems are also expected to be tuned with higher precision. To get that higher precision, you need more readings at a time, which means lower latency. That's especially true in the field Kaspersky is most experienced: networking. If you plan to pass through multiple gigabits of data per second, you're talking a maximum lag time in the nanosecond. range. For turnarounds that quick, you MUST cut the processing time to the bare minimum, and that usually means getting close to the metal. Microkernels block this because they prevent close-to-metal access. Indeed, one caveat of seL4 is that the formal proof only applies if you disable DMA; guess what's one of the most common ways to reduce latency?

        1. Anonymous Coward
          Anonymous Coward

          @Charles 9

          Perhaps some industrial control systems need the lowest possible latency, but the bulk are mostly unchanged since thinnet and token ring networks were common. If you have a SCADA control for your power plant you want it behind a router that won't be compromised. If it can only deliver gigabit throughput instead of 10 gigabit, well, you probably don't care when SCADA data rates are generally measured in kilobits.

          As for L4, it is used for embedded stuff, not general purpose. For instance, Apple uses it as the OS for the "secure enclave" in the iPhone. Its performance is not the top priority, security is, so that is a reasonable trade. Using it for iOS itself might not be - and since the rest of iOS would still be just as complex, security holes would still be possible, you just wouldn't be able to get ring 0 with an exploit.

          1. Charles 9

            Re: @Charles 9

            " If it can only deliver gigabit throughput instead of 10 gigabit, well, you probably don't care when SCADA data rates are generally measured in kilobits."

            Bit Kaspersky's forte is in telecommunications, where data rates in the tens if not hundreds of gigabits per second is becoming old hat. That demands a very tall order: a high-security, high-throughput device. And telecommunications is one of the stated industry goals of this OS.

    3. Alan Brown Silver badge

      Re: True microkernel approach?

      "The past objection to the micro-kernel approach was the performance penalty of switching in/out of ring-0 to do serious stuff."

      In order to be able to switch in/out of ring0, you must have a CPU that's designed to allow it. X86 is not that CPU.

      1. Charles 9

        Re: True microkernel approach?

        "In order to be able to switch in/out of ring0, you must have a CPU that's designed to allow it. X86 is not that CPU."

        Given that context switching is in the manual, and virtualization requires it, an explanation is in order.

  3. CAPS LOCK

    Nobody serious about security is going to take Kaspersky seriously...

    ... everyone knows this is marketing and PR puff. And what's the betting half the code was lifted from NetBSD?

    1. Dan 55 Silver badge

      Re: Nobody serious about security is going to take Kaspersky seriously...

      No, it'll some horrific mash-up between Darwin (yes, it's open source) and OpenWRT.

  4. Christian Berger

    Well routing is actually a very simple problem

    Just receive a packet, look at its address, look in your address table where to forward it to and forward it.

    The problems with modern router insecurity stem from the fact that routers today have so much more code. They have web interfaces, they are supposed to implement complex protocols, etc.

    If you'd just build a router that routes and has a simple external management interface, it's probably downright trivial to make such a thing. As you'll end up with very little code, 4 years seem like a lot.

    1. Charles 9

      Re: Well routing is actually a very simple problem

      But then you have to deal with port forwarding, NAT traversal, VPN's sometimes, and TWO protocol stacks. It's unfortunately a necessary complexity.

      1. Aitor 1

        Re: Well routing is actually a very simple problem

        Yep, gets complicated.

        And then, you want a GUI for that right? well, then, are you going to put a config file, have a webserver?

        Both are potential attack vectors...

        Also, as it has already been suggested, processors have bugs themselves..

        http://www.theregister.co.uk/2015/08/11/memory_hole_roots_intel_processors/

        And now you can pawn the bios (ok, UEFI, a really buggy OS on itself)

    2. DaLo

      Re: Well routing is actually a very simple problem

      "Just receive a packet, look at its address,"

      Which address, MAC, IPv4, IPv6...? What if there is a mismatch?

      "look in your address table where to forward it to"

      Is it unicast, multicast, which address table? Is it a preconfigured address table, a dynamically generated table, has it been poisoned?

      Do you just trust the input and forward it? Do you allow firewall rules? Are these based on port, ip, mac, etc?

      What happens if the packet is corrupted? What happens if packets arrive out of order, are truncated, have jumbo frames. Do you allow dynamic routing? Which VLAN are they on? What if the external port is slower than the receiving port? Do you block, buffer etc?

      What you are describing is an unintelligent L2 switch (with no VLANs) not a router. Also one that trusts every interface - like a switch from 30 years ago.

    3. thegroucho

      Re: Well routing is actually a very simple problem

      Do you mean CLI, the type of management interface used on vast majority of 'proper' routers?

      Admittedly some of them have GUI but that can be disabled and the GUI just translates the mouse clicks into CLI command anyway.

    4. Mark 85

      Re: Well routing is actually a very simple problem

      This might be fine for a stand alone LAN that is air gapped to the Internet but since everyone one doesn't to want that, more is needed. I'm still not sure why an industrial control system needs internet access.. especially critical systems.

      1. Anonymous Coward
        Anonymous Coward

        Re: Well routing is actually a very simple problem

        " I'm still not sure why an industrial control system needs internet access.."

        Remote monitoring and diagnostics.

        I have a couple of 1MW flywheel UPS + generator systems which the maker insists on being publically addressable. After looking at what's running on them and gauging the risks they're firewalled to hell _within_ our network, let alone to the outside. The makers get access from their nominated IPs only and only on specific ports.

        One of the threats made amongst grumbles about making their life difficult was to install 3G cards and bypass our network entirely.

        The alternative is to have someone come out once a week and take measurements. This is included in the maintenance charges up to a point but they want to reduce their costs and be able to do remote diagnosis when things go pearshaped, before dispatching techs out to the site (usually with the wrong diagnosis and the wrong parts, but I digress).

  5. STZ

    Secure router, vulnerable SCADA & ICS behind ?

    Having a secure router OS is great, but does it help against routing malware-laden content to other boxes running Windows or Linux ?

    1. Anonymous Coward
      Anonymous Coward

      Re: Secure router, vulnerable SCADA & ICS behind ?

      Shirley those decisions are up to the owner?

    2. Charles 9

      Re: Secure router, vulnerable SCADA & ICS behind ?

      That is frankly none of its business. That's a job for the higher layers.

    3. Uffish

      Re: Secure router, vulnerable SCADA & ICS behind ?

      If I was a high-up in the Russian Telecoms Ministry I would have constant nightmares about other countries creeping and crawling round the Russian networks and would be very happy to have a solution to the problem. (Even if it were only a partial solution).

      Computers in factories etc would be a problem for the Industry Ministry.

      1. Aitor 1

        Re: Secure router, vulnerable SCADA & ICS behind ?

        quite clearly you can-t trust us companies for security reasons.

        1. Anonymous Coward
          Anonymous Coward

          Re: Secure router, vulnerable SCADA & ICS behind ?

          I'm sure some in the government would try to pin the blame on Snowden's revelations, but if Kaspersky has been working on this for four years, it predates his leak. There have been rumors of NSA/CIA activities where they've i.e. intercepted routers being shipped to a hostile country to install backdoors before that though. If you were Russia, wouldn't you rather be sure?

          Since you might reasonably assume Russia could do the same, I guess the best protection would be to use three routers - one from Cisco, one from Kaspersky, and one from Huawei, one behind another. No way anyone knows the backdoors for all three, and even needing three different exploits would raise the bar considerably for more "standard" attacks.

          1. Alan Brown Silver badge

            Re: Secure router, vulnerable SCADA & ICS behind ?

            "There have been rumors of NSA/CIA activities where they've i.e. intercepted routers being shipped to a hostile country to install backdoors before that though"

            Usually by installing a custom boomloader.

            It's not such a bad idea to reinstall the entire OS and bootloader when you receive your router. It might not get rid of all the NSA spyware but it should help (and you can at least obtain MD5sums/SHA256 of such things to compare with the published ones)

            1. Anonymous Coward
              Anonymous Coward

              Re: Secure router, vulnerable SCADA & ICS behind ?

              "Usually by installing a custom boomloader."

              I thought they did it by swapping the chips so that bootloaders, firmwares, etc. pass signature checks and they can't be defeated without swapping the chips again or (probably because the chip contains a suicide mechanism) by throwing the whole thing out.

              And as for someone not being able to pwn routers from three different companies simultaneous, don't be so sure. Some state agencies actually think that way.

          2. energystar
            Angel

            Re: Secure router, vulnerable SCADA & ICS behind ?

            "... I guess the best protection would be to use three routers - one from Cisco, one from Kaspersky, and one from Huawei, one behind another."

            And nothing gets through...

  6. Sgt_Oddball
    Black Helicopters

    And another thing......

    What of updates? I would assume that there would be the possibility of running updates from time to time? How would these be received and could the updates themselves become a vector, a USB perhaps in which case what's to stop nasties getting that way either?

    Also how easy would it be to lock down (don't forget whilst good security is commendable, nay, a requirement these days if it requires 6 months training to do rather than a skim of the manual then it's not going to be followed very closely).

    (also it's ok now. the helicopters have gone away again (I'm actually quite serious...))

    1. Anonymous Coward
      Anonymous Coward

      Re: And another thing......

      It's awfully easy to bake-in the public half of an authentication key-pair so every device can verify any updates before installing anything.

      Hell, even M$ can manage that!... some of the time... to varying degrees of competence...

      1. Anonymous Coward
        Anonymous Coward

        Re: And another thing......

        "It's awfully easy to bake-in the public half of an authentication key-pair so every device can verify any updates before installing anything."

        And what's to stop a state-level adversary from acquiring the private half?

        1. Anonymous Coward
          Anonymous Coward

          Re: And another thing......

          If they do, they still have to trick the router's owner into installing the "open NSA backdoor" update.

          1. Anonymous Coward
            Anonymous Coward

            Re: And another thing......

            Since the NSA would probably obtain the private signing key, that's the easy part since the router will think it's legit (since it's signed with the official key).

            1. Anonymous Coward
              Anonymous Coward

              Re: And another thing......

              Even with the signing key, they have to get the update to their admins to install. Routers don't just go out on the internet and automatically download their own updates.

              1. Charles 9

                Re: And another thing......

                Oh? Aren't they already on the Internet?

                1. Anonymous Coward
                  Anonymous Coward

                  Re: And another thing......

                  Yes they are, but if the router doesn't currently have a backdoor, how you are going to install the backdoor software on it? If they have an exploit for it, they never needed a backdoor in the first place.

                  1. Anonymous Coward
                    Anonymous Coward

                    Re: And another thing......

                    Unless it was found after the fact, meaning they can now insert the exploit into a later firmware (which they can sign because an insider slipped them the signing key) and then send through the Internet (since it's a router DESIGNED for the Internet) or simply post as a security update for the admins to install on their own (which they'll likely trust since it passes signature checks and a state-level agency can pull off enough masquerades to pass off as the real thing).

  7. Tikimon
    Thumb Up

    It's a dirty job, but SOMEbody has to try

    It's pretty clear we can't depend on the established players to get this right. Does anyone have any faith in Microsoft, Apple, or IOT vendors? While acknowledging the challenges they face, maybe Kaspersky can bring something new and workable to the table. If nothing else, they are putting security first in this project. Everyone else puts it dead last.

    Good luck to them!

    1. Anonymous Coward
      Anonymous Coward

      Re: It's a dirty job, but SOMEbody has to try

      Everyone else puts security last because it doesn't sell. For most customers, security gets in the way of actual work, and actual work is the first priority of any company; otherwise there's no reason for them existing.

      For example, having a door you have to manually pull each time becomes a problem when your job normally requires you to carry large but high-confidence things around with both hands in and out all day long (because, say, you're a trusted courier). Now you have conflicting orders. You need to maintain security because of the sensitivity of your charges, but you still need to be able to get in and out; things start to get complicated.

    2. Anonymous Coward
      Anonymous Coward

      Re: It's a dirty job, but SOMEbody has to try

      Saying everyone puts security last is not really fair. That was true in the past, both Microsoft and Apple had times where security was an afterthought at best, completely ignored at worst.

      While Microsoft has a lot of things you can complain about, since Windows 7 Windows has been pretty stable, gets regular security fixes, and hasn't had another Code Red / I Love You type scenario for years now. The blue screen of death used to be common with Windows 9x/NT/2000/XP, it is pretty rate these days.

      Apple certainly deserved their reputation for thinking "we are invulnerable to hacking, so we can ignore security" in the past, but they do a better job than Microsoft or Google now. They file a CVE for every single security fix they make, even for issues discovered internally, and document them all for each patch, so you know exactly what subsystems are being touched from a security perspective. They published a 60 page iOS security guide that goes into great detail about the inner workings of iOS with relation to encryption and other methods of keeping your data secure both on your device, as well as with services like iCloud. They designed a secure enclave into their SoC, which runs the formally verified L4 microkernel, and is used to protect encryption keys, fingerprint data, and other ultra sensitive data. That's hardly "putting security last".

      1. Charles 9

        Re: It's a dirty job, but SOMEbody has to try

        "The blue screen of death used to be common with Windows 9x/NT/2000/XP, it is pretty rate these days."

        Really?

        You would think something exposed to the public like this would run an OS with a higher degree of reliability, or at least a better way to restart itself unattended.

  8. Anonymous Coward
    Anonymous Coward

    Er, not quite..

    Kaspersky Labs has finished building its eponymously-named operating system after four years of further quiet development.

    FIFY - they've been working on this a LOT longer than just the last 4 years.

  9. lukewarmdog
    Joke

    Really hoping it's cutting edge, having read that you can tell what a hard drive is doing just by listening to the drive noise, I really hope they've got a fake noise generator in there, when you translate what you think it's doing, it's just playing "cant' touch this".

    1. Paul Crawford Silver badge
      Stop

      Hammer time!

  10. Anonymous Coward
    Anonymous Coward

    It's Russia

    Who's going to trust them for seriously sensitive stuff in the West?

    1. Chris G

      Re: It's Russia

      It's Russia, NSA, Huawei etc! Who really trusts anyone for seriously sensitive stuff anywhere in the world?

      How much Western stuff has backdoors, do we know for sure what has and what has not?

      I don't trust Western governments any more than Eastern governments.

      Why not wait a couple of weeks to see what it actually is and how it works?

      Criticising maybes and what ifs, is a waste of time.

      1. Anonymous Coward
        Anonymous Coward

        Re: It's Russia

        "I don't trust Western governments any more than Eastern governments."

        In other words, you don't trust ANYONE. Which begs the question: why are you even on the Internet?

  11. Alan Brown Silver badge

    Um....

    VRP is linux, IOS is a trainwreck of stuff cisco's borged and jammed together.

    It sounds like Kaspersky is reinventing QNX

    1. Charles 9

      Re: Um....

      Actually, it looks to be reinventing seL4 according to the specs. seL4 is the first formally-proven kernel, and this looks to be the second.

  12. Anonymous Coward
    Anonymous Coward

    No such thing as unexploitable

    Still, people have to make sales somehow I suppose.

    You can have a formally proven kernel all you want, but when there is a will to break into a system, a way will be found. CPU's can have exploitable bugs, you ram can be made to work against you (see rowhammer attack) or in the case of a router, it can be bypassed altogether with an air-gap attack.

    1. Anonymous Coward
      Anonymous Coward

      Re: No such thing as unexploitable

      Trouble is, at some point you have to go, "Sod this" and just go for it since you can easily go into DTA Mode and freeze yourself with paranoia (or maybe even kill yourself because you end up not trusting yourself). If it ever got to the point that DTA Mode was completely justified, civilization itself would inevitably collapse.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon