Unformatted text preview:

CSE543 Computer (and Network) Security - Fall 2006 - Professor JaegerCSE 543 - Computer SecurityLecture 10 - Access ControlOctober 5, 2006URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/1CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page TCB (an aside …)•The trusted computing base is the infrastructure that you assume will behave correctly–Hardware (keyboard, monitor, …)–Operating Systems–Implementations–Local networks–Administrators–Other users on the same system•Axiom: the larger the TCB, the more assumptions you must make (and hence, the more opportunity to have your assumptions violated).CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Blindly Following Policy•First, what is a policy?–Some statement of secure procedure or configuration that parameterizes the operation of a system•Example: Airport Policy–You need to put your things through X-ray machine–Take off your shoes (only if it has metal)•Does anybody understand the “metal” part here?–Laptops by themselves–Metal detector•Purpose: to prevent someone from bringing in a (metal) weapon …CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page … when policy goes wrong•Driving license test: take until you pass–Mrs. Miriam Hargrave of Yorkshire, UK failed her driving test 39 times between 1962 and 1970!!!!–… she had 212 driving lessons ….–She finally got it on the 40th try.–Some years later, she was quoted as saying, “sometimes I still have trouble turning right”CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Access Control/Authorization•An access control system determines what rights a particular entity has for a set of objects•It answers the question–E.g., do you have the right to read /etc/passwd–Does Alice have the right to view the EECS website?–Do students have the right to share project data?–Does Dr. Jaeger have the right to change your grades?•An Access Control Policy answers these questionsCSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Simplified Access Control•Subjects are the active entities that do things–E.g., you, Alice, students, Dr. Jaeger •Objects are passive things that things are done to–E.g., /etc/passwd, CSE website, project data, grades•Rights are actions that are taken–E.g., read, view, share, changeCSE543 Computer (and Network) Security - Fall 2005 - Professor McDanielProtection domainProtection DomainsProgram AFiles•The protection domain restricts access of external parties to our computing system’s resources•How is this done today?•Memory protection•E.g., UNIX protected memory, file-system permissions (rwx…)•A protection state describes access of all programs7MemoryCSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Access Control Policy•“A policy is a set of acceptable behaviors.”- F. Schneider •An access control policy is a function:P(S,O,R) -> { accept, deny }–Where, set S=subjects, O=objects, R=rights•The policy is a lot of these tuples, whether explicitly represented that way or not. •There are many, many ways to represent these.CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page The Access Matrix•An access matrix is one way to represent policy.–Frequently used mechanism for describing policy•Columns are objects, subjects are rows.•To determine if Si has right to access object Oj, find the appropriate entry.•Succinct descriptor for O(|S|*|O|) entries•Matrix for each right.O1O2O3S1YYNS2NYNS3NYYCSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Designing an access control system•Separation of policy from mechanism–A mechanism is the tool we use to enforce policy, e.g., the filesystem interfaces, etc.–Policy is that which details rights•Idea: separation gives us the ability to chance the meaning of policy or the enforcement of it quickly “Let me try to explain to you, what to my taste is characteristic for all intelligent thinking. It is, that one is willing to study in depth an aspect of one’s subject matter in isolation for the sake of its own consistency, all the time knowing that one is occupying oneself only with one of the aspects. We know that a program must be correct and we can study it from that viewpoint only; we also know that is should be efficient and we can study its efficiency on another day. But nothing is gained on the contrary by tackling these various aspects simultaneously. It is what I sometimes have called the separation of concerns.”DijkstraCSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Access Policy Enforcement•A protection state defines what each subject can do–E.g., in an access matrix•A reference monitor enforces the protection state–A service that responds to the query...•P(S,O,R) -> { accept, deny }• • A correct reference monitor implementation meets the following guarantees– Tamperproof– Complete Mediation– Simple enough to verify• Why are these guarantees important?CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Access Control •Reference Monitor is Central to Authorization•Consider the Trust and Threat Models in AuthorizationTrusted Computing BaseProcess ProcessReferenceMonitor InterfaceReferenceMonitorProtectionStateCSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page Access Control AdministrationThere are two central ways to specify a policy2.Discretionary - object “owners” define policy –Users have discretion over who has access to what objects and when (trusted users)–Canonical example, the UNIX filesystem–RWX assigned by file owners3.Mandatory - Environment enforces static policy –Access control policy defined by environment, user has no control control over access control decisions (untrusted users)–Canonical example, process labeling•System assigns labels for processes, objects, and a dominance calculus is used to evaluate rightsCSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page DAC vs. MAC•Discretionary Access Control–User defines the access policy–Can pass rights onto other subjects (discretion)–Their programs can pass their rights•Consider a Trojan horse•Mandatory Access Control–System defines access policy–Subjects cannot pass rights –Subjects programs cannot


View Full Document

PSU CSE 543 - Access Control

Documents in this Course
Agenda

Agenda

14 pages

HYDRA

HYDRA

11 pages

PRIMA

PRIMA

15 pages

CLIMATE

CLIMATE

15 pages

Load more
Download Access Control
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Access Control and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Access Control 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?