DOC PREVIEW
Stanford CS 155 - Study Notes

This preview shows page 1-2-3-4-31-32-33-34-35-63-64-65-66 out of 66 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Access Control and Operating System SecurityOutlineAccess controlAccess control matrix [Lampson]Two implementation conceptsCapabilitiesACL vs CapabilitiesSlide 8Slide 9Roles (also called Groups)Role-Based Access ControlGroups for resources, rightsMulti-Level Security (MLS) ConceptsMilitary security policySlide 15Commercial versionBell-LaPadula Confidentiality ModelPicture: ConfidentialityBiba Integrity ModelPicture: IntegrityProblem: Models appear contradictoryOther policy conceptsExample OS MechanismsMulticsMultics time periodMultics InnovationsMultics Access ModelMultics processAmoebaSlide 30Unix file securityQuestionEffective user id (EUID)Process Operations and IDsSetid bits on executable Unix fileExampleCompare to stack inspectionSetuid programmingUnix summaryAccess control in Windows (NTFS)Sample permission optionsPermission InheritanceTokensSecurity DescriptorExample access requestImpersonation Tokens (=setuid?)SELinux Security Policy AbstractionsSlide 48What makes a “secure” OS?Sample Features of “Trusted OS”Controlling information flowSample Features of Trusted OSInteresting risk: data lifetimeSlide 54Kernelized DesignAuditAssurance methodsCommon CriteriaProtection ProfilesEvaluation Assurance Levels 1 – 4Evaluation Assurance Levels 5 – 7Example: Windows 2000, EAL 4+Slide 63Is Windows is “Secure”?Secure attention sequence (SAS)SummaryAccess Control and Operating System Security John MitchellCS 155Spring 2006Outline Access Control ConceptsMatrix, ACL, CapabilitiesMulti-level security (MLS)OS MechanismsMulticsRing structureAmoebaDistributed, capabilitiesUnixFile system, SetuidWindowsFile system, Tokens, EFSSE LinuxRole-based, Domain type enforcementAssurance, LimitationsSecure OSMethods for resisting stronger attacksAssuranceOrange Book, TCSECCommon CriteriaWindows 2000 certificationSome LimitationsInformation flowCovert channelsAccess controlAssumptionsSystem knows who the user isAuthentication via name and password, other credential Access requests pass through gatekeeperSystem must not allow monitor to be bypassedResourceUser processReferencemonitoraccess requestpolicy?Access control matrix [Lampson]File 1 File 2 File 3 … File nUser 1read write - - readUser 2write write write - -User 3- - - read read…User mread write read write readSubjectsObjectsTwo implementation conceptsAccess control list (ACL)Store column of matrix with the resourceCapabilityUser holds a “ticket” for each resourceTwo variationsstore row of matrix with user, under OS controlunforgeable ticket in user spaceFile 1 File 2 …User 1 read write -User 2 write write -User 3 - - read…User mread write writeAccess control lists are widely used, often with groupsSome aspects of capability concept are used in Kerberos, …CapabilitiesOperating system concept“… of the future and always will be …”ExamplesDennis and van Horn, MIT PDP-1 TimesharingHydra, StarOS, Intel iAPX 432, Eros, …Amoeba: distributed, unforgeable ticketsReferencesHenry Levy, Capability-based Computer Systemshttp://www.cs.washington.edu/homes/levy/capabook/Tanenbaum, Amoeba papersACL vs CapabilitiesAccess control listAssociate list with each objectCheck user/group against listRelies on authentication: need to know userCapabilitiesCapability is unforgeable ticketRandom bit sequence, or managed by OSCan be passed from one process to anotherReference monitor checks ticketDoes not need to know identify of user/processACL vs CapabilitiesProcess PUser UProcess QUser UProcess RUser UProcess PCapabilty c,dProcess QProcess RCapabilty cCapabilty cACL vs CapabilitiesDelegationCap: Process can pass capability at run timeACL: Try to get owner to add permission to list?More common: let other process act under current userRevocationACL: Remove user or group from listCap: Try to get capability back from process?Possible in some systems if appropriate bookkeepingOS knows what data is capabilityIf capability is used for multiple resources, have to revoke all or none …Other details …10Roles (also called Groups)Role = set of usersAdministrator, PowerUser, User, GuestAssign permissions to roles; each user gets permissionRole hierarchyPartial order of rolesEach role getspermissions of roles belowList only new permissions given to each roleAdministratorGuestPowerUserUserRole-Based Access ControlIndividuals Roles Resourcesengineeringmarketinghuman resServer 1Server 3Server 2Advantage: user’s change more frequently than rolesGroups for resources, rights Permission = right, resourcePermission hierarchies If user has right r, and r>s, then user has right sIf user has read access to directory, user has read access to every file in directoryGeneral problem in access controlComplex mechanisms require complex inputDifficult to configure and maintainRoles, other organizing ideas try to simplify problem13Multi-Level Security (MLS) ConceptsMilitary security policyClassification involves sensitivity levels, compartmentsDo not let classified information leak to unclassified filesGroup individuals and resourcesUse some form of hierarchy to organize policyOther policy conceptsSeparation of duty“Chinese Wall” Policy14Military security policySensitivity levelsTop SecretSecretConfidentialRestrictedUnclassifiedCompartmentsSatellite dataAfghanistanMiddle EastIsraelMilitary security policyClassification of personnel and dataClass = rank, compartmentDominance relation D1  D2 iff rank1  rank2 and compartment1  compartment2Example: Restricted, Israel   Secret, Middle East Applies toSubjects – users or processesObjects – documents or resources16Commercial version InternalProprietaryPublicProduct specificationsIn productionOEMDiscontinuedBell-LaPadula Confidentiality ModelWhen is it OK to release information?Two Properties (with silly names)Simple security propertyA subject S may read object O only if C(O)  C(S)*-PropertyA subject S with read access to O may write object P only if C(O)  C(P)In words,You may only read below your classification and only write above your classification18Picture: Confidentiality SPublicProprietaryRead below, write aboveSPublicProprietaryRead above, write below19Biba Integrity ModelRules that preserve integrity of


View Full Document

Stanford CS 155 - Study Notes

Documents in this Course
Lecture 5

Lecture 5

64 pages

Phishing

Phishing

31 pages

Load more
Download Study Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?