DOC PREVIEW
Stanford CS 155 - Access Control and Operating System Security

This preview shows page 1-2-3-4-31-32-33-34-35-63-64-65-66 out of 66 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 66 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Access Control and Operating System SecurityOutlineAccess controlAccess control matrix [Lampson]Two implementation conceptsCapabilitiesRoles (also called Groups)Groups for resources, rightsMulti-level Security ConceptsMilitary security policySlide 11Commercial versionBell-LaPadula Confidentiality ModelPicture: ConfidentialityBiba Integrity ModelPicture: IntegrityProblem: Models are contradictoryOther policy conceptsExample OS MechanismsMulticsMultics time periodMultics InnovationsMultics Access ModelUnix file securityQuestionEffective user id (EUID)Process Operations and IDsSetid bits on executable Unix fileExampleCompare to stack inspectionSetuid programmingUnix summaryAccess control in Windows (NTFS)Sample permission optionsPermission InheritanceTokensSecurity DescriptorExample access requestImpersonation Tokens (setuid?)Encrypted File Systems (EFS, CFS)Q: Why use crypto file system?SELinux Security Policy AbstractionsSecure Operating SystemsSample Features of Trusted OSAuditTrusted pathKernelized DesignSELinuxWhy Linux?Rainbow SeriesAssurance methodsOrange Book Criteria (TCSEC)Levels B, A (continued)Orange Book Requirements (TCSEC)Common CriteriaProtection ProfilesEvaluation Assurance Levels 1 – 4Evaluation Assurance Levels 5 – 7Example: Windows 2000, EAL 4+PowerPoint PresentationIs Windows is “Secure”?Limitations of Secure OSNoninterferenceExample: Smart CardCovert ChannelsSlide 66Access Control and Operating System SecurityJohn MitchellOutlineAccess Control•Matrix, ACL, Capabilities•Multi-level security (MLS)OS Policies•Multics–Ring structure•Unix–File system, Setuid•Windows–File system, Tokens, EFS•SE Linux–Role-based–Domain type enforcementSecure OS•Methods for resisting stronger attacksAssurance•Orange Book, TCSEC•Common Criteria•Windows 2000 certificationSome Limitations•Information flow•Covert channelsAccess controlCommon Assumption•System knows who the user is–User has entered a name and password, or other info•Access requests pass through gatekeeper–Global property; OS must be designed so that this is true?ResourceUser processDecide whether user can apply operation to resourceReferencemonitorAccess control matrix [Lampson]File 1 File 2 File 3 … File nUser 1read write - - readUser 2write write write - -User 3- - - read read…User mread write read write readTwo implementation conceptsAccess control list (ACL)•Store column of matrix with the resourceCapability•Allow user to hold a “ticket” for each resource•Roughly: store row of matrix with the userFile 1 File 2 …User 1 read write -User 2 write write -User 3 - - read…User mread write writeAccess control lists are widely used, often with groupsSome aspects of capability concept are used in Kerberos, …CapabilitiesOperating system concept•“… of the future and always will be …”Examples•Dennis and van Horn, MIT PDP-1 Timesharing•Hydra, StarOS, Intel iAPX 432, Amoeba, Eros, …Reference•Henry Levy, Capability-based Computer Systemshttp://www.cs.washington.edu/homes/levy/capabook/Roles (also called Groups)Role = set of users•Administrator, PowerUser, User, Guest•Assign permissions to roles; each user gets permissionRole hierarchy•Partial order of roles•Each role getspermissions of roles below•List only new permissions given to each roleAdministratorGuestPowerUserUserGroups for resources, rights Permission = right, resourceGroup related resourcesHierarchy for rights or resources •If user has right r, and r>s, then user has right s•If user has read access to directory, user has read access to every file in directoryBig problem in access control•Complex mechanisms require complex input•Difficult to configure and maintain•Roles, other organizing ideas try to simplify problemMulti-level Security ConceptsMilitary security policy–Classification involves sensitivity levels, compartments–Do not let classified information leak to unclassified filesGroup individuals and resources•Use some form of hierarchy to organize policyOther concepts•Separation of duty•Chinese Wall PolicyMilitary security policySensitivity levelsTop SecretSecretConfidentialRestrictedUnclassifiedCompartmentsSatellite dataAfghanistanMiddle EastIsraelMilitary security policyClassification of personnel and data•Class = rank, compartmentDominance relation •D1  D2 iff rank1  rank2 and compartment1  compartment2•Example: Restricted, Israel  Secret, Middle East Applies to•Subjects – users or processes•Objects – documents or resourcesCommercial version InternalProprietaryPublicProduct specificationsIn productionOEMDiscontinuedBell-LaPadula Confidentiality ModelWhen is it OK to release information?Two Properties (with silly names)•Simple security property–A subject S may read object O only if C(O)  C(S)•*-Property–A subject S with read access to O may write object P only if C(O)  C(P)In words,•You may only read below your classification and only write above your classificationPicture: Confidentiality SPublicProprietaryRead below, write aboveSPublicProprietaryRead above, write belowBiba Integrity ModelRules that preserve integrity of informationTwo Properties (with silly names)•Simple integrity property–A subject S may write object O only if C(S)  C(O) (Only trust S to modify O if S has higher rank …)•*-Property–A subject S with read access to O may write object P only if C(O)  C(P) (Only move info from O to P if O is more trusted than P)In words,•You may only write below your classification and only read above your classificationPicture: Integrity SPublicProprietaryRead above, write belowSPublicProprietaryRead below, write aboveProblem: Models are contradictoryBell-LaPadula Confidentiality•Read down, write upBiba Integrity•Read up, write downWant both confidentiality and integrity•Only way to satisfy both models is only allow read and write at same classification In reality: Bell-LaPadula used more than Biba modelExample: Common CriteriaOther policy conceptsSeparation of duty•If amount is over $10,000, check is only valid if signed by two authorized people•Two people must be different•Policy involves role membership and Chinese Wall Policy•Lawyers L1, L2 in Firm F are experts in banking •If bank B1 sues bank B2,–L1 and L2 can each


View Full Document

Stanford CS 155 - Access Control and Operating System Security

Documents in this Course
Lecture 5

Lecture 5

64 pages

Phishing

Phishing

31 pages

Load more
Download Access Control and Operating System Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Access Control and Operating System Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Access Control and Operating System Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?