Operating Systems 15 - security

Slides:



Advertisements
Similar presentations
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Advertisements

Access Control Chapter 3 Part 3 Pages 209 to 227.
System Files and Process Environment Password file Group file System identification Time Process environment.
Access Control Methodologies
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Access Control Intro, DAC and MAC System Security.
Operating Systems Recitation 11, June 9-10, 2002.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Li Xiong CS573 Data Privacy and Security Access Control.
FORESEC Academy FORESEC Academy Security Essentials (II)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
G53SEC 1 Access Control principals, objects and their operations.
Li Xiong CS573 Data Privacy and Security Access Control.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.
Security in Computing Protection in General-Purpose Operating Systems.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Lecture 5 User Authentication modified from slides of Lawrie Brown.
OPERATING SYSTEMS 1 - HARDWARE PIETER HARTEL 1. Hardware 2.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
Trusted Operating Systems
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Authentication (and Unix Password Security). 2 Authentication means to establish proof of identity. We will look at these three methods of authentication.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Advanced Programming in the UNIX Environment Hop Lee.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
MLS/MCS on SE Linux Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework Uses.
Information Security Access Control.
Identity and Access Management
TCSEC: The Orange Book.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Lab 05 Firewalls.
Protection and Security
Chapter One: Mastering the Basics of Security
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Computer Data Security & Privacy
Radius, LDAP, Radius used in Authenticating Users
CompTIA Security+ Study Guide (SY0-401)
Discretionary Access Control (DAC)
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Chapter 14: Protection.
Protection in Operating Systems
CE Operating Systems Lecture 21
Discretionary Access Control (DAC)
SECURITY IN THE LINUX OPERATING SYSTEM
OS Access Control Mauricio Sifontes.
Computer Security Protection in general purpose Operating Systems
CS703 - Advanced Operating Systems
Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls.
Presentation transcript:

Operating Systems 15 - security PIETER HARTEL

Contents Authentication Passwords Tokens Biometrics Access control Policies Mechanisms Auditing Logs Intrusion detection

Passwords Why the salt? Salt: two characters of hashed password; 4096 possibilities The salt prevents duplicate passwords from being visible Increases the difficulty of dictionary attacks Increases the difficulty of finding out whether a person has used the same password on different machines By how much does the salting mechanism increase the resilience against password cracking? # entries in the passwd file. Why? Slow hash means take a word from the dictionary and hash it, then see if it occurs in any of the entries With salt this does not work any more, there will be a slow has for every entry for every word in the dictionary. Kerberos does not use the passwd file. Instead it hashes the password on the client and tries to decrypt a challenge from the server with the hashed password as the key.

Reading the password file Output? gcc Getpwent.c ./a.out | more Is there a memory leak? ls –l /etc/shadow /etc/passwd int main(int argc, char* argv[]) { struct passwd *p; while ((p = getpwent()) != NULL) { printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd, p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell); } endpwent(); return 0; $ ./a.out foo:x:1234:5678:bar:/home/foo:/bin/bash etc To investigate whether there is a memory leak, let’s print p and see… gecos field contains the full name The shadow password file simply separates the hashed passwords from the remaining data that must be readable by the world. $ ls -l /usr/bin/passwd rwsr-xr-x 1 root shadow 81824 2008-12-03 13:26 /usr/bin/passwd

Tokens Advantages Generally stronger than passwords Disadvantages May require special hardware Can be lost Authentication protocol Static Dynamic password generator Challenge response Static: follow me printers Dynamic passwords are time based and require synchronization between token and server Cyber-crime Science

Biometrics [Jai00] A. K. Jain, L. Hong, and S. Pankanti. Biometric identification. Commun. ACM, 43(2):90-98, Feb 2000. http://doi.acm.org/10.1145/328236.328110 IIS

Access control policies Policy types Discretionary Mandatory Role based DAC: access control based on the identity of the subject and on access rules that state what identities are allowed to do. Subjects with the right access may grant other subjects access too, hence discretionary. E.g. with write permission on a directory, you can give access to the files in the directory. MAC: uses security labels (i.e. classified, top secret) to grant access of subject and object have compatible clearance levels. Mandatory because subjects cannot change anything. RBAC arose to deal with large numbers of users with the same or similar access requirements.

Discretionary access control mechanisms (for “files”) Enforcement by the reference monitor The matrix is usually sliced (why?) Access control list per object Capabilities per subject The RM must be trusted… The matrix has #objects x #subjects cells and is spars, hence a column major or a row major representation works better See book section 12.8: An ACL states which subjects have which access to the object associated with the ACL A capability states what a subject can do with an object. It is essential that the system manages the capabilities for the subjects otherwise it would be too easy for subjects to given the capabilities away to others.

Role based access control Group user by role Encourage users to switch role Principle of the least privilege Try to pick a role in which you can do what needs to be done, whilst doing the least amount of damage. E.g. a sysadmin should not login as root and co things that do not need root access. Think of rm *…

Monitoring logins #define llsz sizeof(struct lastlog) int main(int argc, char *argv[]) { FILE *fp=fopen("/var/log/lastlog", "r"); int i; for(i=1;i<argc;i++) { struct passwd *p = getpwnam(argv[i]); if(p == NULL) { printf("unknown user: %s\n", argv[i]); } else { struct lastlog ll; fseek(fp, p->pw_uid*llsz, 0); fread(&ll, llsz, 1, fp); printf("%s %s %s %s", argv[i], ll.ll_line, ll.ll_host, ctime(&ll.ll_time)); } fclose(fp); return 0; Monitoring logins last gcc Lastlog.c ./a.out lecturer student Is there a problem? man 5 lastlog ls –l /var/log/lastlog $ ./a.out lecturer student lecturer pts/1 pc1.university Fri Aug 10 12:56:48 2012 student pts/3 pc2.university Thu Aug 9 11:52:55 2012 ll.ll_time is a 32 bit time value, whereas ctime expects a 64 bit time value…

Summary Authentication and access control try to prevent problems Auditing tries to detect problems Technology is only part of the problem Mechanism and policy