An Overview Rick Anderson Pat Demko

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Operating System Security
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
JENNIS SHRESTHA CSC 345 April 22, Contents Introduction History Flux Advanced Security Kernel Mandatory Access Control Policies MAC Vs DAC Features.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
By: Arpit Pandey SELINUX (SECURITY-ENHANCED LINUX)
1 Flexible Mandatory Access Control (MAC) in Modern Operating Systems Jeffrey H. Jewell CS 591 December 7, 2009 Jeffrey H. Jewell CS 591 December 7, 2009.
Chapter 9 Building a Secure Operating System for Linux.
SELinux (Security Enhanced Linux) By: Corey McClurg.
Security-Enhanced Linux Joseph A LaConte CS 522 December 8, 2004.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Shane Jahnke CS591 December 7,  What is SELinux?  Changing SELinux Policies  What is SLIDE?  Reference Policy  SLIDE  Installation and Configuration.
SELinux. 2SELinux Wikipedia says: Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM)
Linux Security.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Security-Enhanced Linux & Linux Security Module The George Washington University CS297 Programming Language & Security YU-HAO HU.
SELinux US/Fedora/13/html/Security-Enhanced_Linux/
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Linux kernel security Professor: Mahmood Ranjbar Authors: mohammad Heydari Mahmood ZafarArjmand Zohre Alihoseyni Maryam Sabaghi.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
FOSS Security through SELinux (Security Enhanced Linux) M.B.G. Suranga De Silva Information Security Specialist TECHCERT c/o Department of Computer Science.
Co-design Environment for Secure Embedded Systems Matt Eby, Janos L. Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue Institute.
1 Implementation of Security-Enhanced Linux Yue Cui Xiang Sha Li Song CMSC 691X Project 2—Summer 02.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Using the Flask Security Architecture to Facilitate Risk Adaptable Access Control March 31 Younsik Jeong Ph.D. Student.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
G53SEC 1 Access Control principals, objects and their operations.
Chapter 7 Securing Commercial Operating Systems. Chapter Overview Retrofitting Security into a Commercial OS History of Retrofitting Commercial OS's Commercial.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
SELinux. The need for secure OS Increasing risk to valuable information Dependence on OS protection mechanisms Inadequacy of mainstream operating systems.
Multics CysecLab Graduate School of Information Security KAIST.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Trusted Operating Systems
The SELinux of First Look. Prologue After many discussions with a lot of Linux users, I’ve come to realize that most of them seem to disable SELinux rather.
Security-Enhanced Linux Eric Harney CPSC 481. What is SELinux? ● Developed by NSA – Released in 2000 ● Adds additional security capabilities to Linux.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
5/7/2007CoreMcClug/SELinux 1 By: Corey McClurg. Outline A History of SELinux What is SELinux and how do I get it? Getting Started Mandatory Access Control.
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
MLS/MCS on SE Linux Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework Uses.
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity)
Overview of NSA Security Enhanced Linux Russell Coker.
SELinux Overview Dan Walsh SELinux for Dummies Dan Walsh
Red Hat Enterprise Linux 5 Security April Red Hat Development Model Collaboration with partners and open source contributors to develop technology.
SE Linux Implementation Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework.
Identity and Access Management
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Protection and Security
Security Enhanced Administrative Role Based Access Control Models
SE Linux Implementation
What is an Operating System?
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
SELinux (Security Enhanced Linux)
SECURITY IN THE LINUX OPERATING SYSTEM
Chapter 29: Program Security
NSA Security-Enhanced Linux (SELinux)
Access Control What’s New?
Mandatory Access Control and the Real World
Presentation transcript:

An Overview Rick Anderson Pat Demko SE Linux An Overview Rick Anderson Pat Demko

Origins NSA research Security enhanced Linux kernel Implements Mandatory Access Control policies RBAC Type Enforcement Multi-level security

How the “Bomb was Dropped” January 2001 the NSA introduces a “Security-Enhanced version” of the Linux 2.2 kernal. Open source code was introduced along with designing documentation!!! THE NSA DOES NOT DO THIS!!! “It’s like the Pope inviting everyone over to his place to watch a soccer game and have a few beers (Secure Electronics Transactions)”

What were the goals?? Not to be focused on just Crypto Incorporate Crypto with MAC policies Increase policy flexibilities Separation of enforcement from policy decisions They want a crypto policy that is flexible Just like the system security policy is. Crypto isn’t always required, so let’s be flexible Look at the security context.

Architecture Overview Not the standard, rather, it is included in the standard. (IBM.com) The Flask architecture Security policy is in a separate component of the OS Known as the Security Server Hybrid of Type Enforcement, RBAC and multilevel security (MLS)

Flask Architecture

Security Server Provides a SID only for LEGAL: User Role Type MLS range “Legal” established by security policy configuration

Object Managers Consult SS to get an access decision Based on a pair of labels Subject and object labels Object’s class Define a mechanism for assigning labels to their objects. No policy-specific logic in object managers.

SID Updates Runtime changes in security policy SS updates SID mapping by canceling SID’s that are no longer authorized Permanent integer SID (PSID) is put with a file and mapped to a security label. Flask labels and controls file descriptions.

Privileges When a program is executed, privileges can change Permissions could be removed from dangerous programs Roles, Roles, Roles!!!!

The Many faces of SID Associated with a file Used in creation of a file This is different for when file is in use! Let’s us check the access to a file’s parent directory Type/Domain distinction??? NOPE A domain is a type…but is associated with a process So, you can separate permissions for a process

Roles Defined in the configuration Each process has a role associated with it System_r role User_r role

Summary Policy configuration goals: Control raw access to data Protect integrity of kernel and software Protecting a process from running malicious code Confining damages Protect Admin role from entry without authentication

Final Remarks What is not expressly permitted is FORBIDDEN!! Exactly what we want in a security system- No Gray areas

Sources http://www.nsa.gov/selinux http://www-128.ibm.com/developerworks/library/s-selinux http://www-128.ibm.com/developerworks/library/s-selinux2