G22.3250-001 Robert Grimm New York University Protection and the Control of Information Sharing in Multics.

Slides:



Advertisements
Similar presentations
Operating System Structures
Advertisements

Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 3 Multics. Chapter Overview Multics contribution to technology Multics History Multics System – Fundamentals – Security Fundamentals – Protection.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Bilkent University Department of Computer Engineering
File Management Systems
Reasons for Protection n Prevent users from accessing information they shouldn’t have access to. n Ensure that each program component uses system resources.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Common System Components
Chapter 12 File Management Systems
Lecture 7 Access Control
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Protection.
Systems Security & Audit Operating Systems security.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Controlling Files Richard Newman based on Smith “Elementary Information Security”
IOS110 Introduction to Operating Systems using Windows Session 8 1.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
G53SEC 1 Access Control principals, objects and their operations.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
Multics CysecLab Graduate School of Information Security KAIST.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Lecture9 Page 1 CS 236 Online Operating System Security, Con’t CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
CSE Operating System Principles Protection.
PROTECTION.
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Operating System Concepts
Operating System Structure
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
UNIX System Protection
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 2: Operating-System Structures
Chapter 14: Protection.
Introduction to Operating Systems
Operating Systems: A Modern Perspective, Chapter 3
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 2: Operating-System Structures
Operating System Concepts
Chapter 14: Protection.
Presentation transcript:

G Robert Grimm New York University Protection and the Control of Information Sharing in Multics

Last Time: Unix  What is the key innovation of Unix?  Unified I/O: Files, pipes, sockets all use the same API  What other important feature offers considerable power?  Inheritance of open file descriptors in forked processes  I/O redirection from/to files, between processes  Shell uses file descriptor 0 for standard intput and 1 for output  How does protection work in Unix?  Through access control lists in the file system  Owner, group, everyone else  Set-User-ID for protection domain transfers

Protection in Multics

The Three Questions  What’s the problem?  What is new or different?  What are the contributions and limitations?

Diggin’ Deeper  How to design for protection?  Design principles  How to specify access restrictions?  Access control lists  How to authenticate users?  Passwords  How to protect memory?  Segment descriptors  Where did we go wrong?  Size of trusted computing base, complexity of UI

Design Principles  Five principles  Require explicit permission instead of exclusion  Check every access  Do not rely on security by obscurity  Operate with the least necessary privilege  Make the UI easy to use  Two functional objectives  Allow decentralized control  Make the protection system extensible  We cannot anticipate all ways of enforcing protection

The Storage System and Access Control  A hierarchical storage system  Comprising catalogs (directories) and segments (files)  Later message queues and removable media descriptors  Accessed through memory-mapped I/O  Each storage system object has an ACL  Mapping from principals to access rights  Principals are partitioned into three parts  User name  Project  Compartment  ACL entries may contain wildcards for partitions

More Details on Access Control  Access control lists are ordered  First match determines rights  Need to carefully insert new entries, favoring more specific ones  Each directory has a default ACL  Copied onto new objects  Users and projects never go away  Otherwise, would have to delete invalid ACL entries (?)  Object owner has full control over ACL  Others cannot restrict it (!?)  E.g., instructor cannot set overall policy for students

Even More Details: Hierarchical Controls  Access control is hierarchical  Write access to directories implies right to modify ACLs  Can be used to provide centralized control  Detour: Access control in Windows 2000  Swift et al., ACM TISSEC 5(4): , Nov  Supports both centralized and local control  Using inherited as well as local ACL entries  Favors speed of access checks over space used by ACLs  Policy propagated down the tree after ACL changes  Places local entries before inherited entries  First matching entry applies

Some Rejected Design Points  Placing permissions on objects (instead of placing them on ACL entries)  Too inflexible as different users need different rights  CTSS put permissions on objects, used (hard) links as separate entry points (capabilities)  Hard to revoke access  Access modes to same object depend on name  Hard to determine rights  Using user-specified reference monitors  Hard to isolate the owner-specified procedure  Cannot run as user seeking access — why?  Cannot run as supervisor — why?

User Authentication  Based on user names and passwords  All operations require (interactive) authentication  Supports proxy logins (!?)  Generates passwords automatically  With English digraph statistics  Stores passwords in encrypted form  Does not print passwords  Automatically logs out idle users  Tracks (un)successful logins  Supports stronger checks and anonymous logins

Memory Protection  Memory organized into segments  Each memory access is through a segment descriptor  Per-process descriptor segment lists all descriptors  Pointer to physical memory  List of access rights  Number of gates  ID of protected subsystem (0-7)  Which modern processor also uses rings of protection?  Can we think of a more flexible scheme? Or, do we need more flexibility?

Memory Protection (cont.)  I/O channel programs (drivers) run as supervisor  Overall, memory protection allows for economy of mechanism  One mechanism to access data  One mechanism to control everyone  Including the supervisor

Two Major Weaknesses  Size of trusted computing base  15% of all code, 300 modules with ~200 lines (60,000 lines)  Three factors  Presumed execution speed  Tight deadlines  Lack of understanding  Complexity of user interface for access lists  Permitted users and projects  Corresponding permissions  Right to backup, perform bulk I/O  Protected subsystem

More Weaknesses  Communication lines are weak  Operator interface is weak  Direct access to hardware  Users may specify their own passwords  No semantic checks on supervisor interface  Secondary storage is cleared on reuse not deallocation  Administrators are overprivileged  Backups expose other users’ directories

More Weaknesses (cont.)  Counter-intelligence is lacking  Hardware protection may fail  “Relatively straight forward modification can easily strengthen any of the areas”  Do we believe this?

Discussion