Linux Capability Zutao Zhu 10/23/2009. Outline Question 2 Question 5 Question 6.

Slides:



Advertisements
Similar presentations
Configuring a Router Harold Hernandez, MS, CCNI. 3.1 Configuring a Router Name a router Set passwords Examine show commands Configure a serial interface.
Advertisements

Florida State UniversityCOP Advanced Unix Programming Raw Sockets Datalink Access Chapters 25, 26.
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Basic Unix system administration
Using VMX within Linux We explore the feasibility of executing ROM-BIOS code within the Linux x86_64 kernel.
PlanetLab Operating System support* *a work in progress.
Diagnostics. Module Objectives By the end of this module participants will be able to: Use diagnostic commands to troubleshoot and monitor performance.
Docker Security Rahul Sharma. Our Problem Sandboxing user coding assessments : Compile / Run different languages Allow to extract result Control network.
1 UNIX 1 History of UNIX 2 Overview of UNIX 3 Processes in UNIX 4 Memory management in UNIX 5 The UNIX file system 6 Input/output in UNIX.
1 Case Study 1: UNIX and LINUX Chapter History of unix 10.2 Overview of unix 10.3 Processes in unix 10.4 Memory management in unix 10.5 Input/output.
Lesson 22 – Introduction to Linux Systems Administration.
Linux+ Guide to Linux Certification, Second Edition
Security Improvements in Linux Using Capabilities
Linux Security Module (LSM) Framework By Hasari Tosun 11/30/2006.
Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network.
Sharing Files Richard Newman based on Smith “Elementary Information Security”
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Operating System Program 5 I/O System DMA Device Driver.
Linux Filesystem Management
Linux Intrusion Detection/Defense System (LIDS) - Sowmya Ponugoti - Binita Mehta - Christopher James.
Files & Directories Objectives –to be able to describe and use the Unix file system model and concepts Contents –directory structure –file system concepts.
Linux in More Detail Shirley Moore CPS5401 August 29,
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Click Router: Hands on Arvind Venkatesan Shivkumar Kalyanaraman.
4P13 Week 1 Talking Points. Kernel Organization Basic kernel facilities: timer and system-clock handling, descriptor management, and process Management.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 6 System Calls OS System.
Troubleshooting and Performance
IPtables Objectives Contents Practicals Summary
EMT 2390L Lecture 5 Dr. Reyes Reference: The Linux Command Line, W.E. Shotts.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
Spam Mail FilterJeff Rupp & Frank Watson1 Implement Spam Mail Filtration inside Linux kernel Jeff Rupp and Frank Watson.
Linux+ Guide to Linux Certification, Third Edition
CSI3131 – Lab 1 Observing Process Behaviour. Running Linux under Virtual PC  Start Virtual PC  This Windows program provides a virtual machine to run.
1 Unix Architecture. 2 Operating Systems Concepts 1. Process 2. Memory management 3. Information protection & security 4. Scheduling and resource management.
CSC414 “Introduction to UNIX/ Linux” Lecture 2. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
The Unix File system (UFS) Presented by: Gurpreet Singh Assistant Professor Department of School of Computing and Engineering Galgotias University.
Click Router: Hands on Alex Newman Arvind Venkatesan Shivkumar Kalyanaraman.
Lab 12 Department of Computer Science and Information Engineering National Taiwan University Lab12 – Driver 2014/12/16 1 /21.
Linux Use the Command-Line Interface to Administer the System.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Secure System Development Mechanisms CS460 Cyber Security Lab Spring 2010.
Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Karlstad University Operating System security Ge Zhang Karlstad University.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
SE Linux Implementation Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework.
Introduction to Unix – CS 21
CIT 480: Securing Computer Systems
Case Study 1: UNIX and LINUX
SE Linux Implementation
IP Network Layer and Ethernet Encapsulation
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Using the WUGS-20 GigE Line Card
Privilege Separation in Condor
UNIX System Protection
Security and File Permission
Linux Security Module (LSM) Framework
The Linux Command Line Chapter 9
LINUX System : Lecture 7 Lecture notes acknowledgement : The design of UNIX Operating System.
From ACCEPT to MASQUERADE Tim(othy) Clark (eclipse)
Module 12 Network Configuration
1.3 Given a scenario, apply appropriate Microsoft command line tools
Access Control and Audit
Presentation transcript:

Linux Capability Zutao Zhu 10/23/2009

Outline Question 2 Question 5 Question 6

Question2: Capabilities cap dac read search cap dac override cap fowner cap chown cap fsetid cap sys module cap kill cap net admin cap net raw cap sys nice cap sys time

CAP_DAC_READ_SEARCH Usage: /* Overrides all DAC restrictions regarding read and search on files and directories, including ACL restrictions if [_POSIX_ACL] is defined. Excluding DAC access covered by CAP_LINUX_IMMUTABLE. */ How: try to open a file owned by root, using a normal user

CAP_DAC_OVERRIDE Usage: /* Override all DAC access, including ACL execute access if [_POSIX_ACL] is defined. Excluding DAC access covered by CAP_LINUX_IMMUTABLE. */ How: try to write to a file owned by root, using a normal user

CAP_FOWNER Usage: /* Overrides all restrictions about allowed operations on files, where file owner ID must be equal to the user ID, except where CAP_FSETID is applicable. It doesn't override MAC and DAC restrictions. */ How: try to change the mode of a file owned by root

CAP_CHOWN Usage: /* In a system with the [_POSIX_CHOWN_RESTRICTED] option defined, this overrides the restriction of changing file ownership and group ownership. */ How: chown command!

CAP_FSETID Usage: /* Overrides the following restrictions that the effective user ID shall match the file owner ID when setting the S_ISUID and S_ISGID bits on that file; that the effective group ID (or one of the supplementary group IDs) shall match the file owner ID when setting the S_ISGID bit on that file; that the S_ISUID and S_ISGID bits are cleared on successful return from chown(2) (not implemented). */ How: man –S 2 chmod, use chmod()

CAP_SYS_MODULE Usage: /* Insert and remove kernel modules - modify kernel without limit */ How: apply to insmod or rmmod. First locate the module location, usually it is in //usr/local/lib (.so) file, /sbin/insmod libmp3lame.so

CAP_KILL Usage: /* Overrides the restriction that the real or effective user ID of a process sending a signal must match the real or effective user ID of the process receiving the signal. */ How: apply to “kill” command!

CAP_NET_ADMIN Usage: /* Allow interface configuration */ /* Allow administration of IP firewall, masquerading and accounting */ /* Allow setting debug option on sockets */ /* Allow modification of routing tables */ /* Allow setting arbitrary process / process group ownership on sockets */ /* Allow binding to any address for transparent proxying */ /* Allow setting TOS (type of service) */ /* Allow setting promiscuous mode */ /* Allow clearing driver statistics */ /* Allow multicasting */ /* Allow read/write of device-specific registers */ /* Allow activation of ATM control sockets */ How: apply to ifconfig command! Ifconfig eth0 ip

CAP_NET_RAW Usage: /* Allow use of RAW sockets */ /* Allow use of PACKET sockets */ How: ping!

CAP_SYS_NICE Usage: /* Allow raising priority and setting priority on other (different UID) processes */ /* Allow use of FIFO and round-robin (realtime) scheduling on own processes and setting the scheduling algorithm used by another process. */ /* Allow setting cpu affinity on other processes */ How: apply to nice(). man –S 2 nice

CAP_SYS_TIME Usage: /* Allow manipulation of system clock */ /* Allow irix_stime on mips */ /* Allow setting the real-time clock */ How: apply to “date” command to change the system clock

Question 5 Use the vulnerable program in buffer- overflow lab You can use focus on CAP_DAC_READ_SEARCH Use cap_disable and cap_drop like use_cap.c to demo that capability really helps!

Question 6 Use the vulnerable program in race condition lab You can use focus on CAP_DAC_READ_SEARCH Use cap_disable and cap_drop like use_cap.c to demo that capability really helps!

Reference include/linux/capability.h Manual pages

Questions?