Introduction To Computer and NetworkSecurity
Introduction To Computer and NetworkSecurity
I
)NFRASTRUCTURE 3ECURITY
.ETWORK AND 3ECURITY 2ESEARCH #ENTER
$EPARTMENT OF #OMPUTER 3CIENCE AND %NGINEERING
0ENNSYLVANIA 3TATE 5NIVERSITY 5NIVERSITY 0ARK 0!
CSE543 - Introduction to
Computer and Network Security
Module: Operating System Security
Ring 0
• Attacks on “register”
• Attacks on “install policy”
• Attacks on “system calls”
Systems and Internet Infrastructure Security (SIIS) Laboratory
Page
14
KERNEL
/* from fs/fcntl.c */ (4) fi
2002]!
(7) dup2( fd
err = security ops->file ops
->fcntl(filp, cmd, arg); KERNEL
... /* thi
err = do fcntl(fd, cmd, arg, filp); * fil
*/
‣
(8) fi
} (9) lo
static long
do_fcntl(unsigned int fd, Fig
unsigned int cmd,
/* from fs/locks.c */
dentry structu
on the inode s
fcntl_getlk(fd, ...) {
struct file * filp;
CQUAL!
Figure 8: Code path from Linux 2.4.9 containing an ex-
...
ploitable type error.
It is also quite c
Systems
CSE543and Internet Infrastructure
- Introduction to ComputerSecurity (SIIS) Laboratory
and Network Security Page
Page 21
28 an
data structure
LSM Enforcement
• Several LSMs have been deployed
‣ Most prominent: AppArmor, SELinux, Smack,
TOMOYO
• The most comprehensive is SELinux
‣ Used by RedHat Fedora and some others
Systems
CSE543and Internet Infrastructure
- Introduction to ComputerSecurity (SIIS) Laboratory
and Network Security Page
Page 10
32
Take Away
• Goal: Build authorization into operating systems
‣ Multics and Linux
• Requirements: Reference monitor
‣ Satisfy reference monitor concept
• Multics
‣ Hierarchical Rings for Protection
‣ Call/Access Bracket Policies (in addition to MLS)
• Linux
‣ Did not enforce security (DAC, Setuid, root daemons)
‣ So, the Linux Security Modules framework was added
‣ Approximates reference monitor assuming network threats
only -- some challenges in ensuring complete mediation
CSE543 - Introduction to Computer and Network Security Page 33