protection and security. policy & mechanism protection mechanisms are tools used to implement...

31
Protection and Security

Post on 19-Dec-2015

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection and Security

Page 2: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Policy & Mechanism• Protection mechanisms are tools used to

implement security policies– Authentication– Authorization– Cryptography

• A security policy reflects an organization’s strategy for authorizing access to the computer’s resources only to authenticated parties– Accountants have access to payroll files– OS processes have access to the page table– Client process has access to information provided by a

server

Page 3: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Security Goals

Resource X

Resource W

Resource Y

Resource ZProcess A

Process B

Process C

• Authentication• Authorization

read

read/write read

read/write

Machine X

Machine Y

Page 4: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Authentication• User/process authentication

– Is this user/process who it claims to be?• Passwords

• More sophisticated mechanisms

• Authentication in networks– Is this computer who it claims to be?

• File downloading

• Obtaining network services

• The Java promise

Page 5: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Authorization

• Is this user/process allowed to access the resource under the current policy?

• What type of access is allowable?– Read– Write– Execute– Append

Page 6: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Lampson’s Protection Model• Active parts (e.g., processes)

– Operate in different domains– Subject is a process in a domain

• Passive parts are called objects

• Want mechanism to implement different security policies for subjects to access objects– Many different policies must be possible– Policy may change over time

Page 7: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

A Protection System

Subjects

XS

Objects

•S desires access to X

Page 8: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

A Protection System

Subjects

XS

Objects

ProtectionState

•S desires access to X•Protection state reflects current ability to access X

Page 9: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

A Protection System

Subjects

XS

Objects

ProtectionState

StateTransition•S desires access to X

•Protection state reflects current ability to access X•Authorities can change

Page 10: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

A Protection System

Subjects

XS

Objects

ProtectionState

StateTransition

Rules

•S desires access to X•Protection state reflects current ability to access X•Authorities can change•What are rules for changing authority?

Page 11: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

A Protection System

Subjects

XS

Objects

ProtectionState

StateTransition

Rules

Policy

•S desires access to X•Protection state reflects current ability to access X•Authorities can change•What are rules for changing authority?•How are the rules chosen?

Page 12: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection System Example

S X

•S desires access to X

Page 13: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection System Example

S

X

Access matrix

S X

•S desires access to X•Captures the protection state

Page 14: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection System Example

S

X

Access matrix

SAccess

authentication

(S,

, X)

X

•S desires access to X•Captures the protection state•Generates an unforgeable ID

Page 15: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection System Example

S

X

SAccess

authenticationMonitor

(S,

, x)

X

•S desires access to X•Captures the protection state•Generates an unforgeable ID•Checks the access against the protection state

Page 16: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection State Example

S1

S2

S3

S1 S2 S3 F1 F2 D1 D2

control

control

control

blockwakeupowner

controlowner

stop

delete executeowner

owner update owner seek*

read*write*

seek owner

Page 17: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

A Protection System

Subjects

XS

Objects

ProtectionState

StateTransition

Rules

Policy

Handling state changes

Page 18: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Policy Rules Example

S1

S2

S3

S1 S2 S3 F1 F2 D1 D2

control

control

control

blockwakeupowner

controlowner

stop

delete executeowner

owner update owner seek*

read*write*

seek owner

Rule Command by S0 Authorization Effect1 transfer(|*) to (S, X) *A[S0, X] A[S, X] = A[S, X]{|*}2 grant(|*) to (S, X) ownerA[S0, X] A[S, X] = A[S, X]{|*}3 delete from (S, X) controlA[S0, S] A[S, X] = A[S, X]-{}

orownerA[S0, X]

Rules for a Particular Policy

Page 19: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection Domains• Lampson model uses processes and

domains -- how is a domain implemented?– Supervisor/user hardware mode bit– Software extensions -- rings

• Inner rings have higher authority– Ring 0 corresponds to supervisor mode– Rings 1 to S have decreasing protection, and

are used to implement the OS– Rings S+1 to N-1 have decreasing protection,

and are used to implement applications

Page 20: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Protection Domains (cont)• Ring crossing is a domain change

• Inner ring crossing rights amplification– Specific gates for crossing– Protected by an authentication mechanism

• Outer ring crossing uses less-protected objects– No authentication– Need a return path– Used in Multics and Intel 80386 (& above)

hardware

Page 21: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Implementing Access Matrix• Usually a sparse matrix

– Too expensive to implement as a table– Implement as a list of table entries

• Column oriented list is called an access control list (ACL)– List kept at the object– UNIX file protection bits are one example

• Row oriented list is a called a capability list– List kept with the subject (i.e., process)– Kerberos ticket is a capability– Mach mailboxes protected with capabilities

Page 22: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

More on Capabilities• Provides an address to object from a very

large address space

• Possession of a capability represents authorization for access

• Implied properties:– Capabilities must be very difficult to guess– Capabilities must be unique and not reused– Capabilities must be distinguishable from

randomly generated bit patterns

Page 23: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Cryptography• Information can be encoded using a key

when it is written (or transferred) -- encryption

• It is then decoded using a key when it is read (or received) -- decryption

• Very widely used for secure network transmission

Page 24: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

More on Cryptography

plaintext ciphertext

encryption

decryption

Page 25: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

More on Cryptography

plaintext plaintextEncryptEncrypt DecryptDecrypt

Ke Kd

C = EKe(plaintext)

Page 26: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

More on Cryptography

plaintext EncryptEncrypt DecryptDecrypt

Ke Kd

C = EKe(plaintext)

InvaderInvaderSide information plaintext

plaintext

Page 27: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

Cryptographic Systems

Cryptographic Systems

Conventional Systems Modern Systems

Private Key Public Key

•Ke and Kd are essentially the same

•Ke and Kd are private

•Ke is public•Kd is private

Page 28: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

KerberosAuthentication

Server

Client

Server

Page 29: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

KerberosAuthentication

Server

Client

Server

Client ID

Session Key

Session Key

Encrypted for clientEncrypted for server

Ticket

Page 30: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

KerberosAuthentication

Server

Client

Server

Client ID

Session Key

Session Key

Encrypted for clientEncrypted for server

Ticket Session Key

Page 31: Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography

KerberosAuthentication

Server

Client

Server

Client ID

Session Key

Session Key

Encrypted for clientEncrypted for server

Ticket

Client ID

Session Key

Ticket

Session Key

Client ID

Session Key