Chapter 24: Auditing

advertisement
Chapter 25: User Security
•
•
•
•
•
Policy
Access
Files, devices
Processes
Electronic communications
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-1
Policy
• Assume user is on Drib development network
–
Policy usually highly informal and in the mind of the
user
• Our users’ policy:
U1 Only users have access to their accounts
U2 No other user can read, change file without owner’s
permission
U3 Users shall protect integrity, confidentiality,
availability of their files
U4 Users shall be aware of all commands that they enter
or that are entered on their behalf
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-2
Access
• U1: users must protect access to their
accounts
– Consider points of entry to accounts
• Passwords
• Login procedure
• Leaving system
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-3
Passwords
• Theory: writing down passwords is BAD!
• Reality: choosing passwords randomly makes
them hard to remember
– If you need passwords for many systems, assigning
random passwords and not writing something down
won’t work
• Problem: Someone can read the written password
• Reality: degree of danger depends on
environment, how you record password
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-4
Isolated System
• System used to create boot CD-ROM
– In locked room; system can only be accessed
from within that room
• No networks, modems, etc.
– Only authorized users have keys
• Write password on whiteboard in room
– Only people who will see it are authorized to
see it
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-5
Multiple Systems
• Non-infrastructure systems: have users use
same password
– Done via centralized user database shared by all
non-infrastructure systems
• Infrastructure systems: users may have
multiple accounts on single system, or may
not use centralized database
– Write down transformations of passwords
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-6
Infrastructure Passwords
• Drib devnet has 10 infrastructure systems, 2 lead
admins (Anne, Paul)
– Both require privileged access to all systems
– root, Administrator passwords chosen randomly
• How to remember? Memorize an algorithm!
– Anne: “change case of 3rd letter, delete last char”
– Paul: “add 2 mod 10 to first digit, delete first letter”
• Each gets printout of transformed password
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-7
Non-Infrastructure Passwords
• Users can pick
– Proactive password checker vets proposed password
• Recommended method: passwords based on
obscure poems or sayings
– Example: “ttrs&vmbi” from first letter of second,
fourth words of each line, putting “&” between them:
He took his vorpal sword in hand:
Long time the manxome foe he sought—
So rested he by the Tumtum tree,
And stood awhile in thought.
Third verse of Jabberwocky, from Alice in Wonderland
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-8
Analysis
• Isolated system meets U1
– Only authorized users can enter room, read password,
access system
• Infrastructure systems meet U1
– Actual passwords not written down
– Anne, Paul don’t write down algorithms
– Stealing papers does not reveal passwords
• Non-infrastructure systems meet U1
– Proactive password checker rejects easy to guess
passwords
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-9
Analysis
• Procedures about walking away meet U1
– Screen locking programs required, as is locking doors
when leaving office; failure to do so involves
disciplinary action
– If screen locking password forgotten, system
administrators can remotely access system and
terminate program
• Procedures about modems meet U1
– No modems allowed; hooking one up means getting
fired (or similar nasty action)
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-10
Persistence
• Disk blocks of deleted file returned to pool of
unused disk blocks
• When reassigned, new process may be able to read
previous contents of disk blocks
– Most systems offer a “wipe” or “cleaning” procedure
that overwrites disk blocks with zeros or random bit
patterns as part of file deletion
– Useful when files being deleted contain sensitive data
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-11
Why?
• Eliminate password sharing problem
– Role accounts under Linux are user accounts
– If two or more people need access, both need role
account’s password
• Program solves this problem
– Runs with root privileges
– User supplies his/her password to authenticate
– If access allowed, program spawns command
interpreter with privileges of role account
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-12
Requirements
1. Access to role account based on user,
location, time of request
2. Settings of role account’s environment
replaces corresponding settings of user’s
environment, but rest of user’s
environment preserved
3. Only root can alter access control
information for access to role account
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-13
More Requirements
4. Mechanism provides restricted,
unrestricted access to role account
•
•
Restricted: run only specified commands
Unrestricted: access command interpreter
5. Access to files, directories, objects owned
by role account restricted to those
authorized to use role account, users
trusted to install system programs, root
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-14
High-Level Design
1. Obtain role account, command, user, location,
time of day
• If command omitted, assume command interpreter
(unrestricted access)
2. Check user allowed to access role account
a) at specified location;
b) at specified time; and
c) for specified command (or without restriction)
If user not, log attempt and quit
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-15
Time Representation
• Use ranges expressed (reasonably) normally
Mon-Thu 9AM-5PM
– Any time between 9AM and 5PM on Mon, Tue, Wed,
or Thu
Mon 9AM-Thu 5PM
– Any time between 9AM Monday and 5PM Thursday
Apr 15 8AM-Sep 15 6PM
– Any time from 8AM on April 15 to 6PM on September
15, on any year
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-16
Windows Vista Firewall
• Both inbound and outbound
• Authentication and
authorization aware
• Outbound application-aware
filtering is now possible
– Includes IPSec management
– Of course, policy-based
administration
– Great for Peer-to-Peer control
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-17
Network Access Protection
Policy Servers
e.g. Microsoft Security
Center, SMS, Antigen
or 3rd party
3
1
Windows
Vista Client
Not policy
compliant
2
DHCP, VPN
Switch/Router
Microsoft
Network
Policy Server
Fix Up
Servers
Restricted
Network
e.g. WSUS, SMS
& 3rd party
Policy
compliant
5
November 1, 2004
4
Introduction to Computer Security
©2004 Matt Bishop
Corporate Network
Slide #12-18
Control Over Device Installation
• Control over removable device installation via a policy
– Mainly to disable USB-device installation, as many corporations worry
about intellectual property leak
– You can control them by device class or driver
• Approved drivers can be pre-populated into trusted Driver Store
• Driver Store Policies (group policies) govern driver packages
that are not in the Driver Store:
– Non-corporate standard drivers
– Unsigned drivers
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-19
Client Security Scanner
• Finds out and reports Windows client’s security state:
–
–
–
–
Patch and update levels
Security state
Signature files
Anti-malware status
• Ability for Windows to self-report its state
• Information can be collected centrally, or just reviewed
in the Security Center by the users and admins
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-20
Code Integrity
• All DLLs and other OS executables have
been digitally signed
• Signatures verified when components load
into memory
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-21
BitLocker™
• BitLocker strongly encrypts and signs the entire hard drive (full
volume encryption)
– TPM chip provides key management
– Can use additional protection factors such as a USB dongle, PIN or
password
• Any unauthorised off-line modification to your data or OS is
discovered and no access is granted
– Prevents attacks which use utilities that access the hard drive while
Windows is not running and enforces Windows boot process
• Protects data after laptop theft etc.
• Data recovery strategy must be planned carefully!
– Vista supports three modes: key escrow, recovery agent, backup
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-22
RMS, EFS, and BitLocker
• Three levels of protection:
– Rights Management Services
• Per-document enforcement of policy-based rights
– Encrypting File Systems
• Per file or folder encryption of data for confidentiality
– BitLocker™ Full Volume Encryption
• Per volume encryption (see earlier)
• Note: it is not necessary to use a TPM for RMS and EFS
– EFS can use smartcards and tokens in Vista
– RMS is based, at present, on a “lockbox.dll” technology, not a TPM
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-23
Vista Supports NSA Suite B
www.nsa.gov/ia/industry/crypto_suite_b.cfm
• Required cryptographic algorithms for all US non-classified and classified
(SECRET and TOP-SECRET) needs
– Higher special-security needs (e.g. nuclear security) – guided by Suite A
(definition classified)
– Announced by NSA at RSA conference in Feb 2005
• Encryption: AES
– FIPS 197 (with keys sizes of 128 and 256 bits)
• Digital Signature: Elliptic Curve Digital Signature Algorithm
– FIPS 186-2 (using the curves with 256 and 384-bit prime moduli)
• Key Exchange: Elliptic Curve Diffie-Hellman or Elliptic Curve MQV
– Draft NIST Special Publication 800-56 (using the curves with 256 and 384-bit
prime moduli)
• Hashing: Secure Hash Algorithm
– FIPS 180-2 (using SHA-256 and SHA-384)
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-24
Resource Access Control Facility
(RACF)
• Access control software for IBM
mainframe.
• Operates at the OS level.
• Can interface with Customer Information
Control System (CICS), IBM’s system for
end user account management.
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-25
RACF Functions
• identify and verify system users
• identify, classify, and protect
system resources
• authorize the users who need
access to the resources you've
protected
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-26
RACF Functions
• control the means of access to
these resources
• log and report unauthorized
attempts at gaining access to the
system and to the protected
resources
• administer security to meet your
installation's security goals.
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-27
Summary
Hierarchy of logical security:
Operating system
Access control software
Data communication software
Application
Data level
Procedures
November 1, 2004
Introduction to Computer Security
©2004 Matt Bishop
Slide #12-28
Download