PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX

Size: px
Start display at page:

Download "PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX"

Transcription

1 PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX Final Report 12/10/09 Mike Detwiler UMBC Student CMSC Course 426 Baltimore, MD Peter Coddington UMBC Student CMSC Course 626 Baltimore, MD ABSTRACT Single user root access for operating systems is a security risk. This paper will explain how the root access can be split into two security policies one is in secure mode the other is administrative mode which is the traditional root access that currently allows the full access we see today. In this fashion one user can have only operational read only access (Secure Mode) while the other user can have full access for configuration changes (Administration Mode). Dividing policies and associated user access into two classes, helps mitigate risk at the root level for UNIX/Linux. 1. Introduction Traditionally, operating systems have an administrative account with elevated privileges for the purpose of system administration. On UNIX/Linux systems, this system administration account is given the username of root. Because the root account has unlimited privileges, it poses a single point of failure security risk. This is a single point of failure because one level of access and a single person has access to the entire root. An attacker gaining control of this account will have unfettered access to the system allowing him to exploit it many ways. A common exploit is to modify the system binary (executable) files for the attacker's malicious purposes. One possible means of preventing such attacks would be to eliminate the system administrator account. This would prevent any user from modifying the system maliciously. However, this would also prevent legitimate system modifications, such as software upgrades and other administrative tasks. Finding the proper balance between system security and system flexibility is the challenge. We propose a solution to this problem that creates two separate security policies thus creating two levels of access to the root. The first level will be run during normal operation of the system. This Secure Mode will use Security Enhanced Linux (SELinux) policies to enforce a system in which no user account has system administration privileges. Therefore, no user will be able to modify the system binary files. The second level or Administration Mode will be used only for the purpose of system administration tasks. When administration tasks such as software update are required, an administrator will boot into this kernel and perform the software upgrade. 2. Related Work Much of the previous work in this area has been centered on Security Enhanced Linux (SELinux). SELinux provided the necessary platform to create the additional security policy for the Secure Mode. SELinux evolved from a research project of the National Information Assurance Research

2 Laboratory of the National Security Agency (NSA) in conjunction with Secure Computing Corporation (SCC).[2] The goal of the project was to develop a strong, flexible mandatory access control architecture based on type enforcement. The NSA and SCC developed two prototypes of the architecture. They then worked with the University of Utah's Flux research group to transfer the architecture to the Fluke research operating system. Along the way, the architecture was enhanced to provide better support for dynamic security policies. This enhanced architecture was named Flask.[1,2,5] Because there was no widely used implementation of the Flask architecture, the NSA proposed integrating the architecture into the Linux operating system to so that it could benefit from exposure to a larger developer and user community. Linus Torvalds, the creator of the Linux kernel, did not want to endorse the NSA architecture as the only security system for Linux[5]. He noted that there were several other security projects in existence, and he did not want to favor one over the other. So he charged the security community with developing a flexible security framework for the kernel that would allow security modules to be loaded into the kernel. These modules would make decisions about mandatory access control (MAC).[2] After two years of effort and contributions from members of the security community, the result was Linux Security Modules (LSM)[5]. The NSA architecture was written as a Linux Security Modules and thus was born SELinux. Since that time, the architecture has been implemented in other operating systems, such as Solaris and BSD. Along with the Linux Security Module, NSA provided a reference security policy implementation.[4] The maintenance of this reference policy has been taken up by Tresys Technology. Tresys saw the need for a SELinux reference policy that was modular, extensible and could easily be adapted to the security goals of multiple projects. In addition, it was necessary to engage the SELinux community to ensure that the resulting technology could be transferred to Linux distributions and commercial Linux products. They developed a modular, comprehensive, welldocumented, and secure SELinux security policy[4]. It is now the basis for the standard SELinux security policy shipped by vendors such as Fedora/Redhat, Gentoo, and others. Each Linux distribution vendor takes reference policy and modifies it for their needs. The security policy shipped with Fedora/Redhat was the basis point for our research. 3. Model Threat Description The model/threat deals with the current access control methods which carry too much risk. The risk is created when the root user access is not divided into some additional levels of privileges. This research project divides access into two levels instead of just one level for all users. By creating two policies and therefore two levels of privileges, risk is mitigated with less users needing full administrative access to the root level. Many users can operate, for example, out on a network in only the secure mode this limits the access that others can get or even need to the root directory [1]. Many tasks do not need full root access with write access read access is enough. To mitigate this risk, dividing the risk and separating the development and software installation of updates to the Kernel and OS into one compartment and the installation of operational OS updates onto the current operational Kernel into another compartment makes sense. Specifically, this paper will propose and prove that creating a second kernel (Secure Kernel) from the existing kernel (Administrative Kernel) allows for separation and mitigates risk. The Administrative Kernel is accessible only to a certain set of trusted system administrators for the purpose of system installation and upgrade. The Secure Kernel will run during normal system operation.

3 4. ARCHITECTURE/PROPOSAL METHOD SELinux is an implementation of a MAC policy mechanism in the Linux kernel.[3] It further controls which operations are allowed after standard discretionary access controls are checked. It enforces rules on files and processes, and on their actions, based on a defined policy. Like other security solutions, in SELinux, files, including directories and devices, are referred to as objects. Processes, such as a user running a command, are referred to as subjects. The subject (or user) accesses the SELinux security Server (see diagram below) with a request. Then the SELinux server checks first the cache to see if that subject and the requested object have been accessed before if its not in the AVC (Access Vector Cache)[2,5] with approved access, the SELinux Security Server checks the SELinux for access control decision. If the subject-object access is within the accessible mode for either the secure or administrative mode, then the AVC is updated in the SELinux Security Server [1]. If the subject s requested object access is not allowed then an error message is issued. information is used to make access control decisions. In reference policy, the system binary directories and files are labeled with the type bin_t, while system library directories and files are labeled with the type lib_t. Our research approach was to modify SELinux reference policy to eliminate the ability of any user (including root) to modify system binary/library files. This is done by eliminating the privilege of managing any of the files labeled with these types from all users.[3] Our architecture will be based of the SELinux implementation that exists in the Linux kernel version as patched by Fedora, a Linux distribution vendor. Our security policy will be based off Fedora's Multi-Level Security policy[3] for SELinux, version As mentioned, Fedora's policy is based off of the reference policy maintained by Tresys. This policy can be downloaded from the Tresys git repository found at After analyzing the policy, we removed the privilege of the system administrator (sysadm_u) and security administrator (secadm_u) to manage files and directories labeled with type bin_t and lib_t. Since the security administrator normally has privileges to relabel files with a different type, these privileges must be stripped to eliminate a security hole. The unified diff of our changes to reference policy can be seen below. Policies[6]: Processes and files are labeled with an SELinux context that contains additional information, such as an SELinux user, role, type, and security level. When SELinux policy is enforced, all of this diff --git a/policy/modules/roles/secadm.te b/policy/modules/roles/secadm.te index ed4f9fd..b6ea3ce a/policy/modules/roles/secadm.te ,7 mls_file_upgrade(secadm_t) mls_file_downgrade(secadm_t) auth_role(secadm_r, secadm_t) -auth_relabel_all_files_except_shadow(secadm_t) +#auth_relabel_all_files_except_shadow(secadm_t)

4 +auth_relabel_all_files_except_shadow(secadm_t, { -bin_t -lib_t }) auth_relabel_shadow(secadm_t) init_exec(secadm_t) diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te index 2ed3c67..27cb0b a/policy/modules/roles/sysadm.te ,9 optional_policy(` rpc_domtrans_nfsd(sysadm_t) ') -optional_policy(` - rpm_run(sysadm_t, sysadm_r) -') +##optional_policy(` +# rpm_run(sysadm_t, sysadm_r) +#') optional_policy(` rssh_role(sysadm_r, sysadm_t) diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index f209ccf..a59c9fa a/policy/modules/system/userdomain.if ,9 template(`userdom_admin_user_template',` auth_getattr_shadow($1_t) # Manage almost all files - auth_manage_all_files_except_shadow($1_t ) + # auth_manage_all_files_except_shadow($1_t) + auth_manage_all_files_except_shadow($1_t,-bin_t -lib_t) # Relabel almost all files - auth_relabel_all_files_except_shadow($1_t) + # auth_relabel_all_files_except_shadow($1_t) + auth_relabel_all_files_except_shadow($1_t,- bin_t -lib_t) -1224,7 template(`userdom_security_admin_template',` selinux_set_all_booleans($1) selinux_set_parameters($1) - auth_relabel_all_files_except_shadow($1) + # auth_relabel_all_files_except_shadow($1) + auth_relabel_all_files_except_shadow($1,- bin_t -lib_t) auth_relabel_shadow($1) init_exec($1) After making these changes, the next step was to apply this patch to the Fedora selinux-policy package. This involved downloading the source rpm from Fedora, installing the rpm source, applying our patch, and then rebuilding the rpms. Once this was complete, we could install our patched policy on our test server. A reboot is necessary to allow the entire filesystem to be labeled according to the new security policy. Once this policy is fleshed out, the secure kernel will be safe from malicious attacks. Then next step will be to modify the kernel to determine which policy should be loaded at boot time. This will require further investigation of the kernel source code and libselinux, to implement a decision of which policy to load at runtime. 5. Security Analysis/Experiments The results of our secure policy enforcement were encouraging. After our policy had been loaded by the kernel, and the filesystem relabel, we began experimenting with our new system. The first test was to see if the root user could write to system binary or library directories or files. The images and their descriptions below demonstrate our results. The first image can be found at the end of this paper and is described as follows. The id command shows that the Linux user detwiler is logged in as the

5 SELinux user staff_u, with the staff_r role in the staff_t domain. It also shows the MLS range encompasses all levels of security (SystemLow- SystemHigh). The next command, semanage, cannot be run by the staff_r role, so it must be prefaced with the sudo command which has built in role transition which will be discussed shortly. The semanage user -l command lists summary information about the SELinux users defined in the currently loaded policy. The staff_u user has the following roles associated with it. auditadm_r: audit administrator staff_r: general staff role secadm_r: security administrator sysadm_r: system administrator system_r: role for system services/processes The staff_u user is allowed to transition into the above roles in order to perform tasks that are privileges of the corresponding role. The final command shows the point in the sudo configuration file where the Linux user detwiler is transitioned automatically into the sysadm_r role in the sysadm_t domain (type) when executing the sudo command. This setting can be overridden with command line options to the sudo command as we shall see shortly. The sestatus command shows that SELinux is enabled and in enforcing mode. The policy type is our modified Multi-Level Security (MLS) policy. $ ls -dz /bin This command lists the security context of one of the system binary directories. It shows that its type is bin_t. We first try to create a file named foo in the /bin directory by using the sudo command to transition to the sysadm_r role in the sysadm_t domain to execute the touch /bin/foo command. Standard MLS policy would normally give a user in this role permission to create this file, however, the secure policy prevents sysadm_r from writing to this directory. Next we use the sudo command to enter into a root shell. We again attempt to write a file to the /bin directory, and once again we find that even root does not have sufficient privileges. Our next step will to be to test a system library directory in the same way. Moving on, our next step is to exercise our secure policy. We start by attempting to write a new file to the /bin directory as shown in the image below. We see that the /lib system library directory is labeled lib_t. Because our policy has taken away privileges to write to this directory, permission is denied. Finally, root is also denied permission to write to this directory.

6 Our initial effort to secure reference policy assumed that removing the privilege to manage directories and files labeled with bin_t or lib_t would be sufficient to prevent installation of new, potentially malicious software. However, as we discovered, the program that installs software, rpm, runs in a privileged domain and was therefore still able to write to these directories, despite our policy changes. Finally, we need to test our policy that prevents SELinux context relabeling. Going back to the drawing board, we found the location in reference policy where permission was granted to the sysadm_r role to run rpm. We removed this privilege and reloaded our policy. We attempt to change the security type of /bin from bin_t to user_home_dir_t, the type of our home directory. The chcon command would normally allow a system or security administrator to do this depending on the type of policy. Our first attempt fails. Recall that the sudo configuration file transitions us into the sysadm_r role in the sysadm_t domain by default. We must override this setting with command line options to sudo to ensure that the security administrator is also unable to perform this command. We tell sudo to transition to the secadm_r role in the secadm_t domain before executing the chcon command. Alas, permission is denied for the secadm_r role to change security labels. 6.REMEDIATION In the image above we have asked yum, a command line tool that wraps around rpm, to install some new software. We answer yes when prompted. As we can see, the software download proceeds without incident, but when yum tries to invoke rpm to install the software, the installation fails. We have successfully blocked software installation and modifications. The creation of a second policy means that any need for configuration updates requires the normal operation of the system in secure mode for most of the users, will need to shut down the system to put in place the policy for the administration mode for access to the write only binary files. System shutdown between policy changes between Secure and Administrative mode still needed. Additionally, the task of switching between policies is still manual. Future work would need to look at means of automating that switch.

7 7. CONCLUSION SELinux allows for creating a separation of users for the root. Separation is one of the best means to help with security. By creating two policies where there was previously only one policy for one user makes access to the root more secure. Dividing the user population s access to the root into two groups, helps mitigate risk. 8. FUTURE WORK Future work would allow automatically work on three items: 1. Policy loads for SELinux would happen automatically on boot of the computer. The computer on boot would decide which policy Secure Mode or Administration Mode would load. Changing between policies can be difficult and would take effort to create a system that could do so [1]. 2. Secure Mode Policy could have some ore limits on privilege. The limits could be refined to insure further security. For example, certain libraries/binaries could be further limited through policy to restrict more access to the root directory. 3. This system can be further tested in a more robust environment. This project has created a system that has not been tested in a more robust operational/test environment. REFERENCES Gregory, Machon and Loscocco, Peter. Using the Flask security Architecture to facilitate Risk adaptable access controls. NSA. Loscocco, Peter and Smalley, Stephen. Integrating Flexible support for Security Policies into the Linux Operating System. NSA. Loscocco, Peter A. and Smalley, Stephen D. Meeting Critical Security Objectives with Security-Enhanced Linux. NSA. PeBenito, Christopher and Mayer, Frank and MacMillan, Karl. Reference Policy for Security Enhanced Linux. Tresys Technology. Smalley, Stephen, and Vance, Chris and Salamon, Wayne. Implementing SELinux as a Linux Security Model. NSA. Tresys Technology Open Source Software SELinux Reference Policy.

Security Enhanced Linux. Thanks to David Quigley

Security Enhanced Linux. Thanks to David Quigley Security Enhanced Linux Thanks to David Quigley History SELinux Timeline 1985: LOCK (early Type Enforcement) 1990: DTMach / DTOS 1995: Utah Fluke / Flask 1999: 2.2 Linux Kernel (patch) 2000: 2001: 2.4

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Bengt Nolin beno9295@student.uu.se October 13, 2004 Abstract A very brief introduction to SELinux; what it is, what is does and a little about how it does it. 1 1 Background 1.1

More information

MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX)

MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX) OPERATING SYSTEM SECURITY GUEST LECTURE MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX) PATRICK UITERWIJK PUITERWIJK@REDHAT.COM / PATRICK.UITERWIJK.ORG GPG KEY: 4096R/0X9AB51E50 0 MANDATORY

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Security Group Meeting 29 November 2002 Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ Computer Laboratory, University of Cambridge Copyright c Steven. J. Murdoch p.1 Summary

More information

What's New with SELinux

What's New with SELinux What's New with SELinux Stephen D. Smalley sds@tycho.nsa.gov National Information Assurance Research Laboratory National Security Agency National Information Assurance Research Laboratory 1 Advances in

More information

Meeting Critical Security Objectives with Security-Enhanced Linux

Meeting Critical Security Objectives with Security-Enhanced Linux Meeting Critical Security Objectives with Security-Enhanced Linux Peter A. Loscocco Information Assurance Research Group National Security Agency Co-author: Stephen D. Smalley, NAI Labs Information Assurance

More information

Access Control. SELinux. Mestrado Integrado em Engenharia Informática e Computação. Computer Systems Security

Access Control. SELinux. Mestrado Integrado em Engenharia Informática e Computação. Computer Systems Security Access Control SELinux Mestrado Integrado em Engenharia Informática e Computação Computer Systems Security João Carlos Eusébio Almeida - up201306301 João Gabriel Marques Costa - up201304197 May 17, 2017

More information

Reference Policy for Security Enhanced Linux Christopher J. PeBenito, Frank Mayer, Karl MacMillan Tresys Technology

Reference Policy for Security Enhanced Linux Christopher J. PeBenito, Frank Mayer, Karl MacMillan Tresys Technology Reference Policy for Security Enhanced Linux Christopher J. PeBenito, Frank Mayer, Karl MacMillan Tresys Technology Abstract The Reference Policy project is an effort to restructure the NSA example policy

More information

SELinux: A New Approach to Secure Systems

SELinux: A New Approach to Secure Systems SELinux: A New Approach to Secure Systems by Chris Runge Abstract In this whitepaper, we will examine Security-Enhanced Linux (SELinux), the benefits it brings, and how Red Hat is working to make those

More information

10/23/12. Fundamentals of Linux Platform Security. Linux Platform Security. Roadmap. Security Training Course. Module 4 Introduction to SELinux

10/23/12. Fundamentals of Linux Platform Security. Linux Platform Security. Roadmap. Security Training Course. Module 4 Introduction to SELinux Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Linux Platform Security Module 4 Introduction to SELinux Roadmap Why SELinux? Overview

More information

SELinux. Daniel J Walsh SELinux Lead Engineer

SELinux. Daniel J Walsh SELinux Lead Engineer SELinux Daniel J Walsh SELinux Lead Engineer 0 Day Exploits Patch Cycle Someone discovers a vulnerability in software Package Maintainer and OS Vendor Notified Fix generated/distributed Fix installed by

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Advanced Systems Security: Principles

Advanced Systems Security: Principles Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Using GConf as an Example of How to Create an Userspace Object Manager

Using GConf as an Example of How to Create an Userspace Object Manager Using GConf as an Example of How to Create an Userspace Object Manager James Carter National Security Agency Abstract GConf is a configuration system for GNOME. It does not provide adequate security controls

More information

Red Hat Enterprise Linux

Red Hat Enterprise Linux Red Hat Enterprise Linux Security www.redhat.com A Powerful Collection of Red Hat Enterprise Linux Security Tools Computing security has never been more important. Increasing regulations, differing requirements

More information

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné

More information

Cloud Under Control. HyTrust Two-Man Rule Solution Brief

Cloud Under Control. HyTrust Two-Man Rule Solution Brief HyTrust Two-Man Rule Solution Brief Summary Summary The exposure of extremely confidential national security information by an N.S.A. systems administrator highlighted the catastrophic consequences of

More information

Core Policy Management Infrastructure for SELinux

Core Policy Management Infrastructure for SELinux Core Policy Management Infrastructure for SELinux 2005 SELinux Symposium Karl MacMillan Tresys Technology http://www.tresys.com Core Policy Management Infrastructure Production

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Application of the Flask Architecture to the X Window System Server

Application of the Flask Architecture to the X Window System Server Application of the Flask Architecture to the X Window System Server Eamon Walsh ewalsh@tycho.nsa.gov National Security Agency National Information Assurance Research Laboratory ( NIARL ) 1 Overview of

More information

Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Last Updated: 2017-10-20 Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Mirek Jahoda Red Hat Customer Content Services mjahoda@redhat.com

More information

SELinux Basics. Clint Savage Fedora Ambassador. Fedora Classroom November 9, 2008

SELinux Basics. Clint Savage Fedora Ambassador. Fedora Classroom November 9, 2008 SELinux Basics Clint Savage Fedora Ambassador Fedora Classroom November 9, 2008 What is SELinux? Another layer of security Created by the NSA / Red Hat Helps add to the multiple layers of defense Generally

More information

Computer Security. 02r. Assignment 1 & Access Control Review. Paul Krzyzanowski David Domingo Ananya Jana. Rutgers University.

Computer Security. 02r. Assignment 1 & Access Control Review. Paul Krzyzanowski David Domingo Ananya Jana. Rutgers University. Computer Security 02r. Assignment 1 & Access Control Review Paul Krzyzanowski David Domingo Ananya Jana Rutgers University Spring 2019 Question 1 What three Internet-enabled vulnerability categories does

More information

SELinux Workshop Redux. Jamie Duncan, Senior Technical Account Manager RVaLUG - 18 April 2014

SELinux Workshop Redux. Jamie Duncan, Senior Technical Account Manager RVaLUG - 18 April 2014 SELinux Workshop Redux Jamie Duncan, Senior Technical Account Manager RVaLUG - 18 April 2014 Red Hat and SELinux Red Hat leads the way in SELinux development. John Dennis, Ulrich Drepper, Steve Grubb,

More information

Design and Implementation of the SELinux Policy Management Server

Design and Implementation of the SELinux Policy Management Server Design and Implementation of the SELinux Policy Management Server Joshua Brindle, Karl MacMillan, Frank Mayer, David Caplan, and Jason Tang, Tresys Technology, LLC Policy Management What is policy management?

More information

Secureworld Conference

Secureworld Conference P14 Emily Ratliff Advances in Linux Security: The Linux Security Modules Project Secureworld Conference 1 n Legal Statement This work represents the views of the author and does not necessarily reflect

More information

CSE Computer Security

CSE Computer Security CSE 543 - Computer Security Lecture 15 - Linux Security October 18, 2007 URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ 1 Retrofit Security in Existing Systems Upside Operating systems are costly to

More information

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

SELinux. Don Porter CSE 506

SELinux. Don Porter CSE 506 SELinux Don Porter CSE 506 MAC vs. DAC By default, Unix/Linux provides Discretionary Access Control The user (subject) has discretion to set security policies (or not) Example: I may chmod o+a the file

More information

Access Control/Capabili1es

Access Control/Capabili1es Access Control/Capabili1es Some slides/ideas adapted from Ninghui Li 1 Why Computers are Vulnerable? Programs are buggy Humans make mistakes Access control is not good enough Discretionary Access Control

More information

Laying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency

Laying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency Trusted Systems Research Conduct and sponsor research to provide information assurance for

More information

SE Linux Implementation LINUX20

SE Linux Implementation LINUX20 SE Linux Implementation LINUX20 Russell Coker IBM eserver pseries, Linux, Grid Computing and Storage Technical University 7/7/2004 Licensed under the GPL Topic Objectives In this topic students will learn

More information

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Privileged Account Security: A Balanced Approach to Securing Unix Environments Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged

More information

Advanced Systems Security: Principles

Advanced Systems Security: Principles Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

SELinux For Mere Mortals

SELinux For Mere Mortals SELinux For Mere Mortals (Or, Don't Turn It Off ) Dan Walsh Principal Software Engineer, Red Hat Thomas Cameron, RHCA Managing Solutions Architect, Red Hat June 23rd, 2010 Agenda About Us What is SELinux?

More information

Justifying Integrity Using a Virtual Machine Verifier

Justifying Integrity Using a Virtual Machine Verifier Justifying Integrity Using a Virtual Machine Verifier Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel ACSAC 09 1 1 Cloudy Horizons Utility-based cloud computing is

More information

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li Securing Linux Hyungjoon Koo and Anke Li Outline Overview Background: necessity & brief history Core concepts LSM (Linux Security Module) Requirements Design SELinux Key elements Security context: identity

More information

Distribution Kernel Security Hardening with ftrace

Distribution Kernel Security Hardening with ftrace Distribution Kernel Security Hardening with ftrace Because sometimes your OS vendor just doesn't have the security features that you want. Written by: Corey Henderson Exploit Attack Surface Hardening system

More information

Application Virtualization and Desktop Security

Application Virtualization and Desktop Security Application Virtualization and Desktop Security Karl MacMillan kmacmillan@tresys.com Tresys Technology 1 Application Virtualization Introduction Encapsulates a single application Bundles application into

More information

Lecture 15 Designing Trusted Operating Systems

Lecture 15 Designing Trusted Operating Systems Lecture 15 Designing Trusted Operating Systems Thierry Sans 15-349: Introduction to Computer and Network Security Anatomy of an operating system Concept of Kernel Definition Component that provides an

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Mapping BeyondTrust Solutions to

Mapping BeyondTrust Solutions to TECH BRIEF Taking a Preventive Care Approach to Healthcare IT Security Table of Contents Table of Contents... 2 Taking a Preventive Care Approach to Healthcare IT Security... 3 Improvements to be Made

More information

Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Last Updated: 2017-12-22 Red Hat Enterprise Linux 7 SELinux User's

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

University of Ulster Standard Cover Sheet

University of Ulster Standard Cover Sheet University of Ulster Standard Cover Sheet Document Title AUTHENTICATION STANDARD 2.0 Custodian Approving Committee ISD Heads ISD Committee Policy approved date 2011 10 13 Policy effective from date 2011

More information

SELinux Introduction. Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com

SELinux Introduction. Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com SELinux Introduction Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com Overview 1. Who am I? 2. What is SELinux? 3. DAC vs MAC 4. Type Enforcement 5. Labels 6. Sometimes SELinux denies badness

More information

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA.

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. Fouad Riaz Bajwa Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. www.ifossf.org Worst Security Threats Sharing Knowledge What makes FOSS secure?

More information

A new Distributed Security Model for Linux Clusters

A new Distributed Security Model for Linux Clusters A new Distributed Security Model for Linux Clusters Makan.Pourzandi@Ericsson.Com Open Systems Lab Montréal Canada June, 2004 Rev PA1 07/05/04 1 Outline Context Distributed Security Distributed Access Control

More information

Middleware MAC for Android. Stephen Smalley Trusted Systems Research National Security Agency

Middleware MAC for Android. Stephen Smalley Trusted Systems Research National Security Agency Middleware MAC for Android Stephen Smalley Trusted Systems Research National Security Agency Motivation Many attacks on Android can occur entirely at the middleware layer. Not directly visible to kernel

More information

Demystifying SELinux:

Demystifying SELinux: Demystifying SELinux: What is it trying to tell me? David Quigley dpquigl@davequigley.com 1 What is Access Control? A system for restricting who or what is allowed to access specific resources and how

More information

SELinux Updates. Thorsten Scherf Senior Consultant. Red Hat Global Professional Services Berlin / Germany

SELinux Updates. Thorsten Scherf Senior Consultant. Red Hat Global Professional Services Berlin / Germany SELinux Updates Thorsten Scherf Senior Consultant Red Hat Global Professional Services 01.12.2011 Berlin / Germany Agenda SELinux review What happened to strict policy Policy customization and development

More information

Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM. Z. Cliffe Schreuders. Linux Security Summit 2010

Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM. Z. Cliffe Schreuders. Linux Security Summit 2010 Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM Z. Cliffe Schreuders Linux Security Summit 2010 The Problem User-oriented controls typically assume processes act in

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 & TECHNOLOGY (IJCET) PROCESS BEHAVIOUR MODELLING USING LSM

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 & TECHNOLOGY (IJCET) PROCESS BEHAVIOUR MODELLING USING LSM INTERNATIONAL 6367(Print), ISSN 0976 6375(Online) JOURNAL Volume OF 3, Issue COMPUTER 3, October-December ENGINEERING (2012), IAEME & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume

More information

Use Cases for Unix & Linux

Use Cases for Unix & Linux WHITE PAPER 15 Server Privilege Management PowerBroker for Unix & Linux, PowerBroker Identity Services, and PowerBroker for Sudo Table of Contents Executive Summary... 3 15 Common Use Cases... 4 1. Removing

More information

SELinux type label enforcement

SELinux type label enforcement SELinux type enforcement -Demonstration -General description David Morgan Demonstration Trying to access a resource (permissions vs SELinux) permissions system cares which user account SELinux cares which

More information

Computer Software. c 2016 by David W. Gerbing. School of Business Administration Portland State University

Computer Software. c 2016 by David W. Gerbing. School of Business Administration Portland State University Computer Software c 2016 by David W. Gerbing School of Business Administration Portland State University Computer Software Introduction Operating Systems Application Software Unix Command Line (on a Mac)

More information

CSC 482/582: Computer Security. Security Policies

CSC 482/582: Computer Security. Security Policies Security Policies Topics 1. What is a security policy? 2. Types of Policies 3. Trust 4. Trusted Computing Base (TCB) 5. Types of Access Control 1. Discretionary (DAC) 2. Mandatory (MAC) 3. Originator-based

More information

LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER

LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER E M B E D D E D S Y S T E M S W H I T E P A P E R w w w. m e n t o r. c o m INTRODUCTION With the proliferation of smart

More information

ABUSING TEXT EDITORS VIA THIRD-PARTY PLUGINS

ABUSING TEXT EDITORS VIA THIRD-PARTY PLUGINS ABUSING TEXT EDITORS VIA THIRD-PARTY PLUGINS A SafeBreach Labs research by Dor Azouri, Security Researcher, SafeBreach March 2018 1 EXECUTIVE SUMMARY Software third-party extensibility mechanisms have

More information

SE Linux Administration Tutorial

SE Linux Administration Tutorial SE Linux Administration Tutorial Russell Coker , http://www.coker.com.au/ 1 Introduction The aim of this tutorial is an advanced hands-on training in administering NSA Security Enhanced

More information

Extensible Kernel Security through the TrustedBSD MAC Framework

Extensible Kernel Security through the TrustedBSD MAC Framework 03/13/2004 Extensible Kernel Security through the TrustedBSD MAC Framework Robert Watson, Research Scientist HIP Group, 03/13/2004 Page 2 Introduction Rationale for Security Extensions TrustedBSD MAC Framework

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

Comprehensive Database Security

Comprehensive Database Security Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought

More information

Internet Engineering Task Force (IETF) Request for Comments: 7204 Category: Informational April 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7204 Category: Informational April 2014 ISSN: Internet Engineering Task Force (IETF) T. Haynes Request for Comments: 7204 NetApp Category: Informational April 2014 ISSN: 2070-1721 Abstract Requirements for Labeled NFS This memo outlines high-level

More information

Access Control. Steven M. Bellovin September 13,

Access Control. Steven M. Bellovin September 13, Access Control Steven M. Bellovin September 13, 2016 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

SELINUX FOR MERE MORTALS

SELINUX FOR MERE MORTALS SELINUX FOR MERE MORTALS (Or, Don't Turn It Off ) Thomas Cameron, RHCA, RHCDS, RHCVA, RHCSS, RHCX Managing Solutions Architect, Red Hat Wednesday, May 4th, 2011 Agenda About Us What is SELinux? About Us

More information

2/26/13. Hands-on SELinux: A Practical Introduction. Roadmap. SELinux Tools. Security Training Course. Day 1: Day 2: GUI

2/26/13. Hands-on SELinux: A Practical Introduction. Roadmap. SELinux Tools. Security Training Course. Day 1: Day 2: GUI Hands-on SELinux: A Practical Introduction Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Day 1: Why SELinux? Overview of SELinux Using SELinux SELinux Permissive Domains

More information

TEACHING ACCESS CONTROL WITH DOMAIN TYPE ENFORCEMENT

TEACHING ACCESS CONTROL WITH DOMAIN TYPE ENFORCEMENT TEACHING ACCESS CONTROL WITH DOMAIN TYPE ENFORCEMENT Steve Carr, Jean Mayo Department of Computer Science Michigan Technological University Houghton MI 49931-1295 ABSTRACT Access control systems have become

More information

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6 Users Manual OP5 System 2.4 OP5 AB. Page 1 of 6 Table of Contents INTRODUCTION...3 FUNDAMENTALS...3 SYSTEM...3 ACCESS...3 ACCOUNTS...3 CONFIGURATION...4 NETWORK...4 SHUTDOWN...4 SERVICES...5 UPGRADE /

More information

Securing Inter-process Communications in SELinux Spencer Shimko, Joshua Brindle Tresys Technology, LLC

Securing Inter-process Communications in SELinux Spencer Shimko, Joshua Brindle Tresys Technology, LLC Securing Inter-process Communications in SELinux Spencer Shimko, Joshua Brindle Tresys Technology, LLC Abstract In the modern computing world, a secure system is best implemented with mandatory access

More information

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Instructor, Consultant and Author Sandervanvugt.nl About Sander van Vugt Trainer, consultant and author Doing much

More information

CSE Computer Security

CSE Computer Security CSE 543 - Computer Security Lecture 25 - Virtual machine security December 6, 2007 URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ 1 Implementation and Results Experimental Platform Exact specification

More information

Towards Automated Authorization Policy Enforcement

Towards Automated Authorization Policy Enforcement Towards Automated Authorization Policy Enforcement Vinod Ganapathy Univ. of Wisconsin-Madison vg@cs.wisc.edu Trent Jaeger Pennsylvania State Univ. tjaeger@cse.psu.edu Somesh Jha Univ. of Wisconsin-Madison

More information

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013 RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

IMEI Security Technical Design Principles

IMEI Security Technical Design Principles IMEI Security Technical Design Principles Enabling stolen mobile device blocking V4.0 August 2016 Table of Contents 1. Introduction... 1 2. Device Identity Security... 1 3. Design Principles... 2 4. IMEI

More information

Security-Enhanced. - System-wide consistency in Access Control - NEC OSS Promotion Center KaiGai Kohei

Security-Enhanced. - System-wide consistency in Access Control - NEC OSS Promotion Center KaiGai Kohei Security-Enhanced PostgreSQL - System-wide consistency in Access Control - NEC OSS Promotion Center KaiGai Kohei Who is KaiGai? Primary developer of SE-PostgreSQL 5 year's experience

More information

Zend Server Cluster Manager 5.x Installation Guide

Zend Server Cluster Manager 5.x Installation Guide Zend Server Cluster Manager 5.x Installation Guide By Zend Technologies www.zend.com This is the Installation Guide for Server Cluster Manager, Version 5.0. The information in this document is subject

More information

WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN

WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN Document Control Document Properties Title Author Document Type Filename File location

More information

Securing Unix Filesystems - When Good Permissions Go Bad

Securing Unix Filesystems - When Good Permissions Go Bad Securing Unix Filesystems - When Good Permissions Go Bad Introduction Unix has a very elegant and flexible permission system at the heart of its filesystem security. These permissions allow and/or disallow

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Red Hat Enterprise Linux 6 Security-Enhanced Linux. User Guide

Red Hat Enterprise Linux 6 Security-Enhanced Linux. User Guide Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Security-Enhanced Linux Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Edition 2.0 Author Copyright 2010 Red Hat, Inc. The text

More information

Getting Started with Linux

Getting Started with Linux Getting Started with Linux For those with experience using Microsoft Windows there will be many familiar ways of operating in a Linux environment. There are also a few key differences. The main differences

More information

Wedge: Splitting Applications into Reduced-Privilege Compartments

Wedge: Splitting Applications into Reduced-Privilege Compartments Wedge: Splitting Applications into Reduced-Privilege Compartments Andrea Bittau Petr Marchenko Mark Handley Brad Karp University College London April 17, 2008 Vulnerabilities threaten sensitive data Exploits

More information

Introduction to Systems Security

Introduction to Systems Security Introduction to Systems Security CIM3571 Dr. S.F. Wu (wusf@vtc.edu.hk, R323, x706) Continuous Assessment 50% Examination 50% Security and Threat There are three aspects of computer security: Confidentiality

More information

Policy Enforced Remote Login

Policy Enforced Remote Login NPS-CS-03-004 February 2003 white paper The Center for INFOSEC Studies and Research Policy Enforced Remote Login Thuy D. Nguyen and Timothy E. Levin Center for Information Systems Security Studies and

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CPS221 Lecture: Operating System Protection

CPS221 Lecture: Operating System Protection Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

Red Hat Enterprise Linux 6.4 Security-enhanced. Linux User Guide >>>CLICK HERE<<<

Red Hat Enterprise Linux 6.4 Security-enhanced. Linux User Guide >>>CLICK HERE<<< Red Hat Enterprise Linux 6.4 Securityenhanced Linux User Guide New and Changed Features for Red Hat Enterprise Linux 6.4. 1.1.6. New and Changed SELinux: Avoid SELinux on GFS2. 2.5.5. Setting Up NFS Over.

More information

Course Design Document. IS436: Data Security and Privacy. Version 1.0

Course Design Document. IS436: Data Security and Privacy. Version 1.0 Course Design Document IS436: Data Security and Privacy Version 1.0 7 July 2014 Table of Content 1 Versions History... 3 2 Overview of Data Security and Privacy Course... 3 2.1 Synopsis... 3 2.2 Prerequisites...

More information

Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Last Updated: 2018-04-03 Red Hat Enterprise Linux 7 SELinux User's

More information

GE Fanuc Intelligent Platforms

GE Fanuc Intelligent Platforms GE Fanuc Intelligent Platforms Vendor Statement for CERT CVE-2009-0216 CERT has reported vulnerabilities in ifix (versions PDE, 2.0, 2.2, 2.21, 2.5, 2.6, 3.0, 3.5, 4.0, 4.5, and 5.0). The vulnerabilities

More information

Editing and Configuring Policies

Editing and Configuring Policies Editing and Configuring Policies Security Policy Development Primer for Security Enhanced Linux (Module 13) 2 Changing a Policy Many ways to change/write a policy Much easier to modify the base policy

More information

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem Why secure the OS? Operating System Security Works directly on the hardware but can be adapted during runtime Data and process are directly visible Application security can be circumvented from lower layers

More information