Secureworld Conference

Size: px
Start display at page:

Download "Secureworld Conference"

Transcription

1 P14 Emily Ratliff Advances in Linux Security: The Linux Security Modules Project Secureworld Conference 1 n

2 Legal Statement This work represents the views of the author and does not necessarily reflect the views of IBM Corporation. The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States and/or other countries: IBM (logo), e-business (logo). A full list of U.S. trademarks owned by IBM may be found at Linux is a registered trademark of Linus Torvalds. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product, and service names may be trademarks or service marks of others. 2

3 Agenda What is LSM? Why you care History Currently available modules Recap 3

4 What is LSM? Linux Security Modules (a.k.a. Loadable Security Modules) Hooks that allow you to customize your security policy by loading a kernel module New feature in v. 2.5 Kernel patch against ~131 hooking functions defined in include/linux/security.h example: inode, file, ipc, msg_queue, module, task, etc. Resources Mailing list archives Web 4

5 Why you should care about LSM Whole new world of security policies will be open to you with the arrival of v.2.6 Alternate security policies will be included in kernel and available by default Customization of security policy now much easier Minimize support costs of maintaining kernel patches that change security policy LSM enables tiny changes that otherwise would not have been worth the cost Researchers/administrators can easily experiment with various security policies 5

6 What can LSM do for you? Extremely Simple Example: log all file opens With LSM code in one hooking function compile module insmod module Without LSM change code in fs/open.c recompile kernel install kernel reboot to new kernel 6

7 History of LSM - First Kernel Summit First 2.5 Kernel Summit March 2001 NSA proposed that Security Enhanced Linux be integrated into kernel. Issue lots of competitors to SELinux: LIDS, RSBAC, Medusa DS/9 Decision: no winner Better way loadable security modules - LSM implement hooks to allow security enhancements (specifically access controls) to load as modules 7

8 History of LSM - Kernel Summit 2002 A core LSM developer presented initial implementation Networking worried about performance impact No major input Two Work items flatten the hooks (no more double indirection) Consider making use of networking hooks configurable 8

9 History of LSM - Inclusion in v2.5 Plan behind submission first submit non-lsm prerequisite patches (in ) break LSM up into logical pieces based on subsystem submit a subsystem at a time, less controversial subsystems first First LSM hooks were accepted in (basic framework + task hooks) Trusted Linux community member submitted most of the LSM patches various community members created the patches LSM networking specialist submitted networking patches 9

10 History of LSM The Battle for the Network Hooks Getting the network hooks in was a battle Network maintainer's initial response was extremely negative unmaintainable skb_set_owner_w: "millions upon millions of times a second on a busy server" now hooks are configurable CONFIG_SECURITY CONFIG_SECURITY_NETWORK hooks in low level interfaces were rejected as unmaintainable No longer supports network packet labeling 10

11 Available LSM Modules Where to find out more about LSM modules: List of modules that the community description link to project home 11

12 SELinux NSA's Security Enhanced Linux Information Assurance role of the NSA Mandatory Access Control (MAC) architecture Separation between policy and enforcement engine Default policies provided Type Enforcement Role Based Access Control Experimental MLS policy Security context (collection of attributes) per process and object Caches access decisions for speed 12

13 SELinux Russell Coker's SELinux play machine Gentoo and Debian have hardened distros that include SELinux RedHat announced for 2H04 13

14 LIDS Linux Intrusion Detection System Began as intrusion detection Grew to encompass Mandatory Access Control In-kernel port scan detector File control ACL implementation Attribute control (append, hide, read-only) Process attributes: un-killable or hidden Intrusion response end user's session to administrator log 14

15 DTE Domain Type Enforcement an access control technology for partitioning host operating systems such as UNIX into access control domains USENIX Security '95 "A DTE UNIX Prototype" Badger, et al Subject - process Object - passive entities: files, named pipes, shared memory segment, etc. Type - attributes associated with objects: read, write, execute Domain - associated with processes: definition of activities that a subject is allowed to perform Cross-domain capabilities also defined example, whether a process can signal another Limits power of processes running as root defeats many remote root exploits 15

16 DISEC Ericsson's Distributed Security Infrastructure Provides coherent secure framework for telecom applications running on carrier class Linux clusters Secure intra-cluster communication Dynamic security policy Change underlying security policy without interrupting running processes (availability) Cluster coherency of security policy Nodes view security of the cluster and the node Network packets between nodes labeled 16

17 Owlsm LSM based on OpenWall kernel patch popular kernel patch by Solar Designer Security Tweaks Enforces resource limits on exec Secure handling of file descriptors 0, 1, 2 Prevent users from creating hard links to files that they don't own Prevent users from following symbolic links in directories where the sticky bit is set (ex. /tmp) Defeats /tmp attacks Zero administration cost 17

18 TPE Trusted Path Execution Essentially limits untrusted users to running system binaries TPE helps defeat local exploits by preventing users from downloading and executing exploit code Implementation trusted users list trusted path directory root owned and neither group nor other writable Can execute binary in: trusted path untrusted path trusted user Yes Yes untrusted user Yes No 18

19 rootplug First module to make it into kernel Meant as an example module originally written as a Linux Journal article Prevents root from executing processes unless a certain USB device is present on the system 19

20 What you should know before developing your module LSM is GPL'd like the rest of the kernel. Unlike module.h, security.h explicitly states that it is GPL'd. security.h must be #included in security modules potential (ugly) workarounds were discussed on the mailing list current (untested) understanding that kernel modules don't have to be GPL'd unclear whether this means that LSMs must be GPL'd but community does believe that LSMs must be GPL'd 20

21 Conclusion LSM is a mechanism to customize your security policy without applying patch and recompiling kernel or even rebooting. LSM has been added to the 2.5 version of the Linux kernel. LSM's value is that you can address unique security needs quickly without making invasive hard-to-support changes to the kernel. 21

22 Backup Charts P14 Emily Ratliff Linux Security Modules Project Backup Charts Secureworld Conference 22 n

23 Technical Issues system call interposition vs. hooks commonly used rejected for performance reasons, access to code made this implementation unnecessary system call table symbol not exported in v. 2.5 restrictive vs. authoritative hooks current implementation: restrictive modules can override yes with no, but can't override no with yes authoritative more expressive helpful for audit and ACL modules more invasive slightly more code LSM committers don't like it will be considered in Phase 2 23

SE Linux Implementation LINUX20

SE Linux Implementation LINUX20 SE Linux Implementation LINUX20 Russell Coker IBM eserver pseries, Linux, Grid Computing and Storage Technical University 7/7/2004 Licensed under the GPL Topic Objectives In this topic students will learn

More information

CSE Computer Security

CSE Computer Security CSE 543 - Computer Security Lecture 15 - Linux Security October 18, 2007 URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ 1 Retrofit Security in Existing Systems Upside Operating systems are costly to

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 13: Operating System Security Department of Computer Science and Engineering University at Buffalo 1 Review Previous topics access control authentication session

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li Securing Linux Hyungjoon Koo and Anke Li Outline Overview Background: necessity & brief history Core concepts LSM (Linux Security Module) Requirements Design SELinux Key elements Security context: identity

More information

SELinux type label enforcement

SELinux type label enforcement SELinux type enforcement -Demonstration -General description David Morgan Demonstration Trying to access a resource (permissions vs SELinux) permissions system cares which user account SELinux cares which

More information

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 & TECHNOLOGY (IJCET) PROCESS BEHAVIOUR MODELLING USING LSM

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 & TECHNOLOGY (IJCET) PROCESS BEHAVIOUR MODELLING USING LSM INTERNATIONAL 6367(Print), ISSN 0976 6375(Online) JOURNAL Volume OF 3, Issue COMPUTER 3, October-December ENGINEERING (2012), IAEME & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume

More information

Red Hat Enterprise Linux

Red Hat Enterprise Linux Red Hat Enterprise Linux Security www.redhat.com A Powerful Collection of Red Hat Enterprise Linux Security Tools Computing security has never been more important. Increasing regulations, differing requirements

More information

Advanced Systems Security: Principles

Advanced Systems Security: Principles Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Advanced Systems Security: Ordinary Operating Systems

Advanced Systems Security: Ordinary Operating Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

ext4: the next generation of the ext3 file system

ext4: the next generation of the ext3 file system June07login_press.qxd:login June 06 Volume 31 5/27/07 10:22 AM Page 25 A V A N T I K A M A T H U R, M I N G M I N G C A O, A N D A N D R E A S D I L G E R ext4: the next generation of the ext3 file system

More information

LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER

LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER E M B E D D E D S Y S T E M S W H I T E P A P E R w w w. m e n t o r. c o m INTRODUCTION With the proliferation of smart

More information

Operating- System Structures

Operating- System Structures Operating- System Structures 2 CHAPTER Practice Exercises 2.1 What is the purpose of system calls? Answer: System calls allow user-level processes to request services of the operating system. 2.2 What

More information

SEEdit: SELinux Security Policy Configuration System with Higher Level Language

SEEdit: SELinux Security Policy Configuration System with Higher Level Language SEEdit: SELinux Security Policy Configuration System with Higher Level Language Yuichi Nakamura, Yoshiki Sameshima Hitachi Software, Japan {ynakam,same}@hitachisoft.jp Toshihiro Tabata Okayama University,

More information

An Introduction to GPFS

An Introduction to GPFS IBM High Performance Computing July 2006 An Introduction to GPFS gpfsintro072506.doc Page 2 Contents Overview 2 What is GPFS? 3 The file system 3 Application interfaces 4 Performance and scalability 4

More information

PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX

PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX Final Report 12/10/09 Mike Detwiler UMBC Student CMSC Course 426 Baltimore, MD Det1@umbc.edu Peter Coddington UMBC Student CMSC Course 626 Baltimore, MD

More information

Advanced Systems Security: Principles

Advanced Systems Security: Principles Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Advanced Systems Security: Securing Commercial Systems

Advanced Systems Security: Securing Commercial Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Network and Filesystem Security

Network and Filesystem Security Network and Filesystem Security Powell Molleti powell@in.ibm.com 1 Agenda Netfilter and TCP Wrappers for Network Security including SNORT for NIDS and tools for checking network vulnerabilities Filesystem

More information

A new Distributed Security Model for Linux Clusters

A new Distributed Security Model for Linux Clusters A new Distributed Security Model for Linux Clusters Makan.Pourzandi@Ericsson.Com Open Systems Lab Montréal Canada June, 2004 Rev PA1 07/05/04 1 Outline Context Distributed Security Distributed Access Control

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 1 Operating System Quandary Q: What is the primary goal of

More information

A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud

A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2013-03 A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the

More information

Computer Security. 02r. Assignment 1 & Access Control Review. Paul Krzyzanowski David Domingo Ananya Jana. Rutgers University.

Computer Security. 02r. Assignment 1 & Access Control Review. Paul Krzyzanowski David Domingo Ananya Jana. Rutgers University. Computer Security 02r. Assignment 1 & Access Control Review Paul Krzyzanowski David Domingo Ananya Jana Rutgers University Spring 2019 Question 1 What three Internet-enabled vulnerability categories does

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Bengt Nolin beno9295@student.uu.se October 13, 2004 Abstract A very brief introduction to SELinux; what it is, what is does and a little about how it does it. 1 1 Background 1.1

More information

SELinux Introduction. Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com

SELinux Introduction. Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com SELinux Introduction Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com Overview 1. Who am I? 2. What is SELinux? 3. DAC vs MAC 4. Type Enforcement 5. Labels 6. Sometimes SELinux denies badness

More information

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system

More information

Thinking the Open Source way

Thinking the Open Source way Thinking the Open Source way Matt Jamison Sr. Gov t Solutions Architect MSgt, USAFR jamo@redhat.com Source code: #include int main (void) { printf("hello, world!\n"); return 0; } Binary code:

More information

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA.

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. Fouad Riaz Bajwa Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. www.ifossf.org Worst Security Threats Sharing Knowledge What makes FOSS secure?

More information

Managing memory in variable sized chunks

Managing memory in variable sized chunks Managing memory in variable sized chunks Christopher Yeoh Linux.conf.au 2006 Outline Current Linux/K42 memory management Fragmentation problems Proposed system K42 Architecture/Implementation

More information

Using the Kernel Security Module Interface

Using the Kernel Security Module Interface Using the Kernel Security Module Interface Greg shows how to create a simple kernel module that uses the LSM framework. by Greg Kroah-Hartman At the 2001 Linux Kernel Summit, NSA developers presented their

More information

SELinux. Don Porter CSE 506

SELinux. Don Porter CSE 506 SELinux Don Porter CSE 506 MAC vs. DAC By default, Unix/Linux provides Discretionary Access Control The user (subject) has discretion to set security policies (or not) Example: I may chmod o+a the file

More information

Distribution Kernel Security Hardening with ftrace

Distribution Kernel Security Hardening with ftrace Distribution Kernel Security Hardening with ftrace Because sometimes your OS vendor just doesn't have the security features that you want. Written by: Corey Henderson Exploit Attack Surface Hardening system

More information

Keeping Up With The Linux Kernel. Marc Dionne AFS and Kerberos Workshop Pittsburgh

Keeping Up With The Linux Kernel. Marc Dionne AFS and Kerberos Workshop Pittsburgh Keeping Up With The Linux Kernel Marc Dionne AFS and Kerberos Workshop Pittsburgh - 2015 The stage Linux is widely deployed as an AFS client platform OpenAFS client available in popular distributions Ubuntu,

More information

Table 12.2 Information Elements of a File Directory

Table 12.2 Information Elements of a File Directory Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For

More information

Converting Informix 4GL Applications to Informix Genero

Converting Informix 4GL Applications to Informix Genero Converting Informix 4GL Applications to Informix Genero Why Convert? Your Informix 4GL applications are fundamental to your business; too important to disrupt, too costly to rewrite and packaged applications

More information

Extensible Kernel Security through the TrustedBSD MAC Framework

Extensible Kernel Security through the TrustedBSD MAC Framework 03/13/2004 Extensible Kernel Security through the TrustedBSD MAC Framework Robert Watson, Research Scientist HIP Group, 03/13/2004 Page 2 Introduction Rationale for Security Extensions TrustedBSD MAC Framework

More information

What's New with SELinux

What's New with SELinux What's New with SELinux Stephen D. Smalley sds@tycho.nsa.gov National Information Assurance Research Laboratory National Security Agency National Information Assurance Research Laboratory 1 Advances in

More information

Advanced Systems Security: Principles

Advanced Systems Security: Principles Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

ADVANCED OPERATING SYSTEMS USB in a microkernel based operating system

ADVANCED OPERATING SYSTEMS USB in a microkernel based operating system ADVANCED OPERATING SYSTEMS 2015 USB in a microkernel based operating system -1- Agenda Microkernels (history and architecture) USB (hardware and protocol specifics) Challenges providing USB in microkernel

More information

Security Architecture

Security Architecture Security Architecture We ve been looking at how particular applications are secured We need to secure not just a few particular applications, but many applications, running on separate machines We need

More information

Testing real-time Linux: What to test and how.

Testing real-time Linux: What to test and how. Testing real-time Linux: What to test and how. Sripathi Kodi sripathik@in.ibm.com Agenda IBM Linux Technology Center What is a real-time Operating System? Enterprise real-time Real-Time patches for Linux

More information

Umbrella We can t prevent the rain... But we don t get wet!

Umbrella We can t prevent the rain... But we don t get wet! Department of Computer Science Aalborg University Fredrik Bajersvej 7E DK 9220 Aalborg Øst Denmark Umbrella We can t prevent the rain... But we don t get wet! Master s Thesis Aalborg University June 2004

More information

TOMOYO Linux for Secure Embedded

TOMOYO Linux for Secure Embedded Toshiharu Harada haradats@nttdata.co.jp NTT DATA CORPORATION February 24, 2008 JFYI This slide has been under control of Subversion. The version you are viewing is $Id: tomoyo.tex 71 2008-03-07 10:06:22Z

More information

Virtual Machine Security

Virtual Machine Security Virtual Machine Security CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ 1 Operating System Quandary Q: What is the primary goal

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Virtuozzo 7. Quick Start Guide

Virtuozzo 7. Quick Start Guide Virtuozzo 7 Quick Start Guide March 16, 2018 Virtuozzo International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 https://virtuozzo.com Copyright 2001-2017

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Lecture 15 Designing Trusted Operating Systems

Lecture 15 Designing Trusted Operating Systems Lecture 15 Designing Trusted Operating Systems Thierry Sans 15-349: Introduction to Computer and Network Security Anatomy of an operating system Concept of Kernel Definition Component that provides an

More information

Running Network Services under User-Mode

Running Network Services under User-Mode Running Network Services under User-Mode Linux, Part I Mick Bauer Abstract Leverage the Linux kernel's virtualization features to isolate network dæmons. In my May 2006 Paranoid Penguin column, I expounded

More information

What Makes Up the Modern Linux OS?

What Makes Up the Modern Linux OS? White Paper by David Davis, ActualTech Media What Makes Up the Modern Linux OS? In this Paper The History of Linux... 2 The Components that Comprise the Linux Operating System... 3 What Is a Distribution?...

More information

GUIDE. MetaDefender Kiosk Deployment Guide

GUIDE. MetaDefender Kiosk Deployment Guide GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system

More information

Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack. Ji-Ho CHO, Han LEE, Jeong-Min KIM and Geuk LEE *

Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack. Ji-Ho CHO, Han LEE, Jeong-Min KIM and Geuk LEE * 2016 International Conference on Applied Mathematics and Mechanics (ICAMM 2016) ISBN: 978-1-60595-399-1 Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack Ji-Ho CHO, Han LEE, Jeong-Min

More information

Linux Operating System

Linux Operating System Linux Operating System Dept. of Computer Science & Engineering 1 History Linux is a modern, free operating system based on UNIX standards. First developed as a small but self-contained kernel in 1991 by

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and

Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Applications software. Systems software provides infrastructure

More information

Kernel approach for Security. Open Source Developpers European Meeting

Kernel approach for Security. Open Source Developpers European Meeting Kernel approach for Security Open Source Developpers European Meeting Philippe Biondi Webmotion Inc. 2 février 2001 Outline 1 Aim Context Trustfulness Conclusion Technical description Design Untamperability

More information

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS)

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Review Segmentation Segmentation Implementation Advantage of Segmentation Protection Sharing Segmentation with Paging Segmentation with Paging Segmentation with Paging Reason for the segmentation with

More information

A Survey of Access Control Policies. Amanda Crowell

A Survey of Access Control Policies. Amanda Crowell A Survey of Access Control Policies Amanda Crowell What is Access Control? Policies and mechanisms that determine how data and resources can be accessed on a system. The Players Subjects Objects Semi-objects

More information

Advanced Systems Security: Integrity

Advanced Systems Security: Integrity Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Secure Sharing of an ICT Infrastructure Through Vinci

Secure Sharing of an ICT Infrastructure Through Vinci Secure Sharing of an ICT Infrastructure Through Vinci Fabrizio Baiardi 1 Daniele Sgandurra 2 1 Polo G. Marconi - La Spezia, University of Pisa, Italy 2 Department of Computer Science, University of Pisa,

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind

More information

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT less discovery can t find all keys and certificates Key and certificate management is no longer just an IT function. So it cannot be treated the same

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

System Configuration as a Privilege

System Configuration as a Privilege System Configuration as a Privilege Glenn Wurster, Paul C. van Oorschot School of Computer Science Carleton University, Canada HotSec 2009 11 Aug 2009 Glenn Wurster, Paul C. van Oorschot System Config

More information

Security at Kernel Level LIDS

Security at Kernel Level LIDS Security at Kernel Level LIDS Philippe Biondi May 30, 2002 Outline 1 Why? Context A new security model Conclusion How? Taxonomy of action pathes Defending kernel space Filtering

More information

SELINUX SUPPORT IN HFI1 AND PSM2

SELINUX SUPPORT IN HFI1 AND PSM2 14th ANNUAL WORKSHOP 2018 SELINUX SUPPORT IN HFI1 AND PSM2 Dennis Dalessandro, Network SW Engineer Intel Corp 4/2/2018 NOTICES AND DISCLAIMERS INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH

More information

Samba in a cross protocol environment

Samba in a cross protocol environment Mathias Dietz IBM Research and Development, Mainz Samba in a cross protocol environment aka SMB semantics vs NFS semantics Introduction Mathias Dietz (IBM) IBM Research and Development in Mainz, Germany

More information

V6R1 System i Navigator: What s New

V6R1 System i Navigator: What s New Agenda Key: Session Number: V6R1 System i Navigator: What s New Tim Kramer - timkram@us.ibm.com System i Navigator web enablement 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication

More information

Week 2. Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands

Week 2. Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands Week 2 Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands mkdir, cd, cls, del, copy, attrib, date, path, type, format, exit. Basic commands in LINUX - cat, ls, pwd,,

More information

Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List

Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List Created on July 21, 2010 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup

More information

IBM i 7.3 Features for SAP clients A sortiment of enhancements

IBM i 7.3 Features for SAP clients A sortiment of enhancements IBM i 7.3 Features for SAP clients A sortiment of enhancements Scott Forstie DB2 for i Business Architect Eric Kass SAP on IBM i Database Driver and Kernel Engineer Agenda Independent ASP Vary on improvements

More information

Use the Reiser4 file system under Linux rev.2

Use the Reiser4 file system under Linux rev.2 Use the Reiser4 file system under Linux rev.2 An alternative advanced file system designed for daredevils Check out the ext2 file system (second extended file system), the ext3 (third extended file system),

More information

Linux Kernel Security Overview

Linux Kernel Security Overview Linux Kernel Security Overview Linux Security Summit Europe 2018 Edinburgh, UK James Morris jmorris@namei.org $ whoami Linux kernel security subsystem maintainer Linux kernel engineer at Microsoft Previously

More information

Introduction to Network Discovery and Identity

Introduction to Network Discovery and Identity The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, on page 1 Uses for Host, Application, and User Discovery and Identity

More information

Why lock down the kernel? Matthew Garrett

Why lock down the kernel? Matthew Garrett Why lock down the kernel? Matthew Garrett What are we trying to do? There s a barrier between users and root Should there be a barrier between root and the kernel? Some prior art CONFIG_MODULE_SIG_FORCE

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

Outline. Low-Level Optimizations in the PowerPC/Linux Kernels. PowerPC Architecture. PowerPC Architecture

Outline. Low-Level Optimizations in the PowerPC/Linux Kernels. PowerPC Architecture. PowerPC Architecture Low-Level Optimizations in the PowerPC/Linux Kernels Dr. Paul Mackerras Senior Technical Staff Member IBM Linux Technology Center OzLabs Canberra, Australia paulus@samba.org paulus@au1.ibm.com Introduction

More information

IBM XIV Storage System Management Tools Version 4.5. Release Notes

IBM XIV Storage System Management Tools Version 4.5. Release Notes IBM XIV Storage System Management Tools Version 4.5 Release Notes First Edition (March 2015) This edition applies to IBM XIV Management Tools version 4.5, and to all subsequent releases and modifications

More information

Operating System Security, Continued CS 136 Computer Security Peter Reiher January 29, 2008

Operating System Security, Continued CS 136 Computer Security Peter Reiher January 29, 2008 Operating System Security, Continued CS 136 Computer Security Peter Reiher January 29, 2008 Page 1 Outline Designing secure operating systems Assuring OS security TPM and trusted computing Page 2 Desired

More information

[This link is no longer available because the program has changed.] II. Security Overview

[This link is no longer available because the program has changed.] II. Security Overview Security ------------------- I. 2 Intro Examples II. Security Overview III. Server Security: Offense + Defense IV. Unix Security + POLP V. Example: OKWS VI. How to Build a Website I. Intro Examples --------------------

More information

Linux Kernel Security

Linux Kernel Security Linux Kernel Security Adapting 1960s Technology to st Meet 21 Century Threats James Morris Red Hat LinuxCon Boston 2010 Fig. 1 History The first fact to face is that UNIX was not developed with security,

More information

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1 Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?

More information

A GPFS Primer October 2005

A GPFS Primer October 2005 A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those

More information

CLIP OS: Building a defense-in-depth OS with the Linux kernel and open source software

CLIP OS: Building a defense-in-depth OS with the Linux kernel and open source software CLIP OS: Building a defense-in-depth OS with the Linux kernel and open source software Timothée Ravier, Nicolas Godinho, Thibaut Sautereau Agence nationale de la sécurité des systèmes d information (ANSSI)

More information

Storage and File Hierarchy

Storage and File Hierarchy COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system

More information

AN OVERVIEW OF DISTRIBUTED FILE SYSTEM Aditi Khazanchi, Akshay Kanwar, Lovenish Saluja

AN OVERVIEW OF DISTRIBUTED FILE SYSTEM Aditi Khazanchi, Akshay Kanwar, Lovenish Saluja www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 10 October, 2013 Page No. 2958-2965 Abstract AN OVERVIEW OF DISTRIBUTED FILE SYSTEM Aditi Khazanchi,

More information

CONTAINER AND MICROSERVICE SECURITY ADRIAN MOUAT

CONTAINER AND MICROSERVICE SECURITY ADRIAN MOUAT CONTAINER AND MICROSERVICE SECURITY ADRIAN MOUAT Chief Scientist @ Container Solutions Wrote "Using Docker" for O'Reilly 40% Discount with AUTHD code Free Docker Security minibook http://www.oreilly.com/webops-perf/free/dockersecurity.csp

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Linux Kernel Evolution. OpenAFS. Marc Dionne Edinburgh

Linux Kernel Evolution. OpenAFS. Marc Dionne Edinburgh Linux Kernel Evolution vs OpenAFS Marc Dionne Edinburgh - 2012 The stage Linux is widely deployed as an OpenAFS client platform Many large OpenAFS sites rely heavily on Linux on both servers and clients

More information

MSMQ-MQSeries Bridge Configuration Guide White Paper

MSMQ-MQSeries Bridge Configuration Guide White Paper MSMQ-MQSeries Bridge Configuration Guide White Paper Published: November 2000 Table of Contents Table of Contents...1 Introduction...1 Definitions... 2 How the Bridge Works...5 MSMQ-MQSeries Bridge Installation...

More information

Advanced Systems Security: Multics

Advanced Systems Security: Multics Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Advanced Systems Security: Integrity

Advanced Systems Security: Integrity Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Name: Peter Lemieszewski Venue: Education

Name: Peter Lemieszewski Venue: Education z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 LINUX FOR TPFERS Name: Peter Lemieszewski Venue: Education AIM Enterprise

More information

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013 RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,

More information

MQ Port Scan Installation and Operation Manual

MQ Port Scan Installation and Operation Manual MQ Port Scan Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com MQPS Installation and

More information

BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS

BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS There are two kinds of people: those who do regular backups and those who never had a hard drive failure Unknown. 1. Introduction The topic of doing backups

More information