Protection and Security. Sarah Diesburg Operating Systems CS 3430

Similar documents
19.1. Security must consider external environment of the system, and protect it from:

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

e-commerce Study Guide Test 2. Security Chapter 10

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Protection and Security

The Security Problem

Language-Based Protection

Chapter 15: Security. Chapter 15: Security

Protection and Security

Security and Authentication

Introduction to Security and User Authentication

Operating systems and security - Overview

Operating systems and security - Overview

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CS 43: Computer Networks Security. Kevin Webb Swarthmore College December 7, 2017

CS162 Operating Systems and Systems Programming Lecture 26. Protection and Security in Distributed Systems II

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

Chapter 19 Security. Chapter 19 Security

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. 5 March,

SE420 Software Quality Assurance

ESE 333 Real-Time Operating Systems 163 Review Deadlocks (Cont.) ffl Methods for handling deadlocks 3. Deadlock prevention Negating one of four condit

CSE 127: Computer Security. Security Concepts. Kirill Levchenko

(a) Which of these two conditions (high or low) is considered more serious? Justify your answer.

Outline Key Management CS 239 Computer Security February 9, 2004

CS 333 Introduction to Operating Systems Class 19 - Security

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

CS 425 / ECE 428 Distributed Systems Fall 2017

Storage and File System

Accounting Information Systems

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Malware, , Database Security

CHAPTER 8 SECURING INFORMATION SYSTEMS

Computer Security: Principles and Practice

2. INTRUDER DETECTION SYSTEMS

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms

COMPUTER PASSWORDS POLICY

What did we talk about last time? Public key cryptography A little number theory

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

CS140 Operating Systems and Systems Programming Final Exam

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

EECE 412, Fall Quiz #4

Chapter 15: Security. Operating System Concepts 9 th Edition

5. Authentication Contents

Define information security Define security as process, not point product.

Security. Reading: Chapter 15, [OSC] (except Section 15.9)

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Chapter 15: Security. Operating System Concepts 8 th Edition,

Outline. Operating System Security CS 239 Computer Security February 23, Introduction. Server Machines Vs. General Purpose Machines

CIS 5373 Systems Security

Keys and Passwords. Steven M. Bellovin October 17,

CS Final Exam

Potential Security Violations CSE 513: Distributed Systems (Security)

Storage and File Hierarchy

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

COS 318: Operating Systems

CIS 4360 Secure Computer Systems Applied Cryptography

SSH. Partly a tool, partly an application Features:

1-7 Attacks on Cryptosystems

Password. authentication through passwords

CS 161 Computer Security

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Wrapup. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

The Kerberos Authentication System Course Outline

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)

Operating Systems Design Exam 3 Review: Spring 2011

Copyright 2006 Prentice-Hall. All rights reserved. 1

User Authentication. Modified By: Dr. Ramzi Saifan

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz II

Authentication in real world: Kerberos, SSH and SSL. Zheng Ma Apr 19, 2005

MODULE NO.28: Password Cracking

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Race Condition Vulnerability Lab

CSE 565 Computer Security Fall 2018

CS 161 Computer Security

User Authentication. Modified By: Dr. Ramzi Saifan

Security. 1 Introduction. Alex S. 1.1 Authentication

3.5 SECURITY. How can you reduce the risk of getting a virus?

Chapter 14: Security. Operating System Concepts Essentials 8 th Edition

The Internet of Things. Steven M. Bellovin November 24,

CPSC 467b: Cryptography and Computer Security

CSci 530 Final Exam. Fall 2007

Passwords. EJ Jung. slide 1

Chapter 10: Security and Ethical Challenges of E-Business

CS530 Authentication

Information Security CS 526

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

BS801E-BSCS. Cryptography

Computers and Security

Transcription:

Protection and Security Sarah Diesburg Operating Systems CS 3430

Definitions Security: policy of authorizing accesses Prevents intentional misuses of a system Protection: the actual mechanisms implemented to enforce the specialized policy Prevents either accidental or intentional misuses

Security Goals Data confidentiality: secret data remains secret Data integrity: unauthorized users should not be able to modify data System availability: nobody can make a system unusable

Security Components Authentication determines who the user is Authorization determines who is allowed to do what Enforcement makes it so people can do only what they are allowed to do

Authentication The most common approach: passwords If I know the secret, the machine can assume that I m the user Problems: 1. Password storage 2. Poor passwords

Password Storage Encryption Uses a key to transform the data Difficult to reverse without the key UNIX stores encrypted passwords in /etc/passwd Uses one-way transformations Encrypts a typed password and compares encrypted passwords

Poor Passwords Short passwords Easy to crack Long passwords Tend to be written down somewhere

Original UNIX Required only lower-case, 5-lettered passwords 26 5 or 1 million combinations In 1975, it would take one day to crack one password Today, we can go through all those combinations < 1 second

Partial Solutions Extend password with a unique number Require more complex passwords 6 letters of upper, lower cases, numbers, and special characters 70 6 or 100 billion combinations Unfortunately, people still pick common words

Partial Solutions Delay every login by 1 second Assign very long passwords Give everyone a password calculator (credit card) Requires a physical theft to steal the password

Authentication in Distributed Systems Private key encryption of data Encrypt(Key, Plaintext) = Cipher text Decrypt(Key, Cipher text) = Plaintext Hard to reverse without the key With the plaintext and the cipher text, one cannot derive the key Provides secrecy and authentication, as long as the key stays secret

How to distribute the keys? Authentication server Keeps a list of keys

Kerberos Protocol Key xy is needed to talk between x and y Server S Encrypt(Key AS, I want Key AB ) Client A Client B Key AS Key BS

Kerberos Protocol Key xy is needed to talk between x and y Server S Encrypt(Key AS, Here is Key AB and a message to B ) Client A Client B Key AS Key BS

Kerberos Protocol Key xy is needed to talk between x and y Server S Client A Client B Key AS Key BS message Encrypt(Key BS, use Key AB to talk to A )

Additional Details Expiration timestamp for a key Prevents a machine from replaying messages (e.g., deposit $100 ) Checksum for an encrypted message Prevents modifications to a message (e.g., deposit $1000 ) Key AS and Key BS are renewed periodically to reduce their exposures

Public Key Encryption Separates authentication from secrecy Involves a public key and private key Encrypt(Key public, plaintext) = cipher text Decrypt(Key private, cipher text) = plaintext Encrypt(Key private, plaintext) = cipher text Decrypt(Key public, cipher text) = plaintext

Public Key Encryption Idea: Private key is kept secret Public key is advertised

Public Key Encryption Encrypt(Key my_public, Hi, Sarah ) Anyone can create it, but only I can read it (secrecy) Encrypt(Key my_private, I m Sarah ) Everyone can read it, but only I can create it (authentication)

Public Key Encryption Encrypt(Key your_public, Encrypt(Key my_private, I know your secret )) Only I can create it, and only you can read it

Authorization Access matrix describes who can do what File 1 Bart read,write read Lisa Maggie Lisa s diary File3 read, write -The matrix tends to be sparse

Access Control List Stores all permissions for all users with each object Analogy: a guard in front of a door Checks for a list of people allowed to enter UNIX: permission of each file is specified according to its owner, group, and the world

Capability List Stores all objects a process can touch Analogy: Keys A key owner has the right of entry Example: page tables Each process has a list of pages that it can access

Access Control List vs. Capability List Access control list (commonly used) Easy to know who can access the object Hard to know which objects a user can access Capability list A user knows the list of objects to access Hard to know who can access an object More difficult to revoke capabilities

Enforcement Enforcer programs check passwords, access control lists, and so on In UNIX, enforcers are run as superuser If there is a bug, you are hosed!

The State of the World in Security Authentication Poor passwords Nobody encrypts emails Authorization Coarse-grained access control list Often turned off for sharing Enforcement Buggy operating systems

Classes of Security Problems Eavesdropping is the listener approach Tap into the Ethernet and see everything Countermeasure: pressurized cabled Abuse of privilege If the superuser is evil, there is nothing you can do

Classes of Security Problems Imposter breaks into the system by pretending to be someone else Recorded voice and facial image Countermeasure: behavioral monitoring to look for suspicious activities Overwriting the boot block

Classes of Security Problems A Trojan horse is a seemingly innocent program that performs an unexpected function Countermeasure: integrity checking Periodically, check binaries against their checksums

Classes of Security Problems Salami attack builds up an attack, one-bit at a time Example: send partial pennies to a bank account Countermeasure: code reviews

Classes of Security Problems Logic bombs: a programmer may secretly insert a piece of code into the production system A programmer feeds the system password periodically If the programmer is fired, the logic bomb goes off Countermeasure: code reviews

Classes of Security Problems Denial-of-service attacks aim to reduce system availability A handful of machines can flood a victim machine to disrupt its normal use Countermeasure: open

Pentagon Traffic Analysis Before the 1991 Persian Gulf War Foreign intelligence tried to predict the starting date of the war time

Pentagon Traffic Analysis So much for the element of surprise

Tenex Used to be the most popular system at universities before UNIX Thought to be very secure

Tenex Source code for the password check: for (j = 0; j < 8; j++) { } if (input[j]!= pw[j]) { } // go to error; Need to go through 256 8 combinations

Tenex Unfortunately, Tenex used virtual memory in memory password on disk A fast password check means that the first character is wrong (error) A slow check means that the first character is correct (page fault)

Tenex 256 8 checks to crack a password is reduced down to 256 * 8 checks

The Internet Worm In 1988, a Cornell graduate student, RTM, released a worm into the Internet The worm used three attacks rsh fingerd sendmail

The Internet Worm Some machines trust other machines, the use of rsh was sufficient to get into a remote machine without authentication

The Internet Worm finger command did not check the input buffer size finger name@location Overflow the buffer Overwrite the return address of a procedure Jump and execute a shell (under root privilege)

The Internet Worm sendmail allowed the worm to mail a copy of the code and get it executed The worm was caught due to multiple infections People noticed the high CPU load