advanced systems security linux security modules
play

Advanced Systems Security: Linux Security Modules Trent Jaeger - PowerPoint PPT Presentation

Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security: Linux Security Modules Trent


  1. Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security: � Linux Security Modules Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University Systems and Internet Infrastructure Security (SIIS) Laboratory Page 1

  2. Linux Authorization circa 2000 Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2

  3. Linux Security circa 2000 Systems and Internet Infrastructure Security (SIIS) Laboratory Page 3

  4. Linus ’ Dilemna Systems and Internet Infrastructure Security (SIIS) Laboratory Page 4

  5. The Answer • The solution to all computer science problems • Add another layer of indirection Systems and Internet Infrastructure Security (SIIS) Laboratory Page 5

  6. Linux Security Modules Was Born Systems and Internet Infrastructure Security (SIIS) Laboratory Page 6

  7. Linux Before and After Systems and Internet Infrastructure Security (SIIS) Laboratory Page 7

  8. LSM Requirements Systems and Internet Infrastructure Security (SIIS) Laboratory Page 8

  9. LSM – A Reference Monitor • To enforce mandatory access control We need to develop an authorization mechanism that ‣ satisfies the reference monitor concept • How do we do that? And satisfy all the other goals? ‣ Systems and Internet Infrastructure Security (SIIS) Laboratory Page 9

  10. LSM – Complete Mediation • First requirement is complete mediation • Add security hooks to mediate various operations in the kernel These hooks invoke functions defined by the chosen ‣ module • These hooks construct “authorization queries” that are passed to the module Subject, Object, Operations ‣ Systems and Internet Infrastructure Security (SIIS) Laboratory Page 10

  11. LSM Hooks Systems and Internet Infrastructure Security (SIIS) Laboratory Page 11

  12. LSM Hooks Systems and Internet Infrastructure Security (SIIS) Laboratory Page 12

  13. LSM – Complete Mediation • First requirement is complete mediation • Enables authorization by module • Linux extends “sensitive data types” with opaque security fields Modules manage these fields – e.g., store security labels ‣ • Which Linux data types are sensitive? Systems and Internet Infrastructure Security (SIIS) Laboratory Page 14

  14. LSM Security Fields Systems and Internet Infrastructure Security (SIIS) Laboratory Page 15

  15. LSM – Complete Mediation • First requirement is complete mediation • How do we know LSM implements complete mediation? • Asked one of the lead developers (Cowan) His reply? ‣ Systems and Internet Infrastructure Security (SIIS) Laboratory Page 16

  16. LSM – Complete Mediation • First requirement is complete mediation • How do we know LSM implements complete mediation? • Asked one of the lead developers (Cowan) His reply? ‣ • “We don’t” Systems and Internet Infrastructure Security (SIIS) Laboratory Page 17

  17. LSM Analysis • Static analysis of Zhang, Edwards, and Jaeger [USENIX Security 2002] Based on a tool called CQUAL ‣ • Approach Objects of particular types can be in ‣ two states Checked, Unchecked • All objects in a “security-sensitive ‣ operation” must be checked Structure member access on some types • Systems and Internet Infrastructure Security (SIIS) Laboratory Page 18

  18. LSM Analysis /* from fs/fcntl.c */ • Static analysis of Zhang, Edwards, long sys_fcntl(unsigned int fd, unsigned int cmd, unsigned long arg) { and Jaeger [USENIX Security struct file * filp; ... filp = fget(fd); ... 2002] err = security ops->file ops ->fcntl(filp, cmd, arg); ... err = do fcntl(fd, cmd, arg, filp); Based on a tool called CQUAL ... ‣ } static long do_fcntl(unsigned int fd, unsigned int cmd, • Found a TOCTTOU vulnerability unsigned long arg, struct file * filp) { ... switch(cmd){ ... case F_SETLK: Authorize filp in sys_fcntl ‣ err = fcntl setlk(fd, ...); ... } ... But pass fd again to fcntl_getlk ‣ } /* from fs/locks.c */ fcntl_getlk(fd, ...) { struct file * filp; • Many supplementary analyses ... filp = fget(fd); /* operate on filp */ were necessary to support ... } CQUAL Figure 8: Code path from Linux 2.4.9 containing an ex- ploitable type error. Systems and Internet Infrastructure Security (SIIS) Laboratory Page 19

  19. LSM Analysis • Runtime analysis of Edwards, Zhang, and Jaeger [ACM CCS 2002] Built a runtime kernel monitor ‣ Logs structure member ‣ accesses and LSM hook calls Rules describe expected ‣ consistency Figure 5: Authorization graph for fcntl calls for F SETLEASE (controlled operations in lease modify and fput ) and F SETOWN (controlled operations in do fcntl and put ). When command is F SETOWN both FCNTL and • Good for finding missing SET OWNER are authorized, but only FCNTL is authorized for F SETLEASE . hooks where one is specified Six cases were found ‣ Systems and Internet Infrastructure Security (SIIS) Laboratory Page 20

  20. LSM Analysis • Automatically inferring security specifications from code – Tan, Zhang, Ma, Xiong, Zhou [USENIX Security 2008] Automate look at which fns are behind pointers ‣ Systems and Internet Infrastructure Security (SIIS) Laboratory Page 21

  21. LSM – Tamperproof • Second requirement is tamperproof • Prevent adversaries from modifying the reference monitor code or data • How is LSM code protected? • How is LSM data protected? Systems and Internet Infrastructure Security (SIIS) Laboratory Page 22

  22. LSM – Tamperproof • Second requirement is tamperproof • Prevent adversaries from modifying the reference monitor code or data • How is LSM code protected? • How is LSM data protected? Systems and Internet Infrastructure Security (SIIS) Laboratory Page 23

  23. LSM – Tamperproof • Second requirement is tamperproof • Add functions to register and unregister Linux Security Modules Implemented as a set of function pointers defined at ‣ registration time • LSM module defines code • LSM function pointers define targets of hooks These are data – modifiable ‣ • Implications? Systems and Internet Infrastructure Security (SIIS) Laboratory Page 24

  24. LSM – Tamperproof • Second requirement is tamperproof • Add functions to register and unregister Linux Security Modules Implemented as a set of function pointers defined at ‣ registration time • Adversaries could modify the code executed by Linux by modifying these function pointer data values Some people opposed this idea and refused to participate ‣ Eventually changed to require compiled-in LSM modules ‣ Systems and Internet Infrastructure Security (SIIS) Laboratory Page 25

  25. LSM API Systems and Internet Infrastructure Security (SIIS) Laboratory Page 26

  26. LSM Tasks Systems and Internet Infrastructure Security (SIIS) Laboratory Page 27

  27. Hook Details Systems and Internet Infrastructure Security (SIIS) Laboratory Page 28

  28. LSM Performance Systems and Internet Infrastructure Security (SIIS) Laboratory Page 29

  29. LSM Use Systems and Internet Infrastructure Security (SIIS) Laboratory Page 30

  30. Take Away • Aiming for mandatory controls in Linux But everyone had their own approach ‣ • Linux Security Modules is a general interface for any* authorization module Much finer controls – interface is union of what everyone ‣ can do • What does this effort say about Achieving complete mediation? • Whether complete mediation should be policy-dependent? • Systems and Internet Infrastructure Security (SIIS) Laboratory Page 31

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend