Application Ecosystem Casey Schaufler September 2009 Casey - - PowerPoint PPT Presentation

application ecosystem
SMART_READER_LITE
LIVE PREVIEW

Application Ecosystem Casey Schaufler September 2009 Casey - - PowerPoint PPT Presentation

Smack and the Application Ecosystem Casey Schaufler September 2009 Casey Schaufler Trusted Solaris, Trusted Irix, Linux LSM Various Government Efforts Trusix, CMM, CHATS Standards P1003.1e/2c, TSIG Smack Todays Talk


slide-1
SLIDE 1

Smack and the Application Ecosystem

Casey Schaufler September 2009

slide-2
SLIDE 2

Casey Schaufler

  • Trusted Solaris, Trusted Irix, Linux LSM
  • Various Government Efforts

– Trusix, CMM, CHATS

  • Standards

– P1003.1e/2c, TSIG

  • Smack
slide-3
SLIDE 3

Today‟s Talk

  • Mandatory Access Control (MAC)
  • The Smack View of MAC
  • Core Applications
  • Security Enforcing Applications
  • Third Party Applications
slide-4
SLIDE 4

Mandatory Access Control

  • Concepts

– Subject, Object, Access

  • Principles

– User has no say in it – Based on system controlled attributes

  • Jargon

– Label, Multilevel Security, CIPSO – Bell & LaPadula, Type Enforcement

slide-5
SLIDE 5

The Smack Approach

  • Every subject gets a label
  • Every object gets a label
  • Object gets creating Subject‟s label
  • Label is a text string
  • Label value is meaningless
slide-6
SLIDE 6

Smack Access Rules

Labels Must Match

Snap Snap Crackle

slide-7
SLIDE 7

Smack Access Rules

The Floor Label

_ _ Crackle

slide-8
SLIDE 8

Smack Access Rules

The Hat Label

Snap Snap ^

slide-9
SLIDE 9

Smack Access Rules

The Star Label

Snap * Crackle

slide-10
SLIDE 10

Smack Access Rules

Explicit: Pop Snap r

Snap Snap Pop

slide-11
SLIDE 11

File System Model

  • Process accesses file
  • Attributes are part of the file

– lstat() requires MAC read access – chmod() requires MAC write access

  • No blind writes

– Write access requires read access

slide-12
SLIDE 12

Networking Model

  • Sender writes to receiver

– Sender is subject, receiver is object

  • Socket, packet not policy components
  • Crackle Pop w

– Allows a UDP packet

  • Pop Crackle r

– Does not allow a UDP Packet

slide-13
SLIDE 13

Packet Labeling

  • CIPSO used by preference

– Smack label encoded in the IP header

  • Unlabeled packets for the Ambient label

– Inbound, outbound, and internal

  • Single label network ranges

– 192.168.230.0/24 Crackle

slide-14
SLIDE 14

Core Applications

  • Showing Smack labels

– ls, id, attr

  • Setting Smack labels

– login, newsmack

  • Setting the Smack environment

– mount

  • There isn‟t much to see here
slide-15
SLIDE 15

Network Applications

  • Network login

– sshd

  • Smack port mutliplexer

– smackpolyport – One advertised port – Multiple servers at various labels

  • X11
slide-16
SLIDE 16

smackpolyport

Snap Crackle Pop Snap Crackle Pop

Port 800 * Port 801 Snap Port 802 Crackle Port 803 Pop

slide-17
SLIDE 17

Smack and X11

  • XACE

– X11 Access Control Extension – Smack extension in test

  • Window Manager

– As much or more work that the server – Unbegun

  • Message bus and more
slide-18
SLIDE 18

Oracle 11gR1 on Smack

  • Readily available
  • Useful
  • Typical of network service applications
  • Requires SELinux be disabled
slide-19
SLIDE 19

Smack Setup

  • Create a Smack Kernel

– 2.6.29 or newer – SELinux and TOMOYO off, Smack on

  • Install smack-util

– newsmack

  • Mount Options

– /smack – /dev/shm

slide-20
SLIDE 20

Oracle Setup

  • Install Oracle 11gR1

– According to instructions – As root with the floor label “_”

  • Relabel the oracle files

– /home/oracle /u01 /tmp/.oracle – /var/tmp/.oracle /var/tmp/oradiag_oracle – find –exec attr –S –s SMACK64 \

–V Database {} \;

slide-21
SLIDE 21

Oracle Startup

# newsmack Database # su – oracle % . oraenv …

slide-22
SLIDE 22

Access By Address

# echo „192.168.230.131 Database‟ > \ /smack/netlabel # echo „192.168.231.0/24 Database‟ > \ /smack/netlabel

slide-23
SLIDE 23

Access By Label

In /etc/smack/accesses UserLabel Database w Database UserLabel w OtherLabel Database w Database Otherlabel w

slide-24
SLIDE 24

What Have You Learned?

  • Simple Separation is … Simple
  • Policy matters

– File system protection – Network access

  • Applications can be trusted with policy
  • … or not
slide-25
SLIDE 25

Contact Information

  • http://schaufler-ca.com
  • casey@schaufler-ca.com