Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
Foundations I Professor Adam Bates Fall 2018 Security & - - PowerPoint PPT Presentation
CS 563 - Advanced Computer Security: Foundations I Professor Adam Bates Fall 2018 Security & Privacy Research at Illinois (SPRAI) Administrative Learning Objectives : Understand the genesis and significance of Multics and the Reference
Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
CS423: Operating Systems Design
2
Learning Objectives:
and the Reference Monitor Concept Announcements:
Reminder: Please put away (backlit) devices at the start of class
2
Security & Privacy Research at Illinois (SPRAI)
3
Security & Privacy Research at Illinois (SPRAI) 4
What’s in the report?
Security & Privacy Research at Illinois (SPRAI)
5
Security & Privacy Research at Illinois (SPRAI)
5
What computer security problems were the Air Force facing in 1972?
Security & Privacy Research at Illinois (SPRAI)
5
What computer security problems were the Air Force facing in 1972?
containing information of different classification levels and need-to-know requirements in a user population not uniformly cleared or access-approved. “
Security & Privacy Research at Illinois (SPRAI)
5
What computer security problems were the Air Force facing in 1972?
containing information of different classification levels and need-to-know requirements in a user population not uniformly cleared or access-approved. “
primary storage simultaneously…”
Security & Privacy Research at Illinois (SPRAI)
5
What computer security problems were the Air Force facing in 1972?
containing information of different classification levels and need-to-know requirements in a user population not uniformly cleared or access-approved. “
primary storage simultaneously…”
against accidental violation of their operating systems… it is equally true that virtually none of them provide any protection against deliberate attempts to penetrate the nominal security controls provide.”
Security & Privacy Research at Illinois (SPRAI)
5
What computer security problems were the Air Force facing in 1972?
containing information of different classification levels and need-to-know requirements in a user population not uniformly cleared or access-approved. “
primary storage simultaneously…”
against accidental violation of their operating systems… it is equally true that virtually none of them provide any protection against deliberate attempts to penetrate the nominal security controls provide.”
networks of related computer systems…”
Security & Privacy Research at Illinois (SPRAI)
6
Many of the problems forecast in the Anderson report have defined the next 50 years of security research…
Security & Privacy Research at Illinois (SPRAI)
6
Many of the problems forecast in the Anderson report have defined the next 50 years of security research…
grounds for certification, since the possibility of a yet undiscovered route into a large existing system is ever“
Security & Privacy Research at Illinois (SPRAI)
6
Many of the problems forecast in the Anderson report have defined the next 50 years of security research…
grounds for certification, since the possibility of a yet undiscovered route into a large existing system is ever“
tend to obscure penetration routes, but have little impact on underlying security problems. “
Security & Privacy Research at Illinois (SPRAI)
6
Many of the problems forecast in the Anderson report have defined the next 50 years of security research…
grounds for certification, since the possibility of a yet undiscovered route into a large existing system is ever“
tend to obscure penetration routes, but have little impact on underlying security problems. “
user… we do not need to distinguish between a foreign agent or the misguided/ disgruntled actions taken by an individual against the "establishment".
Security & Privacy Research at Illinois (SPRAI)
6
Many of the problems forecast in the Anderson report have defined the next 50 years of security research…
grounds for certification, since the possibility of a yet undiscovered route into a large existing system is ever“
tend to obscure penetration routes, but have little impact on underlying security problems. “
user… we do not need to distinguish between a foreign agent or the misguided/ disgruntled actions taken by an individual against the "establishment".
find design or implementation flaws that will give him supervisory control of the system. “
Security & Privacy Research at Illinois (SPRAI)
7
“In order to provide a base upon which a secure system can be designed and built, we recognize the need for a formal statement of what is meant by a secure system - that is a model or ideal design. The model must incorporate in an appropriate and formal way the intended use of a system, the kind of use environment it will exist in, a definition of authorization, the objects (system resources) that will be shared, the kind of sharing required, and the idea of controlled sharing described above. “
Security & Privacy Research at Illinois (SPRAI)
7
“In order to provide a base upon which a secure system can be designed and built, we recognize the need for a formal statement of what is meant by a secure system - that is a model or ideal design. The model must incorporate in an appropriate and formal way the intended use of a system, the kind of use environment it will exist in, a definition of authorization, the objects (system resources) that will be shared, the kind of sharing required, and the idea of controlled sharing described above. “
1) Define a formal Security Model
Security & Privacy Research at Illinois (SPRAI)
7
“In order to provide a base upon which a secure system can be designed and built, we recognize the need for a formal statement of what is meant by a secure system - that is a model or ideal design. The model must incorporate in an appropriate and formal way the intended use of a system, the kind of use environment it will exist in, a definition of authorization, the objects (system resources) that will be shared, the kind of sharing required, and the idea of controlled sharing described above. “
1) Define a formal Security Model 2) Enforce security model (???????)
Security & Privacy Research at Illinois (SPRAI)
7
“In order to provide a base upon which a secure system can be designed and built, we recognize the need for a formal statement of what is meant by a secure system - that is a model or ideal design. The model must incorporate in an appropriate and formal way the intended use of a system, the kind of use environment it will exist in, a definition of authorization, the objects (system resources) that will be shared, the kind of sharing required, and the idea of controlled sharing described above. “
1) Define a formal Security Model 2) Enforce security model (???????) 3) $$$$ Profit $$$$$
Security & Privacy Research at Illinois (SPRAI)
8
Security & Privacy Research at Illinois (SPRAI)
9
Security & Privacy Research at Illinois (SPRAI)
10
Security & Privacy Research at Illinois (SPRAI)
11
variables)
Security & Privacy Research at Illinois (SPRAI)
12
several parties
their system?
Security & Privacy Research at Illinois (SPRAI)
13
reference monitor
reference monitor mandatory protection state
Security & Privacy Research at Illinois (SPRAI)
14
Security & Privacy Research at Illinois (SPRAI)
15
analysis and tests, the completeness of which must be assured
Security & Privacy Research at Illinois (SPRAI)
16
Security & Privacy Research at Illinois (SPRAI)
17
Security & Privacy Research at Illinois (SPRAI)
18
system’s security goals?
Security & Privacy Research at Illinois (SPRAI)
19
system’s security goals?
Security & Privacy Research at Illinois (SPRAI)
20
developed many major concepts in operating systems, including security
continued until the mid-1970s
decommissioned in 2000
GE/Honeywell
and effort to develop ($10M in 1960s dollars, research staff peaked at 400)
Security & Privacy Research at Illinois (SPRAI) 21
Security & Privacy Research at Illinois (SPRAI)
22
segmentation
devices
multiprocessing
Multics did it!
Security & Privacy Research at Illinois (SPRAI)
22
segmentation
devices
multiprocessing
Multics did it!
Security & Privacy Research at Illinois (SPRAI)
23 Descendant Influence
MVS Multics MS/DOS VM/370 VMS UNIX Windows BSD UNIX Mach Windows NT VMWare Linux NEXT MacOS iOS Android Windows 8 MacOS X
Security & Privacy Research at Illinois (SPRAI)
24
Security & Privacy Research at Illinois (SPRAI)
25
activity (gates)
system design
Security & Privacy Research at Illinois (SPRAI)
26
Security Levels Categories
Multilevel Security — A multilevel security system tags all objects and subjects with security tags, classifying them in terms of sensitivity and access level. — We formulate access policy based on these levels — We can also add other dimensions called categories that horizontally partition the rights space (similar to roles)
Security & Privacy Research at Illinois (SPRAI)
US DoD Policy — Used by the US military (and many others), the la!ice model uses MLS to define policy; the levels are: — UNCLASSIFIED < CONFIDENTIAL < SECRET < TOP SECRET — Categories are represented as an unbounded set: — NUC(lear), INTEL(ligence), CRYPTO(graphy) — These levels are used for physical government documents as well
27
Security & Privacy Research at Illinois (SPRAI)
Aside: What do these levels mean?
28
Security & Privacy Research at Illinois (SPRAI)
Aside: What do these levels mean?
29
to the national security”
to the national security”
exceptionally grave damage to the national security”
exceptionally sensitive access (highest level of clearance considered TS/SCI)
lifetime binding non-disclosure agreement
retention, or negligent handling of SCI by me could cause irreparably injury to the United states or be used to advantage by a foreign nation…”
Security & Privacy Research at Illinois (SPRAI)
30
— All subjects are assigned clearance levels and compartments — Alice: (SECRET, {CRYPTO, NUC}) — Bob: (CONFIDENTIAL, {INTEL}) — Charlie: (TOP SECRET, {CRYPTO, NUC, INTEL}) — All objects are assigned an access class — DocA: (CONFIDENTIAL, {INTEL}) — DocB: (SECRET, {CRYPTO}) — DocC: (UNCLASSIFIED, {NUC})
Security & Privacy Research at Illinois (SPRAI)
31
Bob (CONF , {INTEL}) DocA (CONF , {INTEL}) Charlie (TOP SECRET, {CRYPTO, NUC, INTEL}) Alice (SEC, {CRYPTO, NUC}) DocC (UNCLASS, {NUC}) DocB (SEC, {CRYPTO})Evaluating Policy — Access is allowed if: — subject clearance level
— subject categories
categories (read-down property)
Security & Privacy Research at Illinois (SPRAI) 32
Bob (CONF , {INTEL}) DocA (CONF , {INTEL}) Charlie (TOP SECRET, {CRYPTO, NUC, INTEL}) Alice (SEC, {CRYPTO, NUC}) DocC (UNCLASS, {NUC}) DocB (SEC, {CRYPTO})Evaluating Policy — Access is allowed if: — subject clearance level
— subject categories
categories (read-down property)
Security & Privacy Research at Illinois (SPRAI) 33
Bob (CONF , {INTEL}) DocA (CONF , {INTEL}) Alice (SEC, {CRYPTO, NUC}) DocC (UNCLASS, {NUC}) DocB (SEC, {CRYPTO}) Charlie (TOP SECRET, {CRYPTO, NUC, INTEL})Evaluating Policy — Access is allowed if: — subject clearance level
— subject categories
categories (read-down property)
Security & Privacy Research at Illinois (SPRAI) 34
Bob (CONF , {INTEL}) DocA (CONF , {INTEL}) Alice (SEC, {CRYPTO, NUC}) DocC (UNCLASS, {NUC}) DocB (SEC, {CRYPTO}) Charlie (TOP SECRET, {CRYPTO, NUC, INTEL})Evaluating Policy — Access is allowed if: — subject clearance level
— subject categories
categories (read-down property) — Can Bob access DocC?
Security & Privacy Research at Illinois (SPRAI) 35
X
Charlie (TOP SECRET, {CRYPTO, NUC, INTEL})Evaluating Policy — Access is allowed if: — subject clearance level
— subject categories
categories (read-down property) — Can Bob access DocC?
Security & Privacy Research at Illinois (SPRAI) 36
X
Charlie (TOP SECRET, {CRYPTO, NUC, INTEL})Evaluating Policy — Access is allowed if: — subject clearance level
— subject categories
categories (read-down property) — What would a write-up property be?
Security & Privacy Research at Illinois (SPRAI) 37
(More) Formal Definitions — Ability to access a resource because of greater level
access then it dominates — Examples: — (SECRET, {NUC, CRYPTO} (CONF {NUC, CRYPTO}) — (TOP SECRET, {NUC} (CONF {NUC, CRYPTO})
Security & Privacy Research at Illinois (SPRAI) 38
Security La!ices
— Given a set of classifications and categories — Set of security levels forms a lattice — Security levels defined in terms of least upper bound (lub, called supremum in lattice theory) and greatest lower bound (glb, called an infimum in lattice theory) — — — Security levels form a partially ordered set (poset) and every element has a security level and corresponding supremum and infimum, therefore describing a lattice
Security & Privacy Research at Illinois (SPRAI) 39
La!ice Representation — Security lattices can be represented by a Hasse diagram — Represents a finite poset as a directed graph of its transitive reduction (minimum representation of edges)
Security & Privacy Research at Illinois (SPRAI)
40
(ring 0 = kernel mode, ring 3 = user mode)
Security & Privacy Research at Illinois (SPRAI)
41
Security & Privacy Research at Illinois (SPRAI)
42
Security & Privacy Research at Illinois (SPRAI)
Multics Process Invocation Brackets
43
Security & Privacy Research at Illinois (SPRAI)
44
Authorized or not?
new procedure segment access the data segment above?
Security & Privacy Research at Illinois (SPRAI)
45
Security & Privacy Research at Illinois (SPRAI)
46
Security & Privacy Research at Illinois (SPRAI)
47
Authorized or not?
Security & Privacy Research at Illinois (SPRAI)
48
Security & Privacy Research at Illinois (SPRAI)
48
use today?
Security & Privacy Research at Illinois (SPRAI)
48
use today?
Why?
Security & Privacy Research at Illinois (SPRAI)
48
use today?
Why?
Security & Privacy Research at Illinois (SPRAI)
48
use today?
Why?
Security & Privacy Research at Illinois (SPRAI) 49