Lecture 19: Flow and Confinement
- Examples of information flow applications
- The confinement problem
– Covert channels
- Isolation: virtual machines, sandboxes
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #19-1
Lecture 19: Flow and Confinement Examples of information flow - - PowerPoint PPT Presentation
Lecture 19: Flow and Confinement Examples of information flow applications The confinement problem Covert channels Isolation: virtual machines, sandboxes March 2, 2009 ECS 235B, Winter Quarter 2009 Slide #19-1 Matt Bishop, UC
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #19-1
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #18-2
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #18-3
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #18-4
– Check authorization of sender – Sanitize message if needed (words and viruses, etc.)
– Incoming, outgoing messages of different type – Only appropriate type can be moved in or out
SECRET computer UNCLASSIFIED computer
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #18-5
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis Slide #19-6
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-7
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-8
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-9
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-10
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
bit
before repeating to read another bit
Slide #19-11
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-12
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-13
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-14
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-15
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-16
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-17
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
– Knows nothing about the processes within the VM
– By transitivity, these controls apply to processes on VMs
Slide #19-18
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-19
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-20
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-21
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-22
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-23
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-24
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-25
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-26
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
# basic module basic # define subprocess environment variables putenv IFS=”\t\n “ PATH=/sbin:/bin:/usr/bin TZ=PST8PDT # deny access to everything except files under /usr path deny read,write * path allow read,write /usr/* # allow subprocess to read files in library directories # needed for dynamic loading path allow read /lib/* /usr/lib/* /usr/local/lib/* # needed so child can execute programs path allow read,exec /sbin/* /bin/* /usr/bin/*
Slide #19-27
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
– Then marks each with allowed, disallowed actions
– Framework checks arguments, validates that call is allowed for those arguments
Slide #19-28
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
– Has mechanism to execute system-level commands – Embed a file deletion command in attachment …
– Above attempt fails
Slide #19-29
March 2, 2009 ECS 235B, Winter Quarter 2009 Matt Bishop, UC Davis
Slide #19-30