BS1 WS19/20 – topic-based slides
Security
- Security as term, Possible Security violations
- Authentication
- Criteria for Trust in Computer Systems
- Three hearts of Windows Security
- DACLs
Security Security as term, Possible Security violations - - PowerPoint PPT Presentation
BS1 WS19/20 topic-based slides Security Security as term, Possible Security violations Authentication Criteria for Trust in Computer Systems Three hearts of Windows Security DACLs A Look at Security System is secure if
BS1 WS19/20 – topic-based slides
Operating Systems 20
Operating Systems 21
(hard to remember/easy to guess)
–
easy to calculate but hard to invert
–
restricted access to password fjles
Operating Systems 22
Operating Systems 23
http://csrc.nist.gov/cc
specifjed and compared sets, and the concept of Security Target (ST) that contains a set of security requirements that can be made by reference to a PP
Operating Systems 24
–
Operating Systems 25
System Service Dispatcher System Threads User Mode
Kernel Mode
Object Mgr. Windows USER, GDI File System Cache
I/O Mgr
Device & File Sys. Drivers Plug and Play Mgr. Power Mgr. Security Reference Monitor Virtual Memory Processes & Threads Local Procedure Call Graphic s Drivers Kernel (kernel mode callable interfaces) Configura- tion Mgr (registry) WinLogon MSGINA LSASS
Active Directory
LSA Server
SAM Server
MSVC1_0.dll Kerberos.dll LSA Policy
Event Logger Active Directory
SAM
Operating Systems 26
Operating Systems 27
WinLogon MSGINA LSASS NetLogon
Active Directory
LSA Server SAM Server MSVC1_0.dl Kerberos.dll
LSA Policy
Event Logger
Active Directory SAM
Operating Systems 28
the database that contains the usernames and groups defjned on the local machine
along with their passwords and other attributes. This database is stored in the registry under HKLM\SAM.
SAM
Operating Systems 29
in a domain
are managed as a single entity
Ntdsa.dll, that runs in the Lsass process
Operating Systems 30
–
must be specifjed up front,
–
include all accesses that will be performed on the object as a result of the validation.
–
Threads can adopt a special type of token called an “impersonation token” that contains the identify of another account.
–
contains a Discretionary Access Control List (DACL),
–
describes the types of access to the object users are allowed.
Operating Systems 31
accesses they were granted
Operating Systems 32
Operating Systems 33
Operating Systems 34
Read, Write, Delete, ... SID Access Mask ACE Type
Operating Systems 35
–
Deny: return ACCESS_DENIED
–
Allow: grant the specifjed accesses and if there are no remaining accesses to grant, return ACCESS_ALLOWED
ACCESS_DENIED
Operating Systems 36
Security Token User ID: FredMgr Group Ids: Users Mgrs Everyone Privileges: None Desired access read/write File object Security descriptor AccessAllowed FredMgr Read (RX) AccessAllowed Mgrs Special Access(RW) AccessAllowed Everyone Special Access(X) ACE ACE ACE Discretionary Access Control List
Operating Systems 37
Security Token User ID: FredMgr Group Ids: Users Mgrs Everyone Privileges: None Desired access read/write File object Security descriptor AccessDenied Mgrs (No Access) AccessAllowed FredMgr Read(RX) AccessAllowed Everyone Write(W) ACE ACE ACE Discretionary Access Control List
Operating Systems 38
$> ls -lisa total 2 421908 1 drwxr-xr-x 2 apolze 1024 Jan 7 15:06 . 116884 1 drwxr-xr-x 13 apolze 2048 Jan 7 15:06 .. 116992 0 -rw------- 1 apolze 0 Jan 7 15:05 Mail.txt 116991 0 -rw-rw‐rw‐ 1 apolze 0 Jan 7 15:05 test.c