windows nt security
play

Windows NT Security Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - PowerPoint PPT Presentation

Windows NT Security Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP4631 - L20 1 Agenda Brief information about Windows NT Security architecture Identification and authentication Access control Administration C. Ding -


  1. Windows NT Security Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP4631 - L20 1

  2. Agenda • Brief information about Windows NT • Security architecture • Identification and authentication • Access control • Administration C. Ding - COMP4631 - L20 2

  3. Security Architecture C. Ding - COMP4631 - L20 4

  4. Security Architecture • The core operating system service is the Windows NT executive . • User programs make application program interface (API) calls to invoke operating system services. • Two modes: user and kernel modes – User programs (user mode) – Operating system services (kernel mode) C. Ding - COMP4631 - L20 5

  5. Windows NT : kernel vs user mode System Processes Services Applicatio ns Subsystems OS/2 User WinLogon Alerter Application User Win32 Subsystem DLLs Mode System NTDLL.DLL ( NT Layer DLL that control NT system functions ) Threads Executive API Kernel Mode I/O Manager Processes Virtual Cache PnP/Power Security Manager & Threads Memory Manager File systems Object management / Executive RTL Device drivers Kernel Hardware Abstraction Layer (HAL) Hardware interfaces (read/write port, timers, C. Ding - COMP4631 - L20 clocks, cache control, etc.) 6

  6. Security Subsystems • Security Reference Monitor (SRM): – in charge of access control, – an executive component running in “kernel mode”. • Local Security Authority (LSA): – a user mode component involved at login when it checks the user account and creates a system access token (SAT). – the LSA is also responsible for auditing functions. C. Ding - COMP4631 - L20 7

  7. Security Subsystems ctd. • Security Account Manager (SAM): – A user mode component that maintains the user account database used by the LSA – It provides user authentication for the LSA. Winlogon LSA SAM account data base C. Ding - COMP4631 - L20 8

  8. The Registry • It is the central database for Windows NT configuration data. • Entries in the registry are called keys (not be confused with cryptographic keys). • It is a hierarchical database. At the top level, the registry is structured into four sections called hives (or root keys) . Hives contains keys (directories) which in turn contain subkeys (subdirectories) or data items C. Ding - COMP4631 - L20 9

  9. Protection of the Registry • The registry is stored in a proprietary format. • Only the operating system tool Registry Editor can modify the registry. • Protection: remove the Registry Editor from all machines NOT used for system management. C. Ding - COMP4631 - L20 10

  10. Registry File Permissions • Defining access permissions: – use access control lists for hives and keys. • Possible access permissions: – read only: not allowed to make any changes. – full control: edit, create, delete, take away ownership of a key. – special access: users can be granted permissions according to a specified list, i.e., discretionary ACLs . C. Ding - COMP4631 - L20 11

  11. A List of Special Access (1) • Create subkey : create a new subkey within an exiting key • Enumerate keys : identify all subkeys within a key • Notify : receive audit notification generated by the key C. Ding - COMP4631 - L20 12

  12. A List of Special Access (2) • Delete : delete a key • Wr Write DAC : modify the access control list for the key • Write owner : take ownership • Read control : read security information from within the key C. Ding - COMP4631 - L20 13

  13. The Registry in Summary • Hardware configuration • Account data • Software, servers, services • Network configuration, host name, IP address • Description of user’s desktop • Critical to security – Repository for local security data – Access control built in C. Ding - COMP4631 - L20 14

  14. Identification and Authentication C. Ding - COMP4631 - L20 15

  15. Identification and Authentication • Authentication: user name + password – Windows NT 5.0 uses Kerberos for authentication • Implementation: towards networks of servers and workstations C. Ding - COMP4631 - L20 16

  16. Logging on to Windows NT 4.0 • Security Attention Sequence (SAS) - CTRL+ALT+DEL – Eliminates the possibility of Trojan Horses – Handled by WinLogon, which loads GINA to authenticate user – Authentication against local SAM or domain controller’s SAM • GINA: a remotely controllable Logon Graphical User Interface C. Ding - COMP4631 - L20 17

  17. Interactive logon to the machine Winlogon in Windows NT 4.0 1. CTRL + ALT + DEL Winlogon Win32 5. 4. Access token GINA LSA 6. 3. 2. SAM Shell Account DB C. Ding - COMP4631 - L20 18

  18. Windows NT Password Scheme • Passwords are stored in encrypted form. • Two encrypted passwords are computed, one for the Microsoft LAN Manager, the other one for Windows NT. • To prevent users adopting weak passwords, a password filtering dynamically linked library (DLL) can be installed. • The password filter forces the password to have at least six characters. C. Ding - COMP4631 - L20 19

  19. Windows NT Password Scheme • Passwords must contain at least three of the following four data types: upper case letter, lower case letter, Arabic numerical, and non-alphanumeric character. • Passwords cannot contain parts of the username. • The encrypted passwords are stored in the user accounts which are held in the SAM database. The SAM database is part of the registry. C. Ding - COMP4631 - L20 20

  20. The LAN Manager Password • It is encrypted and can be retrieved from the ciphertext stored in the SAM database. – Detailed encryption algorithm is not given here. • Passwords can be up to 14 characters long. C. Ding - COMP4631 - L20 21

  21. The Windows NT Password • It is hashed using a one-way function (MD4). • It cannot be retrieved from the hash value stored in the SAM database. C. Ding - COMP4631 - L20 22

  22. Access Control to Objects C. Ding - COMP4631 - L20 23

  23. Domain • Domain: a collection of machines sharing a common user accounts database, and security policy. • Advantage : you do not need an account in every workstation. • Windows NT uses domains to facilitate single sign-on and coordinated security administration. C. Ding - COMP4631 - L20 24

  24. Domain Controller • A domain controller (DC) is a server computer that responds to security authentication requests within a computer domain. • It is a server on a network that is responsible for allowing host access to domain resources. • It authenticates users, stores user account information and enforces security policy for a domain. C. Ding - COMP4631 - L20 25

  25. User Accounts • Each user needs a user account in a domain. – The master copy of the user accounts database for the domain is held on a server called the primary domain controller (PDC). – Copies of it are held on a backup domain controller (BDC). • Access to any network resource is solely based on the user account. C. Ding - COMP4631 - L20 26

  26. Fields in a User Account • user name (login) • full name • password : – up to 14 characters long. – You can force users to change their password at the next login. – You can prevent them from changing their passwords. – You can set an expiry date on passwords. C. Ding - COMP4631 - L20 27

  27. Fields in a User Account ctd. • User profile path: – the profile defines the user’s desktop environment, i.e., program group, network connections, screen colors, etc. • Home directory : – you can specify whether the home directory is on the local machine or on a network server. • Expiration date : – by default, accounts do not have an expiration date. C. Ding - COMP4631 - L20 28

  28. Security Identifiers • Every user, group, and machine account has a unique security identification number (SID), which is used for discretionary access control . • The SID is constructed when the account is created, and is fixed for life time. • When a workstation or server joins a domain, it receives a SID that including the domain’s SID. Machines need their SID to check whether they are in the same domain. C. Ding - COMP4631 - L20 29

  29. NT Executive – object oriented • Object is anything that needs naming, sharing, protecting w.r.t. user-mode processes. Object Types (Example) Object Types (Example) • Process • Devices • File • Network shares • Access token • NT services • (Registry) Key • Printers • Memory section • timers • Events C. Ding - COMP4631 - L20 30

  30. Security Descriptor of Each Object It contains: • the security ID of the owner of the object • a group security ID • a discretionary access control list , its entry may be: – AccessDenied, AccessAllowed, SystemAudit • a system access control list , what to write to security audit trial C. Ding - COMP4631 - L20 31

  31. Access to Windows NT Objects Access Token Security ID:S-1-5-21-146... User Name: MichaelW Group IDs: Employees Scientists EVERYONE LOCAL Read INTERACTIVE Other Information: . . File Object Access Control List . . Allow Deny Allow Security Scientists MichaelW Employees Descriptor . Execute All Read, Write . C. Ding - COMP4631 - L20 32

  32. Administration (Security Management) C. Ding - COMP4631 - L20 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend