Chapter 14: Protection.

Slides:



Advertisements
Similar presentations
Protection Goals of Protection Domain of Protection Access Matrix
Advertisements

Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Bilkent University Department of Computer Engineering
Reasons for Protection n Prevent users from accessing information they shouldn’t have access to. n Ensure that each program component uses system resources.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Protection.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Operating Systems Protection & Security.
Protection.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
Chapter 14 Protection Bernard Chen Spring Goal of Protection Protection was originally conceived as an adjunct to multiprogramming operation.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
G53SEC 1 Access Control principals, objects and their operations.
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 18: Protection Goals of Protection Domain of Protection Access Matrix.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
Cosc 4740 Chapter 13: Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique.
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Modul ke: Fakultas Program Studi Proteksi SISTEM OPERASI Misbahul Fajri, ST., MTI. 14 FASILKOM Teknik Informatika.
Fall 2015 SILICON VALLEY UNIVERSITY CONFIDENTIAL 1 Operating System Design Dr. Jerry Shiao, Silicon Valley University.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Goals of Protection Operating system consists of a collection.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
11.1 CSE Department MAITSandeep Tayal 11: Protection Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation.
CSS430 Protection1 Textbook Ch14 These slides were compiled from the OSC textbook slides (Silberschatz, Galvin, and Gagne) and the instructor’s class materials.
CSE Operating System Principles Protection.
18.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 18: Protection Goals of Protection Domain of Protection Access Matrix.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
Saurav Karmakar. Chapter 14: Protection  Goals of Protection  Principles of Protection  Domain of Protection  Access Matrix  Implementation of Access.
PROTECTION.
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Operating System Concepts
Chapter 14: Protection.
Chapter 14: Protection Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 17: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
CSE 542: Operating Systems
Chapter 14: Protection.
Operating System Concepts
Chapter 14: Protection.
Presentation transcript:

Chapter 14: Protection

Protection Have been discussing throughout course Dual-mode operation File-system permissions Will examine in more detail Will provide a theoretical construct for comparison purposes Protection System Resources User Other Users

Principles of Protection Guiding principles Principle of least privilege Just enough privileges to perform their tasks Need to know principle Access only those resources that user currently requires Least Privilege Need-to-know

A Theoretical Construct Like Turing machines in computational theory or relational calculus in databases Gives us a framework for comparing models Access-right = <object-name, rights-set> where rights-set is a subset of all valid operations that can be performed on the object. Domain = set objects and their associated of access-rights

Domain Structure Processes Association between process and domain Fixed If wish to adhere to need-to-know principle Must be able to change domain content Dynamic Implies: able to switch domains Processes Change access rights on the fly -or- Switch domains

Domain Implementation (UNIX) System consists of 2 domain classes: User Supervisor Domain = user-id Can’t easily change access privileges on the fly… Unix: dynamic Processes able to change domains

Domain switching in Unix Domain switch accomplished via file system. Each file has associated with it a domain bit (setuid bit). When file is executed and setuid = on, then user-id is set to owner of the file being executed. When execution completes user-id is reset. Example: set password Must change an entry in “passwd” file Could perform through system call Very limiting, must alter the kernel What if a user wanted to give limited access

Domain Implementation (MULTICS) Let Di and Dj be any two domain rings. If j < I  Di  Dj

Access Matrix Representation of theoretical construct In Unix, rows=users, columns=resources (files, etc.)

Where to keep the list ACL vs. Capabilities If keep permissions with object Access control list (ACL) Columns of access matrix If keep with the user (or in a database indexed by user) Capability list Rows of access matrix ACL dominant Still a huge debate ACL vs. Capabilities

Revocation of Access Rights If mean remove rights for all users to access a given object… Access List – Delete access rights from access list. Simple Immediate Capability List – Scheme required to locate capability in the system before capability can be revoked. Less easy, would search all user’s lists Methods for overcoming Reacquisition: periodically delete all rights from domains Back-pointers Indirection Keys (domain has key, objects have locks) Master key Several keys with different privileges User n capabilities Print to printer x r,w,x,own home dir r,x /usr/bin Doug notes Basically, list is with domain, not object Seems cultish, a lot of anger AL has taken over But still lots of research and publications It has been said that they are equivalent Distinguish between capability and or other accessible data I think an example of a capability might be “print” Book says most OS’s use combo of two, and likens permissions on file as access list and entry in open file table as a capability Mach is supposedly capability list From wiki Although most operating systems implement a facility which resembles capabilities, they typically do not provide enough support to allow for the exchange of capabilities among possibly mutually untrusting entities to be the primary means of granting and distributing access rights throughout the system. A capability-based system, in contrast, is designed with that goal in mind. Also said that does not have a path to a file, but rather each user must have an “un-forgeable reference” and simply having the reference gives them access.

Role-Based Access Control RBAC Solaris 10 and systems that utilize directory services (Novel, Windows NT, Linux) Users assigned roles granting access to privileges and programs Can be temporary In charge of certain resources

Language-Based Protection Compiler-based enforcement Only allow compilation by “trusted” compiler Write programs for dissemination with built-in safe-guards Weaknesses? Example: Java Handled by Java Virtual Machine (JVM) Especially useful in Java Applets Disk access off by default Performs loads un-trusted methods downloaded from web A class can only perform a privileged operation if it is in a protection domain All privileged ops must be performed in a privileged block Determined through stack inspection

End of Chapter 14