1 Operating System vs. Network Security Butler Lampson Microsoft Outline What security is about Operating systems security Network security How they fit.

Slides:



Advertisements
Similar presentations
1 Computer Security in the Real World Butler Lampson Microsoft August 2005.
Advertisements

1 Computer Security in the Real World Butler Lampson Microsoft.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Grid Security. Typical Grid Scenario Users Resources.
1 Accountability and Freedom Butler Lampson Microsoft October 27, 2005.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Introduction To Windows NT ® Server And Internet Information Server.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 17 Prof. Crista Lopes.
1 Computer Security in the Real World Butler Lampson Microsoft Annual Computer Security Applications Conference, Edited.
1 Software and Security Butler Lampson Microsoft.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
1 Security and Software Engineering Steven M. Bellovin AT&T Labs – Research
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Session 11: Security with ASP.NET
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Web Server Administration Chapter 10 Securing the Web Environment.
Masud Hasan Secue VS Hushmail Project 2.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
CS CS 5150 Software Engineering Lecture 18 Security.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Configuring Directory Certificate Services Lesson 13.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Csci5233 computer security & integrity 1 Cryptography: an overview.
1 KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS J. G. Steiner, C. Neuman, J. I. Schiller MIT.
3/15/01CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Security: The Goal Computers are as secure as real world systems, and people believe it. This is hard because: Computers can do a lot of damage fast. There.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1 Computer Security in the Real World Butler Lampson What people want from computer security is to be as secure with computers as they are in the real.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Authentication in Dist Systems Presented in cs294-4 P2P Systems by Sailesh Krishnamurthy Oct
Key management issues in PGP
DNS Security Advanced Network Security Peter Reiher August, 2014
Grid Security.
COMPSCI210 Recitation 5 Oct 2012 Vamsi Thummala
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

1 Operating System vs. Network Security Butler Lampson Microsoft Outline What security is about Operating systems security Network security How they fit together

2 Security: The Goal People believe that computers are as secure as real world systems, and it’s true. This is hard because: –People don’t trust new things. –Computers can do a lot of damage fast. –There are many places for things to go wrong. –Anonymous attacks are easy across a network.

3 Real-World Security It’s about value, locks, and police.  Good enough locks that bad guys don’t break in very often.  Good enough police and courts that bad guys that do break in get caught and punished often enough.  As little interference with daily life as possible, consistent with these two points.

4 Dangers Vandalism or sabotage that –damages information –disrupts service Theft of money Theft of information Loss of privacy Secrecy, integrity, and availability

5 Vulnerabilities Bad (buggy or hostile) programs Bad (careless or hostile) people giving instructions to good programs Bad guy tapping or interfering with communications

6 Defensive strategies Keep everybody out –Isolation Keep the bad guy out –Code signing, firewalls Let him in, but keep him from doing damage –Sandboxing, access control Catch him and prosecute him –Auditing, police

7 The Access Control Model Guards control access to valued resources. Reference monitor Object Do operation Resource Principal GuardRequest Source

8 Mechanisms Authenticating principals  Mainly people, but also machines, programs Authorizing access.  Usually for groups of principals Auditing Trusted computing base

9 Levels of Security Network, with a firewall Operating system, with sandboxing –Basic OS (such as NT) –Higher-level OS (such as Java) Application that checks authorization directly All need authentication

10 Why We Don’t Have “Real” Security People don’t buy it –Danger is small, so people buy features instead Secure systems do less because they’re older  Security is a pain »It has to be configured correctly »Users have to authenticate themselves Systems are complicated, so they have bugs.

11 Operating System Security Assume secure channel from user Authenticate user by local password Map user to her SID + group SIDs –Local database for group memberships Access control by ACL on each resource –OS kernel is usually the reference monitor –Any RPC target can read SIDs of its caller ACLs are lists of SIDs –A program has SIDs of its logged in user

12 NT Domain Security Just like OS except for authentication OS does RPC to domain for authentication –Secure channel to domain –Just do RPC(user, password) to get user’s SIDs Domain may do RPC to foreign domain –Pairwise trust and pairkwise secure channels –SIDs include domain ID

13 Distributed Systems Are Different Big Heterogeneous and autonomous parts –In equipment –In management Fault tolerant –Partly broken but still working All these make authentication harder

14 Web Server Security Today Simplified from single OS –(Establish secure channel with SSL) –Authenticate user by local password »(or by local certificate) –Usually ACL only on right to enter –Map user to her private state

15 Web Browser Security Today Authenticate server by DNS lookup (?) –(Authenticate server by SSL + certificate) Authenticate programs by signature –Good programs run as user –Bad programs rejected, or totally sandboxed

16 Principals Authentication:Who sent a message? Authorization:Who is trusted? Principal — abstraction of "who": –People Lampson, Gray –Machines SN , Jumbo –Services microsoft.com, Exchange –Groups UW-CS, MS-Employees

17 What Principals Do Principal says statement –Lampson says “read /MSR/Lampson/foo” –Microsoft-CA says “Lampson's key is #7438”

18 Says things directlyC says s Has knownpossible receiverssecrecy possible sendersintegrity Examples –Within a node: operating system (pipes, etc.) –Between nodes: »Secure wiredifficult to implement »Network fantasy for most networks »Encryptionpractical Secure Channel

19 Speaks For Principal A speaks for B: A  –Meaning: if A says something, B says it too. »Thus A is stronger than B. –Examples »Lampson  MSR »Server-1  MSR-NFS »Key #7438  Lampson Handoff rule: If A says B  A then B  A –Reasonable if A is competent and accessible.

20 Secure Channels via Encryption The channel is defined by the key: –If only A knows K –1, then K  A. K says s is a message which K can decrypt.

21 Authorization with ACLs Access control lists (ACLs) –An object O has an ACL that says: principal P may access O. »Lampson may read and write O »MSR may append to O ACLs must use names for principals –so that people can read them.

22 Names and Name Spaces: SDSI/SPKI A name is local to some name space A name space is defined by a key The key can bind names in its name space –K microsoft says K bwl  K microsoft / Lampson –These certificates are public Path names can start from anywhere –K microsoft / Lampson / friends –K lampson / friends

23 Authenticating a Channel Who can send on a channel? –C  P; C is the channel, P the sender. To get this, must trust some principal K ca that “owns” P. Then K ca can authenticate channels from P: –K ca says K ws  K ca / WS –K ca says K bwl  K ca / Lampson Anyone can use these certificates

24 Checking Access Givena request Q says read O an ACL P may read/write O P  read/write O Check thatQ speaks for PQ  P rights are enough read/write  read Q  P  read/write O hence Q  read/write O

25 What about OS? (1) Put network principals on OS ACLs (2) Let network principal speak for local one  Redmond\rivest –Use network authentication »replacing domain authentication –Users and ACLs stay the same (3) Assign SIDs to network principals –Do this automatically –Use network authentication as before

26 Groups and Group Credentials A group is a principal; its members speak for it –Lampson  MSR –Rashid  MSR –... Proving group membership: Use certificates. –K msr says Lampson  K msr / MSR These certificates are public too

27 Authenticating Systems A machine can store its own secret key A program can be authenticated by a digest: –K ca says “If I has digest X then I is program P” formally X  P A system can speak for another system: –K ca says N  P The first certificate makes N want to run I The second certificate lets N convince others that N is authorized to run P

28 Auditing Checking access: –Givena request Q says read O an ACL P may read/write O –Check thatQ speaks for PQ  P rights suffice read/write  read Auditing –Each step is justified by »a signed statement (certificate), or »a rule

29 Implement: Tools and Assurance Services — tools for implementation –AuthenticationWho said it? –AuthorizationWho is trusted? –Auditing What happened? Trusted computing base –Keep it small and simple. –Validate each component carefully.

30 References Why “real” security is hard – Distributed system security –Lampson et al. TOCS 10, 4 (Nov. 1992) –Wobber et al. TOCS 12, 1 (Feb. 1994) Simple Distributed Security Infrastructure (SDSI) –theory.lcs.mit.edu/~cis/sdsi.htmltheory.lcs.mit.edu/~cis/sdsi.html Simple Public Key Infrastructure (SPKI) –ftp://ds.internic.net/internet-drafts/draft-ietf-spki- cert-structure-02.txtftp://ds.internic.net/internet-drafts/draft-ietf-spki- cert-structure-02.txt