Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Va-scanCopyright 2002, Marchany Securing Solaris – Using syslogs during an Intrusion Randy Marchany.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 9 Auditing Database Activities
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 11.
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
SE571 Security in Computing
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
UNIX Chapter 08 File Security Mr. Mohammad Smirat.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.
Two disparate Examples of of Encryption/Digital Signatures.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
G53SEC 1 Access Control principals, objects and their operations.
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
SCSC 455 Computer Security Chapter 3 User Security.
Chapter 8 File System Security. File Protection Schemes Password-Based Protection Encryption-Based Protection Protection-Based on Access Permission.
Linux Use the Command-Line Interface to Administer the System.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
Week #12 CIS 173 OBJECTIVES Chapter #10 Network Administration.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 11: Managing Users
Chapter 8 File Security.
Unix Access Control Basic CE 2
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Operating System Security
Linux Security.
Presentation transcript:

Unix Security

 Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection

Layers in a computer system hardware operating system (incl networking) application users

Unix security  User access controls  File access controls  System administrator’s control

User access controls  Login in through user name and password.  Password is used to store an encrypted version of 64 bits of zeros.  Note there are two crypt functions on Unix system!!

File access controls  directory based  a file for each user on access objects  access control list based  a list for each user on access objects  access control matrix  capability  a unforgeable token/ticket for access certain objects  procedure-oriented (info. hiding)

Directory based access prog1.crw- cmnd1--x User A’s access directory prog1.cr-- cmnd1rwx User B’s access directory resources (objects) printer1-w- printer1-w-

All users Groups Group User Group All users

Super user and SUID and SGID  Control invocation of privileges are achieved by set {user,group} ID programs.  By setting the permission of those programs, a normal user can effectively run the programs as its owner (group member).  e.g: passwd, login, at, su, etc  Need to monitor the integrity of SUID programs.

File protection  basic  all-none protection  group protection  single permission  password or token  temporary acquired permission  per-object & per user protection  Example  UNIX

Integrity management  Is achieved by  prevention  detecting change

Prevention  By placing controls – such as software, hardware, file system and operating system controls.  By having immutable and append-only files  immutable files are those that cannot be modified once the system is running (suitable for system programs such as login, passwd) and append-only files to which data can be appended, but in which the existing data cannot be changed(suitable for log files)

Detection change  Comparison of files with a (good) backup copy.  the backup copy has to be in a protected mode.  comparison has to be performed byte-by-byte and hence time consuming process (especially for large files – such as database files)  once an authorised change is detected, replace the altered version with the comparison copy, thereby restoring the system to normal.

Detection change  Checklists and metadata  Store only a summary of important characteristics of each file and directory and use this information for comparison. e.g. of summary information – time stamps (last read/modified, file protection modes,link count using ncheck etc) Running this kind of detection change as a crom job may not be a good idea!

Detection change  Checksum and signatures  changes can be made in such a way that the checklists and metadata may not change and hence the previous method may fail. e.g. setting the clock backwards, perform the changes and the set the clock forward  CRC checksums – useful only when there are few bits of change and they are generated by well known polynomials.  generate a signature using a one-way hash function (such as MD5).

Tripwire  In practice one need not generate digital signature on the content of each of the file.  e.g. We need to know if the owner or protection of /etc/passwd file is changed, but we do not care about the size or checksum because we do expect the contents to change while we should be concerned if the contents of /bin/login is altered.  tripwire is a package that allows to configure the files, directories that need to be monitored using MD algorithms. ftp://coast.cs.purdue/edu/pub/COAST/Tripwire

Auditing and Intrusion Detection  After establishing the protection mechanism, you need to monitor the system.  Monitoring is a process of auditing.  Audit trail is carried with the help of log files, however log files itself is vulnerable to security threats (after all they are also files in the system!)

Location of log files  usually in /var/adm  The useful files are: acct or pact – records commands run by every user aculog – records of dial-out modems lastlog – logs each user’s most recent successful login time, and possibly last unsuccessful login too messages – records output to the system’s console and other messages generated from the syslog facility sulog – logs use fo the su command utmp – records each user current login (may be in /etc directory) wtmp – provides a permanent record of each time a user logged in and logged out. Also records system shutdowns and startups vold.log – logs errors encountered with the use of external media, such as tapes, floppy drives, etc. xferlog – logs FTP access

swatch – a log file tool  A perl program to monitor log files.  Available from ftp://sierra.standford.edu/swatch or ftp://coast.cs.purdue.edu/pub/tools/swatch ftp://sierra.standford.edu/swatch ftp://coast.cs.purdue.edu/pub/tools/swatch

Managing log files  Plan to backup log files  Review periodically the log files (may be daily or more often)  Apply filters so that you do not get bored seeing the log messages  Don’t trust logs completely!! – they can be altered or deleted by intruder  Plan to install software which can add security to the operating systems controls (such as tcp wrappers).