L8: Access controls
Not posted yet
Materials
See raw slides (pdf).
Topics
-
Introduced the notion of
setuid
and how it is used to solve certain permission problems in Unix -
Discussed the security problems with
setuid
and specifically the confused deputy problem. -
Introduced an alternative method for access control based on capabilities. This idea offers from natural deterrence for confused deputies.
-
All of these methods still suffer from a basic failure of operation. To defend, systems often employ manditory access control policies.
-
Mandatory Access Control (MAC) is a security model where access rights are regulated by a central authority.
- Centralized control: System administrators define the policies, not data owners.
- Sensitivity labels: System resources and users are assigned classifications and clearances respectively.
- Need-to-know principle: Access is granted only if a user has both the appropriate clearance level and a need to access the resource.
- Strict enforcement: The system rigidly enforces these policies; users cannot change access rights.
- Hierarchical structure or lattice: Labels are typically organized in a hierarchical manner (e.g., Top Secret, Secret, Confidential, Unclassified), or a security lattice in which there compartments in addition to clearances.
- Information flow control: For confidentiality, the Bell-LaPadula model enforces “no read up, no write down”, and for integrity, the Bipa model enforces “no read down, no write up.”
- Common implementations include SELinux and AppArmor.