Object Classes and Permissions

Size: px
Start display at page:

Download "Object Classes and Permissions"

Transcription

1 Object Classes and Permissions Security Policy Development Primer for Security Enhanced Linux (Module 5)

2 2 SE Linux Policy Structure Top-level sections of policy.conf: Flask definitions object classes, permissions, initial SIDs TE and RBAC declarations and statements defines the type enforcement and role access control policies user declarations identify users to policy and associate users with roles constraints additional restrictions based on types, roles, and users security context specifications special security context specifications

3 3 Object Classes Basis for access control in SE Linux specified in terms of subject s access to objects subjects processes objects 29 distinct object classes access numerous permissions each class with its own permission specification

4 4 Object Class Definitions Object classes are defined in: /usr/local/selinux/flask/security_classes same definitions built into kernel Object class definition statement class file class identifier simply defines an object class identifier Policy writers should never change security_classes changed only when object classes change in kernel

5 5 Summary of Object Classes File-related Object Classes file: regular file dir: directory fd: file descriptor opened object descriptors associated with processes lnk_file: symbolic link chr_file: character device (e.g., serial ports, terminals) blk_file: block device (e.g, disk drives) sock_file: Unix-domain socket local socket listed in file name space fifo_file: FIFO, aka named pipes filesystem abstract object representing controls on whole file systems

6 6 Summary of Object Classes Network-related object classes node: host(s) by IP address netif: network interfaces tcp_socket: IP stream socket udp_socket: IP datagram socket rawip_socket: IP raw socket netlink_socket: Netlink sockets packet_socket: low level packet socket unix_stream_socket: local stream socket unix_dgram_socket: local datagram socket key_socket: IPsec security association database socket socket: all other socket types

7 7 Summary of Object Classes System V IPC-related sem: semaphore set msgq: message queue msg: messages within a message queue shm: shared memory ipc: no longer used

8 8 Summary of Object Classes Process class both an object and a subject Security class abstract object to control call to in-kernel security server load new policy, get list of contexts and SIDs only one System class abstract object to control certain system behavior e.g. toggle enforcing mode only one Capability class provides a means to control Linux capabilities must have associated permission as well as capability

9 9 Object Class Permissions Each object class has a defined set of permissions called an access vector The permission definitions in the policy are in: /usr/local/selinux/flask/access_vectors Permission identifiers defined in two ways common statement (used for multiple classes as a group) class statement #2 (class-specific permissions) Policy writers should never change access_vectors as with object classes, hard coded into the kernel changed only when access vectors change in kernel

10 10 Object Class Permissions Common permissions defines group of permission identifiers associated with object classes as a group ensures all like permissions assigned same bit in kernel common file {ioctl read write create getattr setattr lock } common perm identifier permission identifiers assigned to object classes via class statement (#2)

11 11 Object Class Permissions Object class permission definition (class statement #2) assigns permissions to each object class can assign common and/or class-specific permissions class file inherits file { execute_no_trans entrypoint } optional common perms class ID (from previous class definition) common perms (from previous common stmnt) class-specific permissions Net effect: File class has following permissions defined: ioctl read write create getattr setattr lock relabelfrom relabelto append unlink link rename execute swapon quotaon mounton execute_no_trans entrypoint

12 12 Object Class Permissions Exploring Object Classes and Permissions

13 13 File Object Class Permissions read: read file contents write: write or append file contents append: append file contents i.e., opened with O_APPEND flag create: create a new file getattr: read file attributes such as access mode stat, some ioctls, setattr: change file attributes such as access mode chmod, some ioctls, ioctl: ioctl sys call requests not addressed by other permissions unlink: remove hard link (delete) link: create hard link to file

14 14 File Object Class Permissions lock: set and unset file locks rename: rename a hard link relabelfrom: change the security context based on existing type relabelto: change the security context based on the new type mounton: only meaningful for directories in Linux swapon: allows file to be used for paging/swapping space quotaon: enabling quotas execute: same meaning as ordinary Linux execute execute_no_trans: permission to execute file without a domain transition entrypoint: permission to enter a new domain via this program

15 15 Process Object Class Permissions transition: permission to change security context checked against old domain type and new domain type fork: fork or clone a process sigchld: permission to signal SIGCHLD sigkill: permission to signal SIGKILL sigstop: permission to signal SIGSTOP signull: no signal sent, ala kill(pid, 0) signal: all other signal ptrace: ability to trace a process (e.g., debugging) getsched, setsched: get and set process priority getsession: get session information (getsid) getpgid, setpgid: get and set process group ID getcap, setcap: get and set capabilities (capget, capset) share: allows state sharing (via clone call)

16 16 More on Object Class Permissions Understanding all requires detailed understanding of implementation Additional references on classes and permissions most comprehensive, but a little out of date describes some changes from above report Example policy includes macros provides more abstract permission model using m4 macro processor language definitions in./policy/macros/global_macros.te

17 17 Permission Macro Examples All from policy/macros/global_macros.te rx_file_perms (file read/execute permission) read getattr lock execute ioctl r_dir_perms (read and traverse directory) read getattr lock search ioctl create_dir_perms (create and use new directory) create read getattr lock setattr link unlink rename search add_name remove_name reparent write rmdir Permission macros can be used in place (or alongside) of explicit permission list

18 18 Interrelationship of Permissions Many actions require several permissions for several object classes Domain transition, for example process transition permission allow src_type new_type : process transition; program execution permission allow src_type program_type : file { getattr execute }; new domain execute access allow new_type program_type : file entrypoint; other issues file descriptor inheritance, signals, other IPC Macros can help here too see domain_trans() macro for example

19 19 QUESTIONS?

Networking in NSA Security-Enhanced Linux

Networking in NSA Security-Enhanced Linux Networking in NSA Security-Enhanced Linux James Morris Abstract Break through the complexity of SE Linux with a working example that shows how to add SE Linux protection to a simple network server. This

More information

Linux Kernel Architecture

Linux Kernel Architecture Linux Kernel Architecture Amir Hossein Payberah payberah@yahoo.com Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management

More information

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

More information

Linux OS-Level Security Nikitas Angelinas MSST 2015

Linux OS-Level Security Nikitas Angelinas MSST 2015 Linux OS-Level Security Nikitas Angelinas MSST 2015 Agenda SELinux SELinux issues Audit subsystem Audit issues Further OS hardening 2 SELinux Security-Enhanced Linux Is NOT a Linux distribution A kernel

More information

Red Hat Linux Internals

Red Hat Linux Internals Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing

More information

REAL TIME OPERATING SYSTEM PROGRAMMING-II: II: Windows CE, OSEK and Real time Linux. Lesson-12: Real Time Linux

REAL TIME OPERATING SYSTEM PROGRAMMING-II: II: Windows CE, OSEK and Real time Linux. Lesson-12: Real Time Linux REAL TIME OPERATING SYSTEM PROGRAMMING-II: II: Windows CE, OSEK and Real time Linux Lesson-12: Real Time Linux 1 1. Real Time Linux 2 Linux 2.6.x Linux is after Linus Torvalds, father of the Linux operating

More information

Chapter 10 Case Study 1: LINUX

Chapter 10 Case Study 1: LINUX MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 10 Case Study 1: LINUX History of UNIX and Linux UNICS PDP-11 UNIX Portable UNIX Berkeley UNIX Standard UNIX MINIX Linux UNIX/Linux Goals

More information

System Security Fundamentals

System Security Fundamentals System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview

More information

We mean.network File System

We mean.network File System We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine

More information

Linux Driver Devices. Why, When, Which, How?

Linux Driver Devices. Why, When, Which, How? Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may

More information

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what

More information

Operating System Components and Services

Operating System Components and Services Operating System Components and Services Tom Kelliher, CS 311 Feb. 6, 2012 Announcements: From last time: 1. System architecture issues. 2. I/O programming. 3. Memory hierarchy. 4. Hardware protection.

More information

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how

More information

Device Management Functions

Device Management Functions REAL TIME OPERATING SYSTEMS Lesson-6: Device Management Functions 1 1. Device manager functions 2 Device Driver ISRs Number of device driver ISRs in a system, Each device or device function having s a

More information

SELinux. Security Enhanced Linux

SELinux. Security Enhanced Linux SELinux Security Enhanced Linux Introduction and brief overview. Copyright 2005 by Paweł J. Sawicki http://www.pawel-sawicki.com/ Agenda DAC Discretionary Access Control ACL Access Control Lists MAC Mandatory

More information

Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH

Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How

More information

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006 CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4 CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,

More information

Linux/UNIX System Programming. POSIX Shared Memory. Michael Kerrisk, man7.org c 2015. February 2015

Linux/UNIX System Programming. POSIX Shared Memory. Michael Kerrisk, man7.org c 2015. February 2015 Linux/UNIX System Programming POSIX Shared Memory Michael Kerrisk, man7.org c 2015 February 2015 Outline 22 POSIX Shared Memory 22-1 22.1 Overview 22-3 22.2 Creating and opening shared memory objects 22-10

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!

More information

RECOVER ( 8 ) Maintenance Procedures RECOVER ( 8 )

RECOVER ( 8 ) Maintenance Procedures RECOVER ( 8 ) NAME recover browse and recover NetWorker files SYNOPSIS recover [-f] [-n] [-q] [-u] [-i {nnyyrr}] [-d destination] [-c client] [-t date] [-sserver] [dir] recover [-f] [-n] [-u] [-q] [-i {nnyyrr}] [-I

More information

Distributed File Systems. NFS Architecture (1)

Distributed File Systems. NFS Architecture (1) COP 6611 Advanced Operating System Distributed File Systems Chi Zhang czhang@cs.fiu.edu NFS Architecture (1) a) The remote access model. (like NFS) b) The upload/download model (like FTP) 2 1 NFS Architecture

More information

Lab 2 : Basic File Server. Introduction

Lab 2 : Basic File Server. Introduction Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and

More information

Linux Virtual Server Tutorial

Linux Virtual Server Tutorial Linux Virtual Server Tutorial Horms (Simon Horman) horms@valinux.co.jp VA Linux Systems Japan, K.K. www.valinux.co.jp with assistance from NTT Comware Corporation www.nttcom.co.jp July 2003 http://www.ultramonkey.org/

More information

LWIOD Access Audit Module

LWIOD Access Audit Module LWIOD Access Audit Module Andrew Pilloud andrew.pilloud@isilon.com Last updated: June 24, 2010 Current Revision: Abstract Current releases of OneFS use Samba to provide CIFS protocol support. Samba has

More information

Programmation Systèmes Cours 7 IPC: FIFO

Programmation Systèmes Cours 7 IPC: FIFO Programmation Systèmes Cours 7 IPC: FIFO Stefano Zacchiroli zack@pps.jussieu.fr Laboratoire PPS, Université Paris Diderot - Paris 7 15 novembre 2011 URL http://upsilon.cc/zack/teaching/1112/progsyst/ Copyright

More information

List of FTP commands for the Microsoft command-line FTP client

List of FTP commands for the Microsoft command-line FTP client You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows

More information

View access control as a matrix Subjects (processes/users) access objects (e.g., files) Each cell of matrix has allowed permissions

View access control as a matrix Subjects (processes/users) access objects (e.g., files) Each cell of matrix has allowed permissions p. 1/3 View access control as a matrix Subjects (processes/users) access objects (e.g., files) Each cell of matrix has allowed permissions p. 2/3 Specifying policy Manually filling out matrix would be

More information

Get quick control over your Linux server with server commands

Get quick control over your Linux server with server commands Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with

More information

Interprocess Communication Message Passing

Interprocess Communication Message Passing Interprocess Communication Message Passing IPC facility provides two operations: send(message) message size fixed or variable receive(message) If P and Q wish to communicate, they need to: establish a

More information

Chapter 12 File Management. Roadmap

Chapter 12 File Management. Roadmap Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access

More information

Chapter 12 File Management

Chapter 12 File Management Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access

More information

Chapter 14 Analyzing Network Traffic. Ed Crowley

Chapter 14 Analyzing Network Traffic. Ed Crowley Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content

More information

Verifying information flow goals in Security-Enhanced Linux

Verifying information flow goals in Security-Enhanced Linux Journal of Computer Security 13 (2005) 115 134 115 IOS Press Verifying information flow goals in Security-Enhanced Linux Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell and Clement W. Skorupka The MITRE

More information

6.828 Operating System Engineering: Fall 2003. Quiz II Solutions THIS IS AN OPEN BOOK, OPEN NOTES QUIZ.

6.828 Operating System Engineering: Fall 2003. Quiz II Solutions THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.828 Operating System Engineering: Fall 2003 Quiz II Solutions All problems are open-ended questions. In

More information

TACC Stats I/O Performance Monitoring for the Intransigent

TACC Stats I/O Performance Monitoring for the Intransigent TACC Stats I/O Performance Monitoring for the Intransigent John Hammond, TACC jhammond@tacc.utexas.edu IASDS11 Collaborators Bill Barth, TACC Consumer, first user John McCalpin, TACC Performance guru Motivation

More information

DATABASE MANAGEMENT SYSTEMS

DATABASE MANAGEMENT SYSTEMS DATABASE MANAGEMENT SYSTEMS 1) INTRODUCTION : Data base systems data models instances and schemes Database Models Relation,Hierarchical and Network Data independence DDL and DML Data base manager database

More information

Porting Lustre to Operating Systems other than Linux. Ken Hornstein US Naval Research Laboratory April 16, 2010

Porting Lustre to Operating Systems other than Linux. Ken Hornstein US Naval Research Laboratory April 16, 2010 Porting Lustre to Operating Systems other than Linux Ken Hornstein US Naval Research Laboratory April 16, 2010 Motivation We do a lot of data visualization on Lustre data, and would like to do that on

More information

Unix System Calls. Dept. CSIE 2006.12.25

Unix System Calls. Dept. CSIE 2006.12.25 Unix System Calls Gwan-Hwan Hwang Dept. CSIE National Taiwan Normal University 2006.12.25 UNIX System Overview UNIX Architecture Login Name Shells Files and Directories File System Filename Pathname Working

More information

Providing a Shared File System in the Hare POSIX Multikernel. Charles Gruenwald III

Providing a Shared File System in the Hare POSIX Multikernel. Charles Gruenwald III Providing a Shared File System in the Hare POSIX Multikernel by Charles Gruenwald III Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements

More information

Operating Systems and Networks

Operating Systems and Networks recap Operating Systems and Networks How OS manages multiple tasks Virtual memory Brief Linux demo Lecture 04: Introduction to OS-part 3 Behzad Bordbar 47 48 Contents Dual mode API to wrap system calls

More information

Cloud File System. Cloud computing advantages:

Cloud File System. Cloud computing advantages: Cloud File System Liberios Vokorokos, Anton Baláž, Branislav Madoš and Ján Radušovský Faculty of Electrical Engineering and Informatics Technical University of Košice liberiosvokorokos@tukesk, antonbalaz@tukesk,

More information

Lecture 5. User-Mode Linux. Jeff Dike. November 7, 2012. Operating Systems Practical. OSP Lecture 5, UML 1/33

Lecture 5. User-Mode Linux. Jeff Dike. November 7, 2012. Operating Systems Practical. OSP Lecture 5, UML 1/33 Lecture 5 User-Mode Linux Jeff Dike Operating Systems Practical November 7, 2012 OSP Lecture 5, UML 1/33 Contents User-Mode Linux Keywords Resources Questions OSP Lecture 5, UML 2/33 Outline User-Mode

More information

Proceedings of the 11 th USENIX Security Symposium

Proceedings of the 11 th USENIX Security Symposium USENIX Association Proceedings of the 11 th USENIX Security Symposium San Francisco, California, USA August 5-9, 2002 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION 2002 by The USENIX Association All Rights

More information

Capability-Based Access Control

Capability-Based Access Control Lecture Notes (Syracuse University) Capability: 1 Capability-Based Access Control 1 An Analogy: Bank Analogy We would like to use an example to illustrate the need for capabilities. In the following bank

More information

Configuring Security for SMTP Traffic

Configuring Security for SMTP Traffic 4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic

More information

Managed Backup Service - Agent for Linux 6.00.2415- Release Notes

Managed Backup Service - Agent for Linux 6.00.2415- Release Notes Managed Backup Service - Agent for Linux 6.00.2415- Release Notes 1 Managed Backup Service Agent for Linux Version 6.00.2415 Release Notes, 9 th June 2008 1 OVERVIEW This document contains release notes

More information

Using the CoreSight ITM for debug and testing in RTX applications

Using the CoreSight ITM for debug and testing in RTX applications Using the CoreSight ITM for debug and testing in RTX applications Outline This document outlines a basic scheme for detecting runtime errors during development of an RTX application and an approach to

More information

TECHNICAL NOTES. Security Firewall IP Tables

TECHNICAL NOTES. Security Firewall IP Tables Introduction Prior to iptables, the predominant software packages for creating Linux firewalls were 'IPChains' in Linux 2.2 and ipfwadm in Linux 2.0, which in turn was based on BSD's ipfw. Both ipchains

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft

More information

Securing Commercial Operating Systems

Securing Commercial Operating Systems C H A P T E R 7 Securing Commercial Operating Systems Since the discovery of the reference monitor concept during the development of Multics, there have been many projects to retrofit existing commercial

More information

REAL TIME OPERATING SYSTEMS. Lesson-10:

REAL TIME OPERATING SYSTEMS. Lesson-10: REAL TIME OPERATING SYSTEMS Lesson-10: Real Time Operating System 1 1. Real Time Operating System Definition 2 Real Time A real time is the time which continuously increments at regular intervals after

More information

Safety measures in Linux

Safety measures in Linux S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota lichota@mimuw.edu.pl A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows

More information

Lecture 24 Systems Programming in C

Lecture 24 Systems Programming in C Lecture 24 Systems Programming in C A process is a currently executing instance of a program. All programs by default execute in the user mode. A C program can invoke UNIX system calls directly. A system

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

OS: IPC I. Cooperating Processes. CIT 595 Spring 2010. Message Passing vs. Shared Memory. Message Passing: Unix Pipes

OS: IPC I. Cooperating Processes. CIT 595 Spring 2010. Message Passing vs. Shared Memory. Message Passing: Unix Pipes Cooperating Processes Independent processes cannot affect or be affected by the execution of another process OS: IPC I CIT 595 Spring 2010 Cooperating process can affect or be affected by the execution

More information

mypro Installation and Handling Manual Version: 7

mypro Installation and Handling Manual Version: 7 mypro Installation and Handling Manual Version: 7 Date: JAN 2016 Thank you for using mypro on your PC. myscada is a full featured HMI/SCADA system with advanced options such as vector graphics views, advanced

More information

Lecture 16: System-Level I/O

Lecture 16: System-Level I/O CSCI-UA.0201-003 Computer Systems Organization Lecture 16: System-Level I/O Mohamed Zahran (aka Z) mzahran@cs.nyu.edu http://www.mzahran.com Some slides adapted (and slightly modified) from: Clark Barrett

More information

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast. Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport

More information

The POSIX Socket API

The POSIX Socket API The POSIX Giovanni Agosta Piattaforme Software per la Rete Modulo 2 G. Agosta The POSIX Outline Sockets & TCP Connections 1 Sockets & TCP Connections 2 3 4 G. Agosta The POSIX TCP Connections Preliminaries

More information

Appendix. Web Command Error Codes. Web Command Error Codes

Appendix. Web Command Error Codes. Web Command Error Codes Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting

More information

Generalised Socket Addresses for Unix Squeak 3.9 11

Generalised Socket Addresses for Unix Squeak 3.9 11 Generalised Socket Addresses for Unix Squeak 3.9 11 Ian Piumarta 2007 06 08 This document describes several new SocketPlugin primitives that allow IPv6 (and arbitrary future other) address formats to be

More information

Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327

Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed

More information

How To Install Linux Titan

How To Install Linux Titan Linux Titan Distribution Presented By: Adham Helal Amgad Madkour Ayman El Sayed Emad Zakaria What Is a Linux Distribution? What is a Linux Distribution? The distribution contains groups of packages and

More information

DEVICE DRIVERS AND TERRUPTS SERVICE MECHANISM Lesson-14: Device types, Physical and Virtual device functions

DEVICE DRIVERS AND TERRUPTS SERVICE MECHANISM Lesson-14: Device types, Physical and Virtual device functions DEVICE DRIVERS AND TERRUPTS SERVICE MECHANISM Lesson-14: Device types, Physical and Virtual device functions 1 Device Types For each type of device, there is a set of the generic commands. For example,

More information

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded

More information

Virtual Private Systems for FreeBSD

Virtual Private Systems for FreeBSD Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system

More information

Chapter 12 File Management

Chapter 12 File Management Operating Systems: Internals and Design Principles Chapter 12 File Management Eighth Edition By William Stallings Files Data collections created by users The File System is one of the most important parts

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Centralized Logging With syslog ng. Ryan Ma6eson ma6y91@gmail.com h6p://prefetch.net

Centralized Logging With syslog ng. Ryan Ma6eson ma6y91@gmail.com h6p://prefetch.net Centralized Logging With syslog ng Ryan Ma6eson ma6y91@gmail.com h6p://prefetch.net PresentaBon Overview Tonight I am going to discuss centralized logging and how syslog ng can be used to create a centralized

More information

Network Programming with Sockets. Process Management in UNIX

Network Programming with Sockets. Process Management in UNIX Network Programming with Sockets This section is a brief introduction to the basics of networking programming using the BSD Socket interface on the Unix Operating System. Processes in Unix Sockets Stream

More information

Table of Contents. Chapter 1: Introduction. Chapter 2: Getting Started. Chapter 3: Standard Functionality. Chapter 4: Module Descriptions

Table of Contents. Chapter 1: Introduction. Chapter 2: Getting Started. Chapter 3: Standard Functionality. Chapter 4: Module Descriptions Table of Contents Chapter 1: Introduction Chapter 2: Getting Started Chapter 3: Standard Functionality Chapter 4: Module Descriptions Table of Contents Table of Contents Chapter 5: Administration Table

More information

Making Linux Safe for Virtual Machines

Making Linux Safe for Virtual Machines Making Linux Safe for Virtual Machines Jeff Dike (jdike@karaya.com) Abstract User-mode Linux (UML) 1 is the port of Linux to Linux. It has demonstrated that the Linux system call interface is sufficiently

More information

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to

More information

The Case for SE Android. Stephen Smalley sds@tycho.nsa.gov Trust Mechanisms (R2X) National Security Agency

The Case for SE Android. Stephen Smalley sds@tycho.nsa.gov Trust Mechanisms (R2X) National Security Agency The Case for SE Android Stephen Smalley sds@tycho.nsa.gov Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical

More information

New and Improved Lustre Performance Monitoring Tool. Torben Kling Petersen, PhD Principal Engineer. Chris Bloxham Principal Architect

New and Improved Lustre Performance Monitoring Tool. Torben Kling Petersen, PhD Principal Engineer. Chris Bloxham Principal Architect New and Improved Lustre Performance Monitoring Tool Torben Kling Petersen, PhD Principal Engineer Chris Bloxham Principal Architect Lustre monitoring Performance Granular Aggregated Components Subsystem

More information

Exploration of Large Scale Virtual Networks. Open Network Summit 2016

Exploration of Large Scale Virtual Networks. Open Network Summit 2016 Exploration of Large Scale Virtual Networks Open Network Summit 2016 David Wilder wilder@us.ibm.com A Network of Containers Docker containers Virtual network More containers.. 1 5001 2 4 OpenVswitch or

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS

A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS May 7, 2010 Outline Overview Architecture Feature Set Administrator Perspective Developer Perspective Overview 18 years development GPLv3

More information

CSC 2405: Computer Systems II

CSC 2405: Computer Systems II CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building mirela.damian@villanova.edu

More information

Lecture 17. Process Management. Process Management. Process Management. Inter-Process Communication. Inter-Process Communication

Lecture 17. Process Management. Process Management. Process Management. Inter-Process Communication. Inter-Process Communication Process Management Lecture 17 Review February 25, 2005 Program? Process? Thread? Disadvantages, advantages of threads? How do you identify processes? How do you fork a child process, the child process

More information

Linux Distributed Security Module 1

Linux Distributed Security Module 1 Linux Distributed Security Module 1 By Miroslaw Zakrzewski and Ibrahim Haddad This article describes the implementation of Mandatory Access Control through a Linux kernel module that is targeted for Linux

More information

CS161: Operating Systems

CS161: Operating Systems CS161: Operating Systems Matt Welsh mdw@eecs.harvard.edu Lecture 2: OS Structure and System Calls February 6, 2007 1 Lecture Overview Protection Boundaries and Privilege Levels What makes the kernel different

More information

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2

More information

NSA Security-Enhanced Linux (SELinux)

NSA Security-Enhanced Linux (SELinux) NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley sds@epoch.ncsc.mil Information Assurance Research Group National Security Agency Information Assurance Research Group 1

More information

Using NFS v4 ACLs with Samba in a multiprotocol environment

Using NFS v4 ACLs with Samba in a multiprotocol environment Using NFS v4 ACLs with Samba in a multiprotocol environment Alexander Werth IBM 2009 IBM Corporation Using NFS v4 ACLs with Samba in a multiprotocol environment Use multiple protocols with different authorization

More information

Table of Contents Introduction Supporting Arguments of Sysaxftp File Transfer Commands File System Commands PGP Commands Other Using Commands

Table of Contents Introduction Supporting Arguments of Sysaxftp File Transfer Commands File System Commands PGP Commands Other Using Commands FTP Console Manual Table of Contents 1. Introduction... 1 1.1. Open Command Prompt... 2 1.2. Start Sysaxftp... 2 1.3. Connect to Server... 3 1.4. List the contents of directory... 4 1.5. Download and Upload

More information

µtasker Document FTP Client

µtasker Document FTP Client Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.

More information

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

HP POLYSERVE SOFTWARE

HP POLYSERVE SOFTWARE You can read the recommendations in the user guide, the technical guide or the installation guide for HP POLYSERVE SOFTWARE. You'll find the answers to all your questions on the HP POLYSERVE SOFTWARE in

More information

About the File Manager 2

About the File Manager 2 This chapter describes how your application can use the to store and access data in files or to manipulate files, directories, and volumes. It also provides a complete description of all routines, data

More information

IT304 Experiment 2 To understand the concept of IPC, Pipes, Signals, Multi-Threading and Multiprocessing in the context of networking.

IT304 Experiment 2 To understand the concept of IPC, Pipes, Signals, Multi-Threading and Multiprocessing in the context of networking. Aim: IT304 Experiment 2 To understand the concept of IPC, Pipes, Signals, Multi-Threading and Multiprocessing in the context of networking. Other Objective of this lab session is to learn how to do socket

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

The Hadoop Distributed File System

The Hadoop Distributed File System The Hadoop Distributed File System The Hadoop Distributed File System, Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, Yahoo, 2010 Agenda Topic 1: Introduction Topic 2: Architecture

More information

A Look through the Android Stack

A Look through the Android Stack A Look through the Android Stack A Look through the Android Stack Free Electrons Maxime Ripard Free Electrons Embedded Linux Developers c Copyright 2004-2012, Free Electrons. Creative Commons BY-SA 3.0

More information

A Simple Implementation and Performance Evaluation Extended-Role Based Access Control

A Simple Implementation and Performance Evaluation Extended-Role Based Access Control A Simple Implementation and Performance Evaluation Extended-Role Based Access Control Wook Shin and Hong Kook Kim Dept. of Information and Communications, Gwangju Institute of Science and Technology, 1

More information