Programmation Systèmes Cours 4 Runtime user management
|
|
|
- Lucas McCoy
- 10 years ago
- Views:
Transcription
1 Programmation Systèmes Cours 4 Runtime user management Stefano Zacchiroli [email protected] Laboratoire PPS, Université Paris Diderot - Paris 7 20 Octobre 2011 URL Copyright 2011 Stefano Zacchiroli License Creative Commons Attribution-ShareAlike 3.0 Unported License Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
2 Access control on UNIX generalities Traditionally in UNIX systems, access permissions have been granted to specific users or groups of users. Each of those realm is identified by IDs: user IDs and group IDs. As resources are accessed by processes, processes are associated to user and group IDs that are used for access control. Accessing a forbidden resource usually results in a EPERM error. If a process wants to access a resource which is currently forbidden to him, it has to change its sets of user and group IDs. Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
3 Principle of least privilege Principle of least privilege Programs should use the least privilege necessary to accomplish any given task. The application of this principle reduces the impact of security breaches to a minimum (by definition) of privileged actions an attacker will be able to perform. Example binding Internet ports < 1024 is a privileged operation on UNIX a web server that needs to serve on port 80 file system content should 1 start as a user that can bind port 80 (usually root) 2 bind port 80 3 change its user ID to a non-privileged user that can read the files it should serve (bonus point: the change is irreversible) Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
4 User IDs Every process is associated to 6 or more IDs that are relevant for user management: who we really are 1 real user ID 2 real group ID access permission checks 3 effective user ID 4 effective group ID... supplementary group IDs backup copies 5 saved set-user-id 6 saved set-group-id Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
5 User IDs (cont.) Real IDs are tied to the identify of the user initiating processes they are set upon login retrieved from /etc/passwd can be changed (by super user) Effective IDs used for most kinds of access checks, e.g. file access permissions allow to complement user s primary group ID with supplementary group IDs they are usually equal to real IDs, but can diverge from that Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
6 Set-user-ID 2 of the file access permission bits can be used to change effective IDs upon execution of a program. the set-user-id bit sets the effective user ID of the process to the owner of the program file the set-group-id bit sets the effective group ID of the process to the owner of the program file Typical use case: enable non privileged users to perform an action that requires specific privileges via the usage of a (carefully crafted!) set-user-id or set-group-id program. Example (passwd) The passwd program manipulates sensitive files (e.g. /etc/passwd, /etc/shadow) that should be writable and/or readable only by root. Still, passwd should allow random users to change their password. Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
7 Set-user-ID example #include <stdio. h> #include <stdlib. h> #include <string. h> #include <sys/ wait. h> #include " apue. h" int main ( int argc, char ** argv ) { char cmd[1024]; i f ( argc < 2) { p r i n t f ( "Usage : grep shadow USERNAME\n" ) ; exit ( EXIT_FAILURE ) ; } /* Retrieve date of last password change ; see shadow ( 5 ). */ /* Do not try this at home! */ i f ( snprintf (cmd, sizeof (cmd), " grep ^%s : / etc /shadow cut d : f 3", argv [ 1 ] ) < 0) err_sys ( " snprintf error " ) ; i f ( ( system (cmd) ) == 1) err_sys ( " system error " ) ; } exit ( EXIT_SUCCESS ) ; Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
8 Set-user-ID example (cont.) $. / grep shadow zack grep : / etc /shadow : Permission denied $ su Password : # cp grep shadow grep shadow2 # chown root grep shadow2 # chmod u+s grep shadow2 # exit $ l s l grep shadow grep shadow2 rwxr xr x 1 zack zack 7907 ott 18 14:56 grep shadow rwsr xr x 1 root root 7907 ott 18 14:58 grep shadow2 $. / grep shadow2 zack for grep-shadow, real user ID = effective user ID = zack not enough to access /etc/shadow, which is -rw-r----- for grep-shadow2, real user ID = zack, effective user ID = root it is enough to access /etc/shadow Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
9 Set-user-ID programs are risky In some sense, set-user-id programs adhere to the principle of least privilege: the user has set-user-id privileges only for the duration of program execution and only for that process. Is that enough? Exercise (unexpected usage of grep-shadow2)./grep-shadow2 echo zack./grep-shadow2 cat /etc/shadow ; echo zack./grep-shadow2 cat /etc/shadow > shadow.txt ; echo zack what s the problem with grep-shadow2? Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
10 Set-user-ID programs are risky (cont.) In some sense, set-user-id programs adhere to the principle of least privilege: the user has set-user-id privileges only for the duration of program execution and only for that process. Is that enough? Exercise (unexpected usage of grep-shadow2)./grep-shadow2 echo zack system("grep echo zack : /etc/shadow cut...");./grep-shadow2 cat /etc/shadow ; echo zack system("grep cat /etc/shadow ; echo zack : /etc/shadow cut...");./grep-shadow2 cat /etc/shadow > shadow.txt ; echo zack system("grep cat /etc/shadow > shadow.txt ; echo zack : /etc/shadow cut..."); what s the problem with grep-shadow2? Shell script injection! Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
11 Set-user-ID programs are risky (cont.) The shell language is a very powerful language Allowing free form user input to be executed with high privileges as shell snippets it s a very dangerous security breach In this specific case, the problem can be solved sanitizing user input (i.e. argv[1]) before passing it to system, ensuring that: 1 it is a valid user name 2 it does not contain any shell meta-character in the general case, ensuring set-user-id (or set-group-id) programs won t be used for purposes other that the intended ones is very difficult 1 You should avoid set-user-id architectures whenever possible. 2 You should never call system from a set-user-id program. Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
12 Retrieving user/group IDs #include <unistd.h> uid_t getuid(void); gid_t getgid(void); uid_t geteuid(void); gid_t getegid(void); Returns: real user ID of calling process Returns: real group ID of calling process Returns: effective user ID of calling process Returns: effective group ID of calling process uid_t (gid_t) is an integer type representing user (group) IDs Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
13 Retrieving user/group IDs example #include <stdio. h> #include <stdlib. h> #include <unistd. h> int main ( int argc, char ** argv ) { p r i n t f ( " real user ID : \ t%d\n", getuid ( ) ) ; p r i n t f ( " real group ID : \ t%d\n", getgid ( ) ) ; p r i n t f ( " e f f. user ID : \ t%d\n", geteuid ( ) ) ; p r i n t f ( " e f f. group ID : \ t%d\n", getegid ( ) ) ; exit ( EXIT_SUCCESS ) ; } Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
14 Retrieving user/group IDs example (cont.) $. / getids real user ID : 1000 real group ID : 1000 e f f. user ID : 1000 e f f. group ID : 1000 $ su Password : # cp getids getids2 # chgrp root getids2 # chmod g+s getids2 # exit $. / getids2 real user ID : 1000 real group ID : 1000 e f f. user ID : 1000 e f f. group ID : 0 $ Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
15 Changing real IDs Real user (and group) ID can be changed using the system calls: #include <unistd.h> int setuid(uid_t uid); int setgid(gid_t gid); Returns: 0 if OK, -1 on error Obviously, we need some safeguard measures: 1 if the invoking process has superuser privileges, setuid sets all 3 IDs to uid otherwise, if uid=real uid or uid=saved set-user-id, setuid only sets the effective uid otherwise, EPERM is raised 1 only stated for uid; similar rules exist for gid Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
16 Changing real IDs discussion A few general rules can be stated about ID maintenance in the kernel: 1 normally, the real user ID is set upon login and never changes throughout a session 2 only the superuser can change real user IDs; that is what login (a superuser process) does upon login 3 exec copies effective uid to saved set-user-id in case of set-user-id programs, the copy happens after having inherited effective uid from the executable 4 a process can freely change its effective user ID to either its real user ID or its saved set-user-id Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
17 Case study: man The man utility can be installed set-user-id to the man user, in order to maintain a system-wide cache of formatted manual pages. To format a manual page, man invokes a number of external programs. Goals 1 save formatted manual pages to a location writable only by the man user; 2 execute external programs as the invoking user, to avoid that problems with them affect man data. We have to switch among two different privilege realms man s privileges and user s privileges in the following order: man user man. Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
18 Case study: man (cont.) 1 we execute /usr/bin/man, which is set-user-id man. We have: real uid = our user ID effective uid = man saved set-user-id = man 2 if needed, man can access restricted data 3 before executing external programs, man calls setuid(getuid()), which changes only effective uid. 2 We now have: real uid = our user ID (no change) effective uid = our user ID saved set-user-id = man (no change) 2 because we are not a superuser process and setuid s argument = real uid Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
19 Case study: man (cont.) 4 man execute external formatting programs, which are now run as user processes 5 once done, man calls setuid(manuid). This is allowed because man s user ID has been saved in saved set-user-id. We now have: real uid = our user ID (no change) effective uid = man saved set-user-id = man (no change) 6 man can now update the cache (which is write-restricted to man) If setuid didn t allow to go back to saved set-user-id, man would be tempted to retain extra privileges while executing external programs, increasing security risks. Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
20 Effective IDs For more fine grained control (and clearer code), two system calls allow to change only effective IDs: #include <unistd.h> int seteuid(uid_t uid); int setegid(gid_t gid); Returns: 0 if OK, -1 on error A privileged user using them will leave real IDs unaffected. A non-privileged user can change its effective IDs only to its real or saved set-user-id (as it happens with setuid). Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
21 Supplementary groups Each user is associated to a primary group ID, according to /etc/passwd. Additional groups a user is member of are specified in /etc/group. In early UNIXes, each user belonged to a single group at any point in time. The command newgrp was used to change it (choosing among all allowed groups for the user). In modern UNIXes users belong at the same time to the primary and all supplementary groups (up to a maximum). Access permissions are checked against all those groups. the need of explicitly changing group is mostly gone (Which is why you never heard of newgrp) Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
22 Accessing supplementary groups Supplementary groups can be retrieved with: #include <unistd.h> int getgroups(int size, git_d list []); Returns: number of supplementary groups if OK, -1 on error Passing size==0 can be used to evaluate the size of the list. POSIX offers no way to set supplementary groups. Only superuser can do that and there is little use of it beside login implementation. On Linux: #include <grp.h> int setgroups(size_t size, const git_t *list); int initgroups(const char *user, gid_t group); Stefano Zacchiroli (Paris 7) Runtime user management 20 Octobre / 21
Set-UID Privileged Programs
Lecture Notes (Syracuse University) Set-UID Privileged Programs: 1 Set-UID Privileged Programs The main focus of this lecture is to discuss privileged programs, why they are needed, how they work, and
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Programmation Systèmes Cours 7 IPC: FIFO
Programmation Systèmes Cours 7 IPC: FIFO Stefano Zacchiroli [email protected] Laboratoire PPS, Université Paris Diderot - Paris 7 15 novembre 2011 URL http://upsilon.cc/zack/teaching/1112/progsyst/ Copyright
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
CSI 402 Lecture 13 (Unix Process Related System Calls) 13 1 / 17
CSI 402 Lecture 13 (Unix Process Related System Calls) 13 1 / 17 System Calls for Processes Ref: Process: Chapter 5 of [HGS]. A program in execution. Several processes are executed concurrently by the
Programmation Systèmes Cours 9 UNIX Domain Sockets
Programmation Systèmes Cours 9 UNIX Domain Sockets Stefano Zacchiroli [email protected] Laboratoire PPS, Université Paris Diderot 2013 2014 URL http://upsilon.cc/zack/teaching/1314/progsyst/
NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: [email protected] UNIX/LINUX
Computer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes
Computer Systems II Creating and Executing Processes 1 Unix system calls fork( ) wait( ) exit( ) 2 How To Create New Processes? Underlying mechanism - A process runs fork to create a child process - Parent
Programmation Systèmes Cours 9 Memory Mapping
Programmation Systèmes Cours 9 Memory Mapping Stefano Zacchiroli [email protected] Laboratoire PPS, Université Paris Diderot - Paris 7 24 novembre 2011 URL http://upsilon.cc/zack/teaching/1112/progsyst/
CS 290 Host-based Security and Malware. Christopher Kruegel [email protected]
CS 290 Host-based Security and Malware Christopher Kruegel [email protected] Unix Unix / Linux Started in 1969 at AT&T / Bell Labs Split into a number of popular branches BSD, Solaris, HP-UX, AIX Inspired
1. Introduction to the UNIX File System: logical vision
Unix File System 1. Introduction to the UNIX File System: logical vision Silberschatz, Galvin and Gagne 2005 Operating System Concepts 7 th Edition, Feb 6, 2005 Logical structure in each FS (System V):
Recommended File System Ownership and Privileges
FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded
Lab 2: Secure Network Administration Principles - Log Analysis
CompTIA Security+ Lab Series Lab 2: Secure Network Administration Principles - Log Analysis CompTIA Security+ Domain 1 - Network Security Objective 1.2: Apply and implement secure network administration
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep
Integrating Lustre with User Security Administration LAD 15 // Chris Gouge // 2015 Sep Topics User Security in Linux POSIX Permissions The Requirement for Upcall in Lustre Upcall Utilities Overview Upcall
Server Account Management
Server Account Management Setup Guide Contents: About Server Account Management Setting Up and Running a Server Access Scan Addressing Server Access Findings View Server Access Scan Findings Act on Server
CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4
CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Know Your Enemy: A Forensic Analysis
Know Your Enemy: A Forensic Analysis The Study of an Attack Honeynet Project http://project.honeynet.org Last Modified: 23 May 2000 This paper is a continuation of the Know Your Enemy series. The first
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
Lecture 25 Systems Programming Process Control
Lecture 25 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system or single core system can still execute multiple processes
Filesystem Security. General Principles
Filesystem Security 1 General Principles Files and folders are managed by the operating system Applications, including shells, access files through an API Access control entry (ACE) Allow/deny a certain
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006
CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
Networks and Protocols Course: 320301 International University Bremen Date: 2004-11-24 Dr. Jürgen Schönwälder Deadline: 2004-12-03.
Networks and Protocols Course: 320301 International University Bremen Date: 2004-11-24 Dr. Jürgen Schönwälder Deadline: 2004-12-03 Problem Sheet #10 Problem 10.1: finger rpc server and client implementation
Using HP-UX Role-Based Access Control
Using HP-UX Role-Based Access Control Document Information...3 Intended Audience...3 Terms and Definitions...3 Introduction...4 Problem Statement...4 The HP-UX RBAC Solution...4 HP-UX RBAC Overview...5
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
Capability-Based Access Control
Lecture Notes (Syracuse University) Capability: 1 Capability-Based Access Control 1 An Analogy: Bank Analogy We would like to use an example to illustrate the need for capabilities. In the following bank
Plan 9 Authentication in Linux
Plan 9 Authentication in Linux Ashwin Ganti University of Illinois at Chicago [email protected] ABSTRACT This paper talks about the implementation of the Plan 9 authentication mechanisms for Linux. As
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris January 2014; v1.3 By Andrew Ness This article describes how to configure Quest Authentication Services in
LISTSERV Maestro 6.0 Installation Manual for Solaris. June 8, 2015 L-Soft Sweden AB lsoft.com
LISTSERV Maestro 6.0 Installation Manual for Solaris June 8, 2015 L-Soft Sweden AB lsoft.com This document describes the installation of the Version 6.0 Build 11 release of LISTSERV Maestro for Solaris
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Operating System Structure
Operating System Structure Lecture 3 Disclaimer: some slides are adopted from the book authors slides with permission Recap Computer architecture CPU, memory, disk, I/O devices Memory hierarchy Architectural
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
RHEL Clients to AD Integrating RHEL clients to Active Directory
RHEL Clients to AD Integrating RHEL clients to Active Directory Presenter Dave Sullivan Sr. TAM, Red Hat 2013-09-03 Agenda Review Dmitri Pal and Simo Sorce Preso Legacy RHEL hook to AD RHEL Direct--->sssd--->AD
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Oracle security done right. Secure database access on the (unix and linux) operating system level.
Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0)) Yuichi Nakamura July 3, 2006 Contents 1 What is RBAC 2 1.1 Overview............................... 2 1.2 How RBAC works in SELinux....................
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
For a 64-bit system. I - Presentation Of The Shellcode
#How To Create Your Own Shellcode On Arch Linux? #Author : N3td3v!l #Contact-mail : [email protected] #Website : Nopotm.ir #Spcial tnx to : C0nn3ct0r And All Honest Hackerz and Security Managers I - Presentation
Distributed File Systems Part I. Issues in Centralized File Systems
Distributed File Systems Part I Daniel A. Menascé File Naming Issues in Centralized File Systems c:\courses\cs571\procs.ps (MS-DOS) /usr/menasce/courses/cs571/processes.ps (UNIX) File Structure bitstream
TELE 301 Lecture 7: Linux/Unix file
Overview Last Lecture Scripting This Lecture Linux/Unix file system Next Lecture System installation Sources Installation and Getting Started Guide Linux System Administrators Guide Chapter 6 in Principles
Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
Sharing Files Chapter 4 NOT ABOUT FOR SALE THIS OR CHAPTER DISTRIBUTION In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
FreeBSD Developer Summit TrustedBSD: Audit + priv(9)
FreeBSD Developer Summit TrustedBSD: Audit + priv(9) Robert Watson FreeBSD Project Computer Laboratory University of Cambridge TrustedBSD Audit Quick audit tutorial Adding audit support to new kernel features
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]
CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read
More about Continuous Integration: http://www.martinfowler.com/articles/continuousintegration.html
1 2 3 4 More about Continuous Integration: http://www.martinfowler.com/articles/continuousintegration.html 5 6 7 * Hudson was not evaluated separately. Most of the things which apply on Jenkins should
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
Getting Started with the Linux Intrusion Detection
1 of 7 6/18/2006 9:07 PM Getting Started with the Linux Intrusion Detection System Irfan Habib Abstract Sometimes file permissions aren't enough. LIDS gives you kernel-level access control that goes beyond
CA and SSL Certificates
1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary
Ingres 9.3. Security Guide ING-93-SG-02
Ingres 9.3 Security Guide ING-93-SG-02 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Ingres Corporation ("Ingres") at any time. This
OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools.
Network security MSc IDL (GLIA) and MSc HIT / Isima Academic year 2012-2013 OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools. 1. OpenSSL usage Exercice 1.1
Auditing UNIX, Linux and Oracle
Auditing UNIX, Linux and Oracle An Interactive Session Presented by: Alvin Hau Derek Koopowitz Disclaimer The slides and opinions expressed in this presentation are our own and may not reflect the official
SAS 9.4 In-Database Products
SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
How to build secure Apache Tomcat deployments with RPM.
How to build secure Apache Tomcat deployments with RPM. My security experiences really tie into everyday work. A colleague called me from my last gig and asked how to build a RedHat Package Manager (RPM)
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
VINTELA AUTHENTICATION SERVICES
VINTELA AUTHENTICATION SERVICES Troubleshooting Training, Level I Last printed 10/26/2006 3:07:00 PM VAS Troubleshooting Training, Level I VAS Troubleshooting Training, Level I... 2 1: Outline and Purpose...
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
Installation of PHP, MariaDB, and Apache
Installation of PHP, MariaDB, and Apache A few years ago, one would have had to walk over to the closest pizza store to order a pizza, go over to the bank to transfer money from one account to another
Hands-on Hacking Unlimited
About Zone-H Attacks techniques (%) File Inclusion Shares misconfiguration SQL Injection DNS attack through social engineering Web Server external module intrusion Attack against the administrator/user
Windows and Linux Security Audit
Journal of Applied Business Information Systems, 3(4), 2012 117 Journal of Applied Business Information Systems http://www.jabis.ro Windows and Linux Security Audit Sergiu Miclea* * Master Student at Master
Installation documentation for Ulteo Open Virtual Desktop
Installation documentation for Ulteo Open Virtual Desktop Copyright 2008 Ulteo SAS - 1 PREREQUISITES CONTENTS Contents 1 Prerequisites 1 1.1 Installation of MySQL.......................................
Avaya CM Login with Windows Active Directory Services
Avaya CM Login with Windows Active Directory Services Objective 2 Installing Active Directory Services on a Windows 2003 Server 2 Installing Windows Service for UNIX on Windows 2003 Active Directory Server
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router Table of Contents Configuring Secure Shell (SSH) on Cisco IOS Routers...1 Contents...1 Introduction...1 Hardware and Software Versions...1 SSHv1
How To Understand How A Process Works In Unix (Shell) (Shell Shell) (Program) (Unix) (For A Non-Program) And (Shell).Orgode) (Powerpoint) (Permanent) (Processes
Content Introduction and History File I/O The File System Shell Programming Standard Unix Files and Configuration Processes Programs are instruction sets stored on a permanent medium (e.g. harddisc). Processes
Syntax: cd <Path> Or cd $<Custom/Standard Top Name>_TOP (In CAPS)
List of Useful Commands for UNIX SHELL Scripting We all are well aware of Unix Commands but still would like to walk you through some of the commands that we generally come across in our day to day task.
HP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network
Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
SYMANTEC BACKUPEXEC2010 WITH StorTrends
SYMANTEC BACKUPEXEC2010 WITH StorTrends 1 Index 1. Introduction 3 2. Test Environment 3 3. System Requirement 4 4. Storage Requirement 4 5. Installation of Symantec Backup EXEC 2010 4 6. Installing Backup
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
CUIT UNIX Standard Operating Environment and Security Best Practices
Objective and Scope Effective Date: August 2008 This CUIT UNIX Standard Operating Environment (SOE) document defines the agreed system hardening requirements as well as security best practices for CUIT
