Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/



Similar documents
Introduction to Computer Security

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

CIS433/533 - Computer and Network Security Operating System Security

Computer Security: Principles and Practice

Windows servers. NT networks

CIS 551 / TCOM 401 Computer and Network Security

Access Control Lists in Linux & Windows

Windows security for n00bs part 1 Security architecture & Access Control

SECURITY SUBSYSTEM IN WINDOWS

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Windows Security Environment

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall Lake

Objectives I. IY5512 Computer Security. Agenda. Objectives II. Chris Mitchell. Final part of the course covers:

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Using NFS v4 ACLs with Samba in a multiprotocol environment

FreeIPA 3.3 Trust features

Avatier Identity Management Suite

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

How to monitor AD security with MOM

A Survey of Access Control Policies

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

About Microsoft Windows Server 2003

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

Windows Operating Systems. Basic Security

Windows Advanced Audit Policy Configuration

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

Mandatory Access Control

Active Directory and Linux Identity Management

Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep

Windows Server 2008/2012 Server Hardening

RSA Security Analytics

WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS

Local Accounts and Privileges in Likewise Storage Server Rafal Szczesniak EMC Isilon

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Windows Server 2003 Active Directory MST 887. Course Outline

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

More patterns for operating systems access control

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Securing. Active. Directory. Your. Five Key Lessons to. Chapters. Sponsored by: 1. Perform a Self-Audit

Release Notes RSA Authentication Agent for Web for IIS 7.0, 7.5, and 8.0 Web Server

EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL

Xerox DocuShare Security Features. Security White Paper

Talk Internet User Guides Controlgate Administrative User Guide

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Single Sign-on (SSO) technologies for the Domino Web Server

Computer and Network Security Policy

Websense Support Webinar: Questions and Answers

NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a

Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

ONEFS MULTIPROTOCOL SECURITY UNTANGLED

Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH

Homeland Security Red Teaming

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Centralized Oracle Database Authentication and Authorization in a Directory

ILTA HANDS ON Securing Windows 7

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Installation Instruction STATISTICA Enterprise Server

Windows Security and the MKS Toolkit

Configuring Sponsor Authentication

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v

Permissions Mapping in the Isilon OneFS File System

PRiSM Security. Configuration and considerations

Enabling single sign-on for Cognos 8/10 with Active Directory

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

SPICE EduGuide EG0015 Security of Administrative Accounts

Lecture 15 - Web Security

Integration Package for Microsoft Office SharePoint3

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

RemotelyAnywhere Getting Started Guide

15 AFS File Sharing. Client/Server Computing. Distributed File Systems

How To Secure Your Data Center From Hackers

Product Specification

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Virtual Machine Security

Adam Retter. Security. in exist-db. Security in exist-db

Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal

SHARING FILE SYSTEM RESOURCES

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Web Security School Entrance Exam

GFI White Paper PCI-DSS compliance and GFI Software products

Catapult PCI Compliance

BM482E Introduction to Computer Security

Windows Security and Directory Services for UNIX using Centrify DirectControl

Administration Guide ActivClient for Windows 6.2

Transcription:

Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

Windows Security 0 to full speed No protection system in early versions Advantage Know the limits of the UNIX security model What are these? Disadvantage Legacy approaches from insecure environment Will they conflict with new protection system? 2

Windows Protection System What we will discuss was designed for Windows 2000 Protection State Fine-grained access control model Flexible, but complex Flexible definition of subjects and objects Extensible set of operations Enforcement Mechanism Reference Monitor Does it meet guarantees? Transitions Discretionary Access Control 3

Subjects How would you define subjects? UNIX has users and groups Keep these? Should users have multiple subjects that they can use? Per program Per...? How broadly should subjects be recognized? UNIX subjects applied to one machine Should subjects be global? 4

Windows Subjects (Access Tokens) User SID (subject identifier) Authenticated SID Group and Alias SIDs Groups and Aliases that apply to this user Privileges Ad hoc rights E.g., Take ownership of files Like POSIX capabilities in UNIX Defaults for New Objects Access rights for new objects created (like umask) Miscellaneous login session ID token ID 5

Windows Services -- Domains An organization of machines For single sign-on and centralized security administration Domain is a collection of machines sharing common user accounts security policy Designate one or more domain controllers A trusted third party Stores users and groups in a domain, including passwords Centralized authentication 6

User Authentication Secure attention sequence CRTL-ALT-DEL Trusted path to login process winlogon User name and password Passed to the Local Security Authority local: LSA calls SAM which authenticates and returns user SID and group SIDs domain: uses Kerberos where LSA on a DC does authentication LSA obtains user SIDs, group SIDs and privileges of subject Start a shell for user new logon session with subject access tokens are attached to process 7

Tokens Like the UID/GID in a UNIX process Subsequent processes inherit access tokens Different processes may have different rights To obtain access to remote services Processes create network logon sessions (Kerberos tickets) No remote caching What about setuid equivalent? Services 8

Windows Objects Many types Executive (processes and threads) Filesystem (files and directories) Others (Registry keys and devices) Securable objects have a security descriptor Owner SID READ_CONTROL: read access to security descriptor WRITE_DAC: write access to DACL Primary group Compliance Discretionary ACL Permissions System ACL Audit policy 9

Windows Objects -- Active Directory Tree of typed objects Extensible set of object types Object Types A set of properties (attributes) A globally unique ID for each type Even properties have GUIDs Directories are containers of objects May contain objects of different types Access expressed on containers or objects Objects inherit access rights of containers Amazingly complex combinations! 10

Windows Permissions Permissions To display permissions for a file Select file, properties, security Standard access rights Apply to most objects Delete, write owner, synchronize, read control, and write dac Otherwise, specific access rights for each type (2000) Some generic rights to build on (e.g., read, write, all) Access rights are stored in an access mask form 32-bit consisting of type-specific rights standard rights (above) generic rights (read, write, etc) 11

Access Checking Object types have object managers create, store, control access Authorization Object manager calls Security Reference Monitor SRM returns policy decision Object manager enforces decision Normally Subject, object, operation, but not all are always required Reference monitor Where is complete mediation defined? Where is reference monitor implemented? Which code do we depend upon for access control? 12

Access Control Entries DACL in the security descriptor of an object List of access control entries (ACEs) ACE structure (proposed by Swift et al) Type (grant or deny) Flags Object Type: global UID for type (limit ACEs checked) InheritedObjectType: complex inheritance Access rights: access mask Principal SID: principal the ACE applies to Checking algorithm ACE matches SID (user, group, alias, etc) ACE denies access for specified right -- deny ACE grants access for some rights -- need full coverage 13

Access Checking with ACEs 14 Example

Windows vs. UNIX Let s write some policies Is the additional expressive power of Windows worth it? Who is supposed to use it? 15

Other Features Inheritance InheritedObjectType of ACE Only ACEs with a matching InheritedObjectType are copied Inheritance Flags E.g., ACE is only for inheritance Restricted Context Implement a form of least privilege Restricted tokens are used to remove privilege from process s access token Access only allowed if the two access tokens grant access Prevent the Confused Deputy Problem Runas 16

Windows In Total Subject: User SID and group/alias SID Multiple groups active Attributes: can turn some off Files: ACL Access Control Entry: SID, operations Negative Access Tokens First matching ACE is selected, may deny or grant Privileged users Administrator Anyone with Administrator group Admin privileges on domain controller Access throughout the domain 17

Windows Vulnerabilities Things that existed/evolved independently from security E.g., Registry Some odd search semantics Where should we find libraries and executables System Flexibility Every application can execute remote code Administration model Everything runs as user User needs to install programs Programs must run User has admin privileges often 18

Windows Services -- Registry Maps Keys to Values (not a crypto key) Example Keys: File extension associations: extension to application Current user info: user to configuration info Local machine: local machine configuration Access to keys Determines who can edit Specified in terms of keys: Below for remote registry access HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Control\SecurePipeServers\Winreg Not specified means no check Attacking the registry is a common problem (Spyware) 19

Search Issues The. issue Windows searches for executables in the working directory before using the PATH environment Attackers could get files written in the user s directory tree PATH and other environment variables Users can modify directories searched for executables Attackers could place malicious logic in the user s PATH Shortcut spoofing Assign a different destination to a shortcut Attacker can get another program to run Standard Extensions Mapping of standard extensions to executables Serves all users 20

Windows: Library Loads Search in directories for DLL of specified name Program Directory: directory of executable System Directory: presumably protected directory Working Directory: directory of process (where user exec d from) Problem: Attacker may get file in working directory User likely does not even know the working directory of a process Program Directory is always first SafeDllSearchMode Load from working before system directory if 0 System before working if 1 Default value is 1 in Windows2003 and 0 in XP 21

Windows Execution Applications that can execute programs Email clients All kinds Web browsers Scripts Java virtual machine Applets, servlets Microsoft Word Macros Authenticode model 22

Windows 2000/3 vs. UNIX Least Privilege Which can achieve more restrictive controls? Fail-Safe Defaults How fail-safe are each? Economy of Mechanism Complexity of mechanisms? Psychological Acceptability Ease of use? 23