Overview. SELinux Policy. Security Services. IA Paradigm. Recent Trend. IA Paradigm

Similar documents
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction

SELinux course. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant, Nethemba s.r.o.

Security Enhanced Linux and the Path Forward

Networking in NSA Security-Enhanced Linux

Confining the Apache Web Server with Security-Enhanced Linux

Object Classes and Permissions

SELinux. Security Enhanced Linux

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Trusted RUBIX TM. Version 6. Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform. Revision 6

Role-Based Access Control (RBAC)

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

BM482E Introduction to Computer Security

Secure computing: SELinux

RHS429 - Red Hat Enterprise SELinux Policy Administration

Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Chapter 15 Operating System Security

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

J-202. IT 4823 Information Security Administration. Linux Security Model. Linux Security. In Room. Linux Security April 23

Firewalls Overview and Best Practices. White Paper

Linux Operating System Security

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))

White Paper Levels of Linux Operating System Security

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Adobe Flash Player and Adobe AIR security

Homeland Security Red Teaming

Computer Security: Principles and Practice

Introduction to Operating Systems

Securing Data in a RHEL SELinux Multi-Level Secure Environment

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

System Security Policy Management: Advanced Audit Tasks

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

...e SELinux fosse più sicuro?...and if Linux was more secure? (Play on words with the Italian language)

Linux Security Ideas and Tips

W3Perl A free logfile analyzer

Addressing the United States CIO Office s Cybersecurity Sprint Directives

Securing Linux Servers Best Practice Document

Lotus Domino Security

A Simple Implementation and Performance Evaluation Extended-Role Based Access Control

4. Getting started: Performing an audit

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

A New Security Model for Networks and the Internet Dan Thomsen Payoff

What s New in Centrify Server Suite 2014

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Did you know your security solution can help with PCI compliance too?

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

OS with Enhanced Security Functions for Protecting Information Systems against Unauthorized Access, Viruses, and Worms

CAPSICUM. Practical capabilities for UNIX. 19 th USENIX Security Symposium 11 August Washington, DC. Robert N. M. Watson

Application Firewalls

Secure to the Core: The Next Generation Secure Operating System from CyberGuard

Project 2: Firewall Design (Phase I)

Rapid AIX Security Hardening with Trusted Execution (TE) AIX schnell absichern mit Trusted Execution Andreas Leibl, RSTC Ltd

INFOBrief. Red Hat Enterprise Linux 4. Key Points

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Linux OS-Level Security Nikitas Angelinas MSST 2015

Universal Web Server for Web Service Components

Administrative Role-Based Access Control on Top of Security Enhanced Linux

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Network and Host-based Vulnerability Assessment

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

FORBIDDEN - Ethical Hacking Workshop Duration

Cyberspace Security Issues and Challenges

Figure 9-1: General Application Security Issues. Application Security: Electronic Commerce and . Chapter 9

Computer Security DD2395

Top Ten Cyber Threats

Data on Kernel Failures and Security Incidents

Common Cyber Threats. Common cyber threats include:

Safety measures in Linux

Linux System Administration on Red Hat

Locking down a Hitachi ID Suite server

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Web Plus Security Features and Recommendations

Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

What s New in Centrify Server Suite 2013 Update 2

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

NetDefend Firewall UTM Services

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Introduction to UNIX and SFTP

Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first

Lecture 15 - Web Security

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

Weighted Total Mark. Weighted Exam Mark

A Comparative Study of Security Features in FreeBSD and OpenBSD

Xerox Mobile Print Cloud

Transcription:

Overview SELinux Policy CMSC 426/626 Background Includes Some Review from last talk Motivation for MAC SELinux Policy Type Enforcement RBAC SELinux Big Picture for Access Control Security Services Describe the Inner Dependencies of The Security Mechanisms for Information Assurance I&A IA Paradigm The Ying & Yang of Information Assurance CND MAC Audit DAC Think Dependency Lines. Not a DAG. CNE CNA IA Paradigm Computer Network Attack The Big Ds Deny Degrade Disrupt Deceive Damage Destroy Recent Trend Got BotNet? Raise of the Bots Viruses are Out; Bots are In! Example presentation titles from this past summer s ARO Workshop. 1

Security Quotes If I own your machine and you patch it, I still own your machine. PDR Defensive Model Protect Corollary: A popped box patched is still popped Response Detect IMHO, Recovery Response Protect Defensive Model Detect Patch: today s Response to new vulnerabilities. IDS, IPS response Quarantine Recovery Response Discover Patch Prepare Publish Motivation Discretionary Access Control Not Sufficient Malicious software runs with all the privilege of the compromised application or user The classical Trojan Horse Example from last class Consider today s Active Content PDF, PS, DOC, XLS, JPEG, HTML Javascript, Java Applets, email attachments Truly a Threat Motivation DAC is not sufficient Need systems with MAC Least Privilege Principle MAC limits what can be accessed Subjects Program vs. Process A process has state A program in motion Subjects Active entities that access objects. Process State includes identity of the user 2

Objects Entity to which access is granted Regular files, directories, file descriptors, block & char devices, FIFO pipes, links, sockets, memory Processes Can be objects too SELinux 2 Types: Transient Object (processes, data) Persistent Object Example Security Classes for Objects blk_file, dir, fd, fifo_file, file, filesystem, link_file Subject & Objects Subjects act upon objects Security Quotes Security Bake it in don t Brush it on SELinux Policy SELinux Commands SELinux Administrator commands chcon, checkpolicy, getenforce, newrole, run_init, setenforce, setfiles Modified Linux commands cp, mv,, id, ls, ps, ssh, etc. SELinux policy builder & analysis Additional tools apol SELinux Additional Tools apol analyze a SELinux policy. sediff policy semantic diff tool for SELinux. seaudit analyze audit messages from SELinux. seaudit-report generate highly-customized audit log reports. 3

SELinux Additional Tools SELinux Apol secmds command-line tool to analyze and search SELinux policy. sechecker A command line tool for performing modular checks on an SELinux policy. [Tresys] SELinux Apol Security Quotes There are no bugs, just un documented features. --Anonymous, Humor [Tresys] Classically, TE used A Note First Type Domain SELinux calls everything a Type Then discusses Domains and Types For clarity. E.g., snort_t <-- This is a Domain! There are also type commands to define Domains (and Types) ;-( SELinux Policy Access Control policy decision is a Hybrid Access Control Model of TE MAC and RBAC With Classical Unix DAC 4

Security Context Equivalency Classes for related Subjects Objects Similar Subjects can be grouped and similar objects can be grouped. [McCarty] Security Attributes Specific attributes are assigned to subjects and objects to clarify how their control and access to them. Three attributes: Type (Domain) User Role See these in the policy files Security Attributes Security Attributes Security Attribute Type (Domain) User Role Suffix (policy file token) _t (no suffix) _r Example snort_t root sysadm_r Type Most common Security Attribute Look for Allow statements In the policy files Type is from Type Enforcement (TE) Classically: Domain and Type, but SELinux uses them synonymously Contrary to the classical intent of TE Security Phrases You cannot do security through righteous indignation The process of security must blend well into the business practices of the organization. Never, force the need for security after an incident. The organization will resent your actions.» What does this say for Red Teaming? Customizable SELinux Policy File Local, and flexible security policy Binary File loaded at boot Makefile to build /etc/security/selinux/src/policy policy.conf Compiled to binary Make checkpolicy 5

Policy Build Process SELinux Policy Files Object classes TE Files RBAC Files User Declarations Security Context Constraints CAT Policy.conf file checkpolicy Binary Policy Load_policy [McCarty] % wc policy.conf ~250,000 Kernel File Context (FC) File Defines the Domain Recall principle from Type Enforcement Lists the security context for objects Files and directories By convention Name of the program or server Type Enforcement (TE) Files SELinux FC & TE Files SELinux FC File Distribute Handout # SNORT /usr/(s)?bin/snort /etc/snort(/.*)? /var/log/snort(/.*)? Flag Column -- ordinary file -- system_u:object_r:snort_exec_t system_u:object_r:snort_etc_t system_u:object_r:snort_log_t The Objects In Columns of Regex Label assigned to each object SELinux TE File Type command Like a C type statement Use this to define TE Types Allow command Default: fail closed Thus, allow quite common to grant access Can expressly prohibit E.g, auditdeny Macros M4 macro processor Any sendmail admins? SELinux TE File Type snort_etc_t, file_type, sysadmfile; Defines a Type Look @ 3rd line of FC Snort snort_t etc_t:file {getattr read }; Processes in this Domain have access to read and can get attributes To files labeled with the etc_t. { a list of access rights} 6

Question Assume that the Unix init process is Assigned to initrc_t domain What access does init have to snort protected files? Macro # can_network(domain define(`can_network',` allow $1 self:udp_socket create_socket_perms; allow $1 self:tcp_socket create_stream_socket_perms; allow $1 netif_type:netif { tcp_send udp_send rawip_send }; allow $1 netif_type:netif { tcp_recv udp_recv rawip_recv }; allow $1 node_type:node { tcp_send udp_send rawip_send }; allow $1 node_type:node { tcp_recv udp_recv rawip_recv }; allow $1 port_type:{ tcp_socket udp_socket } \ { send_msg recv_msg };... allow $1 net_conf_t:file r_file_perms; ')dnl end can_network definition Security Phrases Write once distribute many An adversary s response to a defenders No attacker will reverse engineering my system. RBAC Role Based Access Control Limits a user (and thus a process) to certain domains. For example, the Role sysadmin_r Is accessible to only the Administrator and not other users. RBAC Transitions 1. Users have Roles, and thus, their processes too 2. Transition to assigned roles only, and authorized Role 1 Role 2 Role 1 1 N X 1 Unassigned Role X RBAC User attribute Associates SELinux users with roles user root roles { staff_r system_r }; user admin roles sysadmin; user ordinary roles { user_r }; 7

RBAC Roles are associated with Domains To permit access In the.te file Example, both permitted to ping_t Domain role sysadm_r types ping_t; role system_r types ping_t; SELinux Access Control A user is assigned to roles DAC rolex_r Protection Bits Roles are associated with Domains ping_t Snort_t MAC Snort_log_t When access to an object is attempted. The access rights for the type are consulted. Security Quotes References Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed. But they are sufficiently pervasive that we must design our protocols around their limitations.) --Kaufman, Perlman, and Spencer Private Communication in a Public World, 1995. [McCarty] Bill McCarty, SELinux: NSA s Open Source Security Enhanced Linux, O Reilly, 2004. [Tresys] Apol: Analyze a SELinux Policy, 2006 http://oss.tresys.com/projects/setools Fini Thanks! 8