Security-EnhancedLinux-ClemsonUniversitySouthCarolinaLinux安全增强-克莱姆森大学南卡罗来纳州

上传人:ra****d 文档编号:252339216 上传时间:2024-11-14 格式:PPT 页数:12 大小:25KB
返回 下载 相关 举报
Security-EnhancedLinux-ClemsonUniversitySouthCarolinaLinux安全增强-克莱姆森大学南卡罗来纳州_第1页
第1页 / 共12页
Security-EnhancedLinux-ClemsonUniversitySouthCarolinaLinux安全增强-克莱姆森大学南卡罗来纳州_第2页
第2页 / 共12页
Security-EnhancedLinux-ClemsonUniversitySouthCarolinaLinux安全增强-克莱姆森大学南卡罗来纳州_第3页
第3页 / 共12页
点击查看更多>>
资源描述
Click to edit the title text format,Click to edit the outline text format,Second Outline Level,Third Outline Level,Fourth Outline Level,Fifth Outline Level,Sixth Outline Level,Seventh Outline Level,Eighth Outline Level,Ninth Outline Level,Security-Enhanced Linux,Eric Harney,CPSC 481,What is SELinux?,Developed by NSA,Released in 2000,Adds additional security capabilities to Linux,Maintains compatibility with existing software,“Designed to enforce separation of information based on confidentiality and integrity requirements.,Open source,GPL,Mandatory Access Control,Exists on top of traditional Unix DAC,Administrator defines a policy,Kernel enforces this policy,Doesnt trust the application,Doesnt trust the user,Role-Based Access Control,Users are assigned to one or more roles,Roles indicate which type domains a user may access,Similar to traditional Unix uid,Used to separate privileges,Each daemon may have its own role,Example roles include system_r,sysadm_r,user_r,Role transitions must be defined,Type Enforcement,Types are assigned to files,Designate categories of files,Web server,Database server,Mail server,Regular users,Stored in the file system,Types are assigned to processes as domains,Domains are closely related to types,Principle of Least Privilege,Reduces the power of the root account,Process running as root is still restricted,Services cannot access each others data,Compromising one service only allows access or damage to its own data,Policies,A policy is a set of rules which specifies allowable behavior,Strict versus targeted,Enumerating good versus bad behavior,No“default permit,Defines,Types for file objects,Domains for processes,Roles,User identities,Highly configurable with booleans,Example Policy Statements,Type enforcement,allow sshd_t sshd_exec_t:file read execute entrypoint;,allow sshd_t sshd_tmp_t:file create read write getattr setattr link unlink rename;,allow sshd_t user_t:process transition;,Role definitions,role system_r types kernel_t initrc_t getty_t klogd_t;,role user_r types user_t user_netscape_t;,role sysadm_r types sysadm_t run_init_t;,Benefits of SELinux,Helps prevent damage from unknown or unpatched exploits,Provides fine-grained access control to all parts of system,Allows a customized level of security,Example Attack,Apache web server running as root with d_t,Malicious user causes a buffer overflow in Apache and executes arbitrary code,User directs Apache to fetch/etc/shadow and serve it to the web client,File read passes DAC,but/etc/shadow is assigned type shadow_t,Apaches d_t role has no access to shadow_t domain access denied,Possible Attacks,Kernel protection is not substantially increased,A buffer overflow in kernel space could still be disastrous,An attacker compromising your login credentials still means game over,SELinux policies are complex-an incorrectly written policy also means game over,Availability,Included in standard mainline Linux kernel,Only well supported by some distributions,Red Hat Enterprise Linux,Fedora,Gentoo(Hardened Gentoo),Will be evaluated for Common Criteria compliance in the future,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 商业管理 > 商业计划


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!