The Evolution of Secure Operating Systems

The Evolution of Secure Operating Systems

The Evolution of Secure Operating Systems! Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University Systems and Internet Infrastructure Security Laboratory (SIIS) Page 1 Operating Systems • Make computer systems easier to use • Improve productivity and collaboration Systems and Internet Infrastructure Security Laboratory (SIIS) Page Operating Systems • Users make mistakes that may affect others • Users may have malicious intentions Systems and Internet Infrastructure Security Laboratory (SIIS) Page Need for Security • The need for operating systems to enforce security requirements was recognized from the advent of multi-user operating systems Systems and Internet Infrastructure Security Laboratory (SIIS) Page EvolutionMultiprocessor of Secure Systems OS •• MajorIn this talk,Effort: I will Multics review the evolution of the design of secure ‣operatingMultiprocessing systems withsystem respect -- developed to these many questions OS concepts • Phase• Including 1: The (Early)security Multics Experience ‣ Begun in 1965 ‣ Archaen ‒ “the formation of continents and life started to form” • Research continued into the mid-70s • Phase 2: The Security Kernel Experience ‣ Used until 2000 ‣‣ ProterozoicInitial partners: ‒ “from MIT, the Bell appearance Labs, GE of (replaced oxygen in by Earth's Honeywell) atmosphere to just before the proliferation of complex life” ‣ Other innovations: hierarchical filesystems, dynamic linking • Phase 3: Recent and Future Directions ‣ Phanerozoic ‒ “starts with the rapid emergence of a number of • Multicslife forms” remains a basis for a secure operating systems • designNot only vertical but horizontal transfers SystemsCSE543 and- Introduction Internet Infrastructure to Computer Security and Network Laboratory Security (SIIS) Page !X Need for Security • The need for operating systems to enforce security requirements was recognized from the advent of multi-user operating systems ‣ F. J. Corbató and V. A. Vyssotsky. Introduction and overview of the Multics System. In Proceedings of the 1965 AFIPS Fall Joint Computer Conference, 1965. ‣ “Of considerable concern is the issue of privacy. Experience has shown that privacy and security are sensitive issues in a multi- user system where terminals are anonymously remote.” Systems and Internet Infrastructure Security Laboratory (SIIS) Page Questions • So, were we done? No, still several difficult questions to address, including • (1) What does security mean? ‣ Policy: What degree of control and access should be allowed to enable a system to process user data securely? • (2) How do we enforce security effectively? ‣ Mechanism: What should be the requirements of a security mechanism to enforce security policies correctly? • (3) How do we validate correctness in enforcement? ‣ Validation: What methods are necessary to validate the correctness requirements for enforcing a security policy? Systems and Internet Infrastructure Security Laboratory (SIIS) Page Multics Project (to 1977) • Importantly, the Multics project explored all three big questions ‣ And made important contributions to each Systems and Internet Infrastructure Security Laboratory (SIIS) Page Multics Project (to 1977) • Importantly, the Multics project explored all three big questions ‣ And made important contributions to each • What does security (policy) mean? ‣ Security has to protect secrecy and integrity even when adversaries control processes (e.g., Mandatory Access Control) Systems and Internet Infrastructure Security Laboratory (SIIS) Page Multics Project (to 1977) • Importantly, the Multics project explored all three big questions ‣ And made important contributions to each • What does security (policy) mean? ‣ Security has to protect secrecy and integrity even when adversaries control processes (e.g., Mandatory Access Control) • What does enforcement mean? ‣ Enforcement mechanisms must satisfy the reference monitor concept Systems and Internet Infrastructure Security Laboratory (SIIS) Page Multics Project (to 1977) • Importantly, the Multics project explored all three big questions ‣ And made important contributions to each • What does security (policy) mean? ‣ Security has to protect secrecy and integrity even when adversaries control processes (e.g., Mandatory Access Control) • What does enforcement mean? ‣ Enforcement mechanisms must satisfy the reference monitor concept • What does validation require? ‣ Small code base; design for security; formal verification Systems and Internet Infrastructure Security Laboratory (SIIS) Page Mandatory Access Control • Multics introduced mandatory access control (MAC) to enforce security ‣ Mandatory ‒ System-defined administration of policies ‣ Access control ‒ Information flow or MLS (e.g., Bell-La Padula, Biba) • User programs are not authorized to ‣ Read/Write to data to unauthorized files or processes ‣ Or change the access control policy • Prevents Trojan horse or compromised programs from violating expected data security Systems and Internet Infrastructure Security Laboratory (SIIS) Page Multics Access Control • Each resource is associated with an ‣ Access Control List ‣ Multilevel Security Level (secrecy) • Bell-La Padula ‣ Access Brackets (integrity) • More later • Last two are forms of mandatory access control Systems and Internet Infrastructure Security Laboratory (SIIS) Page Enforcement in Multics • How to apply policy to ensure correct enforcement? Process 1 Process 2 Process n Program Program Program Data Data ... Data Operating System Security Scheduling Resource Mechanisms Memory Disk Network Display ... Memory Disk Network Display Device Device Device Device ... Systems and Internet Infrastructure Security Laboratory (SIIS) Page Enforcement in Multics • Found that enforcement itself must be systematic and secured ‣ Which OS operations should be protected? ‣ How do authorization checks get processed correctly? ‣ How do we know they were processed correctly? • Clearly, an informal approach to the enforcement of policies is insufficient Systems and Internet Infrastructure Security Laboratory (SIIS) Page Reference Monitor • The Anderson report (USAF 1972) proposed the reference monitor concept to provide ‣ Explicit control must be established over each programs access to any system resource which is shared with any other user or system program. • Reference Monitor Concept requirements: ‣ The reference validation mechanism must be tamperproof ‣ The reference validation mechanism must always be invoked (complete mediation over security-sensitive operations) ‣ The reference validation mechanism must be small enough to be subject to analysis and tests, the completeness of which can be assured (validation) Systems and Internet Infrastructure Security Laboratory (SIIS) Page EnforcementProtection Rings in Multics •• SuccessivelyFound that enforcement less-privileged itself must“domains be systematic” and secured • Modern‣ Which OSCPUs operations support should 4 ringsbe protected? ‣ Use 2 mainly: Kernel and user ‣ How do authorization checks get processed correctly? • Intel x86 rings ‣ How do we know they were processed correctly? ‣ Ring 0 has kernel • Clearly, an informal approach to the enforcement of policies is‣ insufficientRing 3 has application code • Example: Multics (64 rings in theory, 8 in practice) SystemsCSE543 and- Introduction Internet Infrastructure to Computer Security and Network Laboratory Security (SIIS) Page !X ProtectionEnforcement Ring in MulticsRules • • ProgramFound that cannot enforcement call code itself of must be systematic and secured higher privilege directly ‣ Which OS operations should be protected? ‣ Gate is a special memory Ring 3 ‣ addressHow do whereauthorization lower-privilege checks get processed correctly? ‣ codeHow docan we call know higher they were processed correctly? No • Enables OS to control where gate • Clearly,applications an informal call it approach(system calls) to the enforcementGate of policies is insufficient Ring 0 SystemsCSE543 and- Introduction Internet Infrastructure to Computer Securityand Network Laboratory Security (SIIS) Page !X EnforcementWhat Are Protection in Multics Rings? • • Coarse-grained,Found that enforcement Hardware itself mustProtection be systematic Mechanism and secured • Boundary between Levels of Authority ‣ Which OS operations should be protected? ‣ Most privileged -- ring 0 ‣ How do authorization checks get processed correctly? ‣ Monotonically less privileged above ‣ How do we know they were processed correctly? • Fundamental Purpose • ‣Clearly,Protect an systeminformal integrity approach to the enforcement of policies is insufficient• Protect kernel from services • Protect services from apps • So on... SystemsCSE543 and - Introduction Internet Infrastructure to Computer Security and Network Laboratory Security (SIIS) PagePage !X Access Brackets • Multics policy that governs access control based on the ring in which code is run ‣ Subject ‒ process’s ring number ‣ Object ‒ resource’s ring number ‣ Operations ‒ usual read, write and execute • By default, processes cannot ‣ Modify resources in lower (more privileged) rings • What access control model is that? ‣ A bit too strong • Weakened to a contiguous sequence of rings that could modify (or execute) each object Systems and Internet Infrastructure Security Laboratory (SIIS) Page Reference Monitor in Multics • Tamperproofing ‣ Protection rings ‣ Kernel in ring 0 ‣ Gates protecting kernel entry and exit • Complete mediation ‣ Resources modeled

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    40 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us