Access Control for Adaptive Reservations on Multi-User Systems∗

Access Control for Adaptive Reservations on Multi-User Systems∗

Access Control for Adaptive Reservations on Multi-User Systems∗ Tommaso Cucinotta Scuola Superiore Sant’Anna E-mail: [email protected] Abstract media streaming (video / VoIP), Service-oriented Architec- This paper tackles the problem of defining an appropri- tures (SoAs) with real-time enhancements. ate access control model for multi-user systems providing While on typical embedded/dedicated systems the appli- adaptive resource reservations to unprivileged users. Secu- cations that may run are usually under control of the de- rity requirements that need to be met by the system are iden- signer, on general-purpose ones this is not true anymore, tified, and an access control model satisfying them is pro- and users may have the ability to dynamically install cus- posed that also does not degrade the flexibility available on tom applications at will, e.g., through a general remote such systems due to the adaptive reservations framework. shell/terminal access. Though, whenever multiple users Also, the implementation of the proposed model within the may be allocated portions of the same underlying phys- AQuoSA architecture for Linux is briefly discussed. ical machine with certain timing guarantees, issues arise on how to appropriately design access control (AC) mod- 1. Introduction els and implement corresponding security mechanisms so that individual users cannot disturb too much activities of Nowadays, a wide range of time-sensitive applications other users, according to the security policy a system ad- is gaining momentum, for which a few violations of the ministrator may want to enforce. In such cases, temporal designed timing requirements may be acceptable, provided isolation among concurrently running applications is to be that their frequency and severity is kept in check. Typical regarded as being as important as the data isolation fea- examples are multimedia streaming applications, in which ture traditionally provided by nowadays operating systems timing requirements are important, as their violation is im- through memory-space isolation, access-control on multi- mediately perceived by users as annoyances that degrade user filesystems and inter-process protection mechanisms. the quality of the offered service. Distributed applications After a quick discussion of existing approaches to em- for interactive cooperative work, eLearning or interaction bedding adaptive real-time technologies within a GPOS through virtual reality, have also similar stringent timing like Linux, Section 2 highlights what are, from a security requirements. Even computation-intensive batch activities and availability perspective, the critical issues in such ap- may be enriched with timing requirements whenever the proaches, then Section 3 identifies general security require- computational power is made available as a service by a ments that need to be satisfied in such systems, and presents provider, and such activities are embedded within work- an access-control model that may be implemented at the flows to be carried on within time frames of a few hours or kernel-level for the purpose of fulfilling such requirements. days. In fact, the availability of higher and higher computa- Finally, Section 4 briefly discusses implementation of the tional power on individual computing systems, along with proposed technique on a real Linux-based system. the availability of higher and higher network bandwidth at cheaper rates, is leading to a growing interest in sharing the 1.1. State of the art same physical system (or pool of interconnected systems) A quite common approach to adding real-time enhance- for a multitude of applications, even running remotely on ments to a GPOS kernel is the one of the RTLinux [1] and behalf of different users, still retaining a minimum set of RTAI [2] projects, where a real-time “executive” is inter- timing guarantees to individual activities. Typical example posed between the Linux kernel and the real hardware. This scenarios comprise compile factories, remote control of vir- way it is possible to have a real-time scheduler that sched- tual machines, shared multi-purpose servers, web servers ules real-time tasks, falling back to schedule the Linux ker- for monitoring and configuration of control plants, multi- nel and tasks only when no real-time tasks are active. Also, ∗This work has been supported by the FP6/2005/IST/5-034026 Euro- hardware interrupts are managed in the first place by the pean Project named FRESCOR. real-time tasks (through a much lighter routing logics than found in the Linux kernel), and only when no real-time tasks possible access-control model fulfilling them. are interested, they are forwarded to the Linux kernel. This Another interesting paper related to the work here pre- results in highly decreased scheduling and interrupt laten- sented, is the one recently presented by Tsafrir, Etsion and cies. Main drawback of such approaches is the inability Feitelson [8], where it is shown that, in most GPOSes, a ma- for the real-time tasks to exploit the services offered by the licious underprivileged application can utilize nearly 100% Linux OS and higher level software components (e.g., de- of the CPU, regardless of any fairness guarantees supposed vice drivers and architectures for multimedia). to be provided by the scheduler. Also of interest is the An alternative approach is the one of the Linux/RK [3] security viewpoint of the paper, according to which such project, a variant of Linux where real-time extensions are “breach” in the fairness property of the scheduler ends up directly embedded into the Linux kernel (in terms of capa- with opening a set of possibilities of attack to a system, bilities of the CPU and I/O schedulers), for the purpose of where undesired services may be run and steal most of the adding predictability on its timing behaviour across multi- CPU cycles without this being reported by standard moni- ple tasks. This way, it is possible to give proper timing guar- toring tools like ps or top. The technique is based on a good antees to standard Linux applications and software compo- knowledge of the time granularity and mechanisms based nents, taking advantage of the full set of capabilities avail- on which the system scheduler enforces the fairness prop- able on the system. erty, and the system monitoring tools report statistics, and Concerning security issues arising from the availabil- on the availability to the application of a much finer time ity of real-time extensions within a multi-user GPOS like measurement mechanism such as the CPU cycle counter. Linux, the RTLinux and RTAI approaches basically neglect Such technique is interestingly related to the presented work the issue, being focused on embedded applications. Infact, as it constitutes a warning for scheduler implementers to not on such systems the real-time tasks are basically part of the use “poor” time measurement mechanisms, as possible at- kernel itself, or they require administration privileges in or- tackers might try to exploit them in order to break the time- der to be run, what is perfectly coherent with the hard real- liness guarantees and properties that the new scheduler is time focus of these projects. Instead, in [4], Rajkumar and supposed to achieve (see also Section 3.2). Miyoshi explicitly address the problem of avoiding that un- 2. Criticalities in Adaptive Reservations privileged applications affect, intentionally or unintention- ally, the timing guarantees granted to other applications by This section recalls basic properties of the resource reser- the OS, in a context where multiple resources may be al- vation scheduling policies, as well as a few technicalities located by means of reservation policies to a multitude of arising in the context of adaptive reservations, that are of applications owned by different users. The authors propose relevance for the purpose of ensuring appropriate robust- a security mechanism based on a set of Resource Control ness/security properties for the system. For the sake of Lists (RCLs) to be associated to such resources as CPU, brevity, the technical description of the mechanisms is omit- network or disk, for the purpose of allowing for both spec- ted, while the discussion is focused on providing the neces- ification of timing guarantees and constraints, and enforce- sary background for a complete understanding of the secu- ment of system-wide security policies. rity requirements stated in Section 3. The interested reader While addressing basically similar issues as the ones that may refer to [9, 10] for details. motivate the present paper, the RCL approach focuses on Resource reservation schedulers may allow to associate a the seamless integration of timing guarantees within exist- single or multiple threads of execution to each reservation, ing applications at deployment time, in a way that does not thus they schedule abstract entities usually called servers, need any change to the application code. We believe that whereas a scheduler local to a server is responsible for such an approach, while being of great interest in the con- scheduling the various threads within the time frames as- text of system administration and legacy applications, does signed to the server. The typical guarantee provided by not manage to exploit to the full extent the benefits of em- an OS featuring resource reservation scheduling to a server (i) bedding real-time scheduling strategies within the kernel. S , is that the task(s) associated to the server will be sched- (i) This may be done, instead, with

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us