Professional Documents
Culture Documents
OS point of view
Files contains
Data
Meta-data - FCB
14.2
14.3
14.4
14.5
14.6
14.7
14.8
Objectives
Discuss the goals and principles of authentication in a modern
computer system
Discuss the goals and principles of protection in a modern
computer system
Explain how protection domains combined with an access matrix
14.9
Protection vs Security
Protection: one or more mechanisms for controlling the access of
14.10
14.11
Accidental:
If I delete shell, cant log in to fix it!
Could make it more difficult by asking: do you really want to
delete the shell?
Intentional:
Doesnt help to ask if they want to do it (of course!)
Three Pieces to Security
Authentication: who the user actually is
Authorization: who is allowed to do what
Enforcement: make sure people do only what they are
supposed to do
Loopholes in any carefully constructed system:
Log in as superuser and youve circumvented authentication
Log in as self and can do anything with your resources; for
instance: run program that erases all of your files
Can you trust software to correctly enforce Authentication and
Authorization??
14.12
Passwords
Shared secret between two parties
Since only user knows password, someone types correct
password must be user typing it
Very common technique
Smart Cards
Electronics embedded in card capable of providing long
passwords or satisfying challenge response queries
May have display to allow reading of password
Or can be plugged in directly; several credit cards now in this
category
Biometrics
Use of one or more intrinsic physical or behavioral traits to
identify someone
Examples: fingerprint reader, palm reader, retinal scan
Becoming quite a bit more common
14.13
Passwords: Secrecy
System must keep copy of secret to check against passwords
14.14
Password Guessing:
Often people use obvious information like birthday, favorite color,
girlfriends name, etc
Dictionary Attack:
Work way through dictionary and compare encrypted version of
dictionary words with entries in /etc/passwd
Dumpster Diving:
Find pieces of paper with passwords written on them
(Also used to get social-security numbers, etc)
Paradox:
Short passwords are easy to crack
Long ones, people write down!
Technology means we have to use longer passwords
UNIX initially required lowercase, 5-letter passwords: total of
265=10million passwords
In 1975, 10ms to check a password1 day to crack
In 2005, .01s to check a password0.1 seconds to crack
Even faster today (use multiple processors)
Takes less time to check for all words in the dictionary!
Operating System Concepts 8th Edition
14.15
14.16
14.17
Protection Authorization
14.18
Principles:
14.19
Domain Structure
Access-right = <object-name, rights-set>
14.20
User
Supervisor
UNIX
Domain = user-id
14.21
14.22
Access Matrix
View protection as a
Columns represent
objects
Access(i, j) is the set of
14.23
owner of Oi
copy op from Oi to Oj
14.24
Mechanism
Policy
14.25
Figure B
14.26
14.27
14.28
14.29
14.30
Access Control
Protection can be applied to non-file resources
Solaris 10 provides role-based access control to implement least
privilege
14.31
14.32
Simple
Immediate
Reacquisition
Back-pointers
Indirection
Keys
14.33
Enforcement
14.34
Enforcement
Enforcer checks passwords, ACLs, etc
14.35
Authentication: Encryption
But almost no one encrypts or has public key identity
Authorization: Access Control
But many systems only provide very coarse-grained access
In UNIX, need to turn off protection to enable sharing
Enforcement: Kernel mode
Hard to write a million line program without bugs
Any bug is a potential security loophole!
14.36
End of Course 12