1. Trang chủ
  2. » Công Nghệ Thông Tin

Chapter 5 Network access control

20 129 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 20
Dung lượng 0,98 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The process: o A computer system controls the interaction between users and system resources To implement a security policy, which may be determined by o organisational requirements o statutory requirements (ex, medical records) Policy requirements may include o confidentiality (restrictions on read access) o integrity (restrictions on write access) o availability

Trang 1

 

Lecturer: Nguyễn Thị Thanh Vân – FIT - HCMUTE

 Introduction to access control and access control

structures

 ACL and Capability lists

 Administration and aggregation of access control

structures

 BRAC Models

 ACL in Linux

 ACL in Windows

Trang 2

The process:

o a computer system controls the interaction between

users and system resources

determined by

o organisational requirements

o statutory requirements (ex, medical records)

o confidentiality (restrictions on read access)

o integrity (restrictions on write access)

o availability

 A user requests access (read, write, print, etc.) to a

resource in the computer system

The reference monitor

o establishes the validity of the request …

o … and returns a decision either granting or denying access

to the user

Access

Request

System Decision

Reference Monitor

 Ex: RM

o a paper-based office: the set of (locked) filing cabinets

o a night club: the security guard + the guest list

Trang 3

 U- Subject (user): Active entity in a computer system

o User, process, thread

 O- Object: Passive entity or resource in a computer

system

o Files, directories, printers

A principal: an attribute or property associated with a

subject

o User ID, Public key, Process, Thread

 Principal and subject: used to refer to the active entity in

an access operation

 A subject may be represented by more than one principal

● Two parts

Part I:Decide who should have access to certain

resources (access control policy)

Part II:Enforcement – only accesses defined by the

access control policy are granted.

Complete mediation is essential for successful

enforcement

Trang 4

●Introduced by Lampson (1972) and extended by

Harrison, Ruzzo and Ullman (1976-8)

●An access control matrix (ACM)

abstracts the state relevant to access control.

●Rows of ACM correspond to users/subjects/groups

●Columns correspond to resources that need to be

protected

●ACM defines who can access what

● ACM [U,O] define what access rights user U has

for object O.

 The request (jason, allfiles.txt, w) is granted

 The request (mick, allfiles.txt, w) is denied

trash a.out allfiles.txt

Objects

Subjects

Trang 5

 Abstract formulation of access control

 Not suitable for direct implementation

o The matrix is likely to be extremely sparse and therefore

implementation is inefficient

o Management of the matrix is likely to be extremely difficult if

there are 0000s of files and 00s of users (resulting in 000000s of

matrix entries)

 Access control lists focus on the objects

o Typically implemented at operating system level

o Windows NT uses ACLs

o an ACL be stored In trusted part of the system

An ACL corresponds to a column in the access control matrix

Ex: [a.out: (jason, {r,w,x}), (mick, {r,x})]

 How would a reference monitor that uses ACLs check the

validity of the request (jason, a.out, r)?

trash a.out allfiles.txt

Objects

Subjects

Trang 6

A capability list corresponds to a row in the access control

matrix

Ex [jason: (trash, {r,w}), (a.out, {r,w,x}), (allfiles.txt, {r,w})]

 How would such a reference monitor check the validity of

the request (jason, a.out, r)?

trash a.out allfiles.txt

Objects

Subjects

 Where do C-lists go?

o User catalogue of capabilities defines what a certain user

can access

o Can be stored in objects/resources themselves (Hydra)

o Sharing requires propagation of capabilities

Capability lists focus on the subjects

o in services and application software

o Database applications: use capability lists to implement

fine-grained access to tables and queries

o Renewed interest in capability-based access control for

distributed systems

Disdavantage

o How can we check which subjects can access a given object

(“before-the-act per-object review”)?

Trang 7

 Tasks include

o Creation of new objects and subjects

o Deletion of objects and subjects

o Changing entries in access control matrix (changing entries in

ACLs and capability lists)

 The administration of access control structures is

extremely time-consuming, complicated and error-prone

 To simplify the administrative burden: AC structures that

aggregate subjects and objects are used

 Aggregation techniques

o User groups

o Roles

o Procedures

o Data types

users

o In UNIX three groups are associated with each object

• Owner

• Group (owner)

• Others

o In VMS there are four groups

• Owner

• Group

• World

• System

Trang 8

A data type is a set of objects with the same structure

(bank accounts, for example)

We define access operations (procedures or

permissions) on a data type

 Permissions are assigned to roles

 Users are assigned to roles

 Roles are (usually) arranged in a hierarchy

 ACL is used by many OS to determine whether

users are authorized to conduct different actions

o the mandatory access control (MAC): computer system

the computer system decides exactly who has access to

which resource in the system

o the discretionary access control (DAC): users

users are authorized to determine which other users can

access files or other resources that they create

o the role-based access control (RBAC): MAC in special

the system decides exactly which users are allowed to

access which resources—but the system does this in a

special way

 The Bell-LaPadula Model: certain level of access

Trang 9

30/10/2017 17

MAC

DAC

BRAC

 BRAC Model:

the system decides

exactly which users are

allowed to access

which resources—but

the system does this in

a special way

Trang 10

• RBAC0 : the minimum functionality

• RBAC1 : the RBAC 0 functionality +

role hierarchies, which enable one role

to inherit permissions from another

role

• RBAC2 : RBAC 0 + constraints, which

restricts the ways in which the

components of a RBAC system may

be configured

• RBAC 3 : RBAC 0 + RBAC 1 + RBAC 2

- An RBAC 0 system contains the four types of entities (the minimum functionality

for an RBAC system):

• User: An individuals - access to this computer system

• Role: job function - controls this computer system

• Permission: approval of access to one or more objects

• Session: : A mapping between a user and

an activated subset of the set of roles

to which the user is assigned

Trang 11

 RBAC0contains all but hierarchies and constraints

 RBAC1contains RBAC0and hierarchies

 RBAC2contains RBAC0and constraints

 RBAC3contains all

 The RBAC family idea has always been more a NIST

initiative

 The RBAC families are present in the NIST RBAC

standard [NIST2001] with slight modifications:

o RBAC 0 , RBAC 1 (options), RBAC 3 (SSD) , RBAC 3 (DSD)

 We only need to assign users and permissions to roles

 We can use inheritance in the role hierarchy to reduce

the number of assignments that are required

 Simplifies administration

Trang 12

 NIST (Ferraiolo et al., 1992-2000)

 RBAC96 (Sandhu et al., 1996)

 ARBAC97 (Sandhu et al., 1997-99)

 OASIS (Hayton et al., 1996-2001)

 Role Graph model (Nyanchama and Osborn, 1995-2001)

 Unified RBAC96 NIST model (Ferraiolo, Sandhu et al.,

2001)

o Window NT (as global and local groups)

o IBM’s OS/400

o Oracle 8 onwards

o NET framework

RBAC

o Role hierarchies

o Semantics of role hierarchies

Trang 13

 Practical ease of specification

o Abstraction for users, permissions, constraints, administration

 Natural access control aggregations – based on

organizational roles

o As new employees join, their permission assignments are

determined by their job

o Permission assignment is largely static

 Central control and maintenance of access rights

 Flexible enough to enforce

o least privilege, separation of duties, etc.

 Role hierarchy

o Problem: does organizational hierarchy correspond to a permission

inheritance hierarchy?

o Problem: do organizational roles make sense for building hierarchies?

 Constraints

o Problem: constraints apply to all states, so they require a predicate

calculus in general

o Problem: Only certain types of constraints can effectively be

administered? Mutual exclusion, separation of duty, cardinality, etc

 Conflicts

o May find other concepts useful for resolving conflicts between

constraints and hierarchies/assignments

Trang 14

 Practical ease of specification

o Clear base model – need more help for constraints, admin

 Natural access control aggregations – based on

organizational roles

o In some cases, but not clear that organizational roles help with

permission assignment – particularly with inheritance

 Central control and maintenance of access rights

o Central view is a selling feature of products, but a single view of

all can be complex (layering?)

 Flexible enough to enforce

o Flexible access control expression, but difficult to determine if we

enforce our security goals (constraints)

 Each file has an owner, who has a unique user ID (UID)

 Access is possible for an owner, group, and world

 Permissions are read, write, execute

 Special permission: permissions allow users and groups who

are not the owner or group of a file to execute that file as

though they were

o SETUID - set user ID on execute

o SETGID - set group ID on execute

o StickyBit - puts the directory in sticky mode

Trang 15

Example: chmod 4762 myfile translates to:

setuid = on

setgid = off

sticky bit = off

user = read + write + execute

group = read + write

other = write

 Set UID, GID, Sticky bit

chmod u+s = add setuid

chmod g-s = remove setgid

chmod o+t = add sticky bit

 Others:

chmod a+w = add write to *all*

chmod a-wx = remove write and execute from *all

chmod -R 755 myfolder

 provide a finer-grained control over which users can access

specific directories and files

 Using ACLs, you can specify the ways in which each of

several users and groups can access a directory or file

 Commands:

o displays the file name, owner, group and the existing ACL for a file:

getfacl

o sets ACLs of files and directories: setfacl -m

setfacl -m ugo :u/g_name:permissions fil/fol_name

o removes rules in a file or folder's: setfacl –x

Use numeric or character to set permission

Trang 16

 Commands:

o List: net user, net localgroup

o Change the permisions

o Testing - quickly start a program as another user: runas

Ex, runas /User:jack cmd.exe

Lecturer: Nguyễn Thị Thanh Vân – FIT - HCMUTE

Trang 17

 NAC:

o is an authority term for managing access to a network

o authenticates users logging into the network and

o determines what data they can access and actions they can perform

o examines the health of the user’s computer or mobile device (endpoints).

 Elements of a Network Access Control System

o Access requestor (AR): the node that is attempting to access the:

workstations , servers, printers, cameras, and other IP-enabled devices

o Policy server: determines what access should be granted: including

antivirus, patch management, or a user directory, to help determine the

host’s condition.

o Network access server (NAS): as an access control point for users in

remote locations connecting to an enterprise’s internal network Also

called a media gateway, a remote access server (RAS), or a policy

server, an NAS may include its own authentication services or rely on a

separate authentication service from the policy server.

Trang 18

 applied to ARs to regulate access to the enterprise network

Many vendors support multiple enforcement methods

simultaneously, allowing the customer to tailor the

configuration by using one or a combination of methods The

following are common NAC enforcement methods.

o IEEE 802.1X: This is a link layer protocol that enforces authorization

before a port is assigned an IP address (Extensible Authentication

Protocol

o Virtual local area networks (VLANs): NAC system decides to which

of the network’s VLANs it will direct an AR, based on whether the

device needs security remediation

o Firewall: provides a form of NAC by allowing or denying network

traffic between an enterprise host and an external user

o DHCP management: NAC enforcement occurs at the IP layer based

on subnet and IP assignment (gainst to IP spoofing)

 EAP, defined in RFC 3748:

o a framework for network access and authentication protocols

o provides a set of protocol messages that can encapsulate

various authentication methods to be used between a client and

an authentication server

o operate over a variety of network and link level facilities,

including point-to-point links, LANs, and other networks,

o can accommodate the authentication needs of the various links

and networks

Trang 19

30/10/2017 37

 EAP-TLS (EAP Transport Layer Security): EAP-TLS (RFC 5216)

o defines how the TLS protocol can be encapsulated in EAP messages

o uses the handshake protocol in TLS, not its encryption method

o Client and server authenticate each other using digital certificates .

 EAP-TTLS (EAP Tunneled TLS) (RFC 5281):

o like EAP-TLS, but only the server has a certificate to authenticate itself to the client

o a secure connection is established w ith secret keys in authentication process

 EAP-GPSK (EAP Generalized Pre-Shared Key): defined in RFC 5433,

o is an EAP method for mutual authentication and session key derivation using a

Pre-Shared Key (PSK)

o specifies an EAP method based on pre-shared keys and employs secret key-based

cryptographic algorithms

o is efficient in terms of message flow s and computational costs, but requires the

existence of pre-shared keys betw een each peer and EAP server

 EAP-IKEv2: Internet Key Exchange (based on the IKEv2)

o It supports mutual authentication and session key establishment using a variety of

methods

Trang 20

30/10/2017 39

 was designed to provide

access control functions for

LANs

Ngày đăng: 26/10/2018, 16:40

TỪ KHÓA LIÊN QUAN