Security Policies and Enforcement Mechanisms
In this chapter, our focuse is on policies and ther enforcement. Basically, we want to limit the operations and force entities to follow these limits.
Terminology and concepts
In access control, three kinds of entities exists:
- Principals (users)
- Subjects (processes)
- Objects (files, network sockets, devices, ...)
Access control
There is basic principle of least privilege that says, throughout execution, each subject should be give the minimal access necessary to accomplish its task. The goal is to control access to operations performed by subjects on objects.
Discretionary Access Control (DAC)
Discretionary permissions settings at owner's discretion. Meaning that permission on an object is set by its owner.
It can be modeled as a metrix:
User 1 | rw | w | - | |
User N | r | wx | - |
Implementations:
- Access-control lists (ACLs)
- the AC-matrix column describing access rights on an object are stored with the object
- Capabilities
- row-wise representation of AC-matrix, held by the user corresponding to the row
- user should not change them, therefore comes with cryptography mechanisms
Managing permissions
In systems, manageability is improved using indirection Groups and Roles (RBAC, role based access control). It gives the features of inheritance and negative permissions.
Implemetation of DAC on UNIX
Objects
All resources are files. Each file has an owner and group owner. Permissions are divided into three groups (file owner, owner group, everyone else). And 3 bits of permission for each part (read/write/execute). Also, today, they come with one sticky bit.
For directories:
- read means ability to list the directory.
- write means ability to create files in the directory.
- execute means the ability to access specific files if you know the name.
Permissions on newly created files determined by umask
. To change permissions, use chmod
. To change ownership use chown
.
Subjects
Subjects inherit the userid, group and supplemantry groups of the parent. File permission checks are performed using this userid and groups. No permission checks on superuser (userid 0). Objects created by a subject inherit the subject's userid and group.
Effective, Real and Saved UID/GID
- Effective: the uid used for determining access privileges
- Real: the real user that is logged on, and on whose behalf a process is running
- Saved: allows processes to temporarily relinquish privileges but then restore original privileges
Managing access in Linux
There are three important entities:
- Owner: the user who created a file or directory is its owner.
- User: any person or system component with a user account on the system.
- Group: a collection of users. each user belongs to at least one group, and each file has a group associated with it.
In order to see system users as root
, you can cat /etc/passwd
. This file is like this:
root:x:0:0:root:/root:/bin/bash
user1:x:1001:1001::/home/user1:/bin/bash
alice:x:1002:1002::/home/alice:/bin/bash
Files permissions
Every file or directory in Linux has an owner and belongs to a group:
-rw-r--r-- 1 user1 group1 1024 Oct 7 10:00 file.txt
The permissions are for owner, group, and others. Each digit represents the sum of permissions:
- 4 = Read
- 2 = Write
- 1 = Execute
For example, 755
means:
- Owner: read/write/execute
- Group: read/execute
- Others: read/execute
To change file and directory permissions, these commands are used:
- change ownership:
chown <user>:<group> <file>
- change permissions:
chmod <permissions> <file>
User and Group management
The following commands are used for manage users and groups:
- add a user:
useradd <username>
- set user a password:
passwd <password>
- create a group:
groupadd <groupname>
- add a user to a group:
usermod -aG <group> <user>
- view group memberships:
groups <username>
Add user for SSH
- Create the user:
sudo useradd -m -s /bin/bash <username>
- Set password for user:
sudo passwd <username>
- Enable SSH access for the user:
- switch to user:
su - <username
- create
.ssh
directorie:mkdir ~/.ssh && chmod 700 ~/.ssh
- add user public key:
echo "<user-public-key> >> ~/.ssh/authorized_keys" && ~/.ssh/authorized_keys
- check
/etc/ssh/sshd_config
forPubkeyAuthentication yes
- restart ssh service:
sudo systemctl restart sshd
- switch to user:
- To add password authentication
- edit
/etc/ssh/sshd_config
forPasswordAuthentication yes, PermitRootLogin no
- restart ssh service:
sudo systemctl restart sshd
- edit
Now users can login using ssh:
ssh <username>@<server-ip>
ssh -i <private-key-file> <username>@<server-ip>
Capabilities
They are tickets to gain access to a resource. Combine objects and access rights into one package is what they do. They are transferable and must be unforgeable.
- Passwords
- Certificates
- File descriptors
- Some cookies in web applications
In Linux
To handle capabilities, you can use libcap
tools. To install them, you can use libcap2-bin
or libcap
.
After installing it, you can setcap or drop them, or view them using following commands:
- managing capabilities for a binary:
sudo setcap cap_dac+ep /path/to/bin
- drop capabilities:
sudo capsh --drop=cap_dac_override -- -c "command"
- check capabilities of a process:
cat /proc/<pid>/status | grep Cap
Implementation drawbacks
They are more difficult to implement than ACLs. They are also difficult to manage, therefore, capabilities in their purest form are not widely used in OSes.
However, they provide a better framework than ACLs when one or more of the following conditions hold:
- Policy enforcement isn't centralized.
- Parties have limited trust on each other.
- Rights need to move with principals.
Mandatory Access Control (MAC)
There are limitations for DAC:
- Trojan Horse problem: DAC assumes that users authorize all actions of their processes, but what if the process does not follow it? Or, users cannot fully authorize their processes because of their complexity?
- DAC provides no protection if a resource owner did not bother to set the ACL properly.
To overcome these problems, MAC moves the responsibility to a central point, typically the system administrator.
Multi-Level Security (MSL)
Access control policies do not provide any way to control the manner in which information is used. Once an entity is given access to some data, it can use this information in any way. MLS policies control information flow, and hence control how information is used.
Confidentiality Policies
An object is labeled with a level L (unclassified, classified, secret, top secret). A subject is associated with a clearance level C. Therefore, a subject can access on an object if its clearance level is equal to or above the object's level.
MLS: Bell-LaPadual Model
To prevent leakage of sensitive information, we ensure:
- No read-up: a subject S can read object O only if
- No write-down: a subject can write an object O only if
This ensures that information can flow only upwards in terms of confidentiality level.
MLS: Biba Model (Integrity)
Designed to ensure integrity rather than confidentiality. We want to keep higher level subjects safe from lower level ones. So any higher level can write to their lower level, however it only can read from higher level.
- No read-down: a subject S can read object O only if
- No write-up: a subject S can write an object O only if
Low Water-Mark Policy (LOMAC)
Allows read-downs, but downgrade subject to the level of the subject.
Problems with Information Flow
- Label creep, as more and more objects become sensitive, its difficult for the system to be used by lower-clearance subjects.
- No controlled mechanism for making exceptions.
Alternative Approaches
The key goal is to mitigate damage that may result from all powerful root privileges. So, we should break down root privilege into a number of sub-privileges, and decouple user privileges from program privileges. Like:
- Domain and type enforcement: SELinux (Redhat), AppArmor (Debian, Ubuntu)
- Linux capabilities
Domain and Type Enforcement (DTE)
All subjects belong to domains. Users have default domains, but not all their processes belong to the same domain. Objects belong to types. DTE policies specify which domains have what access rights on which types.
Processes can transite to another domain, typically when executing another program. These domain transitions are an important feature.
DTE and SELinux
Security-enhanced Linux (aks SELinux) combines standard UNIX DAC with DTE. Intuitively, the idea is to make access rights a function of user, program, or object.
Generally speaking, MLS requires us to trust a program, or fully trust it. In contrast, DTE allows us to express limited trust that is a function of the program. It grants a program only those rights that it needs to carry out its function.
SELinux vs Information Flow
In practice, DTE has turned out to be one policy per application. Therefore, scalability is an issue. In addition, SELinux policies are quite complex. On the other hand, information flow policies are simpler and closely related to high-level objectives. But, neither approach is easy enough for widespread use.