|
The distinction between security and protection, at least in this note
|
|
Policy and mechanism issues: Security policy should be established first and mechanism to enforce the policy |
|
Categories of threats
|
|||||||||||||
|
Unauthorized disclosure and updates are the threats we are concerned here |
|||||||||||||
|
Threats are generally introduced by breaking-in by such as Trojan horse |
|
Public Design rather than secret design. Reason:
|
|||||||
|
Default = No access |
|||||||
|
Minimum privilige: give just enough power to get the job done |
|||||||
|
Timely check
|
|||||||
|
Simple, uniform mechanism
|
|||||||
|
Appropriate level of security
|
|
Attacks on password and protections
|
|
The protection state of a machine is conceptually defined by an access matrix
|
|||||||
|
Because the matrix tends to be very sparse, access information is represented by access control lists or capability lists |
|
A list of rights associated with an object |
|||||||||||||||||||||||||||||||||||
|
Ex: AFS
|
|||||||||||||||||||||||||||||||||||
|
Ex: Unix
|
|
Capability is a "protected pointer" to an object: pointer + access permission |
|||||||
|
Each process has capabilities to work on as a Unix process has file descriptors of open files |
|||||||
|
Process passes capability to system call instead of passing fd |
|||||||
|
Ensuring the integrity of capability is important. Mechanisms:
|
|||||||
|
Capability in Unix?
|
|||||||
|
HYDRA - a capability based protection |
|
Encryption & decryption algorithm are known to public: remember design principles |
|
|
Only keys make things secret |
|
|
Key should not be too long -> inefficient |
|
Goal: minimize out-of-band transmission while keeping the key secret as much as possible |
|||||||||||||||||||||||
|
Procedure
|
|||||||||||||||||||||||
|
Kerberos - private key (DES) based authentication |
|
General
|
|||||||||||||||
|
Digital signature using PK
|
|||||||||||||||
|
Public key distribution
|
|||||||||||||||
|
Netscape
|
|
Encryption and Secure Computer Network - about encryption and key distribution |