📄 083-086.html
字号:
<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev
<option value="/reference/dir.middleware.html">Middleware
<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
<option value="/reference/dir.networkservices1.html">Networks
<option value="/reference/dir.operatingsystems.html">OS
<option value="/reference/dir.productivityapplications1.html">Prod Apps
<option value="/reference/dir.programminglanguages.html">Programming
<option value="/reference/dir.security1.html">Security
<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
<option value="/reference/dir.userinterfaces.html">UI
<option value="/reference/dir.webservices.html">Web Services
<option value="/reference/dir.webmasterskills1.html">Webmaster
<option value="/reference/dir.y2k1.html">Y2K
<option value="">-----------
<option value="/reference/whatsnew.html">New Titles
<option value="">-----------
<option value="/reference/dir.archive1.html">Free Archive
</SELECT>
</font></td>
</tr>
</table>
</form>
<!-- LEFT NAV SEARCH END -->
</td>
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->
<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->
<!-- begin main content -->
<td width="100%" valign="top" align="left">
<!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=3//-->
<!--PAGES=083-086//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="081-083.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="086-088.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Nothing in the access control system will detect these problems. Only by monitoring your systems and looking for specific security policy violations will you detect errors such as these. Intrusion detection systems look for event patterns, such as the creation of world readable resources by a privileged program.
</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">What Is Access Control?</FONT></H3>
<P>In some sense the login process itself is a form of access control, too. The login process limits who can <I>access</I> the computer. Unfortunately, this is not the type of access that was defined in the basic security model. Recall from that introductory material that access control in the security reference monitor is limited to the simple notions of read and write reference requests. The remainder of this chapter deals with how you access resources and accomplish tasks after you have survived the login steps.</P>
<P>The confusion about what precisely constitutes access control stems from various interpretations that appear in marketing literature. You might read a brochure claiming that a particular product can help limit access to your critical resources. Reading further, you find that the advertised solution is really a badge card reader that limits physical access to systems. In some respects, a router that regulates network traffic also performs access control functions because it will drop packets that do not satisfy configured routing rules. Still, for the purposes of this chapter, access control is considered only in the context of the operating system itself and its reference monitor.</P>
<P>Recall also from Chapter 1 that access control is the primary function of the reference monitor. An access request by a subject for an object is checked by the reference monitor against a conceptual database of access control rules. In theoretical computer discussions, entries in the access control database describe what is <I>not</I> permitted. In practice, and in the rest of this book, access control statements instead state what is permitted. The three values of interest in the access request are the <I>subject identifier</I>, the <I>object identifier</I>, and <I>the type or mode of access</I> requested. Changing one or more of these three values can generate a different result when the request is evaluated.</P>
<P>Think about that last statement again in more detail. <I>Who</I> the system thinks you are is the basis for deciding <I>what</I> you can do. When you log in to a computer, your subject identifier is created from your account information stored in the system. If you want to access a resource on the system, your subject identifier is passed to the reference monitor in the request. <I>If you find a way to impersonate another subject or a way to change your subject identifier, you might be able to access a resource in a manner that normally would not be allowed</I>. In most systems, this is both a design feature and a threat.</P>
<P>UNIX security features are provided for changing subject identifiers in a controlled fashion. These subroutines are the primary means of temporarily increasing privileges for a user, but they also provide avenues for hacker attacks if the implementation is not properly coded by the programmer. NT defines a special privilege that allows a process or thread to impersonate another user. Later in this chapter, you will see how subject identifiers can be changed in UNIX. To keep the issues from getting too confusing, Chapter 10, “Intrusion Detection for NT,” covers impersonation.</P>
<BLOCKQUOTE>
<P><FONT SIZE="-1"><HR><B>NOTE: </B>Remember that you sometimes must request access to a resource that you cannot regularly reference. To accomplish your task, the system magically invokes a process with higher privileges to carry out the job <I>on your behalf</I>. Because this latter process has higher privileges, the boundary through which your process communicates with this privileged process must be tightly controlled. Otherwise, you might be able to send this privileged process information that tricks it and enables you to hack the system.<HR></FONT>
</BLOCKQUOTE>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">How Are Access Control Decisions Made?</FONT></H4>
<P>When you have logged into a system, <I>everything</I> else that happens seems to be regulated by access control. If you want to print a document, access to printers and documents must be granted. You can accomplish something after you have logged in and started a shell, desktop, or some other type of session in one of two ways:</P>
<P>First, you can create new programs that operate on your behalf. Many commands that you type into a shell are interpreted and executed directly by the shell. However, the majority of commands that you type into a UNIX shell will create new programs, even if these programs run for only a few moments.</P>
<P>Second, you can have your shell send a message to another program that already is running on the computer. This latter form of activity on the system is called <I>inter-process communication</I> (IPC) because two running processes are communicating with each other. Instead of creating a new process to execute some commands on your behalf, you can send an IPC message to another program that performs the task for you.</P>
<P>An example of this process is the print spooler on most systems. The spooler is a program running constantly on the system. You might use a direct communication channel to ask the spooler to print something for you, such as sending a print request through an IPC. You also can communicate with the spooler indirectly by storing a file in a special location that the spooler checks. In either case, you can communicate to the spooler that you want some action to occur—printing.</P>
<P>Depositing <I>data</I>, such as a file to print or mail, is a technique hackers have used to gain additional privileges on a system. <I>Common Desktop Environment</I> (CDE) had a bug in its mailer that gave peon users the capability to write any file into the mail directory. In some cases, a normal user could create a empty mail box in this directory for the root user. The mailbox would be owned by the normal user, not by root. At any later time, the peon could read the contents of the root user’s mailbox. Access control worked as designed; the access control rules just weren’t configured properly.</P>
<P>When you perform activities on the system, the credentials associated with your process (UID and GIDs) are checked to see whether the requested operations are permitted. If you run a program, the program has your credentials. If you communicate with another process using an IPC, the credentials of your process are checked by the receiving program. If you deposit data into a directory for a privileged program to act upon, the owner and group IDs for the file represent your credentials, and the privileged program inspects this information to make security decisions. These behaviors show access control at its most fundamental level of analysis—identifiable subjects request access to objects.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="081-083.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="086-088.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- BEGIN SUB FOOTER -->
<br><br>
</TD>
</TR>
</TABLE>
<table width="640" border=0 cellpadding=0 cellspacing=0>
<tr>
<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
<!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- FOOTER -->
<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a> | <a href="/contactus.html"><font color="#006666">Contact Us</font></a> | <a href="/aboutus.html"><font color="#006666">About Us</font></a> | <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> | <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> | <a href="/"><font color="#006666">Home</font></a></b>
<br><br>
Use of this site is subject to certain <a href="/agreement.html">Terms & Conditions</a>, <a href="/copyright.html">Copyright © 1996-1999 EarthWeb Inc.</a><br>
All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
</tr>
</table>
</BODY>
</HTML>
<!-- END FOOTER -->
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -