⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 cops and robbers-unix system security.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 3 页
字号:
     Enhancements I envision include:i) Improved speed and portability without sacrificing  func-tionality (pretty obvious, I guess....)ii) A level of severity assigned to each  warning;  anythingthat  could  compromise root instantly (root having no pass-word, for example) might have a level 0 priority, while sim-ply  having a user with a writable home directory might only                     February 19, 1991                           - 11 -be level 3.  This way the system could be run at  a  certainthreshold  level, or simply have the set of warnings priori-tized for a less sophisticated administrator.iii) Better handling of SUID programs.  The current  programneeds  more  work  to be done on it to be run effectively bymost people; many will not be willing to put the time neededto  go  through  the list of SUID files by hand to decide ifthey are needed or not.  Perhaps also an alarm  would  soundif a shell script is SUID; doubly so if root owned.iv) A CRC checker that would check a file  system  (possiblyjust  the  most  important  programs  (such as this :-)) andreport if any of the executable files were changed -- possi-bly signalling a viral infection.v) The eradication of any design flaws or coding errors thatare in the COPS system.     The main purpose of creating the COPS system  was  two-fold;  the first was to foster an understanding of the secu-rity problems common to most UNIX systems,  and  the  secondwas  to  try  to  create and apply software tools that, whenrun, will inform system administrators of potential problemspresent in their system.  No attempt is made by the tools tocorrect any problems because a potential security problem atone  site  may  be  standard policy/practice at another.  Anemphasis on furthering education and knowledge about UNIX ingeneral is the key to good security practices, not followingblindly what an unintelligent tool might say.     Some of the advantages to using a system such  as  COPSare:i)  Nearly  Continuous  monitoring  of  traditional  problemareas.ii) A new system can be checked before being put  into  pro-duction.iii) New or inexperienced administrators can not  only  stopsome  of  their  problems in security they may have, but canalso raise their consciousness about the potential for secu-rity dilemmas.     And a couple of disadvantages:i) An administrator could get a false sense of security fromrunning  these  programs.  Caveat emptor (ok, they are free,but still beware.)ii) A specific path to the elimination of the problem is notpresented.   This  could  also be construed as an advantage,when considering the third point.                     February 19, 1991                           - 12 -iii) Badguys can get these tools.  You know -- the guys withblack hats.  What happens when they get a copy of this pack-age?  With any sensitive subject like security, knowledge iszealously   guarded.    People   are  afraid  that  absoluteknowledge corrupts -- who knows, they may be right.   But  Istaunchly  stand by the tree of knowledge.  Let the bad guystaste the fruit, and they may see the light,  so  to  speak.In  addition,  the  system  does  not say how to exploit thehole, just that it exists.     Results of Running COPS:     Not surprisingly, the results when COPS was run  variedsignificantly  depending  on what system and site it was runon.  Here at Purdue, it was run on a Sequent  Symmetry  run-ning DYNIX 3.0.12, on a pair of Suns (a 3/280 and 3/50) run-ning UNIX 4.2 release 3.4, a  VAX  11/780  running  4.3  BSDUNIX,  a  VAX  8600  running  Ultrix 2.2, and finally a NeXTmachine running their 0.9 O/S version of UNIX.  The  resultsof  the  COPS  system showed a reasonable amount of securityconcern on all of the machines; the  faculty  only  machinesshowed  the  weakest security, followed by the machines usedby the graduate  students,  and  finally  the  undergraduatemachines  had  the  strongest  security  (our administrators_know_ that  you  can't  trust  those  (us?)  young  folks.)Whether  this was showing that Purdue has a good administra-tion, or that the UNIX vendors have a fairly good  grasp  onpotential  security problems, or if it was merely showcasingthe shortcomings of this system wasn't clear to me from  theresults.     The security results probably will  vary  significantlyfrom  machine  to  machine  --  this is not a fault of UNIX;merely having the same machine and software  does  not  meanthat  two  sites will not have completely different securityconcerns.  In addition, different vendors and administratorshave  significantly varying opinions on how a machine shouldbe set up.  There is no fundamental reason  why  any  systemcannot  pass  all  or nearly all of these tests, but what isstandard policy at one sites may be an unthinkable  risk  atanother,  depending  upon the nature of the work being done,the information stored on the computer, and the users of thesystem.     When I first started researching this report, I thoughtit  would  be  a  fairly  easy  task.  Go to a few computingsites, read some theoretical papers, gather all the programseveryone  had written, and write a brief summary paper.  Butwhat I found was an tremendous  lack  of  communication  andconcerted  effort towards the subject of security.  AT&T hadwritten a couple of programs ([Kaplilow and Cherepov 88], ashad   Hewlett   Packard   ([Spence   89]),   but  they  wereproprietary.  I heard rumors that the government was  eitherworking on or had such a security system, but they certainly                     February 19, 1991                           - 13 -weren't going to give it to me.  The  one  book  devoted  toUNIX security ([Kochran and Wood 86]) was good, but the pro-grams that they presented were not expansive enough for whatI  had  in  mind,  plus the fact that they had written theirprograms mostly based on System V.  And  while  most  systemadministrators  I  talked  to  had  written at least a shellscript or two that performed a  minor  security  task  (SUIDprograms seemed the most popular), no one seemed to exchangeideas or any their problems with  other  sites  --  possiblyafraid  that the admission of a weakness in their site mightbe an invitation to disaster.  There is an  excellent  secu-rity  discussion  group on the network ([Various Authors 84-]), from which I received some excellent ideas for this pro-ject, but it is very restrictive to whom it allows to parti-cipate.  I hope that with the release of this security  sys-tem it will not only help stamp out problems with UNIX secu-rity, but would encourage people  to  exchange  ideas,  pro-grams,  problems  and solutions to the computer community atlarge.Dan Farmer September 29, 1989     Acknowledgements: I would like to thank Eugene Spaffordfor  his  invaluable  help in the researching, planning, anddevelopment of this project.  Without the writings and  pro-grams created by Robert Morris, Matt Bishop, and other capa-ble UNIX programmers, this project could never  have  gottenoff  the  ground.  Thanks also go to Brian Kernighan, DennisRitchie, Donald Knuth, and Ken Thompson, for  such  inspira-tional  computer  work.   And of course without Peg, none ofthis would have come into being.  Thanks  again  to  all  ofyou.                     February 19, 1991                           - 14 -                        BIBLIOGRAPHY_, UNIX Programmers Manual, 4.2 Berkeley Software  Distribu-tion,  Computer  Science  Division, Department of ElectricalEngineering and Computer Science University  of  California,Berkeley, CA, August 1983._, DYNIX(R) V3.0.12 System Manuals,  Sequent  Computer  Sys-tems, Inc., 1984.Aho, Alfred V., Brian W. Kernighan, and Peter J. Weinberger,The AWK Programming Language, Addison-Wesley Publishing Com-pany, 1988.Authors, Various, UNIX Security Mailing  List/Security  Dig-est, December 1984 -.Baldwin,  Robert  W.,  Crypt  Breakers  Workbench,   Usenet,October 1986.Baldwin, Robert W., Rule Based Analysis  of  Computer  Secu-rity, Massachusetts Institute of Technology, June 1987.Bauer, David S. and Michael E. Koblentz, NIDX - A  Real-TimeIntrusion Detection Expert System, Proceedings of the Summer1988 USENIX Conference, Summer, 1988.Bishop, Matt, Security Problems with the UNIX Operating Sys-tem,  Department  of  Computer  Sciences, Purdue University,January 31, 1983.Bishop, Matt, How to Write a Setuid Program, April 18, 1985.Denning, Dorothy, Cryptography and Data  Security,  Addison-Wesley Publishing Company, Inc, 1983.Duff, Tom, Viral Attacks On UNIX System  Security,  Proceed-ings of the Winter 1988 USENIX Conference, Winter, 1988.Fiedler, David and Bruce Hunter, UNIX System Administration,Hayden Book Company, 1986.Grampp, F. T. and R. H. Morris, "UNIX Operating System Secu-rity,"  AT&T  Bell  Laboratories  Technical Journal, October1984.Kaplilow, Sharon A. and Mikhail Cherepov, "Quest -- A  Secu-rity  Auditing Tool," AT&T Bell Laboratories Technical Jour-nal, AT&T  Bell  Laboratories  Technical  Journal,  May/June1988.Morris, Robert and Ken Thompson, "Password Security : A CaseHistory," Communications of the ACM, November 1979.                     February 19, 1991                           - 15 -Reed, Brian, "Reflections on Some Recent Widespread ComputerBreak-ins,"  Communications  of the ACM, vol. Vol 30, No. 2,February 1987.Reed, J.A. and P.J. Weinberger, File Security and  the  UNIXSystem  Crypt Command, Vol 63, No. 8, AT&T Bell LaboratoriesTechnical Journal, October 1984.Smith, Kirk, Tales of  the  Damned,  UNIX  Review,  February1988.Spafford, Eugene H., The Internet Worm Program: An Analysis,Purdue Technical Report CSD-TR-823, Nov 28, 1988.Spafford, Eugene H., 1989.  Private CommunicationsBruce Spence, spy: A  UNIX  File  System  Security  Monitor,Workshop  Proceedings  of  the  Large  Installation  SystemsAdministration III, September, 1988.Stoll, Clifford, Stalking the Wily Hacker, Volume 31, Number5, Communications of the ACM, May 1988.Thompson, Ken, Reflections on  Trusting  Trust,  Volume  27,Number 8, Communications of the ACM, August 1984.Wood, Patrick and Stephen  Kochran,  UNIX  System  Security,Hayden Books, 1986.Wood, Patrick, A Loss of Innocence,  UNIX  Review,  February1988.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -