secure operating systems

18
Secure Operating Systems Lesson 10: SCOMP

Upload: tarala

Post on 16-Feb-2016

58 views

Category:

Documents


0 download

DESCRIPTION

Secure Operating Systems. Lesson 10: SCOMP. Where are we?. Multics is busy being explored, which is kind of cool… But Multics wasn’t the end of custom built operating systems designed with security in mind: it’s natural successor was SCOMP. SCOMP: Verification. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Secure Operating Systems

Secure Operating SystemsLesson 10: SCOMP

Page 2: Secure Operating Systems

Where are we? Multics is busy being explored, which is kind

of cool… But Multics wasn’t the end of custom built

operating systems designed with security in mind: it’s natural successor was SCOMP

Page 3: Secure Operating Systems

SCOMP: Verification Unlike Multics, the designers of SCOMP

wanted verifiable security, and so the goal was chase the fledgling TCSEC A1 evaluation

We don’t see formal methods a lot day to day, but the value is we (theoretically) know the product conforms to its specfications However, we do NOT know if the specifications

are good…

Page 4: Secure Operating Systems

A Quick Aside: TCSEC Trusted Computer System Evaluation Criteria AKA “Orange book” from the “Rainbow

series” TCSEC still matters, though it was replaced

by what is known as the “common criteria” in 2005

Defined multiple levels of security for a system (note that word)

Page 5: Secure Operating Systems

Orange Book A-D D: Minimal Protection C: Discretionary Protection

C1 – discretionary security protection C2 – Controlled access protection

B: Mandatory Protection Labeled Security Protection, Structured Protection, Security

Domains (B1, B2, B3) A: Verified Protection

A1 – Verified design Beyond A1 – speaks to physical root of trust etc.

Page 6: Secure Operating Systems

Design Choices Some of the design choices in SCOMP were,

I think, interesting The designers threw some compatibility away

in the name of security, which I think was clever – as such, SCOMP was not Unix

One particular problem they tried to address was interfacing groups with different security levels – a tough problem

Page 7: Secure Operating Systems

Reference Monitor Remember, the requirements for a reference

monitor: Complete mediation Isolation Verification

The “Security kernel” concept

Page 8: Secure Operating Systems

Segment Access Control Simple ACL

Segments: read, write, execute Directories: status, modify, append

However. The SDW also includes rings and brackets – this can be a little tricky

To grant access, the ACL and Access brackets must both allow…

Page 9: Secure Operating Systems

Mediation Memory protection looked like this in

SCOMP (source: “SCOMP: A Solution to the Multilevel Security Problem”):

Page 10: Secure Operating Systems

Isolation Just like Multics, though there were 4 rings

(sound familiar?) Ring brackets were used (just like Multics) to

provide control over operations

Page 11: Secure Operating Systems

SCOMP Hardware Implementation SCOMP used a security protection module

which interfaced with the Virtual Memory Interface Unit

The mechanism of the SPM is critical to SCOMP

Mediation is trap based

Page 12: Secure Operating Systems

Clever: IO SCOMP used descriptors for IO, similar to

memory descriptors Because mediation happens in hardware, the

drivers themselves do not need to be in Ring 0, decreasing the size (attack surface) of the security kernel Remember, this is all A1 stuff… what happens

when we change it?

Page 13: Secure Operating Systems

DMA SCOMP did allow DMA for speed The initial transfer is mediated by the SPM There is a similar approach taken to virtual

addresses, which is a little safer (why?)

Page 14: Secure Operating Systems

Argument Addressing Mode Remember that whole confused deputy thing? SCOMP had an “argument addressing mode”

which allowed the system to attempt to access parameters with the level of protection of the caller in hardware (avoiding software checks – clever stuff)

Page 15: Secure Operating Systems

SCOMP was small Security Kernel: about 10k lines Trusted software: about 11k lines SCOMP also has a “secure attention” key,

which allowed a user to be sure that they were accessing the OS not something “in the middle”

Page 16: Secure Operating Systems

SCOMP Kernel Interface Package SKIP:

Provide a hierarchical multilevel file system Provide the ability to create child processes Allow for process synchronization Provide an efficient interface Provide a low-level general purpose interface

Not an OS, but an interface to a secure environment

Page 17: Secure Operating Systems

Things to Do Read: “SCOMP: A Solution to the Multilevel

Security Problem”

Page 18: Secure Operating Systems

Questions & Comments What do you want to know?