Outline for April 4, 1997
- Greetings and Felicitations
-
Web page is now up and running; use
index.html
-
Homework will be given out Monday
-
Handout will be given out Wednesday
-
Penetration study (Red teaming, Tiger teaming)
-
A method of testing for problems
-
Failure does not demonstrate security;
success shows that security problems exist
-
Goals must be set with respect to site policy
-
Goals
-
What's the policy?
-
What's the criteria for success
(gaining privileges,
gaining access,
finding a specific numbe of flaws, etc.)
-
What are the constraints (money, time, etc.)
-
Contrast Orange book testing with site testing
-
Structure of the testing
-
stage 1: external attacker with no knowledge (rare)
-
stage 2: external attacker with access to the system (network, modem, etc.)
-
stage 3: internal user with access to system
-
Our test
-
Two targets, not yet installed:
one a Solaris system, another a DG/UX B2 system
-
Split up into groups
-
Work independently or together?
-
System areas for first stage: network security
-
Determine protocols
-
Figure out how they should work
-
Figure out how they DO work
-
The protocols
-
FTP, TFTP
-
Finger
-
SMTP
-
RPC
-
NFS
-
NIS
-
rsh/rcp
-
LPD
-
X protocol
-
UUCP
You can get this document in
Postscript,
ASCII
text,
or
Framemaker
version 5.1.
Send email to
cs253@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 4/9/97