Outline for March 8, 2002
Reading:
§13, §14, §15.1-15.4
-
Greetings and Felicitations
-
Puzzle of the day
-
Identity
-
Principal and identity
-
Users, groups, roles
-
Identity on the web
-
Host identity: static and dynamic identifiers
-
State and cookies
-
Anonymous remailers: type 1 and type 2 (mixmaster)
-
Principles of Secure Design
-
Least Privilege
-
Fail-Safe Defaults
-
Economy of Mechanism
-
Complete Mediation
-
Open Design
-
Separation of Privilege
-
Least Common Mechanism
-
Psychological Acceptability
-
Privilege in Languages
-
Nesting program units
-
Temporary upgrading of privileges
-
Access Control Lists
-
UNIX method
-
ACLs: describe, revocation issue
-
MULTICS ring mechanism
-
MULTICS rings: used for both data and procedures; rights are REWA
-
(b1, b2)
access bracket - can access freely; (b3,
b4) call bracket - can call segment through gate;
so if a's access bracket is (32,35) and its call bracket is (36,39), then
assuming permission mode (REWA) allows access, a procedure in:
rings 0-31: can access a, but ring-crossing fault occurs
rings 32-35: can access a, no ring-crossing fault
rings 36-39: can access a, provided a valid gate is used as an entry point
rings 40-63: cannot access a
-
If the procedure is accessing a data segment d,
no call bracket allowed;
given the above, assuming permission mode (REWA) allows access, a procedure in:
rings 0-32: can access d
rings 33-35: can access d, but cannot write to it (W or A)
rings 36-63: cannot access d
-
Capabilities
-
Capability-based addressing: show picture of accessing object
-
Show process limiting access by not inheriting all parent's capabilities
-
Revocation: use of a global descriptor table