1
Motivation Analyzing Protection Quality of Security-Enhanced Operating Systems Host compromise is a serious problem Operating system security enhancement DAC + MAC High-Level Security Properties Low-Level Security Policy Rules Full paper appeared in the 16th Network and Distributed System Security Symposium (NDSS) 2009 SELinux AppArmor Hong Chen Ninghui Li Ziqing Mao Solution Results What attacks are prevented? How to penetrate? Use another distribution? Attack Scenario = Attack’s Initial Resource + Attack Goal Network access, local account, … Load kernel module, plant Trojan Horse, … State Transition SELinux: proc(uid, gid, domain) AppArmor: proc(uid, gid, profile) State 0 Attacker’s Initial Resources State n Attack Goal State 1 Compromise Host Attack Graph Attack paths Vulnerability surface Logic Programming System facts System rules Evaluation (SELinux / AppArmor) Ubuntu Server Edition 8.04 SUSE Linux Server Edition 10 Fedora 8 Show tightening opportunities Vulnerability Surface Analyzer (VulSAN) Analyze and compare the quality of protection offered by MAC policies in Linux Vulnerability Surface: SELinux vs. AppArmor Ubuntu Server Edition 8.04 SELinux AppArmor Unique attack paths of SELinux Privileged programs run under unconfined_t: nmbd, smbd, vsftpd, portmap, and rpc.statd Confinement not as tight as AppArmor: cupsd and dhclient Setuid confinement: ping, passwd Conclusion with data In this configuration, AppArmor provides better protection Fact Collector Host Attack Graph Generator Attack Path Analyzer 781-1F9.pdf 1 3/9/2009 5:25:32 PM

Analyzing Protection Quality of Security-Enhanced ... · Load kernel module, plant Trojan Horse, … State Transition SELinux: proc(uid, gid, domain) AppArmor: proc(uid, gid, profile)

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Analyzing Protection Quality of Security-Enhanced ... · Load kernel module, plant Trojan Horse, … State Transition SELinux: proc(uid, gid, domain) AppArmor: proc(uid, gid, profile)

Motivation

Analyzing Protection Quality of Security-Enhanced Operating Systems

Host compromise is a serious problem

Operating system security enhancement

DAC + MAC

High-Level Security Properties

Low-Level Security Policy Rules

Full paper appeared in the 16th Network and Distributed System Security Symposium (NDSS) 2009

SELinux

AppArmor

Hong Chen Ninghui Li Ziqing Mao

Solution

Results

What attacks are prevented?

How to penetrate?

Use another distribution?

Attack Scenario = Attack’s Initial Resource + Attack Goal

Network access, local account, …

Load kernel module, plant Trojan Horse, …

State Transition

SELinux:

proc(uid, gid, domain)

AppArmor:

proc(uid, gid, profile)

State0

Attacker’s

Initial Resources

Staten

Attack Goal

State1 …

Compromise

Host Attack Graph

Attack paths

Vulnerability surface

Logic Programming

System facts

System rules

Evaluation (SELinux / AppArmor)

Ubuntu Server Edition 8.04

SUSE Linux Server Edition 10

Fedora 8

Show tightening opportunities

Vulnerability Surface Analyzer (VulSAN)

Analyze and compare the quality of protection offered by MAC policies in Linux

Vulnerability Surface: SELinux vs. AppArmor

Ubuntu Server Edition 8.04

SELinuxAppArmor

Unique attack paths of SELinux

Privileged programs run under unconfined_t:

nmbd, smbd, vsftpd, portmap, and rpc.statd

Confinement not as tight as AppArmor:

cupsd and dhclient

Setuid confinement: ping, passwd

Conclusion – with data

In this configuration, AppArmor provides

better protection

Fact

Collector

Host Attack Graph

Generator

Attack Path

Analyzer

781-1F9.pdf 1 3/9/2009 5:25:32 PM

coj
Typewritten Text
2009 - 781-1F9 - Analyzing Protection Quality of Security-Enhanced Operating Systems - Hong Chen - ASA