Abstract
On usual UNIX systems, a privileged user of root is allowed to acquire any user’s authority without authentication process. If an intruder obtains the root privilege by taking advantage of system’s security hole, he can abuse network reachability of any user of the system to break into other sites. Thus we present a new system design where the authority of users is protected from root by introducing a new user substitution mechanism. However, even if we introduce the new mechanism, on usual UNIX systems, the intruder can get the authority using many other methods for root. We implement the new user substitution mechanism and the mechanisms which prevent the intruder from using such methods in FreeBSD-4.2, and confirm that the system design is effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dorothy E. R. Denning. Cryptography and Data Security. Addison-Wesley, 1983.
Michael Burrows, Martin Abadi, and Roger M. Needham. A logic of authentication. In ACM Transactions on Computer Systems, volume 8, pages 18–36, February 1990.
R. M. Burstall. Program proving as hand simulation with a little induction. In IFIP Congress 74, pages 308–312, 1974.
F. Kröger. Lar: A logic of algorithmic reasoning. In Acta Informatica, volume 8.
A. Pnueli. A temporal logic of programs. In 18th IEEE Symposium on Foundation of Computer Science, pages 46–57. IEEE Computer Society Press, 1977.
Simson Garfinkel and Gene Spafford. Practical UNIX Security. O’Reilly & Associates, Inc., 1991.
CERT. CERT/CC Advisories. http://www.cert.org/.
R. M. Graham. Protection in an information processing utility. In Comm. ACM, volume 11, pages 365–369, 1968.
Marshall Kirk McKusick, Keith Bostic, and Michael J. Karels. The Design and Implementation of the 4.4BSD Operating System (Unix and Open Systems Series.). Addison-Wesley Pub. Co., 1996.
Ronald L. Rivest. The MD5 Message-Digest Algorithm, 1992. RFC1321.
Cactus Development Inc. SecureBSD. http://www.securebsd.com/.
Rob Pike, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom. Plan9 from bell labs. In Plan9 Programmer’s Manual, volume 2. AT&T Bell Laboratories, 1995.
The Santa Cruz Operation, Inc. CMW+. http://www.sco.com/products/Datasheets/cmw/.
Sun Microsystems, Inc. Trusted Solaris. http://www.sun.com/software/solaris/trustedsolaris/trustedsolaris.html.
Department of Defense. Trusted Computer System Evaluation Criteria, 12 1985. DOD5200.28-STD,S225,711.
Bell, David Elliott and Leonard J. La Padula. Secure computer system: Unified exposition and multics interpretation. Technical Report 2997, MITRE Corp, Bedford, MA, 1975.
R. W. Conway, W. L. Maxwell, and H. L. Morgan. On the implementation of security measures in information systems. In CACM 15(4), pages 211–220, 1972.
Jennifer G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Winter 1988 Usenix Conference, pages 191–201, 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Masui, K., Tomoishi, M., Yonezaki, N. (2001). Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_37
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_37
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive