Page 115 - DCAP516_COMPUTER_SECURITY
P. 115

Unit 9: Database Security




          3.   Even if (1) and (2) were met, the evaluation process is very costly and imposes special  Notes
               restrictions on configuration control of the evaluated software.
          Notwithstanding such suppositions, Red Hat Enterprise Linux 5 was certified against LSPP,
          RBACPP, and CAPP at EAL4+ in June 2007. It uses Security-Enhanced Linux to implement MLS
          and was the first Common Criteria certification to enforce TOE security properties with Security-
          Enhanced Linux.

               !

             Caution  Vendor certification strategies can be misleading to laypersons.
          A common strategy exploits the layperson’s overemphasis of EAL level with over-certification,
          such as certifying an EAL 3 protection profile (like CAPP[5]) to elevated levels, like EAL 4 or
          EAL 5. Another is adding and certifying MLS support features (such as Role-Based Access Control
          Protection Profile (RBACPP) and Labeled Security Protection Profile (LSPP)) to a kernel that is
          not evaluated to an MLS-capable protection profile. Those types of features are services run on
          the kernel and depend on the kernel to protect them from corruption and subversion. If the
          kernel is not evaluated to an MLS-capable protection profile, MLS features cannot be trusted
          regardless of how impressive the demonstration looks. It is particularly noteworthy that CAPP
          is specifically not an MLS-capable profile as it specifically excludes self-protection capabilities
          critical for MLS.
          Sun Microsystems offers Solaris Trusted Extensions, as an integrated feature of the commercial
          Solaris Operating System as well as OpenSolaris. In addition to the Controlled Access Protection
          Profile (CAPP), and Role-Based Access Control (RBAC) protection profiles, Trusted Extensions
          has also been certified at EAL4 to the Labeled Security Protection Profile (LSPP). The security
          target includes both desktop and network functionality. LSPP mandates that users are not
          authorized to override the labeling polices enforced by the kernel and X11 server. The evaluation
          does not include a covert channel analysis. Because these certifications depend on CAPP, no
          Common Criteria certifications suggest this product is trustworthy for MLS.
          BAE Systems offers XTS-400, a commercial system that supports MLS at what the vendor claims
          is “high assurance”. Predecessor products (including the XTS-300) were evaluated at the TCSEC
          B3 level, which is MLS-Capable. The XTS-400 has been evaluated under the Common Criteria at
          EAL5+ against the CAPP and LSPP protection profiles. CAPP and LSPP are both EAL3 protection
          profiles that are not inherently MLS-capable, but the security target for the Common Criteria
          evaluation of this product contains an enriched set of security functions that provide MLS
          capability.

          9.4.1 Problems in MLS

          Sanitization is a problem area for MLS systems. Systems that implement MLS restrictions, like
          those defined by Bell-La Padula model, only allow sharing when it does not obviously violate
          security restrictions. Users with lower clearances can easily share their work with users holding
          higher clearances, but not vice versa. There is no efficient, reliable mechanism by which a Top
          Secret user can edit a Top Secret file, remove all Top Secret information, and then deliver it to
          users with Secret or lower clearances. In practice, MLS systems circumvent this problem via
          privileged functions that allow a trustworthy user to bypass the MLS mechanism and change a
          file’s security classification. However, the technique is not reliable.
          Covert channels pose another problem for MLS systems. For an MLS system to keep secrets
          perfectly, there must be no possible way for a Top Secret process to transmit signals of any kind
          to a Secret or lower process. This includes side effects such as changes in available memory or
          disk space, or changes in process timing. When a process exploits such a side effect to transmit




                                           LOVELY PROFESSIONAL UNIVERSITY                                   109
   110   111   112   113   114   115   116   117   118   119   120