Page 297 - DCAP103_Principle of operating system
P. 297

Principles of Operating Systems



                   Notes                        In computer security, mandatory access control (MAC) refers to a type of
                                                access control by which the operating system constrains the ability of a
                                                subject or initiator to access or generally perform some sort of operation on
                                                an object or target.
                                 9.1.5 Cryptographic Access Control

                                 The advent of International Networking spread the security concerns outside the usual realm
                                 of the operating system, to the data that was moving to and from the system over the network.
                                 The ability to mimic a valid data packet meant that data could be changed enroute simply by
                                 rerouting the valid packet, and replacing it with an invalid packet. As a result, security had to
                                 be spread not only to the local system, but also to all critical correspondence between systems.
                                 At first such mechanisms were implemented by sending digests of the original data as part of
                                 the data stream, under the assumption that a changed packet would not fit the original digest.
                                 However it was found that digests were not cryptographically secure and could be fooled
                                 into thinking that data was valid when it was not. As well, sending data in clear meant that
                                 someone in an intervening system could read the packet with a packet sniffer, and learn what
                                 the information was.

                                 The idea when this was determined became to cryptographically protect the data, which would
                                 at least, it was hoped, slow down the reading of the mail, and cryptographically secure the
                                 digest, so that it could not be fooled as easily.

                                 9.2 Security Problem

                                 Even casually computer savvy users these days know about beware of security threats on the
                                 Internet. They know that the online universe is a crawl with computer viruses, worms, Trojan
                                 horses  and  other  malicious  bits  of  code,  and  if  they  are  prudent,  they  have  equipped  their
                                 computers with up-to-date anti-virus and firewall software for repelling these invaders. They
                                 are leery of unsolicited e-mail attachments, and careful about the websites they visit. They have
                                 probably heard about (or experienced) “denial of service” attacks in which malicious hackers
                                 direct  thousands  of  computers  to  bombard  a  company’s  servers  with  requests  to  shut  them
                                 down. They probably even know not to fall for “phishing” scams in which hyperlinks take users
                                 to phony sites posing as legitimate banks and credit card companies for the purpose of stealing
                                 passwords and account information.
                                 What few in the public realize, however, is that the Internet is vulnerable to much deeper levels
                                 of fraud-ones that exploit fundamental security gaps in the network protocols themselves. These
                                 attacks, often called “pharming,” are all but impossible for individuals to guard against or even
                                 detect. They represent a growing threat to personal, corporate and national security that the
                                 federal government needs to address urgently.
                                 Consider, for example, the defenselessness of the domain name system (DNS), the Internet’s
                                 version of “411 information”. When you type a “www.” style name into your browser software,
                                 the browser converts it into an IP address, a string of digits that is the equivalent to a phone
                                 number. It gets the IP address by contacting a local name server, typically operated by your
                                 Internet service provider. Unlike telephone numbers, however, which are often valid for several
                                 years, IP addresses change frequently and so the IP address comes with an expiration date,
                                 known as a “time to live” (or TTL). On the Internet, TTLs are typically measured in seconds,
                                 hours or days, even if the associated IP address does not change that often. If a local name server
                                 receives a request for an “expired” DNS name, it in turn queries a hierarchy of other servers,
                                 keying its request to two 16-bit identification codes—one for a transaction ID and other for a
                                 port number. Unfortunately, the port number is often predictable, and so it becomes possible
                                 for a cyberthief to produce a likely match to both codes by generating a relatively small number
                                 of answers (say 65,536).



        290                               LOVELY PROFESSIONAL UNIVERSITY
   292   293   294   295   296   297   298   299   300   301   302