Skip to main content

Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD

  • Conference paper
  • First Online:
Information Security (ISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Included in the following conference series:

  • 524 Accesses

Abstract

On usual UNIX systems, a privileged user of root is allowed to acquire any user’s authority without authentication process. If an intruder obtains the root privilege by taking advantage of system’s security hole, he can abuse network reachability of any user of the system to break into other sites. Thus we present a new system design where the authority of users is protected from root by introducing a new user substitution mechanism. However, even if we introduce the new mechanism, on usual UNIX systems, the intruder can get the authority using many other methods for root. We implement the new user substitution mechanism and the mechanisms which prevent the intruder from using such methods in FreeBSD-4.2, and confirm that the system design is effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dorothy E. R. Denning. Cryptography and Data Security. Addison-Wesley, 1983.

    Google Scholar 

  2. Michael Burrows, Martin Abadi, and Roger M. Needham. A logic of authentication. In ACM Transactions on Computer Systems, volume 8, pages 18–36, February 1990.

    Article  Google Scholar 

  3. R. M. Burstall. Program proving as hand simulation with a little induction. In IFIP Congress 74, pages 308–312, 1974.

    Google Scholar 

  4. F. Kröger. Lar: A logic of algorithmic reasoning. In Acta Informatica, volume 8.

    Google Scholar 

  5. A. Pnueli. A temporal logic of programs. In 18th IEEE Symposium on Foundation of Computer Science, pages 46–57. IEEE Computer Society Press, 1977.

    Google Scholar 

  6. Simson Garfinkel and Gene Spafford. Practical UNIX Security. O’Reilly & Associates, Inc., 1991.

    Google Scholar 

  7. CERT. CERT/CC Advisories. http://www.cert.org/.

  8. R. M. Graham. Protection in an information processing utility. In Comm. ACM, volume 11, pages 365–369, 1968.

    Article  Google Scholar 

  9. Marshall Kirk McKusick, Keith Bostic, and Michael J. Karels. The Design and Implementation of the 4.4BSD Operating System (Unix and Open Systems Series.). Addison-Wesley Pub. Co., 1996.

    Google Scholar 

  10. Ronald L. Rivest. The MD5 Message-Digest Algorithm, 1992. RFC1321.

    Google Scholar 

  11. Cactus Development Inc. SecureBSD. http://www.securebsd.com/.

  12. Rob Pike, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom. Plan9 from bell labs. In Plan9 Programmer’s Manual, volume 2. AT&T Bell Laboratories, 1995.

    Google Scholar 

  13. The Santa Cruz Operation, Inc. CMW+. http://www.sco.com/products/Datasheets/cmw/.

  14. Sun Microsystems, Inc. Trusted Solaris. http://www.sun.com/software/solaris/trustedsolaris/trustedsolaris.html.

  15. Department of Defense. Trusted Computer System Evaluation Criteria, 12 1985. DOD5200.28-STD,S225,711.

    Google Scholar 

  16. Bell, David Elliott and Leonard J. La Padula. Secure computer system: Unified exposition and multics interpretation. Technical Report 2997, MITRE Corp, Bedford, MA, 1975.

    Google Scholar 

  17. R. W. Conway, W. L. Maxwell, and H. L. Morgan. On the implementation of security measures in information systems. In CACM 15(4), pages 211–220, 1972.

    Google Scholar 

  18. Jennifer G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Winter 1988 Usenix Conference, pages 191–201, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Masui, K., Tomoishi, M., Yonezaki, N. (2001). Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_37

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_37

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics