18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Type Enforced attributes<br />

Chapter 1: Introduction<br />

The Type Enforced environment<br />

When an administrator initially logs into the <strong>Sidewinder</strong> <strong>G2</strong> at a command line<br />

prompt, they are automatically placed in the User domain, which allows no<br />

access to sensitive files. An administrator may then switch to their defined<br />

administrative role’s domain using the srole command (for Admn) or srole<br />

adminro (for AdRO). The Admn domain allows an administrator to access to<br />

all administrative functions. The AdRO domain allows read-only access to the<br />

system configuration areas, as well as the ability to generate reports. An<br />

administrator with read-only access cannot make system modifications.<br />

This guide assumes that most commands will be issued by administrators with<br />

read/write access, and therefore only includes the srole command. If you are<br />

a read-only administrator and have reason to access the command line,<br />

always use srole adminro instead <strong>of</strong> srole alone.<br />

For information on assigning administrator roles, see “Setting up and<br />

maintaining administrator accounts” on page 43.<br />

Inter-domain operations<br />

Interactions between domains, such as signalling, are also controlled by Type<br />

Enforcement. For example, a process running in the SMTP domain cannot<br />

send a signal to the Telnet server running in the Telnet domain.<br />

Access to system calls<br />

A typical UNIX system has many privileged system calls that could enable<br />

malicious users to access the kernel directly and compromise the system. The<br />

<strong>Sidewinder</strong> <strong>G2</strong> solves this problem with a set <strong>of</strong> flags for each domain that<br />

indicate which system calls can be made from that domain.<br />

Files available to a process<br />

Process-to-file access is controlled by a Domain Definition Table that maps out<br />

the various classes <strong>of</strong> data files and processes that may be running on the<br />

<strong>Sidewinder</strong> <strong>G2</strong>. The table specifies which process domains can access<br />

different types <strong>of</strong> files and what type <strong>of</strong> access is allowed (such as read/write/<br />

execute). This table cannot be circumvented.<br />

Your system is pre-configured so that domains have access only to the files<br />

they need. The Domain Definition Table cannot be changed while the<br />

Operational kernel is running. This prevents intruders from tricking the kernel<br />

into modifying the table. Also, Type Enforcement prevents intruders from<br />

installing s<strong>of</strong>tware that may be used to circumvent <strong>Sidewinder</strong> <strong>G2</strong> security<br />

mechanisms.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!