Lecture 4

Security principles,
military security,
the Orange Book,
and the advent of networks

Orthogonal Security

Open Design
``Drive your car to a master mechanic. Tell them that you want a full diagnostic performed on the engine. Tell them that they're to do that, but they can't open the hood to get at it. They will look at you funny.''
--Marcus Ranum

Open Design, cont.

Open Design, cont.

Closed Open
Systems Systems
Insecure cellphones, Firewall-1,
Systems backdoors Kerberos, X11
Secure Military pgp,
Systems applications ssh

A shift of topics

Military security,
the Orange Book,
what worked,
and what didn't

Military security
Military computer security types traditionally worry a lot about The Orange Book: a specification for designing and certifying military-use trusted systems.
Intended to encourage commercial developers to build systems that the military could trust.

Military security, cont.
To understand some of the Orange Book, it helps to understand how military security folks are coming from. Background:

Orange Book concepts
Some extraordinarily useful concepts from the Orange Book:

Trusted computing base

Object reuse
Some spectacular failures:

Trusted path

Mandatory access control

The lattice model
Mathematically, the MAC policy above lends itself to a lattice model.

MAC and integrity
A serious problem with mandatory access control:

What goes up may never come down...

What goes up may never come down...(cont)

Covert channels
A covert channel is a stealthy way to send information from high to low: This is yet another serious problem with MAC.

Assurance

Problems with the Orange Book
It doesn't fit the commercial world, and in some ways it is just plain silly.

Problems with the Orange Book

Problems with the Orange Book

Problems with the Orange Book
Credits: Marcus Ranum

Problems with the Orange Book
Interestingly, the Orange Book applies only to non-networked computers. This is very explicit.
Once you plug that C2-certified NT box into a network, it loses its certification!

Results?
Software glitches leave Navy Smart Ship dead in the water July 13, 1998: In September 1997, the Yorktown suffered a systems failure during maneuvers off the coast of Cape Charles, VA., apparently as a result of the failure to prevent a divide by zero in a Windows NT application. The zero seems to have been an erroneous data item that was manually entered. Atlantic Fleet officials said the ship was dead in the water for about 2 hours and 45 minutes.
To first order, noone buys multilevel certified systems anymore; everyone is using a Windoze 95 or NT box.

Lessons

Networks
So what happens when you introduce networks anyway? Answer: the whole game changes.

Networks and centralized control

Networks and the threat model
In practice, just about the only reasonable threat model is to assume that the network is totally under the control of the adversary. Why?

Networks
Networks require new tools: The answer to the latter is cryptography. More next week...

About this document ...

This document was generated using the LaTeX2HTML translator Version 96.1 (Feb 5, 1996) Copyright © 1993, 1994, 1995, 1996, Nikos Drakos, Computer Based Learning Unit, University of Leeds.

The command line arguments were:
latex2html 0904-www.

The translation was initiated by David Wagner on Fri Sep 18 16:56:49 PDT 1998


David Wagner
Fri Sep 18 16:56:49 PDT 1998