Leveraging IPSec for Mandatory Access Control of Linux Network Communications

نویسندگان

  • Trent R. Jaeger
  • Serge Hallyn
  • Joy Latten
چکیده

We present an implementation of mandatory access control for Linux network communications that restricts socket access to labelled IPSec security associations. The Linux Security Modules (LSM) framework defines a reference monitor interface that enables security modules (e.g., SELinux) to enforce comprehensive mandatory access control (MAC) for Linux version 2.6. The current LSM control over network communication is limited, however. The LSM interface enables control of process access to sockets, but socket communications can only be restricted by network interfaces and IP addresses. We cannot use LSMs to control access to particular applications on remote machines or reliably associate request processing with the appropriate remote principals. The original proposal based on IP Security Options (IPSO) was found to be too expensive for unlabelled communications, so an alternative mechanism is necessary. Prior work on the Flask security architecture showed that IPSec can be used to enable MAC control on network communication. In this paper, we translate this approach into the Linux system, version 2.6.12. We describe our design for enforcement, which is based on the Linux 2.6 IPSec implementation called the XFRM subsystem (pronounced “transform”). We detail the modifications necessary to the kernel and user-level ipsec-tools to support IPSec policy specification and negotiation. Finally, we show how security function can be enabled using these LSM hooks with the SELinux LSM.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DeuTeRiuM - A System for Distributed Mandatory Access Control

LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and sp...

متن کامل

A cryptographic tour of the IPsec standards

In this article, we provide an overview of cryptography and cryptographic key management as they are specified in IPsec, a popular suite of standards for providing communications security and network access control for Internet communications. We focus on the latest generation of the IPsec standards, recently published as Request for Comments 4301–4309 by the Internet Engineering Task Force, an...

متن کامل

Internet Engineering Task Force ( IETF ) D

ESP and AH protocols make use of various cryptographic algorithms to provide confidentiality and/or data origin authentication to protected data communications in the IP Security (IPsec) architecture. To ensure interoperability between disparate implementations, the IPsec standard specifies a set of mandatory-toimplement algorithms. This document specifies the current set of mandatory-to-implem...

متن کامل

Virtual Private Networks Coping with Complexity

Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authentication and authorization group policies. In this paper we are going to present some approaches for IP address, user, and access control management that have already been realized for the Linux FreeS/WAN IPsec stack o...

متن کامل

Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks

Today, security threats to operating systems largely come from network. Traditional discretionary access control mechanism alone can hardly defeat them. Although traditional mandatory access control models can effectively protect the security of OS, they have problems of being incompatible with application software and complex in administration. In this paper, we propose a new model, Suspicious...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005