On Mon, 28 Dec 1998, Bennett Todd wrote:

> Well --- sure. Those don't strike me as hard to solve well enough, without a
> trusted OS.

Securelevel and ACLs start to solve them, but don't do the whole job.  
"Well enough" depends on your situation, I happen to believe that 
building secure infrastructure scales "well enough" quite a bit beyond 
semi-secure infrastructure, YMMV.

> The Hard problem is assuring that the CGI doesn't damage the most valuable
> data on the same machine, which is to say the data it must be able to
> manipulate to do its job. That requires auditing, no way around it.

Of course, that depends, not all CGI access needs to be "change"-type.  
Write-only is also a good thing.  Also, the CGI data *isn't* the most 
valuable data on the machine, the administrator's access is, everything 
scales down from there. 

> What I hear you saying is that trusted OSes are good for sandboxing. Sure. So
> is separate hardware, and at the level of security-critical CGIs it's an easy
> fix --- and one I'm more likely to trust than an OS used by a few people here
> and there, who don't have access to its source.

That's only a good thing if you can sandbox developers, administrators, 
or if your trust model dictates extending trust to them.  For things like 
SEC-controlled data that may not be the best option, your lawyers may vary.

> 
> As for the trustworthiness of the evaluation process, for whatever its worth,
> military machines attached to the internet are routinely burgled, and the

Most "military machines" are general purpose OS based systems.  Having run 
and been a user of quite a few "military machines" in a past life I think 
I can speak with at least some insight...

> standard "oh this is no problem" response from the press flacks is that
> _important_ machines cannot be attached to the internet; I am inclined to read

This, at least during my time in was true, I'd hope it's still true, 
compromise of a single administrator shouldn't compromise the computing 
system or its information and on GP OS' that's pretty much a given [it is as 
well on some trusted OS', something I'd like to see changed]...

> here that the evaluation process is expected to produce OSes that cannot be
> configured to withstand the grade of attack that will be mounted from the
> internet.

Well, I can set that straight I think.  The model we used followed the 
rainbow series, mostly TNI (The Red Book).  Classified systems weren't 
attached to *any* public network without so many hoops it's not funny, 
*including* the PTN, or even a private point-to-point circuit and that 
required strong crypto at both ends with hand-couriered encryption 
keys.  It's really got nothing to do with grade of attack, and everything to 
do with security model.  

Systems and networks are traditionally rated for the level of classification 
they can process, a particular installation has an accreditation based on the 
implementation of it's evaluated systems.  You don't traditionally connect a 
system rated for [value] to one rated for less than [value], or even put users
who's classification level is less than [value] on a system that isn't MLS 
capable.  The goal being that only someone with legitimate access to some 
particular information can compromise it, same with accounts and machines 
and facilities.  The problem we're left with is limiting the scope of 
legitimate access and auditing that access.  MLS systems are a design which 
seeks to take care of the scope problem (as are compartments in the user 
space).  All trusted systems are designed to ensure the audit mechanism and 
role is at least somewhat strong, MLS systems provide a great solution there 
too.  

Most of the systems I've seen that handled classified data weren't 
B-level systems either, hence a large part of the physical seperation 
issue.  Trust extended to an untested system is less than that extended 
to a C-level system, is less than that extended to a B-level system...

Just like everyone else, our government can't afford to put strong 
systems everywhere, and has a large number of managers who don't have 
INFOSEC clue 1.  Hopefully things like RSBAC will help to raise the bar 
of what's possible, and drive GP OS' to include more tools and mechanisms 
for building real security.

> In other words, the boys setting gov't security practices seem to count on
> separate-hardware for their sandboxing.

There's an initiative underway for Dockmaster II to hold both 
unclassified and classified data and be on the Internet.  AFAIK it's 
waiting the OS to pass B2 before they add anything beyond unclassified.

http://www.nsa.gov:8080/isso/brochure/hiassur.htm

So, it would appear that NSA seems to think a B2 (red book B2) system has 
enough of what it takes to sit on both red and black networks at the same 
time, including the Internet.  They don't seem to think the same thing of any 
general purpose OS.  alt.conspiracy theories aside, I happen to think they're 
right.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to