Protection, Pt. 2 Flashcards
1
Q
Policy vs. Mechanism with a Matrix
A
Mechanism
-Operating system provides access matrix + rules
-Matrix is only manipulated by authorized users
-Rules are strictly enforced
Policy
-Users/admins dictate policy (who can access what object in what mode)
2
Q
Implementation of Access Matrix
A
- Global Table
- Access Control List
- Capability List
3
Q
Global Table
A
- The matrix is large and sparse - additional I/O
- Grouping can help reduce the size
- Repetition of access rights for defaults
4
Q
Access Control List (ACL)
A
- Each column has a list of domains that can access it and what type of access
- Can support default rights
- Difficult to determine access rights of a domain
5
Q
Capability List
A
- Each row has a list of objects and what operations are allowed on them
- Difficult to revoke capabilities of an object
6
Q
Schemes to Implement Revocation
A
- Back-pointers (pointers maintained to object with capabilities)
- Indirection (capabilities point to entry in global table)
- Reacquisition (periodically delete capability from each domain)
- Keys (objects have a master key, capabilities have a copy of the key, revocation is done by changing the master key, objects can hold multiple keys)
7
Q
Capabilities/ACL
A
- When a process tries to access object, ACL is searched
- If approved, a capability is created and attached to that process
- Subsequent accesses use the capability for faster check
8
Q
Protection in Unix
A
ACL can be long and time consuming to search, so Unix has three classes: owner, group, and universe (rwx stuff)
9
Q
Problems with rwx
A
- If you want more than three different classes, you need to do something else
- Solaris and Linux create on-demand ACL if more access classes are required
10
Q
A user in one domain may need to execute a command allowed only in ____
A
Another domain
11
Q
Temporary Domain Switching
A
- Each executable file has a setuid bit associated with it
- When setuid bit is set to 1, any user will execute the file with the same privileges as the owner of the file
- Use āsā in place of the x bit
- setgid is the same, but for groups instead of users