Linux Security
    Linux Security
    Linux Security

    Announce: RSBAC v1.2.0 released

    Date
    4222
    Posted By
    RSBAC is a flexible, powerful and fast open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). All development is independent of governments and big companies, and no existing access . . .
    From: Amon Ott To: RSBAC List Subject: Announce: RSBAC v1.2.0 released
    Hi!

    Rule Set Based Access Control (RSBAC) version 1.2.0 has been released.Full information and downloads are available from https://www.rsbac.org

    RSBAC is a flexible, powerful and fast open source access control frameworkfor current Linux kernels, which has been in stable production use sinceJanuary 2000 (version 1.0.9a). All development is independent of governmentsand big companies, and no existing access control code has been reused.

    This version comes with many new features, e.g.:

    • Network Device (NETDEV) targets (for configuration and raw access)
    • Real template based network access control with Network Object (Socket) templates (NETTEMP) and targets (NETOBJ) and new request types BIND, CONNECT, etc.
    • CAP module with min and max Linux Capabilities for users and programs
    • Network and firewall config protection as new SCD targets
    • Unlimited roles and types in Role Compatibility (RC) model
    • Separate request type MAP_EXEC for library mapping (used to be EXECUTE, too)
    • User ID and RC role based symlink redirection support
    • Lifetime limits for many RC and ACL settings, like access rights and group memberships

    Amon Ott.

    Brief Description

    Name:          rsbacVersion:       1.2.0Kernelver:     2.2.20, 2.4.18Status:        9 (UP), 8 (SMP)Author:        Amon Ott Maintainer:    Amon Ott Description:   Rule Set Based Access Control (RSBAC)Date:          28-May-2002Descfile-URL:  https://www.rsbac.org/rsbac.descDownload-URL:  https://www.rsbac.org/download.htmHomepage-URL:  https://www.rsbac.org/Manual-URL:    https://www.rsbac.org/instadm.htm

    What is RSBAC?

    Name:          rsbacVersion:       1.2.0Kernelver:     2.2.20, 2.4.18Status:        9 (UP), 8 (SMP)Author:        Amon Ott Maintainer:    Amon Ott Description:   Rule Set Based Access Control (RSBAC)Date:          28-May-2002Descfile-URL:  https://www.rsbac.org/rsbac.descDownload-URL:  https://www.rsbac.org/download.htmHomepage-URL:  https://www.rsbac.org/Manual-URL:    https://www.rsbac.org/instadm.htm

    Key features

    • Open Source (GPL)
    • Independent of governments and big companies
    • Several well-known and new security models, e.g. MAC, ACL and RC
    • Control over individual user and program network accesses
    • Any combination of models possible
    • Easily extensible: write your own model for runtime registration
    • Support for current kernels
    • Stable for production use
    RSBAC is a flexible, powerful and fast open source access control frameworkfor current Linux kernels, which has been in stable production use sinceJanuary 2000 (version 1.0.9a). All development is independent of governmentsand big companies, and no existing access control code has been reused.

    The standard package includes a range of access control models like MAC, RC,ACL (see below). Furthermore, the runtime registration facility (REG) makesit easy to implement your own access control model as a kernel module andget it registered at runtime.

    The RSBAC framework is based on the Generalized Framework for Access Control(GFAC) by Abrams and LaPadula. All security relevant system calls areextended by security enforcement code. This code calls the central decisioncomponent, which in turn calls all active decision modules and generates acombined decision. This decision is then enforced by the system callextensions.

    Decisions are based on the type of access (request type), the access targetand on the values of attributes attached to the subject calling and to thetarget to be accessed. Additional independent attributes can be used byindividual modules, e.g. the privacy module (PM). All attributes are storedin fully protected directories, one on each mounted device. Thus changes toattributes require special system calls provided.

    From version 1.2.0, all types of network accesses can be controlledindividually for all users and programs. This gives you full control overtheir network behaviour and makes unintended network accesses easier toprevent and detect.

    As all types of access decisions are based on general decision requests,many different security policies can be implemented as a decision module.Apart from the builtin models shown below, the optional Module Registration(REG) allows for registration of additional, individual decision modules atruntime.

    In the RSBAC version 1.2.0, the following modules are included. Please notethat all modules are optional. They are described in detail in an extratext.

    • MAC: Bell-LaPadula Mandatory Access Control (compartments limited to a number of 64)

    • FC: Functional Control. A simple role based model, restricting access to security information to security officers and access to system information to administrators.

    • SIM: Security Information Modification. Only security administrators are allowed to modify data labeled as security information

    • PM: Privacy Model. Simone Fischer-Hübner's Privacy Model in its first implementation. See our paper on PM implementation (43K) for the National Information Systems Security Conference (NISSC 98)

    • MS: Malware Scan. Scan all files for malware on execution (optionally on all file read accesses or on all TCP/UDP read accesses), deny access if infected. Currently the Linux viruses Bliss.A and Bliss.B and a handfull of others are detected. See our paper on Approaches to Integrated Malware Detection and Avoidance (34K) for The Third Nordic Workshop on Secure IT Systems (Nordsec'98)

    • FF: File Flags. Provide and use flags for dirs and files, currently execute_only (files), read_only (files and dirs), search_only (dirs), secure_delete (files), no_execute (files), add_inherited (files and dirs), no_rename_or_delete(files and dirs, no inheritance) and append_only (files). Only FF security officers may modify these flags.

    • RC: Role Compatibility. Defines roles and types for each target type (file, dir, dev, ipc, scd, process etc.). For each role, compatibility to all types and to other roles can be set individually and with request granularity. For administration there is a fine grained separation-of-duty. Granted rights can also have a time limit.

    • AUTH: Authorization enforcement. Controls all CHANGE_OWNER requests for process targets, only programs/processes with general setuid allowance and those with a capability for the target user ID may setuid. Capabilities can be controlled by other programs/processes, e.g. authentication daemons.

    • ACL: Access Control Lists. For every object there is an Access Control List, defining which subjects may access this object with which request types. Subjects can be of type user, RC role and ACL group. Objects are grouped by their target type, but have individual ACLs. If there is no ACL entry for a subject at an object, rights are inherited from parent objects, restricted by an inheritance mask. Direct (user) and indirect (role, group) rights are accumulated. For each object type there is a default ACL on top of the normal hierarchy. Group management has been added in version 1.0.9a. Granted rights and group memberships can have a time limit.

    • CAP: Linux Capabilities (new in 1.2.0). For all users and programs you can define a minimum and a maximum Linux capability set ("set of root special rights"). This lets you e.g. run server programs as normal user, or restrict rights of root programs in the standard Linux way.

    A general goal of RSBAC design has been to some day reach (obsolete) OrangeBook (TCSEC) B1 level. Now it is mostly targeting to be useful as secure andmulti-purposed networked system, with special interest in firewalls.

    Amon Ott <[email protected]>

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.