This chapter looks at the security features provided by Tru64 UNIX. The first section provides a brief security overview (Section 9.1), after which the following topics are discussed:
Identification and authentication (Section 9.2)
Audit features (Section 9.3)
Discretionary access controls (Section 9.4)
Security administration (Section 9.5)
Object reuse (Section 9.6)
The protected environment for trusted components (Section 9.7)
Integrity features (Section 9.8)
Additional security features (Section 9.9)
Tru64 UNIX offers a range of security configuration options, and can be tailored to the appropriate security level of your installation. The range extends from traditional UNIX security, the default, to the optional enhanced security subsets that, when enabled, satisfy or exceed the requirements of the C2 evaluation class of DoD 5200.28-STD Trusted Computer System Evaluation Criteria (TCSEC), also known as the Orange Book.
For specific information, see the
Security
guide.
9.2 Identification and Authentication
Security Integration Architecture (SIA) allows a single set of identification and authentication (I&A) utilities to work in both base mode (as a nontrusted system) and in enhanced mode.
Base mode is the default and enhanced mode is available through optional security subsets. The SysMan interface can enable enhanced mode in one of two ways:
Shadow passwords only
Custom (providing the means to completely configure)
The following I&A features are provided on a system running enhanced security:
Password control
Configurable maximum password length up to 80 characters.
Configurable password lifetimes. This includes an optional minimum interval between password changes.
A floating value of the minimum password length, based directly on the Department of Defense Password Management Guideline (the Green Book) guidelines and the password lifetime.
User password-generation flags, which include the ability to require a user to have a generated password.
Recording of who (besides the user) last changed the user's password.
Login control
Optional recording of the last terminal and time of the last successful login and of the last unsuccessful login attempt.
Automatic account lockout after a specified number of consecutive bad access attempts (break-in detection and evasion).
A per-terminal setting for the delay between consecutive login attempts and the maximum amount of time each attempt is allowed before being declared a failed attempt.
A per-terminal setting for maximum consecutive failed login attempts before locking any new accesses from that terminal.
Differentiation between "retired" and "locked" accounts.
Configurable multilevel system default values for the various I&A fields (templates).
A CDE-based graphical interface (dxaccounts
)
to perform user-account management and other I&A administration tasks.
The
edauth
,
convauth
,
and
convuser
utilities to ease the migration of accounts
to the enhanced security level.
The following audit features are provided:
An audit configuration GUI,
audit_setup
,
to ease system auditing
Command line interfaces
The ability to send audit logs to a remote host
Event profiles allowing simplified configuration based on system type
Fine-grained preselection of system events, application events, and site-definable events
Fine-grained post-analysis of system events, application events, and site-definable events
Optional automated audited log cleanup
The
dxaudit
GUI
When used with enhanced security, auditing
includes support for a per-user audit characteristics profile with enhanced
identification and authorization.
The audit system is set up through SysMan
or by using the
audit_setup
utility from the command line.
Maintenance for the audit system is done from the command line or with the
dxaudit
GUI.
9.4 Discretionary Access Controls
Discretionary access controls (DACs) provide the capability for users to define how the resources they create can be shared. The traditional UNIX permission bits provide this capability.
Tru64 UNIX also provides optional access control lists (ACLs) for
object protection at the individual user level.
ACLs are supported under the
UFS, NFS, and AdvFS file systems.
To simplify ACL management, an ACL GUI,
named
dxsetacl
is available in addition to the command
line interface.
9.5 Security Administration
Tru64 UNIX provides system administrators with tools to ease the of
use of administration of system security.
9.5.1 Configuring System Security
System administrators can select the security level for their system.
The default base security level consists of object reuse and discretionary
access control (DAC).
System administrators can select enhanced security
features and ACLs by using SysMan or by running thesecsetup
utility from the command line.
The audit system is configurable through SysMan
or by using the
audit_setup
utility from the command line.
9.5.2 Windows-Based Administration Utilities
Tru64 UNIX provides four GUIs to deal with day-to-day security administration on the local machine:
The
dxaccounts
utility (Account Manager
under the CDE-based system administration utilities), which operates in both
base and enhanced security modes, provides the ability to create template
accounts and to modify selected system defaults.
Under enhanced security,
you can use
dxaccounts
to specify a set of events to audit
(audit mask) for each user.
The
dxaudit
utility controls the administration
of the audit system (for instance, defining which events to audit) and the
generation of audit reports.
Auditing is available with both base and enhanced
security.
The
dxsetacl
utility (ACL Manager under
the CDE based system administration utilities) is used to create, modify,
and delete ACLs on files and directories.
The
dxdevices
utility configures secure
devices in enhanced security mode.
Note
The
audit_setup
,secsetup
,XSysAdmin
, andXIsso
utilities have been retired. They are available in the Obsolete subset, but their use is not recommended.
For more information, see the
dxaccounts
(8X),
dxsetacl
(8X),
dxaudit
(8X),
and
dxdevices
(8X)
reference pages.
9.6 Object Reuse
Object reuse ensures that the following types of physical storage (memory or disk space) is cleared ("scrubbed."):
Physical storage that is assigned to shared objects
Physical storage that is released prior to reassignment to another user
Examples of object reuse are disk space that is released after
a file is truncated or physical memory that is released prior to reassignment
to another user to read.
9.7 Protected Environment for Trusted Components
Tru64 UNIX uses hardware memory management to maintain a kernel address space for itself and to maintain separate address spaces for each instance of an executing application process. Processes may try to write to the same address space. DACs control the sharing of this address space among processes; the default is to disallow sharing. The administrator can disable the sharing of sections as read-only address space; for example, shared libraries. Thus, the security-relevant components of the system (the trusted computing base, or TCB) are protected while they execute.
Tru64 UNIX protects the on-disk security components using discretionary access control. Attempted violations of the DAC protections can be audited so that remedial action can be taken by the system security officer.
In addition, the security components are structured into well defined, largely independent modules.
Tru64 UNIX is designed, developed, and maintained under a configuration management system that controls changes to the specifications, documentation, source code, object code, hardware, firmware, and test suites. Tools, which are also maintained under configuration control, are provided to control and automate the generation of new versions of the security components from source code and to verify that the correct versions of the source have been incorporated into the new version.
The master copies of all material used to generate the security components
are protected from unauthorized modification or destruction.
9.8 Integrity Features
Tru64 UNIX provides the capability to validate the correct operation of hardware, firmware, and software security components. The firmware includes power-on diagnostics and more extensive diagnostics that optionally can be enabled. The firmware itself resides in EEPROM and can be physically write protected. It also can be compared against, or reloaded from, an offline master copy. Additional hardware diagnostics can be used also.
The firmware can require authorization to load any operating software other than the default or to execute privileged console monitor commands that examine or modify memory.
Once the operating system is loaded, administrators can run system diagnostics to validate the correct operation of the hardware and software. In addition, test suites are available to ensure the correct operation of the operating system software.
The following tools can be run automatically to detect inconsistencies in the security software and databases:
This command reads subset inventory records from standard input and verifies that the attributes for the files on the system match the attributes listed in the corresponding records. Missing files and inconsistencies in file size, checksum, user ID, group ID, permissions, and file type are reported.
This program checks both the overall structure and internal field consistency of all components of the authentication database and reports problems that it finds.
Tru64 UNIX supports features that are unavailable in other OSF-based
UNIX operating systems.
9.9.1 The Security Integration Architecture Layer
All security mechanisms that run on the Tru64 UNIX operating system
run under the Security Integration Architecture (SIA) layer.
The SIA allows
a suitably privileged administrator to layer various local and distributed
security authentication mechanisms onto Tru64 UNIX with no modification
to the security-sensitive Tru64 UNIX commands, such as
login
,
su
, and
passwd
.
The SIA isolates the security-sensitive
commands from the specific security mechanisms, thus eliminating the need
to modify them for each new security mechanism.
Because of the presence of the SIA, administrators can use the
secconfig
command to move back and forth between the secure and
nonsecure commands and utilities.
The SIA also supports the following:
DECnet interoperability
The SIA interface provides support for the DECnet/OSI networking software.
Distributed Computing Environment interoperability
When Tru64 UNIX is configured for enhanced security, the SIA allows you to enter both your system password and your Distributed Computing Environment (DCE) password at login time. You do not have to log in to the Tru64 UNIX secure system and then log in again to DCE.
9.9.2 Network Information Service Compatibility
Tru64 UNIX provides support for accessing Network Information Service
(NIS) distributed databases while running enhanced security.
For example,
administrators can use the
ypcat passwd
command to gather
information about users on the network.
However, the user's encrypted password
in the NIS distributed password database is not the same as the encrypted
password on the secure system, which cannot be viewed by unprivileged users.
In addition, on a Tru64 UNIX system running enhanced security, NIS
can be used to distribute the enhanced security protected password database.
9.9.3 Configuration and Setup Script
Tru64 UNIX supports the
secsetup
configuration
and setup script, which allows you to select the security level you want to
run, permits you to move back and forth between secure and nonsecure commands
and utilities, and configures security at boot time, depending on the value
of the
SECURITY
variable in the
/etc/rc.config
file.
9.9.4 Graphical User Interfaces
Tru64 UNIX provides the
dxaccounts
,
dxaudit
, and
dxdevices
graphical interfaces that administrators
can use to create and modify user accounts, modify system defaults, modify
the audit interfaces and devices.
The
dxsetacl
graphical
interface lets users manipulate ACLs on system objects.
9.9.5 Division of Privileges
The Division of Privileges (DOP) feature provides role-based privilege
management.
System administrators can use the DOP configuration utility,
dopconfig
, to assign users or groups the privilege to execute a
set of actions that would usually be reserved for root.