9    Security

This chapter looks at the security features provided by Tru64 UNIX. The first section provides a brief security overview (Section 9.1), after which the following topics are discussed:

9.1    Overview

Tru64 UNIX offers a range of security configuration options, and can be tailored to the appropriate security level of your installation. The range extends from traditional UNIX security, the default, to the optional enhanced security subsets that, when enabled, satisfy or exceed the requirements of the C2 evaluation class of DoD 5200.28-STD Trusted Computer System Evaluation Criteria (TCSEC), also known as the Orange Book.

For specific information, see the Security guide.

9.2    Identification and Authentication

Security Integration Architecture (SIA) allows a single set of identification and authentication (I&A) utilities to work in both base mode (as a nontrusted system) and in enhanced mode.

Base mode is the default and enhanced mode is available through optional security subsets. The SysMan interface can enable enhanced mode in one of two ways:

The following I&A features are provided on a system running enhanced security:

9.3    Audit System

The following audit features are provided:

When used with enhanced security, auditing

includes support for a per-user audit characteristics profile with enhanced identification and authorization. The audit system is set up through SysMan or by using the audit_setup utility from the command line. Maintenance for the audit system is done from the command line or with the dxaudit GUI.

9.4    Discretionary Access Controls

Discretionary access controls (DACs) provide the capability for users to define how the resources they create can be shared. The traditional UNIX permission bits provide this capability.

Tru64 UNIX also provides optional access control lists (ACLs) for object protection at the individual user level. ACLs are supported under the UFS, NFS, and AdvFS file systems. To simplify ACL management, an ACL GUI, named dxsetacl is available in addition to the command line interface.

9.5    Security Administration

Tru64 UNIX provides system administrators with tools to ease the of use of administration of system security.

9.5.1    Configuring System Security

System administrators can select the security level for their system. The default base security level consists of object reuse and discretionary access control (DAC). System administrators can select enhanced security features and ACLs by using SysMan or by running thesecsetup utility from the command line. The audit system is configurable through SysMan or by using the audit_setup utility from the command line.

9.5.2    Windows-Based Administration Utilities

Tru64 UNIX provides four GUIs to deal with day-to-day security administration on the local machine:

Note

The audit_setup, secsetup, XSysAdmin, and XIsso utilities have been retired. They are available in the Obsolete subset, but their use is not recommended.

For more information, see the dxaccounts(8X), dxsetacl(8X), dxaudit(8X), and dxdevices(8X) reference pages.

9.6    Object Reuse

Object reuse ensures that the following types of physical storage (memory or disk space) is cleared ("scrubbed."):

Examples of object reuse are disk space that is released after a file is truncated or physical memory that is released prior to reassignment to another user to read.

9.7    Protected Environment for Trusted Components

Tru64 UNIX uses hardware memory management to maintain a kernel address space for itself and to maintain separate address spaces for each instance of an executing application process. Processes may try to write to the same address space. DACs control the sharing of this address space among processes; the default is to disallow sharing. The administrator can disable the sharing of sections as read-only address space; for example, shared libraries. Thus, the security-relevant components of the system (the trusted computing base, or TCB) are protected while they execute.

Tru64 UNIX protects the on-disk security components using discretionary access control. Attempted violations of the DAC protections can be audited so that remedial action can be taken by the system security officer.

In addition, the security components are structured into well defined, largely independent modules.

Tru64 UNIX is designed, developed, and maintained under a configuration management system that controls changes to the specifications, documentation, source code, object code, hardware, firmware, and test suites. Tools, which are also maintained under configuration control, are provided to control and automate the generation of new versions of the security components from source code and to verify that the correct versions of the source have been incorporated into the new version.

The master copies of all material used to generate the security components are protected from unauthorized modification or destruction.

9.8    Integrity Features

Tru64 UNIX provides the capability to validate the correct operation of hardware, firmware, and software security components. The firmware includes power-on diagnostics and more extensive diagnostics that optionally can be enabled. The firmware itself resides in EEPROM and can be physically write protected. It also can be compared against, or reloaded from, an offline master copy. Additional hardware diagnostics can be used also.

The firmware can require authorization to load any operating software other than the default or to execute privileged console monitor commands that examine or modify memory.

Once the operating system is loaded, administrators can run system diagnostics to validate the correct operation of the hardware and software. In addition, test suites are available to ensure the correct operation of the operating system software.

The following tools can be run automatically to detect inconsistencies in the security software and databases:

9.9    Unique Security Features

Tru64 UNIX supports features that are unavailable in other OSF-based UNIX operating systems.

9.9.1    The Security Integration Architecture Layer

All security mechanisms that run on the Tru64 UNIX operating system run under the Security Integration Architecture (SIA) layer. The SIA allows a suitably privileged administrator to layer various local and distributed security authentication mechanisms onto Tru64 UNIX with no modification to the security-sensitive Tru64 UNIX commands, such as login, su, and passwd. The SIA isolates the security-sensitive commands from the specific security mechanisms, thus eliminating the need to modify them for each new security mechanism.

Because of the presence of the SIA, administrators can use the secconfig command to move back and forth between the secure and nonsecure commands and utilities. The SIA also supports the following:

9.9.2    Network Information Service Compatibility

Tru64 UNIX provides support for accessing Network Information Service (NIS) distributed databases while running enhanced security. For example, administrators can use the ypcat passwd command to gather information about users on the network. However, the user's encrypted password in the NIS distributed password database is not the same as the encrypted password on the secure system, which cannot be viewed by unprivileged users.

In addition, on a Tru64 UNIX system running enhanced security, NIS can be used to distribute the enhanced security protected password database.

9.9.3    Configuration and Setup Script

Tru64 UNIX supports the secsetup configuration and setup script, which allows you to select the security level you want to run, permits you to move back and forth between secure and nonsecure commands and utilities, and configures security at boot time, depending on the value of the SECURITY variable in the /etc/rc.config file.

9.9.4    Graphical User Interfaces

Tru64 UNIX provides the dxaccounts, dxaudit, and dxdevices graphical interfaces that administrators can use to create and modify user accounts, modify system defaults, modify the audit interfaces and devices. The dxsetacl graphical interface lets users manipulate ACLs on system objects.

9.9.5    Division of Privileges

The Division of Privileges (DOP) feature provides role-based privilege management. System administrators can use the DOP configuration utility, dopconfig, to assign users or groups the privilege to execute a set of actions that would usually be reserved for root.