9    Security

This chapter looks at the security features provided by Tru64 UNIX. The first section provides a brief security overview (Section 9.1), after which the following topics are discussed:

9.1    Overview

Tru64 UNIX offers a range of security configuration options, and can be tailored to the appropriate security level of your installation. The range extends from traditional UNIX security, the default, to the optional enhanced security subsets that, when enabled, satisfy or exceed the requirements of the C2 evaluation class of DoD 5200.28-STD Trusted Computer System Evaluation Criteria (TCSEC), also known as the Orange Book.

For specific information, see the Security manual.

9.2    Identification and Authentication

Security Integration Architecture (SIA) allows a single set of identification and authentication (I and A) utilities to work in both base mode (as a nontrusted system) and in enhanced mode.

Base mode is the default and enhanced mode is available through optional security subsets. The SysMan interface can enable enhanced mode in one of two ways:

The following I&A features are provided on a system running enhanced security:

9.3    Audit System

The following audit features are provided:

When used with enhanced security, auditing includes support for a per-user audit characteristics profile with enhanced identification and authorization. The audit system is set up through SysMan or by using the audit_setup utility from the command line. Maintenance for the audit system is done from the command line or with the dxaudit GUI.

9.4    Discretionary Access Controls

Discretionary access controls (DACs) provide the capability for users to define how the resources they create can be shared. The traditional UNIX permission bits provide this capability.

Tru64 UNIX also provides optional access control lists (ACLs) for object protection at the individual user level. ACLs are supported under the UFS, NFS, and AdvFS file systems. To simplify ACL management, an ACL GUI, named dxsetacl is available in addition to the command line interface.

9.5    Security Administration

Tru64 UNIX provides system administrators with tools to ease the of use of administration of system security.

9.5.1    Configuring System Security

System administrators can select the security level for their system. The default base security level consists of object reuse and discretionary access control (DAC). System administrators can select enhanced security features and ACLs by using SysMan or by running thesecsetup utility from the command line. The audit system is configurable through SysMan or by using the audit_setup utility from the command line.

9.5.2    Windows-Based Administration Utilities

Tru64 UNIX provides four graphical utilities to deal with day-to-day security administration on the local machine:

For more information, see the dxaccounts(8X), dxsetacl(8X), dxaudit(8X), and dxdevices(8X) reference pages.

9.6    Object Reuse

Object reuse ensures that the following types of physical storage (memory or disk space) is cleared ("scrubbed."):

Examples of object reuse are disk space that is released after a file is truncated or physical memory that is released prior to reassignment to another user to read.

9.7    Protected Environment for Trusted Components

Tru64 UNIX uses hardware memory management to maintain a kernel address space for itself and to maintain separate address spaces for each instance of an executing application process. Processes may try to write to the same address space. DACs control the sharing of this address space among processes; the default is to disallow sharing.

The administrator can disable the sharing of sections as read-only address space; for example, shared libraries. Thus, the security-relevant components of the system (the trusted computing base, or TCB) are protected while they execute.

Tru64 UNIX protects the on-disk security components using discretionary access control. Attempted violations of the DAC protections can be audited so that remedial action can be taken by the system security officer.

In addition, the security components are structured into well defined, largely independent modules.

Tru64 UNIX is designed, developed, and maintained under a configuration management system that controls changes to the specifications, documentation, source code, object code, hardware, firmware, and test suites. Tools, which are also maintained under configuration control, are provided to control and automate the generation of new versions of the security components from source code and to verify that the correct versions of the source have been incorporated into the new version.

The master copies of all material used to generate the security components are protected from unauthorized modification or destruction.

9.8    Integrity Features

Tru64 UNIX provides the capability to validate the correct operation of hardware, firmware, and software security components. The firmware includes power-on diagnostics and more extensive diagnostics that optionally can be enabled. The firmware itself resides in EEPROM and can be physically write protected. It also can be compared against, or reloaded from, an offline master copy. Additional hardware diagnostics can be used also.

The firmware can require authorization to load any operating software other than the default or to execute privileged console monitor commands that examine or modify memory.

Once the operating system is loaded, administrators can run system diagnostics to validate the correct operation of the hardware and software. In addition, test suites are available to ensure the correct operation of the operating system software.

The following tools can be run automatically to detect inconsistencies in the security software and databases:

9.9    Other Security Features

The following sections describe additional security features that are integrated into the Tru64 UNIX software and separately available programs that provide addtional security features to the operating system.

9.9.1    Features Included with the Operating System

Tru64 UNIX supports features that are unavailable in other OSF-based UNIX operating systems.

9.9.1.1    The Security Integration Architecture Layer

All security mechanisms that run on the Tru64 UNIX operating system run under the Security Integration Architecture (SIA) layer. The SIA allows a suitably privileged administrator to layer various local and distributed security authentication mechanisms onto Tru64 UNIX with no modification to the security-sensitive Tru64 UNIX commands, such as login, su, and passwd. The SIA isolates the security-sensitive commands from the specific security mechanisms, thus eliminating the need to modify them for each new security mechanism.

Because of the presence of the SIA, administrators can use the secconfig command to move back and forth between the secure and nonsecure commands and utilities. The SIA also supports the following:

9.9.1.2    Network Information Service Compatibility

Tru64 UNIX provides support for accessing Network Information Service (NIS) distributed databases while running enhanced security. For example, administrators can use the ypcat passwd utility to gather information about users on the network. However, the user's encrypted password in the NIS distributed password database is not the same as the encrypted password on the secure system, which cannot be viewed by unprivileged users.

In addition, on a Tru64 UNIX system running enhanced security, NIS can be used to distribute the enhanced security protected password database.

9.9.1.3    Configuration and Setup Script

Tru64 UNIX supports the secsetup configuration and setup script, which allows you to select the security level you want to run, permits you to move back and forth between secure and nonsecure commands and utilities, and configures security at boot time, depending on the value of the SECURITY variable in the /etc/rc.config file.

9.9.1.4    Graphical User Interfaces

Tru64 UNIX provides the dxaccounts, dxaudit, and dxdevices graphical interfaces that administrators can use to create and modify user accounts, modify system defaults, modify the audit interfaces and devices. The dxsetacl graphical interface lets users manipulate ACLs on system objects.

9.9.1.5    Division of Privileges

The division of privileges (dop) utility lets a system administrator with root privileges assign access to certain classes of administrative tasks to other users or groups of users, thereby minimizing access to the powerful root account.

With the assigned privileges, users and groups can execute the selected privileged programs without knowing the root password. For example, a user granted the AccountManagement privilege can run the tasks listed under the Accounts branch of the SysMan Menu.

The dop utility is available from the command line, from the SysMan Menu, and from the CDE Application Manager.

9.9.2    Programs to Augment Tru64 UNIX Security

The following sections describe programs that are available on the Tru64 UNIX Associated Products CD-ROMS and from Compaq on the Internet.

9.9.2.1    Common Data Security Architecture

The Common Data Security Architecture (CDSA) is a multiplatform, industry-standard security infrastructure that is available for Tru64 UNIX as an advanced developers kit (ADK). It provides a standards-based, stable programming interface that applications can use to access operating system security services, allowing developers to create cross-platform, security-enabled applications.

The CDSA kit is available at the following Compaq Web site:

http://tru64unix.compaq.com/internet/download.htm

9.9.2.2    Single Sign On

Single Sign On (SSO) is an optional user authentication security feature included on a Tru64 UNIX Associated Products CD-ROM. Based on Kerberos technology, the Tru64 UNIX SSO software increases an organization's level of security and decreases user account maintenance and administration in a heterogeneous intranet.

9.9.2.3    Security Products on the Internet Express for Tru64 UNIX CD-ROM

Several security products are included on the Internet Express for Tru64 UNIX CD-ROM (see Section 1.3.7.1). Those products include a secure socket layer (SSL), the FireScreen firewall product, the RID Denial of Service Scanner, and tcpwrapper.

Other security utilities such as tripwire, wuftpd, lsof, and crack are available on the Tru64 UNIX Open Source Software Collection CD-ROM (see Section 1.2.10) or from public domain sites on the Internet.