SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
TOMOYO Linux for Secure Embedded

         Toshiharu Harada
       haradats@nttdata.co.jp
    NTT DATA CORPORATION

         February 24, 2008
TOMOYO Linux for Secure Embedded




     JFYI
     This slide has been under control of Subversion.
     The version you are viewing is
     $Id: tomoyo.tex 71 2008-03-07 10:06:22Z haradats $

     The latest and a better version is
     http://sourceforge.jp/projects/tomoyo/document/fosdem2008.pdf.

     Visit the elinux Wiki for general information of
     TOMOYO Linux
     http://elinux.org/TomoyoLinux.




2008-2-24 FOSDEM’08 Embedded Track                                    1
TOMOYO Linux for Secure Embedded


     About
     This slide
     . . . was prepared for the presentation of TOMOYO Linux at
     the FOSDEM’08 Embedded Track.
     Toshiharu Harada <haradats@nttdata.co.jp>
     . . . is project manager of TOMOYO Linux and the
     author/speaker/contact person of the program.
     NTT DATA CORPORATION
     . . . is the largest SI company in Japan and has been supporting
     the project.
     http://www.nttdata.co.jp/en/index.html.


2008-2-24 FOSDEM’08 Embedded Track                                      2
TOMOYO Linux for Secure Embedded




     Executive Summary
       • TOMOYO Linux is designed and developed to be a
         practical security enhancements to Linux 2.4 and 2.6.

       • It can be used to analyze a system as well as protection.

       • Ubuntu based LiveCD (ISO image) is available.

       • There are two different versions:
         Version 1.x non LSM, full featured.
         Version 2.x LSM compliant, for mainline inclusion.

       • Gorgeous GUI should be available soon.



2008-2-24 FOSDEM’08 Embedded Track                                   3
TOMOYO Linux for Secure Embedded




     TOMOYO Linux Security Goal
     Quotes from the message posted to LKML (Linux Kernel
     Mailing List).

         The TOMOYO Linux’s security goal is to provide
         “MAC that covers practical requirements for most
         users and keeps usable for most administrators”.
         TOMOYO Linux is not a tool for security professional
         but for average users and administrators.
     Full message can be found at
     http://lwn.net/Articles/263179/.




2008-2-24 FOSDEM’08 Embedded Track                              4
TOMOYO Linux for Secure Embedded


     What is TOMOYO Linux
       • TOMOYO Linux is a mandatory access control
         implementation to Linux 2.4 and 2.6 kernel.
       • TOMOYO Linux consists of set of kernel patch files and
         utilities. No userland modifications are needed for
         TOMOYO Linux.
       • Available packages include:
            RedHat Linux 9, Fedora Core 3-6, Fedora 7/8,
            CentOS 4.6/5.1, Debian Sarge/Etch/Lenny,
            OpenSUSE 10.1/10.2/10.3, Asianux 2.0/3.0,
            Ubuntu 6.06/6.10/7.04/7.10, Vine Linux 4.2,
            Gentoo 2007.0 and Turbolinux 10/11 Server.


2008-2-24 FOSDEM’08 Embedded Track                               5
TOMOYO Linux for Secure Embedded



     Project Official Information
       • http://elinux.org/TomoyoLinux (English)

       • http://tomoyo.sourceforge.jp/ (English and Japanese)

       • http://tomoyo.sourceforge.jp/wiki-e/ (English)

       • http://sourceforge.jp/projects/tomoyo/ (English and
         Japanese)

       • http://tomoyo.sourceforge.jp/cgi-bin/lxr/source
         (the code)

     If you have not heard of TOMOYO Linux, elinux.org Wiki word
     is the best place to start.


2008-2-24 FOSDEM’08 Embedded Track                                 6
TOMOYO Linux for Secure Embedded




     “mandatory access control”
       • often called as ‘MAC’.

       • the opposite of ‘DAC’ (Discretionary Access Control), that
         was included in good and sweet old UNIX and early days
         Linux.

       • MAC was designed to compensate the shortages of DAC.

     MAC has been ported to most modern operating systems by
     now. SELinux is an implementation of the MAC to Linux.
     Please refer TCSEC and NSA SELinux web site for more
     information.



2008-2-24 FOSDEM’08 Embedded Track                                    7
TOMOYO Linux for Secure Embedded




     Why developing another MAC while SELinux is
     available?
       • The project members were not smart enough to use
         SELinux. :-)

       • Linux is open source. So, why not? :-)




2008-2-24 FOSDEM’08 Embedded Track                          8
TOMOYO Linux for Secure Embedded




     How many MACs are there on this planet?
       • Already in-tree
          – SELinux

       • Just (2.6.25) in-tree
          – SMACK (Simplified Mandatory Access Control Kernel)

       • Want to be in-tree
          – AppArmor (formerly known as SubDomain)
          – TOMOYO Linux
          – LIDS (Linux Intrusion Detection System)



2008-2-24 FOSDEM’08 Embedded Track                              9
TOMOYO Linux for Secure Embedded




       • “Our Own Way” for some reasons
          – RSBAC
          – GRESECURITY

       • Where to find the players?
          – “Linux Weather Forecast” run by the Linux Foundation
            might help.
            http://www.linux-foundation.org/en/Linux_Weather_Forecast




2008-2-24 FOSDEM’08 Embedded Track                                 10
TOMOYO Linux for Secure Embedded




     How do they compare?
     I am trying to provide a fair and helpful chart. Comments and
     suggestions would be appreciated.
     http://tomoyo.sourceforge.jp/wiki-e/?WhatIs#comparison




2008-2-24 FOSDEM’08 Embedded Track                                   11
TOMOYO Linux for Secure Embedded




     TOMOYO Linux General Features
       1. “Policy learning mode” revolutionary enlightens the loads
          of policy management tasks.

       2. Policy definitions of TOMOYO Linux is exceptionally
          human readable and understandable.

       3. TOMOYO Linux can live with any file system (built on
          top of the VFS layer).

       4. Small footprint




2008-2-24 FOSDEM’08 Embedded Track                                    12
TOMOYO Linux for Secure Embedded




     Key Concepts
       • TOMOYO Linux limits the access by the behavior of the
         subject while SELinux limits the access by the attributes of
         the subject and object.

       • TOMOYO Linux kernel keeps track of the process
         invocation history (a.k.a. system call chains). Every
         process remembers its parent and ancestors.
          – This scheme quite well suits to the Linux’s fork/exec
            mechanism. Process invocation history information is
            copied when fork() and added the new process name
            when execve() issued.



2008-2-24 FOSDEM’08 Embedded Track                                      13
TOMOYO Linux for Secure Embedded




     Terminology
       • TOMOYO Linux Policy is composed of per DOMAIN
         access control definitions.

       • In TOMOYO Linux, DOMAINs are automatically defined
         and given names by the TOMOYO Linux kernel, no
         operations required for the administrators side.

       • Access control modes for each DOMAIN is specified by a
         number that ranges 0. . . 255. That number is called as
         PROFILE id.




2008-2-24 FOSDEM’08 Embedded Track                                 14
TOMOYO Linux for Secure Embedded




       • Administrators need to define the meaning of each
         PROFILE id in /etc/ccs/profile.conf.

       • Administrators define the entity of each PROFILE id by
         choosing the desired MAC functionality.




2008-2-24 FOSDEM’08 Embedded Track                               15
TOMOYO Linux for Secure Embedded




       • While SELinux has system wide global modes called
         “enforcing” and “permissive”, TOMOYO Linux has per
         domain four MODEs to administrate MAC behavior.
          Mode             unpermitted access       Log      domains

          0 (Disabled)     granted                           grows
          1 (Learning)     granted and learned      logged   grows
          2 (Permissive)   granted                  logged   grows
          3 (Enforcing)    rejected                 logged   unchanged
       • Learning mode is for designing a policy.

       • Permissive mode is for testing the policy.



2008-2-24 FOSDEM’08 Embedded Track                                       16
TOMOYO Linux for Secure Embedded




     Profile definitions
     Syntax
     [Profile id(0-255)]-[Directive]=[Mode]

     Example
     1-COMMENT=----- Profile #1 Defs -----
     1-MAC_FOR_FILE=1
     1-MAC_FOR_NETWORK=1
     2-COMMENT=----- Profile #2 Defs -----
     2-MAC_FOR_FILE=2
     2-MAC_FOR_NETWORK=2



2008-2-24 FOSDEM’08 Embedded Track                 17
TOMOYO Linux for Secure Embedded




     Profile Sample
     Description
     The following example defines profile number 35, “file access is
     enforced (access will be restricted) and network and signal are
     learned (access will not be restricted)”.

     Example
     35-MAC_FOR_FILE=3
     35-MAC_FOR_NETWORK=1
     35-MAC_FOR_SIGNAL=1




2008-2-24 FOSDEM’08 Embedded Track                                     18
TOMOYO Linux for Secure Embedded




     TOMOYO Linux supports MAC only for files?

     “Hell, No!”:-)
     TOMOYO Linux supports MAC for networking
     (MAC FOR NETWORK), signals (MAC FOR SIGNAL),
     capabilities (MAC FOR CAPABILITY) . . . and much much
     more.
     For the meanings of each directives, please RTFM.




2008-2-24 FOSDEM’08 Embedded Track                           19
TOMOYO Linux for Secure Embedded




     “Domain” of TOMOYO Linux
     Domain name starts from the prefix string, “<kernel>”.
     Names of the programs (issued execve()) will be appended
     sequentially with a single space character as a separator. (quite
     simple, huh?)
      <kernel> /sbin/init

      <kernel> /sbin/init /boo /bar

      <kernel> /sbin/init /foo /bar /buz




2008-2-24 FOSDEM’08 Embedded Track                                       20
TOMOYO Linux for Secure Embedded




     TOMOYO Linux ACL Example
     Captured on Ubuntu 7.10 Desktop.

     <kernel> /sbin/init
     --x /bin/dash
     rw- /dev/console
     rw- /dev/null
     r-- /etc/event.d/control-alt-delete
     r-- /etc/event.d/logd
     ...




2008-2-24 FOSDEM’08 Embedded Track                 21
TOMOYO Linux for Secure Embedded




     Policy Configuration Files
     All policy configuration files are located at /etc/ccs in plain
     text format.
       Name               File

       Domain Policy      domain policy.conf
       System Policy      system policy.conf
       Exception Policy   exception policy.conf




2008-2-24 FOSDEM’08 Embedded Track                                   22
TOMOYO Linux for Secure Embedded




     Policy Editor (CUI)
     CUI program “editpolicy” is located at /usr/lib/ccs with
     other TOMOYO Linux tools.
     editpolicy has roles of:

       1. To show the current (on memory) policy settings

       2. To modify them.

     editpolicy understands and deals with the all three
     TOMOYO Linux policy configuration files.




2008-2-24 FOSDEM’08 Embedded Track                              23
TOMOYO Linux for Secure Embedded


     Policy Editor (CUI)
     When invoked, domain policy screen will be displayed.
     Entering TAB key will change the screens.
       Screen Name        Description

       Domain Policy      Shows domain transition trees.
                          The total number of existing domains
                          will be displayed in the top of the screen.
                          Move cursor control keys to choose a domain.
       System Policy      Shows system global settings.
       Exception Policy   Shows lists of MAC access control
                          exceptions.


2008-2-24 FOSDEM’08 Embedded Track                                       24
TOMOYO Linux for Secure Embedded




     Other tools
     savepolicy
     Saves current policy settings under /etc/ccs.

     loadpolicy
     Loads policy settings to the kernel.




2008-2-24 FOSDEM’08 Embedded Track                   25
TOMOYO Linux for Secure Embedded




     TOMOYO Linux LiveCD
     Definition
     TOMOYO Linux LiveCD = Ubuntu 7.10 Desktop +
     TOMOYO Linux kernel and tools

     For what?
     Casual, safe and free trial of TOMOYO Linux.

     Where can I get one?
     http://tomoyo.sourceforge.jp/wiki-e/?TomoyoLive




2008-2-24 FOSDEM’08 Embedded Track                     26
TOMOYO Linux for Secure Embedded


     LiveCD Design Specification
     TOMOYO Linux LiveCD comes with predefined policy
     definition.

     domain policy.conf
     # cat /etc/ccs/domain_policy.conf
     <kernel>
     use_profile 1
     #
     This means, “run the <kernel> domain with profile 1”. The
     definition of profile with id 1 can be found at profile.conf.
     Since the mode for file access (MAC FOR FILE) of profile 1 is
     not enforcing, domains are created as needed.


2008-2-24 FOSDEM’08 Embedded Track                                 27
TOMOYO Linux for Secure Embedded


     profile.conf
     # head /etc/ccs/profile.conf
     1-MAC_FOR_FILE=1
     1-MAC_FOR_NETWORK=1
     1-MAC_FOR_SIGNAL=1
     ...

     Profile 1 is defined to remember access for files, networks,
     signals. . . and keeps the results on memory. Thus, TOMOYO
     Linux LiveCD allows every access (as usual Ubuntu LiveCD)
     and keeps remembering them.
     The results depend on your environment. For instance, number
     of domains and each ACL for specific domains.


2008-2-24 FOSDEM’08 Embedded Track                                  28
TOMOYO Linux for Secure Embedded




     How to use a LiveCD
       1. save and burn the ISO image.

       2. set the disc to your PC.


       3.   BOOT IT!
     Or, you can define a virtual machine that reads the saved ISO
     image.




2008-2-24 FOSDEM’08 Embedded Track                                  29
TOMOYO Linux for Secure Embedded



     What can I do with TOMOYO Linux LiveCD?
     In addition to anything you can do with Ubuntu,

       • View how Ubuntu are running on your PC by browsing
         domain transitions and ACL information obtained from
         policy learning mode.

       • Select domains and change the behavior. For instance,
         selecting a shell domain and change it from policy learning
         mode to enforcing mode.

       • Exploring what will happen if you click GNOME menus.
         (Everything including GUI and X are monitored by
         TOMOYO Linux kernel)


2008-2-24 FOSDEM’08 Embedded Track                                     30
TOMOYO Linux for Secure Embedded




       • TOMOYO Linux LiveCD can be used to install to your
         PC. Here’s the instruction.
          1. Boot from TOMOYO Linux LiveCD.
          2. Find icon named ”Install”.
          3. Click it, as usual.
          4. Follow the instruction from the LiveCD.
         This is by far the easiest way to install TOMOYO Linux.




2008-2-24 FOSDEM’08 Embedded Track                                 31
TOMOYO Linux for Secure Embedded




     Policy Editor (GUI)
     Implemented as an Eclipse plugin. Runs on both Linux and
     Windows. Communicates using SSH. No server side
     modifications needed.
     Coming soon.




2008-2-24 FOSDEM’08 Embedded Track                              32
TOMOYO Linux for Secure Embedded




     TOMOYO Linux for Secure Embedded




2008-2-24 FOSDEM’08 Embedded Track                 33
TOMOYO Linux for Secure Embedded




     Reasons to use TOMOYO Linux with Embedded
       • For use with 2.4 kernel (LSM does not support 2.4)

       • File system independent

       • Userland modifications free

       • BusyBox support

       • Small footprint




2008-2-24 FOSDEM’08 Embedded Track                            34
TOMOYO Linux for Secure Embedded




     Digging issues from LKML




2008-2-24 FOSDEM’08 Embedded Track                 35
TOMOYO Linux for Secure Embedded




     How about labels?
     Pros
       • Label is bound to inode that we can trust, so unaffected by
         renames.

     Cons
       • Needs extra resource and work for labels.

       • Inode can be changed by operations.

       • Label is defined according to pathnames. :)

     Label has clear advantages but does not solve every cases.



2008-2-24 FOSDEM’08 Embedded Track                                    36
TOMOYO Linux for Secure Embedded




     Label or Pathname?
     That’s ridiculous.
     What pathname means is a “name of the place”. Pathname is
     not bound to the attributes of the entity.

       • No one can live without pathnames.

       • Both Label and Pathname are incomplete and needs work.

       • People can easily argue.




2008-2-24 FOSDEM’08 Embedded Track                                37
TOMOYO Linux for Secure Embedded




     LABEL vs. PATHNAME argument
     Most important difference is LABEL or PATHNAME.

     label Assign ‘labels’ to the objects and judge access control
        according the label information. xattr (extended
        attributes) are used to store label information. SELinux
        and SMACK belong this.

     pathname Don’t use labels and live with traditional
        pathnames. AppArmor and TOMOYO Linux belong this.




2008-2-24 FOSDEM’08 Embedded Track                                   38
TOMOYO Linux for Secure Embedded




     Issues with pathname
     Pros
       • Pathnames are handy for restricting behavior of the
         subject.

     Cons
       • Pathnames can be easily changed by operations (mount,
         chroot, /etc/../etc/shadow, ln. . . ).




2008-2-24 FOSDEM’08 Embedded Track                               39
TOMOYO Linux for Secure Embedded



     Summary
       • TOMOYO Linux is a lightweight and usable MAC
         implementation to Linux.

       • Though it was designed for servers, it also suits embedded
         systems very well.

       • TOMOYO Linux is useful for analyzing your own Linux
         box, so it would help embedded developers.

       • We are having unclear difficulties in mainlining TOMOYO
         Linux. We promise to continue the work.

       • We will be happy if you use our work, if TOMOYO Linux
         helps you. We will be pleased to help you.


2008-2-24 FOSDEM’08 Embedded Track                                    40
TOMOYO Linux for Secure Embedded



     Project History
     March 2003 I met Tetsuo Handa and started working at a
       small building called Kayaba-cho Tower. Tetsuo has wrote
       the first version of TOMOYO Linux and is the chief
       architect of the project ever since.

     November 2005 Made the code open (GPL2)

     April 2007 First proposal posting to LKML.

     April 2007 Embedded Linux Conference 2007, ””TOMOYO
        Linux: A Lightweight and Manageable Security System for
        PC and Embedded Linux”. Thank Tim Bird for this cool
        title.


2008-2-24 FOSDEM’08 Embedded Track                                41
TOMOYO Linux for Secure Embedded



     June 2007 Ottawa Linux Symposium 2007, “TOMOYO
        Linux BoF”.

     November 2007 PacSec 2007, “TOMOYO Linux: A
        Practical Method to Understand and Protect Your Own
        Linux Box”.

     December 2007 6th proposal posting to LKML.

     February 2008 FOSDEM’08 presentation, “TOMOYO Linux
        for Secure Embedded” (U R here)

     Every slides and papers are stored at
     http://sourceforge.jp/projects/tomoyo/docman/ (choose
     the category and the language).


2008-2-24 FOSDEM’08 Embedded Track                            42
TOMOYO Linux for Secure Embedded



     Acknowledgments
     Special thanks goes to. . .

       • Linus Torvalds for creating this wonderful world of Linux.

       • Donald E. Knuth for bringing the world TEX and letting us
         to know the joy of writing.

       • Bill Joy for creating “the editor”, “vi”. It’s part of
         myself.

       • Staff of SourceForge.jp (http://sourceforge.jp/) for
         their continuous supports and hosting.

       • NTT DATA CORPORATION for supporting the project.


2008-2-24 FOSDEM’08 Embedded Track                                    43
TOMOYO Linux for Secure Embedded




       • Jack Bauer and the staff of Twenty Four series. They
         taught me what the brave is.

       • My family for their patience and forgiveness. Also, my dog,
         Wish for taking me to a walk everyday and not biting me
         so often as before.




2008-2-24 FOSDEM’08 Embedded Track                                     44
TOMOYO Linux for Secure Embedded




     Thanks!
     We will see you at ELC2008 and OLS2008.
     Toshiharu Harada <haradats@nttdata.co.jp>
     Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp>
     Kentaro Takeda <takedakn@nttdata.co.jp>




2008-2-24 FOSDEM’08 Embedded Track                       45
TOMOYO Linux for Secure Embedded




2008-2-24 FOSDEM’08 Embedded Track                 46

Contenu connexe

Tendances

LCA14: LCA14-105: UEFI secure boot
LCA14: LCA14-105: UEFI secure bootLCA14: LCA14-105: UEFI secure boot
LCA14: LCA14-105: UEFI secure bootLinaro
 
Have You Driven an SELinux Lately? - An Update on the SELinux Project - OLS ...
Have You Driven an SELinux Lately? - An Update on the SELinux Project -  OLS ...Have You Driven an SELinux Lately? - An Update on the SELinux Project -  OLS ...
Have You Driven an SELinux Lately? - An Update on the SELinux Project - OLS ...James Morris
 
Linux Device Driver Introduction
Linux Device Driver IntroductionLinux Device Driver Introduction
Linux Device Driver IntroductionDavidChen0513
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
Protected Process Light will be Protected – MemoryRanger Fills the Gap Again
Protected Process Light will be Protected – MemoryRanger Fills the Gap AgainProtected Process Light will be Protected – MemoryRanger Fills the Gap Again
Protected Process Light will be Protected – MemoryRanger Fills the Gap AgainIgor Korkin
 
UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating SystemFatima Qayyum
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011Aravindan Arun
 
Unix lecture1
Unix lecture1Unix lecture1
Unix lecture1dolleyj
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating SystemShivam Pandey
 

Tendances (20)

Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
 
Rovnix
RovnixRovnix
Rovnix
 
LCA14: LCA14-105: UEFI secure boot
LCA14: LCA14-105: UEFI secure bootLCA14: LCA14-105: UEFI secure boot
LCA14: LCA14-105: UEFI secure boot
 
Have You Driven an SELinux Lately? - An Update on the SELinux Project - OLS ...
Have You Driven an SELinux Lately? - An Update on the SELinux Project -  OLS ...Have You Driven an SELinux Lately? - An Update on the SELinux Project -  OLS ...
Have You Driven an SELinux Lately? - An Update on the SELinux Project - OLS ...
 
Microsoft windows
Microsoft windowsMicrosoft windows
Microsoft windows
 
Linux Device Driver Introduction
Linux Device Driver IntroductionLinux Device Driver Introduction
Linux Device Driver Introduction
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
Unix Training - 1
Unix Training - 1Unix Training - 1
Unix Training - 1
 
Protected Process Light will be Protected – MemoryRanger Fills the Gap Again
Protected Process Light will be Protected – MemoryRanger Fills the Gap AgainProtected Process Light will be Protected – MemoryRanger Fills the Gap Again
Protected Process Light will be Protected – MemoryRanger Fills the Gap Again
 
UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
 
Defense
DefenseDefense
Defense
 
Linux introduction Class 02
Linux introduction Class 02Linux introduction Class 02
Linux introduction Class 02
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011
 
Unix lecture1
Unix lecture1Unix lecture1
Unix lecture1
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Unix seminar
Unix seminarUnix seminar
Unix seminar
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 

En vedette

En vedette (6)

TOMOYO Linux on Android (Taipei, 2009)
TOMOYO Linux on Android (Taipei, 2009)TOMOYO Linux on Android (Taipei, 2009)
TOMOYO Linux on Android (Taipei, 2009)
 
TOMOYO Linux on Android
TOMOYO Linux on AndroidTOMOYO Linux on Android
TOMOYO Linux on Android
 
Job's 2005 Stanford Speech Translation Kit
Job's 2005 Stanford Speech Translation KitJob's 2005 Stanford Speech Translation Kit
Job's 2005 Stanford Speech Translation Kit
 
Dallo scatto al volantino
Dallo scatto al volantinoDallo scatto al volantino
Dallo scatto al volantino
 
’You’ve got to find what you love,’ Jobs says
’You’ve got to find what you love,’ Jobs says’You’ve got to find what you love,’ Jobs says
’You’ve got to find what you love,’ Jobs says
 
20090703 tomoyo thankyou
20090703 tomoyo thankyou20090703 tomoyo thankyou
20090703 tomoyo thankyou
 

Similaire à FOSDEM'08: TOMOYO Linux for Secure Embedded

PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...
PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...
PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...Toshiharu Harada, Ph.D
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)Security Bootcamp
 
Moby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at Kiratech
Moby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at KiratechMoby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at Kiratech
Moby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at KiratechKiratech
 
MR201406 A Re-introduction to SELinux
MR201406 A Re-introduction to SELinuxMR201406 A Re-introduction to SELinux
MR201406 A Re-introduction to SELinuxFFRI, Inc.
 
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsLinux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsJames Morris
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Toshiharu Harada, Ph.D
 
Hack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingHack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingTom Keetch
 
Introduction to OpenBricks: an Embedded Linux Framework
Introduction to OpenBricks: an Embedded Linux FrameworkIntroduction to OpenBricks: an Embedded Linux Framework
Introduction to OpenBricks: an Embedded Linux FrameworkBenjamin Zores
 
Minicom linux hyperterminal
Minicom linux hyperterminal Minicom linux hyperterminal
Minicom linux hyperterminal Charuta Sumant
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@nightjtimberman
 
Containerday17 Moby-linuxkit-DockerCon-2017-announcements
Containerday17 Moby-linuxkit-DockerCon-2017-announcementsContainerday17 Moby-linuxkit-DockerCon-2017-announcements
Containerday17 Moby-linuxkit-DockerCon-2017-announcementsKiratech
 
FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...
FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...
FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...Akihiro Suda
 
Open comrtos formally_developed _rtos_for_heterogeneous_systems
Open comrtos formally_developed _rtos_for_heterogeneous_systemsOpen comrtos formally_developed _rtos_for_heterogeneous_systems
Open comrtos formally_developed _rtos_for_heterogeneous_systemsEric Verhulst
 
8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systemsHuma Tariq
 
BKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFIBKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFILinaro
 
Bkk16 309B Enterprise Firmware - The gold standard and how to get there
Bkk16 309B Enterprise Firmware - The gold standard and how to get thereBkk16 309B Enterprise Firmware - The gold standard and how to get there
Bkk16 309B Enterprise Firmware - The gold standard and how to get thereLinaro
 
Lesson 02 operating system
Lesson 02   operating systemLesson 02   operating system
Lesson 02 operating systemRodz Tech
 

Similaire à FOSDEM'08: TOMOYO Linux for Secure Embedded (20)

PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...
PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...
PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your O...
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 
Moby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at Kiratech
Moby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at KiratechMoby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at Kiratech
Moby and linux kit, what to expect - Lorenzo Fontana, DevOps Expert at Kiratech
 
How We Protected Our Router
How We Protected Our RouterHow We Protected Our Router
How We Protected Our Router
 
MR201406 A Re-introduction to SELinux
MR201406 A Re-introduction to SELinuxMR201406 A Re-introduction to SELinux
MR201406 A Re-introduction to SELinux
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsLinux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
 
Hack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingHack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical Sandboxing
 
Introduction to OpenBricks: an Embedded Linux Framework
Introduction to OpenBricks: an Embedded Linux FrameworkIntroduction to OpenBricks: an Embedded Linux Framework
Introduction to OpenBricks: an Embedded Linux Framework
 
Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linux
 
Minicom linux hyperterminal
Minicom linux hyperterminal Minicom linux hyperterminal
Minicom linux hyperterminal
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@night
 
Containerday17 Moby-linuxkit-DockerCon-2017-announcements
Containerday17 Moby-linuxkit-DockerCon-2017-announcementsContainerday17 Moby-linuxkit-DockerCon-2017-announcements
Containerday17 Moby-linuxkit-DockerCon-2017-announcements
 
FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...
FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...
FILEgrain: Transport-Agnostic, Fine-Grained Content-Addressable Container Ima...
 
Open comrtos formally_developed _rtos_for_heterogeneous_systems
Open comrtos formally_developed _rtos_for_heterogeneous_systemsOpen comrtos formally_developed _rtos_for_heterogeneous_systems
Open comrtos formally_developed _rtos_for_heterogeneous_systems
 
8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systems
 
BKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFIBKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFI
 
Bkk16 309B Enterprise Firmware - The gold standard and how to get there
Bkk16 309B Enterprise Firmware - The gold standard and how to get thereBkk16 309B Enterprise Firmware - The gold standard and how to get there
Bkk16 309B Enterprise Firmware - The gold standard and how to get there
 
Lesson 02 operating system
Lesson 02   operating systemLesson 02   operating system
Lesson 02 operating system
 

Plus de Toshiharu Harada, Ph.D

CaitSith 新しいルールベースのカーネル内アクセス制御
CaitSith 新しいルールベースのカーネル内アクセス制御CaitSith 新しいルールベースのカーネル内アクセス制御
CaitSith 新しいルールベースのカーネル内アクセス制御Toshiharu Harada, Ph.D
 
The role of "pathname based access control" in security"
The role of "pathname based access control" in security"The role of "pathname based access control" in security"
The role of "pathname based access control" in security"Toshiharu Harada, Ph.D
 
振る舞いに基づくSSHブルートフォースアタック対策
振る舞いに基づくSSHブルートフォースアタック対策振る舞いに基づくSSHブルートフォースアタック対策
振る舞いに基づくSSHブルートフォースアタック対策Toshiharu Harada, Ph.D
 
僕より少し遅く生まれてきた君たちへ
僕より少し遅く生まれてきた君たちへ僕より少し遅く生まれてきた君たちへ
僕より少し遅く生まれてきた君たちへToshiharu Harada, Ph.D
 
20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」
20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」
20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」Toshiharu Harada, Ph.D
 
20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」
20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」
20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」Toshiharu Harada, Ph.D
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Toshiharu Harada, Ph.D
 
プロセス実行履歴に基づくアクセスポリシー自動生成システム
プロセス実行履歴に基づくアクセスポリシー自動生成システムプロセス実行履歴に基づくアクセスポリシー自動生成システム
プロセス実行履歴に基づくアクセスポリシー自動生成システムToshiharu Harada, Ph.D
 
使いこなせて安全なLinuxを目指して
使いこなせて安全なLinuxを目指して使いこなせて安全なLinuxを目指して
使いこなせて安全なLinuxを目指してToshiharu Harada, Ph.D
 
Linuxセキュリティ強化エッセンシャル
Linuxセキュリティ強化エッセンシャルLinuxセキュリティ強化エッセンシャル
Linuxセキュリティ強化エッセンシャルToshiharu Harada, Ph.D
 
闘うITエンジニアのためのLinuxセキュリティ講座
闘うITエンジニアのためのLinuxセキュリティ講座闘うITエンジニアのためのLinuxセキュリティ講座
闘うITエンジニアのためのLinuxセキュリティ講座Toshiharu Harada, Ph.D
 

Plus de Toshiharu Harada, Ph.D (20)

CaitSith 新しいルールベースのカーネル内アクセス制御
CaitSith 新しいルールベースのカーネル内アクセス制御CaitSith 新しいルールベースのカーネル内アクセス制御
CaitSith 新しいルールベースのカーネル内アクセス制御
 
TOMOYO Linuxのご紹介
TOMOYO Linuxのご紹介TOMOYO Linuxのご紹介
TOMOYO Linuxのご紹介
 
LSM Leaks
LSM LeaksLSM Leaks
LSM Leaks
 
The role of "pathname based access control" in security"
The role of "pathname based access control" in security"The role of "pathname based access control" in security"
The role of "pathname based access control" in security"
 
Tomoyo linux introduction
Tomoyo linux introductionTomoyo linux introduction
Tomoyo linux introduction
 
Your First Guide to "secure Linux"
Your First Guide to "secure Linux"Your First Guide to "secure Linux"
Your First Guide to "secure Linux"
 
振る舞いに基づくSSHブルートフォースアタック対策
振る舞いに基づくSSHブルートフォースアタック対策振る舞いに基づくSSHブルートフォースアタック対策
振る舞いに基づくSSHブルートフォースアタック対策
 
僕より少し遅く生まれてきた君たちへ
僕より少し遅く生まれてきた君たちへ僕より少し遅く生まれてきた君たちへ
僕より少し遅く生まれてきた君たちへ
 
Why TOMOYO Linux?
Why TOMOYO Linux?Why TOMOYO Linux?
Why TOMOYO Linux?
 
Deep inside TOMOYO Linux
Deep inside TOMOYO LinuxDeep inside TOMOYO Linux
Deep inside TOMOYO Linux
 
ComSys2009
ComSys2009ComSys2009
ComSys2009
 
20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」
20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」
20031030 「読み込み専用マウントによる改ざん防止Linuxサーバの構築」
 
20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」
20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」
20031020 「プロセス実行履歴に基づくアクセスポリシー自動生成システム」
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
 
プロセス実行履歴に基づくアクセスポリシー自動生成システム
プロセス実行履歴に基づくアクセスポリシー自動生成システムプロセス実行履歴に基づくアクセスポリシー自動生成システム
プロセス実行履歴に基づくアクセスポリシー自動生成システム
 
TOMOYO Linux
TOMOYO LinuxTOMOYO Linux
TOMOYO Linux
 
使いこなせて安全なLinuxを目指して
使いこなせて安全なLinuxを目指して使いこなせて安全なLinuxを目指して
使いこなせて安全なLinuxを目指して
 
TOMOYO Linuxへの道
TOMOYO Linuxへの道TOMOYO Linuxへの道
TOMOYO Linuxへの道
 
Linuxセキュリティ強化エッセンシャル
Linuxセキュリティ強化エッセンシャルLinuxセキュリティ強化エッセンシャル
Linuxセキュリティ強化エッセンシャル
 
闘うITエンジニアのためのLinuxセキュリティ講座
闘うITエンジニアのためのLinuxセキュリティ講座闘うITエンジニアのためのLinuxセキュリティ講座
闘うITエンジニアのためのLinuxセキュリティ講座
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

FOSDEM'08: TOMOYO Linux for Secure Embedded

  • 1. TOMOYO Linux for Secure Embedded Toshiharu Harada haradats@nttdata.co.jp NTT DATA CORPORATION February 24, 2008
  • 2. TOMOYO Linux for Secure Embedded JFYI This slide has been under control of Subversion. The version you are viewing is $Id: tomoyo.tex 71 2008-03-07 10:06:22Z haradats $ The latest and a better version is http://sourceforge.jp/projects/tomoyo/document/fosdem2008.pdf. Visit the elinux Wiki for general information of TOMOYO Linux http://elinux.org/TomoyoLinux. 2008-2-24 FOSDEM’08 Embedded Track 1
  • 3. TOMOYO Linux for Secure Embedded About This slide . . . was prepared for the presentation of TOMOYO Linux at the FOSDEM’08 Embedded Track. Toshiharu Harada <haradats@nttdata.co.jp> . . . is project manager of TOMOYO Linux and the author/speaker/contact person of the program. NTT DATA CORPORATION . . . is the largest SI company in Japan and has been supporting the project. http://www.nttdata.co.jp/en/index.html. 2008-2-24 FOSDEM’08 Embedded Track 2
  • 4. TOMOYO Linux for Secure Embedded Executive Summary • TOMOYO Linux is designed and developed to be a practical security enhancements to Linux 2.4 and 2.6. • It can be used to analyze a system as well as protection. • Ubuntu based LiveCD (ISO image) is available. • There are two different versions: Version 1.x non LSM, full featured. Version 2.x LSM compliant, for mainline inclusion. • Gorgeous GUI should be available soon. 2008-2-24 FOSDEM’08 Embedded Track 3
  • 5. TOMOYO Linux for Secure Embedded TOMOYO Linux Security Goal Quotes from the message posted to LKML (Linux Kernel Mailing List). The TOMOYO Linux’s security goal is to provide “MAC that covers practical requirements for most users and keeps usable for most administrators”. TOMOYO Linux is not a tool for security professional but for average users and administrators. Full message can be found at http://lwn.net/Articles/263179/. 2008-2-24 FOSDEM’08 Embedded Track 4
  • 6. TOMOYO Linux for Secure Embedded What is TOMOYO Linux • TOMOYO Linux is a mandatory access control implementation to Linux 2.4 and 2.6 kernel. • TOMOYO Linux consists of set of kernel patch files and utilities. No userland modifications are needed for TOMOYO Linux. • Available packages include: RedHat Linux 9, Fedora Core 3-6, Fedora 7/8, CentOS 4.6/5.1, Debian Sarge/Etch/Lenny, OpenSUSE 10.1/10.2/10.3, Asianux 2.0/3.0, Ubuntu 6.06/6.10/7.04/7.10, Vine Linux 4.2, Gentoo 2007.0 and Turbolinux 10/11 Server. 2008-2-24 FOSDEM’08 Embedded Track 5
  • 7. TOMOYO Linux for Secure Embedded Project Official Information • http://elinux.org/TomoyoLinux (English) • http://tomoyo.sourceforge.jp/ (English and Japanese) • http://tomoyo.sourceforge.jp/wiki-e/ (English) • http://sourceforge.jp/projects/tomoyo/ (English and Japanese) • http://tomoyo.sourceforge.jp/cgi-bin/lxr/source (the code) If you have not heard of TOMOYO Linux, elinux.org Wiki word is the best place to start. 2008-2-24 FOSDEM’08 Embedded Track 6
  • 8. TOMOYO Linux for Secure Embedded “mandatory access control” • often called as ‘MAC’. • the opposite of ‘DAC’ (Discretionary Access Control), that was included in good and sweet old UNIX and early days Linux. • MAC was designed to compensate the shortages of DAC. MAC has been ported to most modern operating systems by now. SELinux is an implementation of the MAC to Linux. Please refer TCSEC and NSA SELinux web site for more information. 2008-2-24 FOSDEM’08 Embedded Track 7
  • 9. TOMOYO Linux for Secure Embedded Why developing another MAC while SELinux is available? • The project members were not smart enough to use SELinux. :-) • Linux is open source. So, why not? :-) 2008-2-24 FOSDEM’08 Embedded Track 8
  • 10. TOMOYO Linux for Secure Embedded How many MACs are there on this planet? • Already in-tree – SELinux • Just (2.6.25) in-tree – SMACK (Simplified Mandatory Access Control Kernel) • Want to be in-tree – AppArmor (formerly known as SubDomain) – TOMOYO Linux – LIDS (Linux Intrusion Detection System) 2008-2-24 FOSDEM’08 Embedded Track 9
  • 11. TOMOYO Linux for Secure Embedded • “Our Own Way” for some reasons – RSBAC – GRESECURITY • Where to find the players? – “Linux Weather Forecast” run by the Linux Foundation might help. http://www.linux-foundation.org/en/Linux_Weather_Forecast 2008-2-24 FOSDEM’08 Embedded Track 10
  • 12. TOMOYO Linux for Secure Embedded How do they compare? I am trying to provide a fair and helpful chart. Comments and suggestions would be appreciated. http://tomoyo.sourceforge.jp/wiki-e/?WhatIs#comparison 2008-2-24 FOSDEM’08 Embedded Track 11
  • 13. TOMOYO Linux for Secure Embedded TOMOYO Linux General Features 1. “Policy learning mode” revolutionary enlightens the loads of policy management tasks. 2. Policy definitions of TOMOYO Linux is exceptionally human readable and understandable. 3. TOMOYO Linux can live with any file system (built on top of the VFS layer). 4. Small footprint 2008-2-24 FOSDEM’08 Embedded Track 12
  • 14. TOMOYO Linux for Secure Embedded Key Concepts • TOMOYO Linux limits the access by the behavior of the subject while SELinux limits the access by the attributes of the subject and object. • TOMOYO Linux kernel keeps track of the process invocation history (a.k.a. system call chains). Every process remembers its parent and ancestors. – This scheme quite well suits to the Linux’s fork/exec mechanism. Process invocation history information is copied when fork() and added the new process name when execve() issued. 2008-2-24 FOSDEM’08 Embedded Track 13
  • 15. TOMOYO Linux for Secure Embedded Terminology • TOMOYO Linux Policy is composed of per DOMAIN access control definitions. • In TOMOYO Linux, DOMAINs are automatically defined and given names by the TOMOYO Linux kernel, no operations required for the administrators side. • Access control modes for each DOMAIN is specified by a number that ranges 0. . . 255. That number is called as PROFILE id. 2008-2-24 FOSDEM’08 Embedded Track 14
  • 16. TOMOYO Linux for Secure Embedded • Administrators need to define the meaning of each PROFILE id in /etc/ccs/profile.conf. • Administrators define the entity of each PROFILE id by choosing the desired MAC functionality. 2008-2-24 FOSDEM’08 Embedded Track 15
  • 17. TOMOYO Linux for Secure Embedded • While SELinux has system wide global modes called “enforcing” and “permissive”, TOMOYO Linux has per domain four MODEs to administrate MAC behavior. Mode unpermitted access Log domains 0 (Disabled) granted grows 1 (Learning) granted and learned logged grows 2 (Permissive) granted logged grows 3 (Enforcing) rejected logged unchanged • Learning mode is for designing a policy. • Permissive mode is for testing the policy. 2008-2-24 FOSDEM’08 Embedded Track 16
  • 18. TOMOYO Linux for Secure Embedded Profile definitions Syntax [Profile id(0-255)]-[Directive]=[Mode] Example 1-COMMENT=----- Profile #1 Defs ----- 1-MAC_FOR_FILE=1 1-MAC_FOR_NETWORK=1 2-COMMENT=----- Profile #2 Defs ----- 2-MAC_FOR_FILE=2 2-MAC_FOR_NETWORK=2 2008-2-24 FOSDEM’08 Embedded Track 17
  • 19. TOMOYO Linux for Secure Embedded Profile Sample Description The following example defines profile number 35, “file access is enforced (access will be restricted) and network and signal are learned (access will not be restricted)”. Example 35-MAC_FOR_FILE=3 35-MAC_FOR_NETWORK=1 35-MAC_FOR_SIGNAL=1 2008-2-24 FOSDEM’08 Embedded Track 18
  • 20. TOMOYO Linux for Secure Embedded TOMOYO Linux supports MAC only for files? “Hell, No!”:-) TOMOYO Linux supports MAC for networking (MAC FOR NETWORK), signals (MAC FOR SIGNAL), capabilities (MAC FOR CAPABILITY) . . . and much much more. For the meanings of each directives, please RTFM. 2008-2-24 FOSDEM’08 Embedded Track 19
  • 21. TOMOYO Linux for Secure Embedded “Domain” of TOMOYO Linux Domain name starts from the prefix string, “<kernel>”. Names of the programs (issued execve()) will be appended sequentially with a single space character as a separator. (quite simple, huh?) <kernel> /sbin/init <kernel> /sbin/init /boo /bar <kernel> /sbin/init /foo /bar /buz 2008-2-24 FOSDEM’08 Embedded Track 20
  • 22. TOMOYO Linux for Secure Embedded TOMOYO Linux ACL Example Captured on Ubuntu 7.10 Desktop. <kernel> /sbin/init --x /bin/dash rw- /dev/console rw- /dev/null r-- /etc/event.d/control-alt-delete r-- /etc/event.d/logd ... 2008-2-24 FOSDEM’08 Embedded Track 21
  • 23. TOMOYO Linux for Secure Embedded Policy Configuration Files All policy configuration files are located at /etc/ccs in plain text format. Name File Domain Policy domain policy.conf System Policy system policy.conf Exception Policy exception policy.conf 2008-2-24 FOSDEM’08 Embedded Track 22
  • 24. TOMOYO Linux for Secure Embedded Policy Editor (CUI) CUI program “editpolicy” is located at /usr/lib/ccs with other TOMOYO Linux tools. editpolicy has roles of: 1. To show the current (on memory) policy settings 2. To modify them. editpolicy understands and deals with the all three TOMOYO Linux policy configuration files. 2008-2-24 FOSDEM’08 Embedded Track 23
  • 25. TOMOYO Linux for Secure Embedded Policy Editor (CUI) When invoked, domain policy screen will be displayed. Entering TAB key will change the screens. Screen Name Description Domain Policy Shows domain transition trees. The total number of existing domains will be displayed in the top of the screen. Move cursor control keys to choose a domain. System Policy Shows system global settings. Exception Policy Shows lists of MAC access control exceptions. 2008-2-24 FOSDEM’08 Embedded Track 24
  • 26. TOMOYO Linux for Secure Embedded Other tools savepolicy Saves current policy settings under /etc/ccs. loadpolicy Loads policy settings to the kernel. 2008-2-24 FOSDEM’08 Embedded Track 25
  • 27. TOMOYO Linux for Secure Embedded TOMOYO Linux LiveCD Definition TOMOYO Linux LiveCD = Ubuntu 7.10 Desktop + TOMOYO Linux kernel and tools For what? Casual, safe and free trial of TOMOYO Linux. Where can I get one? http://tomoyo.sourceforge.jp/wiki-e/?TomoyoLive 2008-2-24 FOSDEM’08 Embedded Track 26
  • 28. TOMOYO Linux for Secure Embedded LiveCD Design Specification TOMOYO Linux LiveCD comes with predefined policy definition. domain policy.conf # cat /etc/ccs/domain_policy.conf <kernel> use_profile 1 # This means, “run the <kernel> domain with profile 1”. The definition of profile with id 1 can be found at profile.conf. Since the mode for file access (MAC FOR FILE) of profile 1 is not enforcing, domains are created as needed. 2008-2-24 FOSDEM’08 Embedded Track 27
  • 29. TOMOYO Linux for Secure Embedded profile.conf # head /etc/ccs/profile.conf 1-MAC_FOR_FILE=1 1-MAC_FOR_NETWORK=1 1-MAC_FOR_SIGNAL=1 ... Profile 1 is defined to remember access for files, networks, signals. . . and keeps the results on memory. Thus, TOMOYO Linux LiveCD allows every access (as usual Ubuntu LiveCD) and keeps remembering them. The results depend on your environment. For instance, number of domains and each ACL for specific domains. 2008-2-24 FOSDEM’08 Embedded Track 28
  • 30. TOMOYO Linux for Secure Embedded How to use a LiveCD 1. save and burn the ISO image. 2. set the disc to your PC. 3. BOOT IT! Or, you can define a virtual machine that reads the saved ISO image. 2008-2-24 FOSDEM’08 Embedded Track 29
  • 31. TOMOYO Linux for Secure Embedded What can I do with TOMOYO Linux LiveCD? In addition to anything you can do with Ubuntu, • View how Ubuntu are running on your PC by browsing domain transitions and ACL information obtained from policy learning mode. • Select domains and change the behavior. For instance, selecting a shell domain and change it from policy learning mode to enforcing mode. • Exploring what will happen if you click GNOME menus. (Everything including GUI and X are monitored by TOMOYO Linux kernel) 2008-2-24 FOSDEM’08 Embedded Track 30
  • 32. TOMOYO Linux for Secure Embedded • TOMOYO Linux LiveCD can be used to install to your PC. Here’s the instruction. 1. Boot from TOMOYO Linux LiveCD. 2. Find icon named ”Install”. 3. Click it, as usual. 4. Follow the instruction from the LiveCD. This is by far the easiest way to install TOMOYO Linux. 2008-2-24 FOSDEM’08 Embedded Track 31
  • 33. TOMOYO Linux for Secure Embedded Policy Editor (GUI) Implemented as an Eclipse plugin. Runs on both Linux and Windows. Communicates using SSH. No server side modifications needed. Coming soon. 2008-2-24 FOSDEM’08 Embedded Track 32
  • 34. TOMOYO Linux for Secure Embedded TOMOYO Linux for Secure Embedded 2008-2-24 FOSDEM’08 Embedded Track 33
  • 35. TOMOYO Linux for Secure Embedded Reasons to use TOMOYO Linux with Embedded • For use with 2.4 kernel (LSM does not support 2.4) • File system independent • Userland modifications free • BusyBox support • Small footprint 2008-2-24 FOSDEM’08 Embedded Track 34
  • 36. TOMOYO Linux for Secure Embedded Digging issues from LKML 2008-2-24 FOSDEM’08 Embedded Track 35
  • 37. TOMOYO Linux for Secure Embedded How about labels? Pros • Label is bound to inode that we can trust, so unaffected by renames. Cons • Needs extra resource and work for labels. • Inode can be changed by operations. • Label is defined according to pathnames. :) Label has clear advantages but does not solve every cases. 2008-2-24 FOSDEM’08 Embedded Track 36
  • 38. TOMOYO Linux for Secure Embedded Label or Pathname? That’s ridiculous. What pathname means is a “name of the place”. Pathname is not bound to the attributes of the entity. • No one can live without pathnames. • Both Label and Pathname are incomplete and needs work. • People can easily argue. 2008-2-24 FOSDEM’08 Embedded Track 37
  • 39. TOMOYO Linux for Secure Embedded LABEL vs. PATHNAME argument Most important difference is LABEL or PATHNAME. label Assign ‘labels’ to the objects and judge access control according the label information. xattr (extended attributes) are used to store label information. SELinux and SMACK belong this. pathname Don’t use labels and live with traditional pathnames. AppArmor and TOMOYO Linux belong this. 2008-2-24 FOSDEM’08 Embedded Track 38
  • 40. TOMOYO Linux for Secure Embedded Issues with pathname Pros • Pathnames are handy for restricting behavior of the subject. Cons • Pathnames can be easily changed by operations (mount, chroot, /etc/../etc/shadow, ln. . . ). 2008-2-24 FOSDEM’08 Embedded Track 39
  • 41. TOMOYO Linux for Secure Embedded Summary • TOMOYO Linux is a lightweight and usable MAC implementation to Linux. • Though it was designed for servers, it also suits embedded systems very well. • TOMOYO Linux is useful for analyzing your own Linux box, so it would help embedded developers. • We are having unclear difficulties in mainlining TOMOYO Linux. We promise to continue the work. • We will be happy if you use our work, if TOMOYO Linux helps you. We will be pleased to help you. 2008-2-24 FOSDEM’08 Embedded Track 40
  • 42. TOMOYO Linux for Secure Embedded Project History March 2003 I met Tetsuo Handa and started working at a small building called Kayaba-cho Tower. Tetsuo has wrote the first version of TOMOYO Linux and is the chief architect of the project ever since. November 2005 Made the code open (GPL2) April 2007 First proposal posting to LKML. April 2007 Embedded Linux Conference 2007, ””TOMOYO Linux: A Lightweight and Manageable Security System for PC and Embedded Linux”. Thank Tim Bird for this cool title. 2008-2-24 FOSDEM’08 Embedded Track 41
  • 43. TOMOYO Linux for Secure Embedded June 2007 Ottawa Linux Symposium 2007, “TOMOYO Linux BoF”. November 2007 PacSec 2007, “TOMOYO Linux: A Practical Method to Understand and Protect Your Own Linux Box”. December 2007 6th proposal posting to LKML. February 2008 FOSDEM’08 presentation, “TOMOYO Linux for Secure Embedded” (U R here) Every slides and papers are stored at http://sourceforge.jp/projects/tomoyo/docman/ (choose the category and the language). 2008-2-24 FOSDEM’08 Embedded Track 42
  • 44. TOMOYO Linux for Secure Embedded Acknowledgments Special thanks goes to. . . • Linus Torvalds for creating this wonderful world of Linux. • Donald E. Knuth for bringing the world TEX and letting us to know the joy of writing. • Bill Joy for creating “the editor”, “vi”. It’s part of myself. • Staff of SourceForge.jp (http://sourceforge.jp/) for their continuous supports and hosting. • NTT DATA CORPORATION for supporting the project. 2008-2-24 FOSDEM’08 Embedded Track 43
  • 45. TOMOYO Linux for Secure Embedded • Jack Bauer and the staff of Twenty Four series. They taught me what the brave is. • My family for their patience and forgiveness. Also, my dog, Wish for taking me to a walk everyday and not biting me so often as before. 2008-2-24 FOSDEM’08 Embedded Track 44
  • 46. TOMOYO Linux for Secure Embedded Thanks! We will see you at ELC2008 and OLS2008. Toshiharu Harada <haradats@nttdata.co.jp> Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp> Kentaro Takeda <takedakn@nttdata.co.jp> 2008-2-24 FOSDEM’08 Embedded Track 45
  • 47. TOMOYO Linux for Secure Embedded 2008-2-24 FOSDEM’08 Embedded Track 46