天无二日指什么生肖| 垂体是什么意思| 夏天适合喝什么汤| 心肌炎是什么| 左肾结石的症状是什么| 女人吃猪肝有什么好处| 女性支原体感染有什么症状| 寒门什么意思| 吃生洋葱有什么好处| 强的松是什么药| 膝关节咔咔响是什么原因| 续弦是什么意思| 栀子花什么时候修剪| 月经提前来是什么原因| 指甲白色是什么原因| 胸腔疼痛是什么原因| 梦见李子是什么意思| outlets是什么意思| 脾肾阳虚吃什么药| 白内障吃什么药| 弱肉强食什么意思| 男鼠配什么生肖最好| 肚子里的蛔虫是什么意思| 字母圈什么意思| 穹窿是什么意思| 韭菜苔炒什么好吃| oz是什么意思| 吃大蒜有什么好处| 净高是什么意思| 太监是什么| cap医学上是什么意思| 什么是菩提心| 梦见狗咬别人是什么意思| 拉杆箱什么材质的好| 什么吞什么咽| 什么是碱性食物| 扁桃体为什么会发炎| 淋巴滤泡增生吃什么药| aa是什么意思| 黄瓜不能和什么一起吃| 暴力倾向的人有什么表现| 胆汁为什么会反流到胃里面| 吃什么盐比较好有利于健康| 牙疳是什么意思| 尿酸高中医叫什么病| 脾胃虚寒吃什么中成药| 牙疼吃什么食物能缓解| 蓝色的猫是什么品种| 念珠菌感染用什么药| 内向的人适合什么职业| 一个月大的小狗吃什么| 流感为什么晚上会比白天严重| 眼角痒是什么原因| 金银花洗澡对婴儿有什么好处| 为什么光吃不拉大便| 1935年属什么生肖属相| 羊蛋是什么部位| 弟弟的孩子叫姐姐什么| 四两拨千斤是什么意思| 一什么森林| 晚上老是做梦是什么原因| zn是什么意思| 华侨是什么| 广西有什么水果| 金牛座女和什么座最配对| 幼儿急疹是什么原因引起的| 什么叫肝功能不全| 木丹念什么| ti是什么元素| 同型半胱氨酸是什么| 喉结是什么| 属蛇的和什么属相最配| 交尾是什么意思| 湿气重吃什么调理| 肺大泡是什么病| 眼珠子发黄是什么原因| 鼻咽癌有什么症状| 八仙过海指什么生肖| 脉弦是什么意思和症状| 牙龈为什么会萎缩| 少阳是什么意思| 同房出血是什么原因造成的| ipa啤酒是指什么| 长期熬夜会得什么病| 什么什么的阳光| 樱桃什么季节成熟| 什么是医院感染| 什么是空调病| 知了喜欢吃什么| 总想喝水是什么原因| 为什么空调外机会滴水| 垂体瘤是什么病| 二氧化碳低是什么原因| 群星是什么意思| 红脸代表什么| 6月12号是什么星座| 男人脚底有痣代表什么| 慢性浅表性胃炎伴糜烂吃什么药| 肋软骨炎挂什么科| 今年83岁属什么生肖| 辟邪剑谱和葵花宝典有什么关系| 寄居蟹喜欢吃什么| 感冒了吃什么饭菜合适| 平衡是什么意思| 口干口苦口臭是什么原因引起的| 木瓜是什么季节的水果| 什么是埋线减肥| 尿道发炎吃什么药| 经常头晕是什么原因| 小孩上吐下泻吃什么药| 火车代表什么生肖| winner是什么意思| 排卵期什么症状和反应| 世界上最大的哺乳动物是什么| ig是什么意思| 一直发烧不退是什么原因| 舌头干燥吃什么药| 电饭煲煮粥为什么会溢出来| 视网膜脱落是什么原因引起的| 非萎缩性胃炎伴糜烂吃什么药| 冰箱什么品牌好| 1997年属什么| 吊客是什么意思| 手足口挂什么科| 中医考证需要什么条件| 莞尔是什么意思| 生的反义词是什么| 蒸鱼豉油可以用什么代替| 迎春花什么时候开| 贯众是什么植物| 神经性皮炎用什么药最好| 刮痧红色说明什么原因| 结节钙化是什么意思| 胃疼发烧是什么原因| 牙龈肿胀吃什么药| 酮体是什么| 后背疼挂什么科| 皮肤黄适合穿什么颜色的衣服| 胃炎吃什么中成药效果好| 晚上七点是什么时辰| 松茸是什么东西| 暗房是什么意思| 什么是阳痿| 桑叶泡水喝有什么好处| 熊猫属于什么科| 华丽转身是什么意思| sanag是什么牌子| 去医院检查艾滋病挂什么科| 什么东西降火| 今年什么时候过年| 白血病有什么症状| 疟原虫是什么生物| 正月十二是什么星座| 斐然是什么意思| psg是什么意思| 为什么不来大姨妈也没有怀孕| 睾酮素低了有什么症状| 秘鲁说什么语言| 什么的成长| 随意是什么意思| 连襟是什么意思| 蛋黄吃多了有什么坏处| 产检建档需要什么资料| 菱角什么时候上市| 外阴过敏用什么药| 什么水果补肾| 10年什么婚| 子宫前位什么姿势易孕| 难以启齿是什么意思| 舒化奶是什么意思| 后背凉是什么原因| other是什么意思| 脚底发麻是什么原因| 老人经常头晕是什么原因引起的| 郭靖属什么生肖| 狮子座是什么象星座| 弱水三千是什么意思| 使节是什么意思| 血糖高对身体有什么危害| 999是什么电话| 优点是什么意思| 什么食粮| 孕妇不能吃什么| 消化酶缺乏是什么症状| 梦到喝酒是什么意思| 什么叫盗汗| 说梦话是什么原因引起的| mr平扫是什么检查| 浠字五行属什么| 卵巢低回声是什么意思| 癫痫患者不能吃什么| 海凉粉是什么做的| 佟丽娅为什么离婚| 皓是什么意思| 1月16日是什么星座| 什么是三有保护动物| 茧子是什么意思| 脚麻是什么原因| 三个子字念什么| 什么姿势| 狗狗什么时候打疫苗| 牛骨煲汤搭配什么最好| 肝炎吃什么药| 宝宝胀气是什么原因引起的| 脚底烧热是什么原因| 拖鞋什么材质的好| 笔试是什么意思| 例假提前是什么原因| 盆底脱垂有什么症状| 二脚趾比大脚趾长代表什么| 爽是什么结构| 貌不惊人什么意思| 什么叫闺蜜| 平均红细胞体积偏低是什么意思| 可定是什么药| 熊人是什么意思| 宝宝吐奶是什么原因引起的| 胎毛什么时候剃最好| 补办身份证要带什么| 斛什么意思| 八段锦是什么| 红斑狼疮是一种什么病| 藕带是什么| 澳大利亚有什么动物| 八哥吃什么| 抗凝血是什么意思| 龙的三合生肖是什么| 伶字五行属什么| 灰指甲是什么原因引起| egcg是什么| 什么样的血管瘤不用治| 女性放屁多是什么原因| 癫痫病吃什么药| 韧带拉伤吃什么药| 梦到上坟是什么意思| b27是什么检查| 女人安全期是什么时候| 血沉高是什么原因引起的| 什么叫肾阴虚和肾阳虚| 重庆有什么美食| 手指关节疼痛吃什么药| 黑茶属于什么茶| 类风湿和风湿有什么区别| 舌苔发黄是什么原因| 查传染病四项挂什么科| 下眼皮跳是什么原因| 常吃黑芝麻有什么好处和坏处| 紫苏叶是什么| 抗核抗体是检查什么的| 凌晨一点半是什么时辰| 福建人喜欢吃什么| 舌头发黑是什么原因| 心直口快是什么意思| 蛇最怕什么药| 血脂高吃什么药好| cn是什么| 为什么叫印度阿三| 火同念什么| 刘禹锡是什么朝代的| 白雪什么什么| 声优是什么意思| 什么是优质碳水| 石楠花什么味道| 腺肌症不治疗会导致什么结果| 百度Jump to content

12人大群殴! 新游《The Lost Pit VR》5月上线

From Wikipedia, the free encyclopedia
百度 有英国网友发出这样的感慨:多么希望上学那时学校就有中国的数学老师!现在看见数字还是心惊肉跳。

In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a database) constrains the ability of a subject or initiator to access or modify on an object or target.[1] In the case of operating systems, the subject is a process or thread, while objects are files, directories, TCP/UDP ports, shared memory segments, or IO devices. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, the operating system kernel examines these security attributes, examines the authorization rules (aka policy) in place, and decides whether to grant access. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.

In mandatory access control, the security policy is centrally controlled by a policy administrator and is guaranteed (in principle) to be enforced for all users. Users cannot override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions or assign security attributes.

Historically and traditionally, MAC has been closely associated with multilevel security (MLS) and specialized military systems. In this context, MAC implies a high degree of rigor to satisfy the constraints of MLS systems. More recently,[when?] however, MAC has deviated out of the MLS niche and has started to become more mainstream. The more recent MAC implementations, such as SELinux and AppArmor for Linux and Mandatory Integrity Control for Windows, allow administrators to focus on issues such as network attacks and malware without the rigor or constraints of MLS.

History and background

[edit]

Historically, MAC was strongly associated with multilevel security (MLS) as a means of protecting classified information of the United States. The Trusted Computer System Evaluation Criteria (TCSEC), the seminal work on the subject and often known as the Orange Book, provided the original definition of MAC as "a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity".[2] Early implementations of MAC such as Honeywell's SCOMP, USAF's SACDIN, NSA's Blacker, and Boeing's MLS LAN focused on MLS to protect military-oriented security classification levels with robust enforcement.

The word "mandatory" in MAC has acquired a special meaning derived from its use with military systems. In this context, MAC implies an extremely high degree of robustness that assures that the control mechanisms can resist any type of subversion, thereby enabling them to enforce access controls that are mandated by the order of a government such as the Executive Order 12958. Enforcement is supposed to be more imperative than for commercial applications. This precludes enforcement by best-effort mechanisms. Only mechanisms that can provide absolute or near-absolute enforcement of the mandate are acceptable for MAC. This is a tall order and sometimes assumed unrealistic by those unfamiliar with high assurance strategies, and very difficult for those who are.

In some systems, users have the authority to decide whether to grant access to any other user. To allow that, all users have clearances for all data. This is not necessarily true of an MLS system. If individuals or processes exist that may be denied access to any of the data in the system environment, then the system must be trusted to enforce MAC. Since there can be various levels of data classification and user clearances, this implies a quantified scale for robustness. For example, more robustness is indicated for system environments containing classified "Top Secret" information and uncleared users than for one with "Secret" information and users cleared to at least "Confidential." To promote consistency and eliminate subjectivity in degrees of robustness, an extensive scientific analysis and risk assessment of the topic produced a landmark benchmark standardization quantifying security robustness capabilities of systems and mapping them to the degrees of trust warranted for various security environments. The result was documented in CSC-STD-004-85.[3] Two relatively independent components of robustness were defined: Assurance level and functionality. Both were specified with a degree of precision that warranted significant confidence in certifications based on these criteria.

The Common Criteria standard[4] is based on this science and it intended to preserve the assurance level as EAL levels and the functionality specifications as Protection Profiles. Of these two essential components of objective robustness benchmarks, only EAL levels were faithfully preserved. In one case, TCSEC level C2[5] (not a MAC-capable category) was fairly faithfully preserved in the Common Criteria, as the Controlled Access Protection Profile (CAPP).[6] MLS Protection Profiles (such as MLSOSPP similar to B2)[7] is more general than B2. They are pursuant to MLS, but lack the detailed implementation requirements of their Orange Book predecessors, focusing more on objectives. This gives certifiers more subjective flexibility in deciding whether the evaluated product’s technical features adequately achieve the objective, potentially eroding consistency of evaluated products and making it easier to attain certification for less trustworthy products. For these reasons, the importance of the technical details of the Protection Profile is critical to determining the suitability of a product.

Such an architecture prevents an authenticated user or process at a specific classification or trust-level from accessing information, processes, or devices in a different level. This provides a containment mechanism of users and processes, both known and unknown. An unknown program might comprise an untrusted application where the system should monitor or control accesses to devices and files.

A few MAC implementations, such as Unisys' Blacker project, were certified robust enough to separate Top Secret from Unclassified late in the last millennium. Their underlying technology became obsolete and they were not refreshed. Today there are no current implementations certified by TCSEC to that level of robust implementation. However, some less robust products exist.

In operating systems

[edit]

Microsoft

[edit]

Starting with Windows Vista and Server 2008, Microsoft has incorporated Mandatory Integrity Control (MIC) in the Windows operating system, which adds integrity levels (IL) to running processes. The goal is to restrict access of less trustworthy processes to sensitive info. MIC defines five integrity levels: Low, medium, high, system, and trusted installer.[8] By default, processes started at medium IL. Elevated processes receive high IL.[9] Child processes, by default, inherit their parent's integrity, although the parent process can launch them with a lower IL. For example, Internet Explorer 7 launches its subprocesses with low IL. Windows controls access to objects based on ILs. Named objects, including files, registry keys or other processes and threads, have an entry in their ACL indicating the minimum IL of the process that can use the object. MIC enforces that a process can write to or delete an object only when its IL is equal to or higher than the object’s IL. Furthermore, to prevent access to sensitive data in memory, processes can’t open processes with a higher IL for read access.[10]

Apple

[edit]

Apple Inc. has incorporated an implementation of the TrustedBSD framework in its iOS and macOS operating systems.[11] (The word "mac" in "macOS" is short for "Macintosh" and has nothing to do with the abbreviation of "mandatory access control.") The command-line function sandbox_init provides a limited high-level sandboxing interface.[12]

Google

[edit]

Version 5.0 and later of the Android operating system, developed by Google, use SELinux to enforce a MAC security model on top of its original UID-based DAC approach.[13]

Linux family

[edit]

Linux and many other Unix distributions have MAC for CPU (multi-ring), disk, and memory. While OS software may not manage privileges well, Linux became famous during the 1990s as being more secure and far more stable than non-Unix alternatives.[citation needed] The three main Linux Security Modules implementing MAC are SELinux, AppArmor, and TOMOYO Linux.[14]

Security-Enhanced Linux (SELinux) was originally developed by the NSA and released to the Open Source community in 2000.[15] It is one of the first MAC implementations for Linux and is also one of the most popular.[16] It has been incorporated into Linux kernels since v2.4, and is enabled by default on Android 5.0+ and Red Hat/Fedora. SELinux provides powerful fine-grained control which makes it suitable for high-security environments, but many users find that its power and granularity come with a high degree of complexity and a steep learning curve.[14]

TOMOYO Linux is a lightweight MAC implementation for Linux and Embedded Linux, developed by NTT Data Corporation. It has been merged in Linux Kernel mainline version 2.6.30 in June 2009.[17] Differently from the label-based approach used by SELinux, TOMOYO Linux performs a pathname-based Mandatory Access Control, separating security domains according to process invocation history, which describes the system behavior. Policy are described in terms of pathnames. A security domain is simply defined by a process call chain, and represented by a string. There are 4 modes: disabled, learning, permissive, enforcing. Administrators can assign different modes for different domains. TOMOYO Linux introduced the "learning" mode, in which the accesses occurred in the kernel are automatically analyzed and stored to generate MAC policy: this mode could then be the first step of policy writing, making it easy to customize later.

AppArmor is a MAC implementation which utilizes the Linux Security Modules (LSM) interface of Linux 2.6 and is incorporated into SUSE Linux and Ubuntu 7.10. LSM provides a kernel API that allows modules of kernel code to govern ACL (DAC ACL, access-control lists). AppArmor is not capable of restricting all programs and is optionally in the Linux kernel as of version 2.6.36.[18]

Amon Ott's RSBAC (Rule Set Based Access Control) provides a framework for Linux kernels that allows several different security policy / decision modules. One of the models implemented is Mandatory Access Control model. A general goal of RSBAC design was to try to reach (obsolete) Orange Book (TCSEC) B1 level. The model of mandatory access control used in RSBAC is mostly the same as in Unix System V/MLS, Version 1.2.1 (developed in 1989 by the National Computer Security Center of the USA with classification B1/TCSEC). RSBAC requires a set of patches to the stock kernel, which are maintained quite well by the project owner.

Smack (Simplified Mandatory Access Control Kernel) is a Linux kernel security module that protects data and process interaction from malicious manipulation using a set of custom mandatory access control rules, with simplicity as its main design goal.[19] It has been officially merged since the Linux 2.6.25 release.[20]


grsecurity is a patch for the Linux kernel providing a MAC implementation (precisely, it is an RBAC implementation). grsecurity is not implemented via the LSM API.[21]

Astra Linux OS developed for Russian Army has its own mandatory access control.[22]

Other OSes

[edit]

FreeBSD supports Mandatory Access Control, implemented as part of the TrustedBSD project. It was introduced in FreeBSD 5.0. Since FreeBSD 7.2, MAC support is enabled by default. The framework is extensible; various MAC modules implement policies such as Biba and multilevel security.

Sun's Trusted Solaris uses a mandatory and system-enforced access control mechanism (MAC), where clearances and labels are used to enforce a security policy. However note that the capability to manage labels does not imply the kernel strength to operate in multilevel security mode[citation needed]. Access to the labels and control mechanisms are not[citation needed] robustly protected from corruption in protected domain maintained by a kernel. The applications a user runs are combined with the security label at which the user works in the session. Access to information, programs and devices are only weakly controlled[citation needed].

See also

[edit]

Access control

[edit]

Other topics

[edit]

Footnotes

[edit]
  1. ^ Belim, S. V.; Belim, S. Yu. (December 2018). "Implementation of Mandatory Access Control in Distributed Systems". Automatic Control and Computer Sciences. 52 (8): 1124–1126. doi:10.3103/S0146411618080357. ISSN 0146-4116. S2CID 73725128.
  2. ^ "Trusted Computer Evaluation Criteria" (PDF). National Institute of Standards and Technology. 15 August 1983. Archived (PDF) from the original on 13 April 2023. Retrieved 25 June 2023.
  3. ^ "Technical Rational Behind CSC-STD-003-85: Computer Security Requirements". 2025-08-06. Archived from the original on July 15, 2007. Retrieved 2025-08-06.
  4. ^ "The Common Criteria Portal". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  5. ^ US Department of Defense (December 1985). "DoD 5200.28-STD: Trusted Computer System Evaluation Criteria". Retrieved 2025-08-06.
  6. ^ "Controlled Access Protection Profile, Version 1.d". National Security Agency. 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  7. ^ "Protection Profile for Multi-Level Operating Systems in Environments Requiring Medium Robustness, Version 1.22" (PDF). National Security Agency. 2025-08-06. Retrieved 2025-08-06.
  8. ^ Matthew Conover. "Analysis of the Windows Vista Security Model". Symantec Corporation. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  9. ^ Steve Riley. "Mandatory Integrity Control in Windows Vista". Retrieved 2025-08-06.
  10. ^ Mark Russinovich. "PsExec, User Account Control and Security Boundaries". Retrieved 2025-08-06.
  11. ^ TrustedBSD Project. "TrustedBSD Mandatory Access Control (MAC) Framework". Retrieved 2025-08-06.
  12. ^ "sandbox_init(3) man page". 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  13. ^ "Security-Enhanced Linux in Android". Android Open Source Project. Archived from the original on 19 June 2023. Retrieved 25 June 2023.
  14. ^ a b "Linux Security Modules Overview: SELinux, AppArmor, and TOMOYO Comparison". 2025-08-06. Retrieved 2025-08-06.
  15. ^ "National Security Agency Shares Security Enhancements to Linux". NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  16. ^ "Introduction to SELinux". 2025-08-06. Retrieved 2025-08-06.
  17. ^ "TOMOYO Linux, an alternative Mandatory Access Control". Linux 2 6 30. Linux Kernel Newbies.
  18. ^ "Linux 2.6.36 released 20 October 2010". Linux 2.6.36. Linux Kernel Newbies.
  19. ^ "Official SMACK documentation from the Linux source tree". Archived from the original on 2025-08-06.
  20. ^ Jonathan Corbet. "More stuff for 2.6.25". Archived from the original on 2025-08-06.
  21. ^ "Why doesn't grsecurity use LSM?".
  22. ^ (in Russian) Ключевые особенности Astra Linux Special Edition по реализации требований безопасности информации Archived 2025-08-06 at the Wayback Machine

References

[edit]
[edit]
  • Weblog post on the how virtualization can be used to implement Mandatory Access Control.
  • Weblog post from a Microsoft employee detailing Mandatory Integrity Control and how it differs from MAC implementations.
  • GWV Formal Security Policy Model A Separation Kernel Formal Security Policy, David Greve, Matthew Wilding, and W. Mark Vanfleet.
环移位了有什么症状 指数是什么 上面一个处下面一个日是什么字 过敏性鼻炎喝什么茶好 侮辱什么意思
炖鸡放什么材料 阴道有褐色分泌物是什么原因 每天喝柠檬水有什么好处 皮肤是什么组织 肯定是什么意思
鱼油是什么 HlV是什么 全飞秒手术是什么 大水牛是什么意思 什么叫做流年
茵芙莎属于什么档次 脚痒用什么药 宝宝益生菌什么时候吃最好 电销是什么工作 寄生虫感染吃什么药
手术后吃什么最有营养hcv9jop2ns6r.cn 沙茶酱什么味道hcv9jop2ns1r.cn 绿豆配什么打豆浆最好hcv7jop6ns9r.cn 为什么女的会流水怎么回事hcv7jop9ns9r.cn 笔仙是什么hcv8jop3ns4r.cn
什么东西补血最快hcv9jop1ns1r.cn 小舌头学名叫什么hcv7jop5ns5r.cn 喉咙发痒吃什么药hcv9jop6ns6r.cn 1942年属什么生肖hcv8jop1ns1r.cn 混油皮是什么意思hcv9jop1ns3r.cn
o型b型生的孩子是什么血型hanqikai.com 血糖高吃什么可以降下来hcv8jop4ns6r.cn 女人大把掉头发是什么原因hcv8jop4ns3r.cn 风寒吃什么药hcv8jop5ns1r.cn 补钾吃什么食物hcv9jop0ns3r.cn
宫腔积液是什么意思hcv8jop1ns9r.cn 嗜睡是什么病hcv7jop5ns2r.cn 白细胞计数偏低是什么原因hcv9jop4ns6r.cn 尿里面有血是什么原因yanzhenzixun.com 小麦和大麦有什么区别hcv7jop9ns2r.cn
百度