POSIX Capabilities are a technique to manage privilege separation in the Linux Kernel, similar to traditional capabilities such as the ones used in microkernels. This approach can create a security mechanism that presents a strong and well-defined privilege separation. Whilst capabilities are a really powerful way to describe user permissions, it can be difficult to analyze the security implications behind every single configuration, making it difficult to not result in a sense of False Security and a cumbersome tuning process. Being a relatively new technology, usable tools to configure Ambient capabilities security subsystems are lacking in the industry scene. To overcome this industrial gap, we propose cado, a usable system to configure capabilities and capability environments. Focusing on usable security and scripting possibilities alongside real-world use-case scenarios, we compare it with reference implementations of similar models. We also present in great detail the attacks analyzed during the creation of the tool, and how cado makes them inapplicable by default in every installation scenario.

Berardi, D., Bassi, L., Davoli, R. (2024). Capability Ambient DO – A Usable Tool for Linux System Security. Cham : Springer [10.1007/978-3-031-68738-9_22].

Capability Ambient DO – A Usable Tool for Linux System Security

Renzo Davoli
2024

Abstract

POSIX Capabilities are a technique to manage privilege separation in the Linux Kernel, similar to traditional capabilities such as the ones used in microkernels. This approach can create a security mechanism that presents a strong and well-defined privilege separation. Whilst capabilities are a really powerful way to describe user permissions, it can be difficult to analyze the security implications behind every single configuration, making it difficult to not result in a sense of False Security and a cumbersome tuning process. Being a relatively new technology, usable tools to configure Ambient capabilities security subsystems are lacking in the industry scene. To overcome this industrial gap, we propose cado, a usable system to configure capabilities and capability environments. Focusing on usable security and scripting possibilities alongside real-world use-case scenarios, we compare it with reference implementations of similar models. We also present in great detail the attacks analyzed during the creation of the tool, and how cado makes them inapplicable by default in every installation scenario.
2024
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops: DECSoS, SASSUR, TOASTS, and WAISE,
284
295
Berardi, D., Bassi, L., Davoli, R. (2024). Capability Ambient DO – A Usable Tool for Linux System Security. Cham : Springer [10.1007/978-3-031-68738-9_22].
Berardi, Davide; Bassi, Luca; Davoli, Renzo
File in questo prodotto:
File Dimensione Formato  
Cado__Workshop_TOAST_2024__SAFECOMP__Template__Springer_LNCS-2.pdf

embargo fino al 09/09/2025

Tipo: Postprint
Licenza: Licenza per accesso libero gratuito
Dimensione 370.45 kB
Formato Adobe PDF
370.45 kB Adobe PDF   Visualizza/Apri   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/999995
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact