svn commit: r43114 - head/ja_JP.eucJP/books/handbook/security
Ryusuke SUZUKI
ryusuke at FreeBSD.org
Thu Nov 7 11:31:18 UTC 2013
Author: ryusuke
Date: Thu Nov 7 11:31:17 2013
New Revision: 43114
URL: http://svnweb.freebsd.org/changeset/doc/43114
Log:
- Merge the following from the English version:
r15155 -> r15170 head/ja_JP.eucJP/books/handbook/security/chapter.xml
MAC section is not translated and commented out.
This section will be removed from this chapter.
Modified:
head/ja_JP.eucJP/books/handbook/security/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/security/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/security/chapter.xml Thu Nov 7 00:38:30 2013 (r43113)
+++ head/ja_JP.eucJP/books/handbook/security/chapter.xml Thu Nov 7 11:31:17 2013 (r43114)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: 1.122
+ Original revision: r15170
Waiting for: 1.123 or mac/chapter.xml
("mac" referenced from disks).
Translation note: "fs-acl" section added in rev.1.118 is moved to
@@ -86,6 +86,12 @@
<para>³ÈÄ¥¤µ¤ì¤¿¥Õ¥¡¥¤¥ë¥·¥¹¥Æ¥à¥¢¥¯¥»¥¹À©¸æ¥ê¥¹¥È
(ACL) ¤Î UFS ¤Ç¤ÎÀßÄꤪ¤è¤Ó»ÈÍÑÊýË¡</para>
</listitem>
+<!--
+ <listitem>
+ <para>How to configure and load access control extension
+ modules using the TrustedBSD MAC Framework.</para>
+ </listitem>
+-->
</itemizedlist>
<para>¤³¤Î¾Ï¤òÆɤàÁ°¤Ë¡¢¼¡¤Î¤³¤È¤¬É¬Íפˤʤê¤Þ¤¹¡£</para>
@@ -3865,4 +3871,234 @@ user at unfirewalled.myserver.com's passwor
issues with the root file system.</para>
</sect1>
-->
+<!--
+ <sect1 id="mac">
+ <sect1info>
+ <authorgroup>
+ <author>
+ <firstname>Robert</firstname>
+ <surname>Watson</surname>
+ <contrib>Sponsored by DARPA and Network Associates Laboratories.
+ Contributed by </contrib>
+ </author>
+ </authorgroup>
+ </sect1info>
+ <indexterm>
+ <primary>MAC</primary>
+ </indexterm>
+ <title>Mandatory Access Control (MAC)</title>
+
+ <para>FreeBSD 5.0 includes a new kernel security framework, the
+ TrustedBSD MAC Framework. The MAC Framework permits compile-time,
+ boot-time, and run-time extension of the kernel access control
+ policy, and can be used to load support for Mandatory Access
+ Control (<acronym>MAC</acronym>), and custom security modules
+ such as hardening modules. The MAC Framework is currently
+ considered to be an experimental feature, and should not yet
+ be used in production environments without careful consideration.
+ It is anticipated that the MAC Framework will be appropriate for
+ more widespread production use by FreeBSD 5.2.</para>
+
+ <para>When configured into a kernel, the MAC Framework permits
+ security modules to augment the existing kernel access control
+ model, restricting access to system services and objects. For
+ example, the mac_bsdextended module augments file system access
+ control, permitting administrators to provide a firewall-like
+ ruleset constraining access to file system objects based on user
+ ids and group membership. Some modules require little or no
+ configuration, such as mac_seeotheruids, whereas others perform
+ ubiquitous object labeling, such as mac_biba and mac_mls, and
+ require extensive configuration.</para>
+
+ <para>To enable the MAC Framework in your system kernel, you must
+ add the following entry to your kernel configuration:</para>
+
+ <programlisting>options MAC</programlisting>
+
+ <para>Security policy modules shipped with the base system may
+ be loaded using &man.kldload.8; or in the boot &man.loader.8;
+ They may also be compiled directly into the kernel using the
+ following options, if the use of modules is not desired.</para>
+
+ <para>Different MAC policies may be configured in different ways;
+ frequently, MAC policy modules export configuration parameters
+ using the &man.sysctl.8; <acronym>MIB</acronym> using the
+ security.mac.* namespace. Policies relying on file system
+ or other labels may require a configuration step that involes
+ assigning initial labels to system objects or creating a
+ policy configuration file. For information on how to configure
+ and use each policy module, see its man page.</para>
+
+ <para>A variety of tools are available to configure the MAC Framework
+ and labels maintained by various policies. Extensions have been
+ made to the login and credential management mechanisms
+ (&man.setusercontext.3;) to support initial user labeling using
+ &man.login.conf.5;. In addition, modifications have been made
+ to &man.su.1;, &man.ps.1;, &man.ls.1;, and &man.ifconfig.8; to
+ inspect and set labels on processes, files, and interfaces. In
+ addition, several new tools have been added to manage labels
+ on objects, including &man.getfmac.8;, &man.setfmac.8;, and
+ &man.setfsmac.8; to manage labels on files, and &man.getpmac.8; and
+ &man.setpmac.8;.</para>
+
+ <para>What follows is a list of policy modules shipped with FreeBSD
+ 5.0.</para>
+ <sect2 id="mac-policy-biba">
+ <title>Biba Integrity Policy (mac_biba)</title>
+ <indexterm>
+ <primary>Biba Integrity Policy</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_biba.ko</para>
+ <para>Kernel option: MAC_BIBA</para>
+ <para>The Biba Integrity Policy (XXXMANPAGE) provides
+ for hierarchal and non-hierarchal labeling of all system
+ objects with integrity data, and the strict enforcement of
+ an information flow policy to prevent corruption of high
+ integrity subjects and data by low-integrity subjects.
+ Integrity is enforced by preventing high integrity
+ subjects (generally processes) from reading load integrity
+ objects (often files), and preventing low integrity
+ subjects from writing to high integrity objects.
+ This security policy is frequently used in commercial
+ trusted systems to provide strong protection for the
+ Trusted Code Base (<acronym>TCB</acronym>). Because it
+ provides ubiquitous labeling, the Biba integrity policy
+ must be compiled into the kernel or loaded at boot.</para>
+ </sect2>
+ <sect2 id="mac-policy-ifoff">
+ <title>Interface Silencing Policy (mac_ifoff)</title>
+ <indexterm>
+ <primary>Interface Silencing Policy</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_ifoff.ko</para>
+ <para>Kernel option: MAC_IFOFF</para>
+ <para>The interface silencing policy (XXXMANPAGE)
+ prohibits the use of network interfaces during the boot
+ until explicitly enabled, preventing spurious stack output
+ stack response to incoming packets. This is appropriate
+ for use in environments where the monitoring of packets
+ is required, but no traffic may be generated.</para>
+ </sect2>
+ <sect2 id="mac-policy-lomac">
+ <title>Low-Watermark Mandatory Access Control (LOMAC)
+ (mac_lomac)</title>
+ <indexterm>
+ <primary>Low-Watermark Mandatory Access Control</primary>
+ </indexterm>
+ <indexterm>
+ <primary>LOMAC</primary>
+ </indexterm>
+ <para>Vendor: Network Associates Laboratories</para>
+ <para>Module name: mac_lomac.ko</para>
+ <para>Kernel option: MAC_LOMAC</para>
+ <para>Similar to the Biba Integrity Policy, the LOMAC
+ policy (XXXMANPAGE) relies on the ubiquitous
+ labeling of all system objects with integrity labels.
+ Unlike Biba, LOMAC permits high integrity subjects to
+ read from low integrity objects, but then downgrades the
+ label on the subject to prevent future writes to high
+ integrity objects. This policy may provide for greater
+ compatibility, as well as require less initial
+ configuration than Biba. However, as with Biba, it
+ ubiquitously labels objects and must therefore be
+ compiled into the kernel or loaded at boot.</para>
+ </sect2>
+ <sect2 id="mac-policy-mls">
+ <title>Multi-Level Security Policy (MLS) (mac_mls)</title>
+ <indexterm>
+ <primary>Multi-Level Security Policy</primary>
+ </indexterm>
+ <indexterm>
+ <primary>MLS</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_mls.ko</para>
+ <para>Kernel option: MAC_MLS</para>
+ <para>Multi-Level Security (<acronym>MLS</acronym>)
+ (XXXMANPAGE) provides for hierarchal and
+ non-hierarchal labeling of all system objects with
+ sensitivity data, and the strict enforcement of an
+ information flow policy to prevent the leakage of
+ confidential data to untrusted parties. The logical
+ conjugate of the Biba Integrity Policy,
+ <acronym>MLS</acronym> is frequently shipped in
+ commercial trusted operating systems to protect data
+ secrecy in multi-user environments. Hierarchal labels
+ provide support for the notion of clearances and
+ classifications in traditional parlance; non-hierarchal
+ labels provide support for "need-to-know". As with
+ Biba, ubiquitous labeling of objects occurs, and it
+ must therefore be compiled into the kernel or loaded
+ at boot. As with Biba, extensive initial configuration
+ may be required.</para>
+ </sect2>
+ <sect2 id="mac-policy-none">
+ <title>MAC Stub Policy (mac_none)</title>
+ <indexterm>
+ <primary>MAC Stub Policy</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_none.ko</para>
+ <para>Kernel option: MAC_NONE</para>
+ <para>The None policy (XXXMANPAGE) provides a stub
+ sample policy for developers, implementing all entry
+ points, but not changing the system access control
+ policy. Running this on a production system would
+ not be highly beneficial.</para>
+ </sect2>
+ <sect2 id="mac-policy-partition">
+ <title>Process Partition Policy (mac_partition)</title>
+ <indexterm>
+ <primary>Process Partition Policy</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_partition.ko</para>
+ <para>Kernel option: MAC_PARTITION</para>
+ <para>The Partition policy (XXXMANPAGE) provides for a
+ simple process visibility limitation, assigning labels to
+ processes identifying what numeric system partition they
+ are present in. If none, all other processes are visible
+ using standard monitoring tools; if a partition identifier
+ is present, then only other processes in the same
+ partition are visible. This policy may be compiled into
+ the kernel, loaded at boot, or loaded at run-time.</para>
+ </sect2>
+ <sect2 id="mac-policy-seeotheruids">
+ <title>See Other Uids Policy (mac_seeotheruids)</title>
+ <indexterm>
+ <primary>See Other Uids Policy</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_seeotheruids.ko</para>
+ <para>Kernel option: MAC_BIBA</para>
+ <para>The See Other Uids policy (XXXMANPAGE) implements
+ a similar process visibility model to mac_partition,
+ except that it relies on process credentials to control
+ visibility of processes, rather than partition labels. This
+ policy may be configured to exempt certain users and groups,
+ including permitting system operators to view all processes
+ without special privilege. This policy may be compiled into
+ the kernel, loaded at boot, or loaded at run-time.</para>
+ </sect2>
+ <sect2 id="mac-policy-test">
+ <title>MAC Framework Test Policy</title>
+ <indexterm>
+ <primary>MAC Framework Test Policy</primary>
+ </indexterm>
+ <para>Vendor: TrustedBSD Project</para>
+ <para>Module name: mac_test.ko</para>
+ <para>Kernel option: MAC_TEST</para>
+ <para>The Test policy (XXXMANPAGE) provides a regression test
+ environment for the MAC Framework, and will cause a
+ fail-stop in the event that internal MAC Framework assertions
+ about proper data labeling fail. This module can be used to
+ detect failures to properly label system objects in the kernel
+ implementation. This policy may be compiled into the kernel,
+ loaded at boot, or loaded at run-time.</para>
+ </sect2>
+
+ </sect1>
+-->
</chapter>
More information about the svn-doc-head
mailing list