- Merge the following from the English version:

r15170 -> r15267	head/ja_JP.eucJP/books/handbook/security/chapter.xml
This commit is contained in:
Ryusuke SUZUKI 2013-11-07 11:44:29 +00:00
parent 7587c96f94
commit c057dbfa2b
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=43115

View file

@ -3,7 +3,7 @@
The FreeBSD Documentation Project The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project The FreeBSD Japanese Documentation Project
Original revision: r15170 Original revision: r15267
Waiting for: 1.123 or mac/chapter.xml Waiting for: 1.123 or mac/chapter.xml
("mac" referenced from disks). ("mac" referenced from disks).
Translation note: "fs-acl" section added in rev.1.118 is moved to Translation note: "fs-acl" section added in rev.1.118 is moved to
@ -3902,13 +3902,14 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
<para>When configured into a kernel, the MAC Framework permits <para>When configured into a kernel, the MAC Framework permits
security modules to augment the existing kernel access control security modules to augment the existing kernel access control
model, restricting access to system services and objects. For model, restricting access to system services and objects. For
example, the mac_bsdextended module augments file system access example, the &man.mac.bsdextended.4; module augments file system
control, permitting administrators to provide a firewall-like access control, permitting administrators to provide a
ruleset constraining access to file system objects based on user firewall-like ruleset constraining access to file system objects
ids and group membership. Some modules require little or no based on user ids and group membership. Some modules require
configuration, such as mac_seeotheruids, whereas others perform little or no configuration, such as &man.mac.seeotheruids.4,
ubiquitous object labeling, such as mac_biba and mac_mls, and whereas others perform ubiquitous object labeling, such as
require extensive configuration.</para> &man.mac.biba.4; and &man.mac.mls.4;, and require extensive
configuration.</para>
<para>To enable the MAC Framework in your system kernel, you must <para>To enable the MAC Framework in your system kernel, you must
add the following entry to your kernel configuration:</para> add the following entry to your kernel configuration:</para>
@ -3923,11 +3924,11 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
<para>Different MAC policies may be configured in different ways; <para>Different MAC policies may be configured in different ways;
frequently, MAC policy modules export configuration parameters frequently, MAC policy modules export configuration parameters
using the &man.sysctl.8; <acronym>MIB</acronym> using the using the &man.sysctl.8; <acronym>MIB</acronym> using the
security.mac.* namespace. Policies relying on file system <varname>security.mac</varname> namespace. Policies relying on
or other labels may require a configuration step that involes file system or other labels may require a configuration step
assigning initial labels to system objects or creating a that involes assigning initial labels to system objects or
policy configuration file. For information on how to configure creating a policy configuration file. For information on how to
and use each policy module, see its man page.</para> configure and use each policy module, see its man page.</para>
<para>A variety of tools are available to configure the MAC Framework <para>A variety of tools are available to configure the MAC Framework
and labels maintained by various policies. Extensions have been and labels maintained by various policies. Extensions have been
@ -3950,14 +3951,17 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_biba.ko</para> <para>Module name: mac_biba.ko</para>
<para>Kernel option: MAC_BIBA</para> <para>Kernel option: <literal>MAC_BIBA</literal></para>
<para>The Biba Integrity Policy (XXXMANPAGE) provides <indexterm>
<primary>TCB</primary>
</indexterm>
<para>The Biba Integrity Policy (&man.mac.biba.4;) provides
for hierarchal and non-hierarchal labeling of all system for hierarchal and non-hierarchal labeling of all system
objects with integrity data, and the strict enforcement of objects with integrity data, and the strict enforcement of
an information flow policy to prevent corruption of high an information flow policy to prevent corruption of high
integrity subjects and data by low-integrity subjects. integrity subjects and data by low-integrity subjects.
Integrity is enforced by preventing high integrity Integrity is enforced by preventing high integrity
subjects (generally processes) from reading load integrity subjects (generally processes) from reading low integrity
objects (often files), and preventing low integrity objects (often files), and preventing low integrity
subjects from writing to high integrity objects. subjects from writing to high integrity objects.
This security policy is frequently used in commercial This security policy is frequently used in commercial
@ -3966,6 +3970,33 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
provides ubiquitous labeling, the Biba integrity policy provides ubiquitous labeling, the Biba integrity policy
must be compiled into the kernel or loaded at boot.</para> must be compiled into the kernel or loaded at boot.</para>
</sect2> </sect2>
<sect2 id="mac-policy-bsdextended">
<title>File System Firewall Policy (mac_bsdextended)</title>
<indexterm>
<primary>File System Firewall Policy</primary>
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_bsdextended.ko</para>
<para>Kernel option: <literal>MAC_BSDEXTENDED</literal></para>
<para> The File System Firewall Policy (&man.mac.bsdextended.4;)
provides an extension to the BSD file system permission model,
permitting the administrator to define a set of firewall-like
rules for limiting access to file system objects owned by
other users and groups. Managed using &man.ugidfw.8;, rules
may limit access to files and directories based on the uid
and gids of the process attempting the access, and the owner
and group of the target of the access attempt. All rules
are restrictive, so they may be placed in any order. This policy
requires no prior configuration or labeling, and may be
appropriate in multi-user environments where mandatory limits
on inter-user data exchange are required. Caution should be
exercised in limiting access to files owned by the super-user or
other system user ids, as many useful programs and directories
are owned by these users. As with a network firewall,
improper application of file system firewall rules may render
the system unusable. New tools to manage the rule set may be
easily written using the &man.libugidfw.3; library.</para>
</sect2>
<sect2 id="mac-policy-ifoff"> <sect2 id="mac-policy-ifoff">
<title>Interface Silencing Policy (mac_ifoff)</title> <title>Interface Silencing Policy (mac_ifoff)</title>
<indexterm> <indexterm>
@ -3973,8 +4004,8 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_ifoff.ko</para> <para>Module name: mac_ifoff.ko</para>
<para>Kernel option: MAC_IFOFF</para> <para>Kernel option: <literal>MAC_IFOFF</literal></para>
<para>The interface silencing policy (XXXMANPAGE) <para>The interface silencing policy (&man.mac.ifoff.4;)
prohibits the use of network interfaces during the boot prohibits the use of network interfaces during the boot
until explicitly enabled, preventing spurious stack output until explicitly enabled, preventing spurious stack output
stack response to incoming packets. This is appropriate stack response to incoming packets. This is appropriate
@ -3992,9 +4023,9 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: Network Associates Laboratories</para> <para>Vendor: Network Associates Laboratories</para>
<para>Module name: mac_lomac.ko</para> <para>Module name: mac_lomac.ko</para>
<para>Kernel option: MAC_LOMAC</para> <para>Kernel option: <literal>MAC_LOMAC</literal></para>
<para>Similar to the Biba Integrity Policy, the LOMAC <para>Similar to the Biba Integrity Policy, the LOMAC
policy (XXXMANPAGE) relies on the ubiquitous policy (&man.mac.lomac.4;) relies on the ubiquitous
labeling of all system objects with integrity labels. labeling of all system objects with integrity labels.
Unlike Biba, LOMAC permits high integrity subjects to Unlike Biba, LOMAC permits high integrity subjects to
read from low integrity objects, but then downgrades the read from low integrity objects, but then downgrades the
@ -4015,24 +4046,22 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_mls.ko</para> <para>Module name: mac_mls.ko</para>
<para>Kernel option: MAC_MLS</para> <para>Kernel option: <literal>MAC_MLS</literal></para>
<para>Multi-Level Security (<acronym>MLS</acronym>) <para>Multi-Level Security (<acronym>MLS</acronym>)
(XXXMANPAGE) provides for hierarchal and (&man.mac.mls.4;) provides for hierarchal and non-hierarchal
non-hierarchal labeling of all system objects with labeling of all system objects with sensitivity data, and the
sensitivity data, and the strict enforcement of an strict enforcement of an information flow policy to prevent
information flow policy to prevent the leakage of the leakage of confidential data to untrusted parties. The
confidential data to untrusted parties. The logical logical conjugate of the Biba Integrity Policy,
conjugate of the Biba Integrity Policy, <acronym>MLS</acronym> is frequently shipped in commercial
<acronym>MLS</acronym> is frequently shipped in trusted operating systems to protect data secrecy in
commercial trusted operating systems to protect data multi-user environments. Hierarchal labels provide support
secrecy in multi-user environments. Hierarchal labels for the notion of clearances and classifications in
provide support for the notion of clearances and traditional parlance; non-hierarchal labels provide support
classifications in traditional parlance; non-hierarchal for <quote>need-to-know.</quote> As with Biba, ubiquitous
labels provide support for "need-to-know". As with labeling of objects occurs, and it must therefore be compiled
Biba, ubiquitous labeling of objects occurs, and it into the kernel or loaded at boot. As with Biba, extensive
must therefore be compiled into the kernel or loaded initial configuration may be required.</para>
at boot. As with Biba, extensive initial configuration
may be required.</para>
</sect2> </sect2>
<sect2 id="mac-policy-none"> <sect2 id="mac-policy-none">
<title>MAC Stub Policy (mac_none)</title> <title>MAC Stub Policy (mac_none)</title>
@ -4041,8 +4070,8 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_none.ko</para> <para>Module name: mac_none.ko</para>
<para>Kernel option: MAC_NONE</para> <para>Kernel option: <literal>MAC_NONE</literal></para>
<para>The None policy (XXXMANPAGE) provides a stub <para>The None policy (&man.mac.none.4;) provides a stub
sample policy for developers, implementing all entry sample policy for developers, implementing all entry
points, but not changing the system access control points, but not changing the system access control
policy. Running this on a production system would policy. Running this on a production system would
@ -4055,8 +4084,8 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_partition.ko</para> <para>Module name: mac_partition.ko</para>
<para>Kernel option: MAC_PARTITION</para> <para>Kernel option: <literal>MAC_PARTITION</literal></para>
<para>The Partition policy (XXXMANPAGE) provides for a <para>The Partition policy (&man.mac.partition.4;) provides for a
simple process visibility limitation, assigning labels to simple process visibility limitation, assigning labels to
processes identifying what numeric system partition they processes identifying what numeric system partition they
are present in. If none, all other processes are visible are present in. If none, all other processes are visible
@ -4072,31 +4101,32 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_seeotheruids.ko</para> <para>Module name: mac_seeotheruids.ko</para>
<para>Kernel option: MAC_BIBA</para> <para>Kernel option: <literal>MAC_SEEOTHERUIDS</literal></para>
<para>The See Other Uids policy (XXXMANPAGE) implements <para>The See Other Uids policy (&man.mac.seeotheruids.4;)
a similar process visibility model to mac_partition, implements a similar process visibility model to
except that it relies on process credentials to control mac_partition, except that it relies on process credentials to
visibility of processes, rather than partition labels. This control visibility of processes, rather than partition labels.
policy may be configured to exempt certain users and groups, This policy may be configured to exempt certain users and
including permitting system operators to view all processes groups, including permitting system operators to view all
without special privilege. This policy may be compiled into processes without special privilege. This policy may be
the kernel, loaded at boot, or loaded at run-time.</para> compiled into the kernel, loaded at boot, or loaded at
run-time.</para>
</sect2> </sect2>
<sect2 id="mac-policy-test"> <sect2 id="mac-policy-test">
<title>MAC Framework Test Policy</title> <title>MAC Framework Test Policy (mac_test)</title>
<indexterm> <indexterm>
<primary>MAC Framework Test Policy</primary> <primary>MAC Framework Test Policy</primary>
</indexterm> </indexterm>
<para>Vendor: TrustedBSD Project</para> <para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_test.ko</para> <para>Module name: mac_test.ko</para>
<para>Kernel option: MAC_TEST</para> <para>Kernel option: <literal>MAC_TEST</literal></para>
<para>The Test policy (XXXMANPAGE) provides a regression test <para>The Test policy (&man.mac.test.4;) provides a regression
environment for the MAC Framework, and will cause a test environment for the MAC Framework, and will cause a
fail-stop in the event that internal MAC Framework assertions fail-stop in the event that internal MAC Framework assertions
about proper data labeling fail. This module can be used to about proper data labeling fail. This module can be used to
detect failures to properly label system objects in the kernel detect failures to properly label system objects in the kernel
implementation. This policy may be compiled into the kernel, implementation. This policy may be compiled into the kernel,
loaded at boot, or loaded at run-time.</para> loaded at boot, or loaded at run-time.</para>
</sect2> </sect2>
</sect1> </sect1>