System configuration as a privilege

  • Authors:
  • Glenn Wurster;Paul C. Van Oorschot

  • Affiliations:
  • School of Computer Science, Carleton University, Canada;School of Computer Science, Carleton University, Canada

  • Venue:
  • HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a new approach for separating configuration privilege from traditional root privilege. We limit this new configuration privilege to a single (new) system daemon, configd. This daemon reads requests for changes in system configuration, either allowing or denying each request based on various criteria (possibly including user input). We do not allow any other application to run with configuration permission, forcing all requests for a change in system configuration to be processed by configd. We discuss the basic functionality required for configd to protect system configuration, and some preliminary improvements to a basic prototype design. We concentrate on only those system configuration changes performed through the modification of a file on disk.