Operating System
Download
Report
Transcript Operating System
Operating System
VISC lab
Na Young Lee
09-20-02
Agenda
Operating System
UNIX (standard UNIX)
Window (2000)
Manage Window
Operating System (OS)
Computer consists of Hardware and OS
What is OS?
• Manager
• OS manages users, access rights and user
interaction.
• OS manages resources
Files, directories
Devices
Processes
Memory
I/O
Operating System (OS)
To understand OS ~= what and how
manage
• Process
• Memory
• I/O
• File System
• Security
Operating System (OS)
How manage
• User interaction : command, GUI
• Device controllers : bus
• Interrupts
• Tables : fd
• Signals, messages : system
UNIX - Interfaces
Users
Standard Utility Program
User
mode
Standard library
OS
Hardware
Kernel
mode
UNIX-User interaction
User interaction
• Shell : Command programming
language
providing an interface to the Unix
OS.
Modifiable
• compiler
• Kernel : Core of the OS.
Invoked by system call
UNIX - Kernel
System calls
Terminal handling
Raw tty
Interrupts and traps
Sockets
File
naming
Mappin
g
Cooked
tty
Network protocol
File
system
Virtual
memor
y
Line
disciplin
es
Routing
Buffer
cache
Character devices
Network device
drivers
Disk device driver
Hardware
Signal
handle
Preoces
s
creation
and
termina
tion
UNIX – Device
Device Control
• Abstraction of the physical devices
• Input : keyboard, mouse, CD-ROM
• Output : Screen, printers
• I/O : disk, tape, network
Commands
• Lp, ioctl, sockio, streamio, tar
UNIX – process
Abstraction of running program
Address space that contains data,
instruction, hardware resources.
• Running, ready, block status
• Interrupt from input (vector) – current
process's info pushed to stack –
hardware access the address to be
assigned for interrupt device – after
process done, one of the processes in
the ready status is scheduled.
UNIX – process
Process table
• Process status, program counter, stack
pointer, PID
• Scheduling parameters : process
priority, CPU running time, -> decide
next process
• Memory info : how to find the process
not in the memory (ready or block)
• Signals : mask signal, effective signal
UNIX – process
Kernel process start a series of
processes
-Daemons (started at system booting)
• ttymon watches various terminals for
login
• ttymon starts new process for user shell
• Command
ps, exit, kill, fork, wait, bg, fg, signal, sigset,
alarm
UNIX – File System
Hierarchical File System
/
System binary
sbin
var
dev
usr
etc
Device file
mail
spool
tmp
tmp
home
kernel
Data of sa
bin
Binary file
sbin
user1
System files
user2
UNIX – File System
Command
• mkdir, link, mount, cd, rmdir, cp, mv, rm
• Create/open, close, read/write, pipe
NFS (Network File System)
UNIX - Security
UNIX is designed for multi-user
system
• UID (user ID) , GID (group ID)
each process, file, and folder
File and folder permission 9 bit
• SETUID
Set on the program by superuser (root)
• chmod, setuid, setgid
owner, superuser
UNIX - Security
Login is program with SETUID root
• Login asks the username and password
• Hash function h (username)
• Call setuid and setgid system call
• Open keyboard (fd 0), screen (fd 1),
screen error (fd 2), start user shell
(UID), and terminate
• All processes forked by shell inherit the
UID
Windows – OS Structure
Operating System Structure
Win32 program
Win32 subsystem
System Interface
System Service
Obj ProcessMemorySecurity Cache Power Config
Kernel
HAL
Hardware
Windows – OS Structure
Kernel mode
• HAL : present rest OS with abstract
hardware device
(winnt/system32/hal.dll)
ex) map device address to logical
system address (bus)
interrupt service set the
priority on
the device
Windows – OS Structure
• Kernel : present complete hardware
independency
ex) save the CPU register,
flush CPU table
• System service : accept windows
system calls
Windows – OS Structure
User mode : provide each user
process with system call interface
• Environment Subsystems ~= win32 API
(application programming interface)
• System Interface : DLL (dynamic link
libraries)
• Service processes
Window - Manage
Interrupt
Direct
memory
access
I/O
Memory
Window - Registry
Registry
• Don’t change if
you have a plan
to use machine
again.
• Directory (key)
• Entry : name, type,
value
Window - Registry
• All the win32 application include
win32API functions
( RegCreateKeyEx, _Delete_, _Open_,
etc)
• All the registry file is in the
winnt/system32/confg
• Some file can not open, but if you
succeed opening file (?), you can see
the file start “regf…”
Windows
Booting
• Boot sector : first sector of the partition
having the bootable OS and has ntldr
• ntldr look up boot.ini file to get the info
on configuration
• ntoskrnl.exe, and bootvid.dll are loaded.
• Finally ntldr load all the drives needed
to finish booting ( like mouse, keyboard)
and load smass.exe
• winlogin.exe,
Windows - Security
Winlogin.exe create lass.exe
(authentication manager) and
services.exe (look in registry and
start services)
Services : Printer server, File server,
Telnet Daemon, DNS
resolver,
Event logger, Plug-and-play
manager
Windows - Security
User SID (security ID)
Process has access token
Header
Expiration
time
Groups
Default
CACL
User
SID
Group
SID
Restricted
SID
Privilege
Windows - Security
Security descriptor
Owner’s SID
Group SID
DACL
SACL
Implementation
Deny access List
System Access
Control List
• Winlogon.exe give initial process access token
lass.exe decides success of login and lookup registry to get
correct user profile and start services.exe with access
token
• Subsequent processes inherit parent’s access token.
• Thread usually inherit the process’s access token.
Manage Windows
Why have to protect windows?
• Bugs : Every software contains bugs
• Intruders : Crackers find a vulnerability
in the OS and exploit it to break into
and control
• Virus Infections : antivirus software
• Violation of your privacy : spyware
(software to collect data about you and
secretly send it home)
Manage Windows
How to protect windows
• Service pack
• Windows update
• Installing Hotfixes
• Microsoft Baseline Security Analyzer
• Virus protection
• Firewall protection
• Malicious Script Protection
Manage Windows
Service packs
• contain hundreds of bug and security
fixes and enable you to apply these
fixes in one fell swoop
• Check the service pack version and
download the newest version
Windows Update
• Updates are being released constantly
• http://windowsupdate.microsoft.com/
Manage Windows
Installing hotfixs
• additional patches
• subscribe to Microsoft's Security Bulletin http://www.microsoft.com/technet/security/bu
lletin/notify.asp - or the CERT Advisory Mailing
List http://www.cert.org/contact_cert/certmaillist.h
tml. You will receive regular e-mail
notifications about vulnerabilities and fixes you
might need to apply to your system.
Manage Windows
Microsoft Baseline
Security Analyzer
• MBSA allows you to
check your Windows
NT4, 2000, or XP
installation for a
number of security
issues, i.e. Windows
vulnerabilities, weak
passwords, IIS
vulnerabilities, SQL
vulnerabilities, and
missing hotfixes
Manage Windows
Virus protection
• Anti-virus program : known virus , update
virus definition
• Common sense
unknown virus
DON'T OPEN ATTACHMENTS FROM UNKNOWN
SOURCES!
DELETE IT!
e-mail with an attachment from a person you
know but didn't expect it - DO NOT OPEN IT DELETE IT!
Manage Windows
Firewall Protection
• Internet connetion : exposed to world
• DSL or cable modem with static IP
• Find out how vulnerable your machine is
• http://grc.com/default.htm
click on Shield's UP!.
• Do Test My Shields! and Probe My Ports!.
Check for obvious vulnerabilities of your PC.
Chances are you have a number of open and/or
visible ports that can make your machine a
target for crackers
Manage Windows
• Firewall protects machine by closing these
security holes.
• Firewall software monitors your Internet
connection and filters all traffic to keep
undesired traffic out and only allow legitimate
traffic through.
• recommend is ZoneLab's Zone Alarm
• http://www.zonelabs.com.
• After installing Zone Alarm, and perform
another Shields UP! test and Port Probe.
Manage Windows
Spyware Protection
• What is Spyware
come in form of software installed on your machine
with or without your knowledge
tracks and collects data about you and your computer
and sends it back to a central database for
processing and analyzing
Lavasoft's Ad-aware http://www.lavasoftusa.com/.
After installing this software you can scan your entire
system including hard drives and registry for any
traces of spyware.
Manage Windows
Lavasoft's Ad-aware
Manage Windows
Malicious Script Protection
• A lot of e-mail viruses are scripts.
• In order to function, they need to be executed.
• Prevent you from accidentally launching a
malicious script that was not caught by your
antivirus software by installing script
monitoring software
• AnalogX's Script Defender
http://www.analogx.com/contents/download/s
ystem/sdefend.htm
Manage Windows
Malicious Script Protection
Manage Windows
Email
• If possible, set the format as plain /text :HTML mail is a
potential risk and allows for snooping and malicious code
infection
• Disable to running ActiveX , script
• ActiveX applets (or "controls" as they are called) are
downloadable programs that are run by your system.
Unlike the normal EXE files, ActiveX can be run
transparently in your Internet Explorer to perform any
action such as erasing files or stealing your passwords.
• Do not open EXE, BAT, VBS, and SCR type attachments
ever
• Consider using a plain text (non-HTML) e-mail reader
such as Eudora or The Bat!
• DOC file can be opened up in like WordPad to view the
text contents without the risk of a macro virus infection.
Manage Windows
Perform frequent data backups.
Disable file sharing.
Create an emergency boot disk.
Manage Windows -VISC
Secure Shell
Manage Windows - VISC
Reference
Modern operating systems – Andrew
S. Tanenbaum
A practical Guide to Solaris –Mark G.
Sobell
Lecture 2 – Dr. Spring