Claims
- 1. A system comprising:
a processor; a memory; a first network interface; a second network interface; and software in the memory that is operable on the processor for causing the system to:
establish an assured pipeline between the first network interface and the second network interface; encrypt outbound network traffic received on the first network interface; send the encrypted outbound network traffic via the assured pipeline to the second network interface; decrypt inbound network traffic received on the second network interface; and send the inbound decrypted network traffic via the assured pipeline to the first network interface.
- 2. The system of claim 1, wherein the software includes secure operating system software.
- 3. The system of claim 1, wherein the software implements a multilevel secure computer.
- 4. The system of claim 1, wherein the software implements a Type Enforcing Secure Computer.
- 5. The system of claim 1, wherein the system prevents execution of executable objects that have not been recognized as a trusted executable object.
- 6. The system of claim 3, wherein the system prevents execution of executable objects that have not been recognized as a trusted executable object.
- 7. The system of claim 4, wherein the system prevents execution of executable objects that have not been recognized as a trusted executable object.
- 8. The system of claim 2, wherein the system includes a virtual page translator having page access control bits and wherein the secure operating system software uses the page access control bits to ensure that file protection checks are not avoided.
- 9. The system of claim 5, wherein the system includes a virtual page translator having page access control bits and wherein the secure operating system software uses the page access control bits to ensure that Type Enforcement checks are not avoided.
- 10. The system of claim 2, wherein the software establishing an assured pipeline includes software for performing a UNIX file permission check and software for performing a secure operating system permission check.
- 11. The system of claim 10, wherein the secure operating system permission check is part of a system call.
- 12. The system of claim 2, wherein the software establishing an assured pipeline includes software for performing a file permission check and wherein the secure operating system permission check is part of a system call.
- 13. The system of claim 2, wherein a fork system call returns a child process that inherits domain attributes of a parent process.
- 14. The system of claim 1, wherein the first network interface is a wireless network interface.
- 15. A router comprising:
a processor; a memory; a first network interface; a second network interface; and a firewall program stored in the memory and operable on the processor for causing the router to:
implement a security policy program enforcing a Type Enforcement security mechanism to restrict access to network resources, wherein the Type Enforcement security mechanism establishes an assured pipeline for transfer of data and programs between the first and second network interfaces.
- 16. The router of claim 15, wherein the router includes a virtual page translator having page access control bits and wherein the firewall program is further operable on the processor to use the page access control bits to ensure that resource protection checks are not avoided.
- 17. The router of claim 15, wherein the firewall program is further operable on the processor to prevent access to executable objects that have not been recognized as a trusted executable object.
- 18. The router of claim 15, wherein the network resources include data and programs.
- 19. The router of claim 15, wherein the router further includes software in the memory that is operable on the processor for causing the router to:
run in either an administrative or operational state; and disable the second network interface when in the administrative state and only accept commands from an authenticated client over the first network interface.
- 20. The router of claim 19, wherein the router further includes software in the memory that is operable on the processor for causing the router to:
disable the Type Enforcement security mechanism when the router is in the administrative state.
- 21. The router of 15, wherein the first network interface is a wireless network interface for wireless network communication.
- 22. A firewall device comprising:
a processor; a memory; and a secure operating system having an operational kernel and an administrative kernel, wherein the operational kernel includes a Type Enforcement security mechanism for restricting execution of files stored in the memory by the processor, further wherein execution restrictions placed on files in the memory can only be modified from within the administrative kernel.
- 23. The firewall device of claim 22, further comprising:
executable instructions stored in the memory and operable on the processor for causing the firewall device to filter network traffic received over a network interface.
- 24. The firewall device of claim 22, wherein the firewall device includes a virtual page translator having page access control bits and wherein the secure operating system uses the page access control bits to ensure that resource protection checks are not avoided.
- 25. The firewall device of claim 22, wherein the secure operating system prevents access to executable objects that have not been recognized as a trusted executable object.
- 26. A method for network protection, comprising:
establishing an assured pipeline between a first network interface and a second network interface; encrypting outbound network traffic received on the first network interface; sending the encrypted outbound network traffic via the assured pipeline to the second network interface; decrypting inbound network traffic received on the second network interface; and sending the inbound decrypted network traffic via the assured pipeline to the first network interface.
- 27. The method of claim 26, further comprising:
implementing a security policy to restrict access to network resources.
- 28. The method of claim 27, wherein the security policy enforces a Type Enforcement security mechanism for transferring data and programs between the first and second networking interfaces.
- 29. The method of claim 26, wherein establishing an assured pipeline includes preventing execution of executable objects that have not been recognized as trusted executable objects.
- 30. The method of claim 27 wherein establishing an assured pipeline includes preventing execution of executable objects that have not been recognized as trusted executable objects.
- 31. The method of claim 28 wherein establishing an assured pipeline includes using page access control bits for ensuring Type Enforcement checks are performed.
- 32. The method of claim 26, wherein establishing an assured pipeline includes performing a file permission check.
- 33. The method of claim 26, further comprising:
performing a fork system call; and receiving as a return from the fork system call, a child process that inherits domain attributes of a parent process.
- 34. A server comprising:
a processor; a secure operating system having a security mechanism for restricting access by processes to server resources; and a firewall operating on the processor, wherein the firewall includes processes which access server resources and processes which limit access by others to server resources.
- 35. The server of claim 34, wherein the security mechanism is a Type Enforcement security mechanism.
- 36. The server of claim 34, wherein the security mechanism is a multilevel secure computer mechanism.
- 37. The server of claim 34, wherein the security mechanism prevents execution of executable objects that have not been recognized as a trusted executable object.
- 38. The server of claim 34, wherein the processor includes a virtual page translator having page access control bits and wherein the secure operating system uses the page access control bits to ensure that file protection checks are not avoided.
- 39. The server of claim 34, further comprising:
a memory; a first network interface; a second network interface; and software in the memory that is operable on the processor for causing the server to:
encrypt outbound network traffic received on the first network interface; send the encrypted outbound network traffic over the second network interface; decrypt inbound network traffic received on the second network interface; and send the inbound decrypted network traffic on the first network interface.
- 40. The server of claim 39 wherein the firewall includes a means for establishing an assured pipeline between the first and second network interfaces.
- 41. The server of claim 40, wherein the means for establishing an assured pipeline further comprise:
a means for performing a file permission check; and a means for performing a secure operating system permission check.
- 42. A machine readable medium, with instructions thereon, for causing a device to implement a security mechanism preventing execution of executable objects that have not been recognized as trusted executable objects and for implementing an assured pipeline based on the security mechanism, for transfer of data and programs between a first network interface and a second network interface.
- 43. The machine readable medium of claim 42, wherein the security mechanism assigns processes to domains and restricts access of a process to data and programs as a function of the domain assigned the process.
- 44. The machine readable medium of claim 42, wherein the security mechanism partitions the system to isolate security critical subsystems from non-security critical subsystems and restricts access to certain data to security critical subsystems.
RELATED APPLICATIONS
[0001] This application is a continuation of U.S. patent application Ser. No. 09/221,665, filed Dec. 23, 1998, which is a continuation of U.S. patent application Ser. No. 08/322,078, filed Oct. 12, 1994, now issued as U.S. Pat. No. 5,864,683, both of which are incorporated herein by reference.
Continuations (2)
|
Number |
Date |
Country |
Parent |
09221665 |
Dec 1998 |
US |
Child |
10854602 |
May 2004 |
US |
Parent |
08322078 |
Oct 1994 |
US |
Child |
09221665 |
Dec 1998 |
US |