Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Programming Windows Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Programming Windows Security

Programming Windows Security

Keith Brown

580 pages, parution le 01/08/2000

Résumé

Windows security has often been considered a dry and unapproachable topic. For years, the main examples of programming security were simply exercises in ACL manipulation. Programming Windows Security is a revelation providing developers with insight into the way Windows security really works. This book shows developers the essentials of security in Windows 2000, including coverage of Kerberos, SSL, job objects, the new ACL model, COM+ and IIS 5.0. Also included are highlights of the differences between security in Windows 2000 and in Windows NT 4.0.

Programming Windows Security is written by an experienced developer specifically for use by other developers. It focuses on the issues of most concern to developers today: the design and implementation of secure distributed systems using the networking infrastructure provided by Windows, the file server, the web server, RPC servers, and COM(+) servers.

Topics covered include:

  • COM(+) security, from the ground up
  • IIS security
  • How the file system redirector works and why developers should care
  • The RPC security model
  • Kerberos, NTLM, and SSL authentication protocols and SSPI
  • Services and the Trusted Computing Base (TCB)
  • Logon sessions and tokens
  • Window stations, desktops, and user profiles
  • The Windows 2000 ACL model, including the new model of inheritance
  • Using private security descriptors to secure objects
  • Accounts, groups, aliases, privileges, and passwords
  • Comparison of three strategies for performing access control--impersonation, role-centric, and object-centric--and their impact on the design of a distributed application

Programming Windows Security provides the most comprehensive coverage of COM(+) security available in one place, culled from the author's extensive experience in diagnosing COM security problems in the lab and via correspondence on the DCOM mailing list.

Contents

Preface xi

PART 1 * MODEL 1

1 The Players 3

Principals 3
Authorities 10
Machines as Principals 12
Authentication 12
Trust 18
Summary 24

2 The Environment 27

Logon Sessions 28
Tokens 32
The System Logon Session 35
Window Stations 37
Processes 41
Summary 42

3 Enforcement 45

Authorization 45
Discovering Authorization Attributes 51
Distributed Applications 52
Objects and Security Descriptors 54
Access Control Strategies 56
Choosing a Model 62
Caching Mechanisms 63
Summary 69

Part II * MECHANICS 71

4 Logon Sessions 73

Logon Session 999 76
Daemon Logon Sessions 80
Network Logon Sessions 83
Interactive Logon Sessions 84
Network Credentials 86
Tokens 86
Memory Allocation and Error Handling Strategies 105
Using Privileges 106
Impersonation 112
Restricting Authorization Attributes 128
Terminating a Logon Session 133
Summary 134

5 Window Stations and Profiles 137

What Is a Window Station? 137
Window Station Permissions 140
Natural Window Station Allocation 142
Daemons in the Lab 146
Other Window Stations 147
Exploring Window Stations 150
Closing Window Station Handles 152
Window Stations and Access Control 153
Desktops 154
Jobs, Revisited 164
Processes 165
Summary 177

6 Access Control and Accountability 179

Permissions 180
Anatomy of a Security Descriptor 184
Where Do Security Descriptors Come From? 188
Security Descriptor Usage Patterns 191
How ACLs Work 194
Security Descriptors and Built-in Objects 206
Security Descriptors and Private Objects 208
Hierarchical Object Models and ACL Inheritance 210
ACL Programming 235
Handles 247
Summary 249

PART III * DISTRIBUTION 253

7 Network Authentication 255

The NTLM Authentication Protocol 256
The Kerberos v5 Authentication Protocol 273
SSPI 300
SPNEGO: Simple and Protected Negotiation 306
Summary 307

8 The File Server 309

Lan Manager 309
Lan Manager Sessions 310
Clients and Sessions 315
Use Records 318
NULL Sessions 325
Dealing with Conflict 327
Drive Letter Mappings 328
Named Pipes 329
SMB Signing 333
Summary 334

9 COM(+) 337

The MSRPC Security Model 338
The COM Security Model 355
COM Interception 370
Activation Requests 377
More COM Interception: Access Control 383
Plugging Obscure Security Holes 385
Security in In-Process Servers? 386
Surrogates and Declarative Security 387
COM Servers Packaged as Services 390
Legacy Out-of-Process Servers 392
Launching Servers via the COM SCM 394
A Note on Choosing a Server Identity 399
Access Checks in the Middle Tier 400
The COM+ Security Model: Configured Components 401
Catalog Settings 404
Applications and Role-Based Security 407
Making Sense of COM+ Access Checks 416
Which Components Need Role Assignments? 422
Security in COM+ Library Applications 423
Fine-Grained Access Control: IsCallerInRole 426
Call Context Tracking 428
Tips for Debugging COM Security Problems 429
Summary 432

10 IIS 435

Authentication on the Web 436
Public Key Cryptography 440
Certificates 442
Secure Sockets Layer 448
Certificate Revocation 452
From Theory to Practice: Obtaining and Installing a Web Server Certificate 453
Requiring HTTPS via the IIS Metabase 457
Managing Web Applications 460
Client Authentication 465
Server Applications 475
IIS as a Gateway into COM+ 482
Miscellaneous Topics 486
Where to Get More Information 489
Summary 490

Appendix: Some Parting Words 493

Well-Known SIDs 494
Printing SIDs in Human Readable Form 495
Adding Domain Principals in Windows 2000 498
Adding Groups in Windows 2000 500
Adding Local Accounts and Aliases 504
Privileges and Logon Rights 505
Secrets: The Windows Password Stash 507

Glossary 517
Bibliography 541
Index 543

L'auteur - Keith Brown

Keith Brown is a Principal Scientist at DevelopMentor, where he helps to develop the Windows security and COM curriculum. He is also a contributing editor and columnist for MSDN Magazine.

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Keith Brown
Parution 01/08/2000
Nb. de pages 580
Format 18,7 x 23,5
Couverture Broché
Poids 1214g
Intérieur Noir et Blanc
EAN13 9780201604429

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription