Résumé
Programming Windows Security is written by an experienced developer specifically for use by other developers. It focuses on the issues of most concern to developers today: the design and implementation of secure distributed systems using the networking infrastructure provided by Windows, the file server, the web server, RPC servers, and COM(+) servers.
Topics covered include:
- COM(+) security, from the ground up
- IIS security
- How the file system redirector works and why developers should care
- The RPC security model
- Kerberos, NTLM, and SSL authentication protocols and SSPI
- Services and the Trusted Computing Base (TCB)
- Logon sessions and tokens
- Window stations, desktops, and user profiles
- The Windows 2000 ACL model, including the new model of inheritance
- Using private security descriptors to secure objects
- Accounts, groups, aliases, privileges, and passwords
- Comparison of three strategies for performing access control--impersonation, role-centric, and object-centric--and their impact on the design of a distributed application
Programming Windows Security provides the most comprehensive coverage of COM(+) security available in one place, culled from the author's extensive experience in diagnosing COM security problems in the lab and via correspondence on the DCOM mailing list.
Contents
Preface xi
PART 1 * MODEL 1
1 The Players 3
Principals 3Authorities 10
Machines as Principals 12
Authentication 12
Trust 18
Summary 24
2 The Environment 27
Logon Sessions 28Tokens 32
The System Logon Session 35
Window Stations 37
Processes 41
Summary 42
3 Enforcement 45
Authorization 45Discovering Authorization Attributes 51
Distributed Applications 52
Objects and Security Descriptors 54
Access Control Strategies 56
Choosing a Model 62
Caching Mechanisms 63
Summary 69
Part II * MECHANICS 71
4 Logon Sessions 73
Logon Session 999 76Daemon Logon Sessions 80
Network Logon Sessions 83
Interactive Logon Sessions 84
Network Credentials 86
Tokens 86
Memory Allocation and Error Handling Strategies 105
Using Privileges 106
Impersonation 112
Restricting Authorization Attributes 128
Terminating a Logon Session 133
Summary 134
5 Window Stations and Profiles 137
What Is a Window Station? 137Window Station Permissions 140
Natural Window Station Allocation 142
Daemons in the Lab 146
Other Window Stations 147
Exploring Window Stations 150
Closing Window Station Handles 152
Window Stations and Access Control 153
Desktops 154
Jobs, Revisited 164
Processes 165
Summary 177
6 Access Control and Accountability 179
Permissions 180Anatomy of a Security Descriptor 184
Where Do Security Descriptors Come From? 188
Security Descriptor Usage Patterns 191
How ACLs Work 194
Security Descriptors and Built-in Objects 206
Security Descriptors and Private Objects 208
Hierarchical Object Models and ACL Inheritance 210
ACL Programming 235
Handles 247
Summary 249
PART III * DISTRIBUTION 253
7 Network Authentication 255
The NTLM Authentication Protocol 256The Kerberos v5 Authentication Protocol 273
SSPI 300
SPNEGO: Simple and Protected Negotiation 306
Summary 307
8 The File Server 309
Lan Manager 309Lan Manager Sessions 310
Clients and Sessions 315
Use Records 318
NULL Sessions 325
Dealing with Conflict 327
Drive Letter Mappings 328
Named Pipes 329
SMB Signing 333
Summary 334
9 COM(+) 337
The MSRPC Security Model 338The COM Security Model 355
COM Interception 370
Activation Requests 377
More COM Interception: Access Control 383
Plugging Obscure Security Holes 385
Security in In-Process Servers? 386
Surrogates and Declarative Security 387
COM Servers Packaged as Services 390
Legacy Out-of-Process Servers 392
Launching Servers via the COM SCM 394
A Note on Choosing a Server Identity 399
Access Checks in the Middle Tier 400
The COM+ Security Model: Configured Components 401
Catalog Settings 404
Applications and Role-Based Security 407
Making Sense of COM+ Access Checks 416
Which Components Need Role Assignments? 422
Security in COM+ Library Applications 423
Fine-Grained Access Control: IsCallerInRole 426
Call Context Tracking 428
Tips for Debugging COM Security Problems 429
Summary 432
10 IIS 435
Authentication on the Web 436Public Key Cryptography 440
Certificates 442
Secure Sockets Layer 448
Certificate Revocation 452
From Theory to Practice: Obtaining and Installing a Web Server Certificate 453
Requiring HTTPS via the IIS Metabase 457
Managing Web Applications 460
Client Authentication 465
Server Applications 475
IIS as a Gateway into COM+ 482
Miscellaneous Topics 486
Where to Get More Information 489
Summary 490
Appendix: Some Parting Words 493
Well-Known SIDs 494Printing SIDs in Human Readable Form 495
Adding Domain Principals in Windows 2000 498
Adding Groups in Windows 2000 500
Adding Local Accounts and Aliases 504
Privileges and Logon Rights 505
Secrets: The Windows Password Stash 507
Glossary 517
Bibliography 541
Index 543
L'auteur - Keith Brown
Keith Brown is a Principal Scientist at DevelopMentor, where he helps to develop the Windows security and COM curriculum. He is also a contributing editor and columnist for MSDN Magazine.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Keith Brown |
Parution | 01/08/2000 |
Nb. de pages | 580 |
Format | 18,7 x 23,5 |
Couverture | Broché |
Poids | 1214g |
Intérieur | Noir et Blanc |
EAN13 | 9780201604429 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse