网络安全基础COMP3301/COMP7308课程作业补习
2021-11-05 17:03 来源:留学在线 阅读量:24
辅导案例-COMP3301/COMP7308课程中,将向学生介绍组织面临的现实世界的网络安全挑战,并学习应用通过其他计算机科学课程获得的知识和技能来应对这些挑战。挑战将从攻击者的角度(如何利用系统)和防御者的角度(如何保护系统或应对威胁)的角度进行审查。将探讨针对软件,Web应用程序,网络,操作系统,密码系统和人员的常见攻击和防御策略。该课程还将介绍网络安全管理概念,包括安全运营,风险管理,安全工程和安全体系结构,并针对专门从事网络安全的不同职业道路提供指导。
COMP3301/COMP7308 2024 Assignment 2 (DRAFT)
• DRAFT
• Revision : 232
1 Process Accounting Pseudo Device Driver
This assignment asks you to write a device driver for the OpenBSD kernel that implements a replacement
for the current process accounting facility.
Process accounting is a facility that allows administrators to audit the system resource utilisation of
commands run by users.
Process accounting in OpenBSD is currently implemented via the acct(2) system call that enables or
disables of logging of commands to a file, the accton(8) utility for calling the syscall, and the sa(8) and
lastcom(8) utilities for processing said file. The format of the file is described in the acct(5) manual
page.
A pseudo device driver is an actual driver, but not one that implements support for physical hardware. It
provides a virtual, software only, service for user programs to use.
Device special file are entries in a filesystem that refer to a set of functions in the kernel that implement
file behaviour such as open, read, write, and close.
Examples of pseudo device drivers that provide device special files are zero(4), null(4), tun(4), and
tap(4).
This is an individual assignment. You should feel free to discuss aspects of C programming and the
assignment specification with fellow students. You should not actively help (or seek help from) other
students with the actual coding of your assignment solution. It is cheating to look at another student’s
code and it is cheating to allow your code to be seen or shared in printed or electronic form. You should
note that all submitted code may be subject to automated checks for plagiarism and collusion. If we detect
plagiarism or collusion, formal misconduct proceedings will be initiated against you. If you're having
trouble, seek help from a member of the teaching staff. Don't be tempted to copy another student's code.
You should read and understand the statements on student misconduct in the course profile and on the
school web-site: https://www.itee.uq.edu.au/itee-student-misconduct-including-plagiarism
2 Specifications
This assigment specifies the replacement of the acct(2) system call with a pseudo device driver that
provides a device special file that produces messages analogous to the entries written to the accounting
file.
The acct(4) driver will provide a superset of the functionality that is provided by the current system
call. The system call only records information about the process when it exits, but the driver will also
report information about process forks and execs.
2.1 Code Style
Your code is to be written according to OpenBSD's style guide, as per the style(9) man page.
1
2.2 Compilation
Your code is to be built as part of the kernel on an amd64 OpenBSD 6.5 or -current system.
The changes to the kernel necessary to configure an acct(4) driver so it can be compiled will be supplied
as a diff available from Blackboard. The diff can be applied by running the following:
dlg@r630 ~$ cd /usr/src/ sys
dlg@r630 sys$ patch
Hmm... Looks like a unified diff to me...
The driver must be implemented in a single file, and placed in sys/dev/acct .c next to the sys/dev/acct.h
provided by the diff described above.
2.3 Messages
The messages that a program reads from the device driver are represented as a set of structs. The kernel
driver populates the structs when the relevant events occur in the kernel, and makes them available for a
program to read.
The structure of the messages the driver should produce is provided in sys/dev/acct.h.
2.3.1 Common Fields
All messages from the driver start with a common set of fields that are contained in struct acct_common.
The other messages all contain struct acct_common as their first field.
The first three fields of the common structure refer to the message itself, rather than the process the
message is about. The ac_type field contains a number representing the type of the current message, eg, a
value of 0 or ACCT_MSG_FORK states that the message is about a process forking and should be interpreted
as the associated message structure.
The ac_len field contains the number of bytes used for this message, including the ac_type and ac_len
fields.
ac_seq is a simple wrapping counter that increments for every message that the driver generates. If the
driver receives notification from the rest of the kernel that an event has occurred (eg, acct_fork() is
called when a process forks), but is unable to generate a message about it, the sequence number should
still be incremented so that the userland consumer of the messages will know that an event has been lost.
The counter should be reset to 0 when the acct(4) device is opened.
The remaining common fields should be set for the process the message is about.
2.3.2 exit message
The exit message corresponds with struct acct_exit. The information in this message corresponds with
the information described in acct(5). acct(2) may be used as a reference when filling in the information
in this message.
2.3.3 fork event
The fork message corresponds with struct acct_fork, and is generated when a process forks a new child.
The information in the message should be based on the parent of the new process, apart from ac_cpid
which contains the process ID of the new child. Note that acct_fork is given a pointer to the child, not
the parent.
2
2.3.4 exec event
The exec message corresponds with struct acct_exec, and is geneated when a process calls exec(). It
exists to record the new name of the binary the program is executing.
2.4 Driver entry points
acct.c must provide the following functions to support the integration into the kernel, and to provide
the required interface for userland to access the driver.
2.4.1 Kernel entry points
The kernel is patched to call 3 functions when a process forks, execs, or exits. Those functions are
acct_fork(), acct_exec(), and acct_exit() respectively. All these functions take a struct process
* as their only argument, and do not return anything to the caller.
2.4.2 Userland entry points
acctattach( ) is called when the kernel starts running for the driver to configure any state needed for it
to operate.
acctopen() is called when a program attempts to open a device file with the corresponding major number
to this driver. It should allow only the 0th minor to be opened, opened exclusively, and only opened for
reading. Read/write or write only opens of the device should fail with EPERM. The sequence number for
generated messages should be reset to 0 on every open.
acctclose() should clean up any state associated with the open driver.
acctioctl() should support FIONREAD, and FIONBIO as per the ioctl(2) manpage. FIONASYNC should
not be implemented.
acctread() dequeues aa single message, and copies as much of that one message as possible to userland.
It should support non-blocking reads.
acctwrite() should return EOPNOTSUPP as the driver does not support being written to by a userland
process.
The driver should support non-blocking I/O (well, just O) by implementing acctpoll() and
acctkqfilter().
3 Submission
You are required to implement the acct(4) driver by writing your code in a single file, sys/ dev/acct.c.
This file in the OpenBSD source tree will be committed to your SVN repo as ass2/acct.c.
Submission must be made electronically by committing to your Subversion repository on
source.eait.uq.edu.au. In order to mark your assignment the markers will check out ass2/acct.c
from your repository. Code checked in to any other part of your repository will not be marked.
As per the source.eait.uq.edu.au usage guidelines, you should only commit source code and Makefiles.
The due date for the code submission is the beggining of your prac session, either 10am on Wednesday
the 19th, or 2pm on Thursday the 20th of September 2024. Note that no submissions can be made more
than 120 hours past the deadline under any circumstances.
3
3.1 Recommendations
The following kernel functionality may or may not be useful in the implementation of this assigment:
• malloc(9) - kernel memory allocator
• pool(9) - resource pool manager
• TAILQ_INIT(3) - doubly-linked list macros
• KASSERT(9) - kernel assert routines
• uiomove(9) - move (copy) data described by a struct uio
• mutex(9) - kernel mutex implementation
• rwlock(9) - kernel read/write lock implementation
• tsleep(9), and wakeup(9) - process context sleep and wakeup
The majority of the OpenBSD kernel still runs under a Big Giant lock, known as the kernel lock, which
can be used to provide implicit serialisation of code in this driver . The kernel lock is taken and released
with KERNEL_LOCK() and KERNEL_UNLOCK() respectively, or if it is assumed to be held, may be asserted
with KERNEL_ASSERT_LOCKED().
4 Testing
A tool will be provided that reads from the special file and parses the messages as per sys/dev/acct.h.
网络安全基础COMP3301/COMP7308课程作业补习教育在线一对一辅导。
"留学在线"的新闻页面文章、图片、音频、视频等稿件均为自媒体人、第三方机构发布或转载。如稿件涉及版权等问题,请与
我们联系删除或处理,客服邮箱756005163@qq.com,稿件内容仅为传递更多信息之目的,不代表本网观点,亦不代表本网站赞同
其观点或证实其内容的真实性。
最新文章
- 卧龙岗大学全球排名第几
留学问答 · 2024-03-06
- 卧龙岗大学全球排名第几
留学问答 · 2024-03-06
- 卧龙岗大学全球排名第几
留学问答 · 2024-03-06
- 卧龙岗大学全球排名第几
留学问答 · 2024-03-06
- 墨尔本皇家理工大学全球排名第几
留学问答 · 2024-02-29