![]() |
||
Overview| Examples| Bugs| FAQ | White papers | Download | Help wanted | SourceForge Project page | Filltable utility | ||
Next
Previous
Contents
1. Introduction1.1 Identification
1.2 Security Target OverviewThe filltable utility is a python script to allow relatively untrusted (junior) GNU/Linux system adinistrators (for example system adinistrator of a chrooted sandbox) to modify specific parts of the linux netfilter configuration with the help of the senior system administrator. The senior system administrator can designate specific packet classes (based on source/destination addresses, ports, etc) to be managed by the junior system administrator. These packet filter classes are directed to one or more netfilter chains. The junior system administrator can describe the configuration in a text file, which makes the input of the filltable utility. After that the senior system administrator can run the filltable utility on these files, thus obtaining an iptables dump whith which she can modify the configuration. The filltable script is strict on the syntax of its input file, thus makes compromising the execution domain of itself impossible. The script is accompanied with a test suite and documentation. The filltable script is a Trusted Procedure in the sense of the Clark-Wilson access control modell. This Security Target, hence the TOE does not claims conformance to any Protection Profile. The Assurance level of the Security Target, hence the TOE is EAL3 augmented. The TOE is designed to be added to the Trusted Computing Base of an LSPP conformant Operating System product in a manner that the Operating System product continues to be LSPP conformant. You can find the known issues with the Security Target and the TOE (TODO) at the end of this Security Target. In the evaluated version this section is empty. 1.3 Common Criteria ConformanceThe filltable script aims to be part2 conformant and part3 conformant. Next Previous Contents |