Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 95 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
95
Dung lượng
1,99 MB
Nội dung
CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 545 ■ Note CAS is deprecated in .NET 4.0. How It Works To minimize the security risks posed by malicious code, the runtime does not allow assemblies granted only partial trust to access strongly named assemblies. This restriction dramatically reduces the opportunity for malicious code to attack your system, but the reasoning behind such a heavy-handed approach requires some explanation. Assemblies that contain important functionality that is shared between multiple applications are usually strongly named and are often installed in the Global Assembly Cache (GAC). This is particularly true of the assemblies that constitute the .NET Framework class library. Other strongly named assemblies from well-known and widely distributed products are in the GAC and accessible to managed applications. The high chance that certain assemblies will be present in the GAC, their easy accessibility, and their importance to many different applications make strongly named assemblies the most likely target for any type of subversive activity by malicious managed code. Generally, the code most likely to be malicious is that which is loaded from remote locations over which you have little or no control (such as over the Internet). Under the default security policy of the .NET Framework, all code run from the local machine has full trust, whereas code loaded from remote locations has only partial trust. Stopping partially trusted code from accessing strongly named assemblies means that partially trusted code has no opportunity to use the features of the assembly for malicious purposes, and cannot probe and explore the assembly to find exploitable holes. Of course, this theory hinges on the assumption that you correctly administer your security policy. If you simply assign all code full trust, not only will any assembly be able to access your strongly named assembly, but the code will also be able to access all of the functionality of the .NET Framework and even Win32 or any COM object through P/Invoke and COM Interop. That would be a security disaster! ■ Note If you design, implement, and test your shared assembly correctly using CAS to restrict access to important members, you do not need to impose a blanket restriction to prevent partially trusted code from using your assembly. However, for an assembly of any significance, it’s impossible to prove there are no security holes that malicious code can exploit. Therefore, you should carefully consider the need to allow partially trusted code to access your strongly named assembly before applying AllowPartiallyTrustedCallersAttribute. However, you might have no choice. If you are exposing public classes that provide events, you must apply this attribute. If you do not, an assembly that is not strongly named will be allowed to register a handler for one of your events, but when it is called, a security exception will be thrown. Code in an assembly that is not strongly named is not allowed to call code in a strongly named assembly. The runtime stops partially trusted code from accessing strongly named assemblies by placing an implicit LinkDemand for the FullTrust permission set on every public and protected member of every publicly accessible type defined in the assembly. This means that only assemblies granted the permissions equivalent to the FullTrust permission set are able to access the types and members from CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 546 the strongly named assembly. Applying AllowPartiallyTrustedCallersAttribute to your strongly named assembly signals the runtime to not enforce the LinkDemand on the contained types and members. ■ Note The runtime is responsible for enforcing the implicit LinkDemand security actions required to protect strongly named assemblies. The C# assembler does not generate declarative LinkDemand statements at compile time. The Code The following code fragment shows the application of the attribute AllowPartiallyTrustedCallersAttribute. Notice that you must prefix the attribute with assembly: to signal to the compiler that the target of the attribute is the assembly (also called a global attribute). In addition, you do not need to include the Attribute part of the attribute name, although you can if you want to add it. Because you target the assembly, the attribute must be positioned after any top-level using statements, but before any namespace or type declarations. using System.Security; [assembly:AllowPartiallyTrustedCallers] namespace Apress.VisualCSharpRecipes.Chapter11 { public class Recipe11-01 { // Implementation code . . . } } ■ Tip It's common practice to contain all global attributes in a file separate from the rest of your application code. Microsoft Visual Studio uses this approach, creating a file named AssemblyInfo.cs to contain all global attributes. Notes If, after applying AllowPartiallyTrustedCallersAttribute to your assembly, you want to restrict partially trusted code from calling only specific members, you should implement a LinkDemand for the FullTrust permission set on the necessary members, as shown in the following code fragment: CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 547 [System.Security.Permissions.PermissionSetAttribute (System.Security.Permissions.SecurityAction.LinkDemand, Name="FullTrust")] public void SomeMethod() { // Method code . . . } 11-2. Disable Code Access Security Problem You need to turn off all CAS checks. Solution Use the Code Access Security Policy tool (Caspol.exe) and execute the command caspol -s off from the command line to temporarily disable code access security checks. ■ Note This recipe only applies to .NET version 3.5 and earlier. How It Works Although CAS was implemented with performance in mind and has been used prudently throughout the .NET class library, some overhead is associated with each security demand and resulting stack walk that the runtime must execute to check every caller in the chain of execution. You can temporarily disable CAS and remove the overhead and possible interference caused by code-level security checks. Turning off CAS has the effect of giving all code the ability to perform any action supported by the .NET Framework (equivalent to the FullTrust permission set). This includes the ability to load other code, call native libraries, and use pointers to access memory directly. Caspol.exe is a utility provided with the .NET Framework that allows you to configure all aspects of your code access security policy from the command line. When you enter the command caspol -s off from the command line, you will see the following message indicating that CAS has been temporarily disabled: Microsoft (r) .NET Framework CasPol 2.0.50727.42 Copyright (c) Microsoft Corporation. Al rights reserved. CAS enforcement is being turned off temporarily. Press <enter> when you want to restore the setting back on. As the message states, CAS enforcement is off until you press Enter, or until the console in which Caspol.exe is running terminates. CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 548 11-3. Disable Execution Permission Checks Problem You need to load assemblies at runtime without the runtime checking them for execution permission. Solution In code, set the property CheckExecutionRights of the class System.Security.SecurityManager to false and persist the change by calling SecurityManager.SavePolicy. Alternatively, use the Code Access Security Policy tool (Caspol.exe), and execute the command caspol -e off from the command line. ■ Note This recipe only applies to .NET version 3.5 and earlier. How It Works As the runtime loads each assembly, it ensures that the assembly’s grant set (the permissions assigned to the assembly based on the security policy) includes the Execution element of SecurityPermission. The runtime implements a lazy policy resolution process, meaning that the grant set of an assembly is not calculated until the first time a security demand is made against the assembly. Not only does execution permission checking force the runtime to check that every assembly has the execution permission, but it also indirectly causes policy resolution for every assembly loaded, effectively negating the benefits of lazy policy resolution. These factors can introduce a noticeable delay as assemblies are loaded, especially when the runtime loads a number of assemblies together, as it does at application startup. In many situations, simply allowing code to load and run is not a significant risk, as long as all other important operations and resources are correctly secured using CAS and operating system security. The SecurityManager class contains a set of static methods that provide access to critical security functionality and data. This includes the CheckExecutionRights property, which turns on and off execution permission checks. To modify the value of CheckExecutionRights, your code must have the ControlPolicy element of SecurityPermission. The change will affect the current process immediately, allowing you to load assemblies at runtime without the runtime checking them for execution permission. However, the change will not affect other existing processes. You must call the SavePolicy method to persist the change to the Windows registry for it to affect new processes. The Code The following example contains two methods (ExecutionCheckOn and ExecutionCheckOff) that demonstrate the code required to turn execution permission checks on and off and persist the configuration change. You may need to run the example with administrator privileges. CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 549 using System; using System.Security; namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_03 { // A method to turn on execution permission checking // and persist the change. public void ExecutionCheckOn() { // Turn on execution permission checks. SecurityManager.CheckExecutionRights = true; // Persist the configuration change. SecurityManager.SavePolicy(); } // A method to turn off execution permission checking // and persist the change. public void ExecutionCheckOff() { // Turn off execution permission checks. SecurityManager.CheckExecutionRights = false; // Persist the configuration change. SecurityManager.SavePolicy(); } } } Notes The .NET runtime allows you to turn off the automatic checks for execution permissions from within code or by using Caspol.exe. When you enter the command caspol -e off or its counterpart caspol -e on from the command line, the Caspol.exe utility actually sets the CheckExecutionRights property of the SecurityManager class before calling SecurityManager.SavePolicy. 11-4. Ensure the Runtime Grants Specific Permissions to Your Assembly Problem You need to ensure that the runtime grants your assembly those code access permissions that are critical to the successful operation of your application. CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 550 Solution In your assembly, use permission requests to specify the code access permissions that your assembly must have. You declare permission requests using assembly-level code access permission attributes. ■ Note CAS is deprecated in .NET 4.0. How It Works The name permission request is a little misleading given that the runtime will never grant permissions to an assembly unless security policy dictates that the assembly should have those permissions. However, naming aside, permission requests serve an essential purpose, and although the way the runtime handles permission requests might initially seem strange, the nature of CAS does not allow for any obvious alternative. Permission requests identify permissions that your code must have to function. For example, if you wrote a movie player that your customers could use to download and view movies from your web server, it would be disastrous if the user’s security policy did not allow your player to open a network connection to your media server. Your player would load and run, but as soon as the user tried to connect to your server to play a movie, the application would crash with the exception System.Security.SecurityException. The solution is to include in your assembly a permission request for the code access permission required to open a network connection to your server (System.Net.WebPermission or System.Net.SocketPermission, depending on the type of connection you need to open). The runtime honors permission requests using the premise that it’s better that your code never load than to load and fail sometime later when it tries to perform an action that it does not have permission to perform. Therefore, if after security policy resolution the runtime determines that the grant set of your assembly does not satisfy the assembly’s permission requests, the runtime will fail to load the assembly and will instead throw the exception System.Security.Policy.PolicyException. Since your own code failed to load, the runtime will handle this security exception during the assembly loading and transform it into a System.IO.FileLoadException exception that will terminate your program. When you try to load an assembly from within code (either automatically or manually), and the loaded assembly contains permission requests that the security policy does not satisfy, the method you use to load the assembly will throw a PolicyException exception, which you must handle appropriately. To declare a permission request, you must use the attribute counterpart of the code access permission that you need to request. All code access permissions have an attribute counterpart that you use to construct declarative security statements, including permission requests. For example, the attribute counterpart of SocketPermission is SocketPermissionAttribute, and the attribute counterpart of WebPermission is WebPermissionAttribute. All permissions and their attribute counterparts follow the same naming convention and are members of the same namespace. When making a permission request, it’s important to remember the following: • You must declare the permission request after any top-level using statements but before any namespace or type declarations. • The attribute must target the assembly, so you must prefix the attribute name with assembly. CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 551 • You do not need to include the Attribute portion of an attribute’s name, although you can. • You must specify SecurityAction.RequestMinimum as the first positional argument of the attribute. This value identifies the statement as a permission request. • You must configure the attribute to represent the code access permission you want to request using the attribute’s properties. Refer to the .NET Framework SDK documentation for details of the properties implemented by each code access security attribute. • The permission request statements do not end with a semicolon (;). • To make more than one permission request, simply include multiple permission request statements. The Code The following example is a console application that includes two permission requests: one for SocketPermission and the other for SecurityPermission. If you try to execute the PermissionRequestExample application and your security policy does not grant the assembly the requested permissions, you will get a PolicyException, and the application will not execute. Using the default security policy, this will happen if you run the assembly from a network share, because assemblies loaded from the intranet zone are not granted SocketPermission. using System; using System.Net; using System.Security.Permissions; // Permission request for a SocketPermission that allows the code to open // a TCP connection to the specified host and port. [assembly:SocketPermission(SecurityAction.RequestMinimum, Access = "Connect", Host = "www.fabrikam.com", Port = "3538", Transport = "Tcp")] // Permission request for the UnmanagedCode element of SecurityPermission, // which controls the code's ability to execute unmanaged code. [assembly:SecurityPermission(SecurityAction.RequestMinimum, UnmanagedCode = true)] namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_04 { public static void Main() { // Do something . . . CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 552 // Wait to continue. Console.WriteLine("Main method complete. Press Enter."); Console.ReadLine(); } } } 11-5. Limit the Permissions Granted to Your Assembly Problem You need to restrict the code access permissions granted to your assembly, ensuring that people and other software can never use your code as a mechanism through which to perform undesirable or malicious actions. Solution Use declarative security statements to specify optional permission requests and permission refusal requests in your assembly. Optional permission requests define the maximum set of permissions that the runtime will grant to your assembly. Permission refusal requests specify particular permissions that the runtime should not grant to your assembly. ■ Note CAS is deprecated in .NET 4.0. How It Works In the interest of security, it’s ideal if your code has only those code access permissions required to perform its function. This minimizes the opportunities for people and other code to use your code to carry out malicious or undesirable actions. The problem is that the runtime resolves an assembly’s permissions using security policy, which a user or an administrator configures. Security policy could be different in every location where your application is run, and you have no control over what permissions the security policy assigns to your code. CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 553 Although you cannot control security policy in all locations where your code runs, the .NET Framework provides two mechanisms through which you can reject permissions granted to your assembly: • Refuse request: This allows you to identify specific permissions that you do not want the runtime to grant to your assembly. After policy resolution, if the final grant set of an assembly contains any permission specified in a refuse request, the runtime removes that permission. • Optional permission request: This defines the maximum set of permissions that the runtime can grant to your assembly. If the final grant set of an assembly contains any permissions other than those specified in the optional permission request, the runtime removes those permissions. Unlike as with a minimum permission request (discussed in recipe 11-4), the runtime will not refuse to load your assembly if it cannot grant all of the permissions specified in the optional request. You can think of a refuse request and an optional request as alternative ways to achieve the same result. The approach you use depends on how many permissions you want to reject. If you want to reject only a handful of permissions, a refuse request is easier to code. However, if you want to reject a large number of permissions, it’s easier to code an optional request for the few permissions you want, which will automatically reject the rest. You include optional and refuse requests in your code using declarative security statements with the same syntax as the minimum permission requests discussed in recipe 11-4. The only difference is the value of the System.Security.Permissions.SecurityAction that you pass to the permission attribute’s constructor. Use SecurityAction.RequestOptional to declare an optional permission request and SecurityAction.RequestRefuse to declare a refuse request. As with minimal permission requests, you must declare optional and refuse requests as global attributes by beginning the permission attribute name with the prefix assembly. In addition, all requests must appear after any top-level using statements but before any namespace or type declarations. The Code The code shown here demonstrates an optional permission request for the Internet permission set. The Internet permission set is a named permission set defined by the default security policy. When the runtime loads the example, it will not grant the assembly any permission that is not included within the Internet permission set. (Consult the .NET Framework SDK documentation for details of the permissions contained in the Internet permission set.) using System.Security.Permissions; [assembly:PermissionSet(SecurityAction.RequestOptional, Name = "Internet")] namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_05_OptionalRequest { // Class implementation . . . } } CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 554 In contrast to the preceding example, the following example uses a refuse request to single out the permission System.Security.Permissions.FileIOPermission—representing write access to the C: drive—for refusal. using System.Security.Permissions; [assembly:FileIOPermission(SecurityAction.RequestRefuse, Write = @"C:\")] namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_05_RefuseRequest { // Class implementation . . . } } 11-6. View the Permissions Required by an Assembly Problem You need to view the permissions that an assembly must be granted in order to run correctly. Solution Use the Permissions Calculator (Permcalc.exe) supplied with the .NET Framework SDK version 3.5 or earlier. ■ Note CAS is deprecated in .NET 4.0. How It Works To configure security policy correctly, you need to know the code access permission requirements of the assemblies you intend to run. This is true of both executable assemblies and libraries that you access from your own applications. With libraries, it’s also important to know which permissions the assembly refuses so that you do not try to use the library to perform a restricted action, which would result in a System.Security.SecurityException exception. The Permissions Calculator (Permcalc.exe) supplied with the .NET Framework SDK version overcomes this limitation. Permcalc.exe walks through an assembly and provides an estimate of the permissions the assembly requires to run, regardless of whether they are declarative or imperative. [...]... IsolatedStorageFilePermission(SecurityAction.RequestOptional, Unrestricted = true)] // Refuse request for ReflectionPermission [assembly: ReflectionPermission(SecurityAction.RequestRefuse, Unrestricted = true)] namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_06 { public static void Main() { // Create and configure a FileIOPermission object that represents // write access to the C:\Data folder FileIOPermission fileIOPerm... efficient to use the returned Boolean value to set a configuration flag indicating whether to allow users to save files using System.Security; using System.Security.Permissions; namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_07 { // Define a variable to indicate whether the assembly has write // access to the C:\Data folder private bool canWrite = false; public Recipe11_07() { // Create... InheritanceDemand, the PermissionSetAttribute is used to allow only classes granted the FullTrust permission set to override the method SomeProtectedMethod using System.Security.Permissions; namespace Apress.VisualCSharpRecipes.Chapter11 { [PublisherIdentityPermission(SecurityAction.InheritanceDemand, CertFile = "pubcert.cer")] public class Recipe11_08 { [PermissionSet(SecurityAction.InheritanceDemand, Name="FullTrust")]... Explorer runtime host) is free to assign additional host evidence as it loads an assembly using using using using System; System.Reflection; System.Collections; System.Security.Policy; namespace Apress.VisualCSharpRecipes.Chapter11 { public class Recipe11_09 { public static void Main(string[] args) { // Load the specified assembly Assembly a = Assembly.LoadFrom(args[0]); // Get the Evidence collection from... as command-line arguments Remember to prefix the group name with the machine or domain name, or BUILTIN for standard Windows groups using System; using System.Security.Principal; namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_10 { public static void Main (string[] args) { 566 CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY if (args.Length == 0) { Console.WriteLine( "Please provide groups to check... and Method3), and then three other methods protected using the equivalent declarative RBS demands (Method4, Method5, and Method6) using System; using System.Security.Permissions; namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_11 { public static void Method1() { // An imperative role-based security demand for the current principal // to represent an identity with the name Anya The roles... permission to execute unmanaged code // and control the thread principal [assembly:SecurityPermission(SecurityAction.RequestMinimum, UnmanagedCode=true, ControlPrincipal=true)] namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_12 { 573 CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY // Define some constants for use with the LogonUser function const int LOGON32_PROVIDER_DEFAULT = 0; const int LOGON32_LOGON_INTERACTIVE... zero values The Code The following example instantiates an RNGCryptoServiceProvider object and uses it to generate random values using System; using System.Security.Cryptography; namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_13 { public static void Main() { // Create a byte array to hold the random data byte[] number = new byte[32]; 576 CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY // Instantiate... converting strings to and from various character-encoding formats using System; using System.Text; using System.Security.Cryptography; 579 CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_14 { public static void Main(string[] args) { // Create a HashAlgorithm of the type specified by the first // command-line argument HashAlgorithm hashAlg = null;... elevated privileges If the current user is an administrator but your process is running without elevated privileges, checking membership of BUILTIN\Administrators will return false See Chapter 14 for recipes relating to elevated privileges The Code The following example demonstrates how to test whether the current user is a member of a set of named “Windows groups.” You specify the groups that you . namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_ 05_ OptionalRequest { // Class implementation . . . } } CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 55 4 In contrast. Version=1.0 .50 00.0, Culture=neutral, PublicKeyToken=b77a5c5 61934e089" version="1" Unrestricted="true"/> </PermissionSet> CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 55 7. namespace Apress.VisualCSharpRecipes.Chapter11 { class Recipe11_04 { public static void Main() { // Do something . . . CHAPTER 11 ■ SECURITY AND CRYPTOGRAPHY 55 2 // Wait to