Homework 1
Due Date: Friday, October 16, 1998
Points: 300
- (18 points) Please characterize each of the following as one of
snooping, masquerading, modifying, denying service, delaying, denying receipt,
and repudiating origin. Remember to explain your answers!
- Changing a love letter that your friend asked you to mail;
- Writing a love letter and signing your friend's name;
- Denying you wrote a love letter with your name signed;
- Denying you received a love letter that your sweetie wrote you;
- Not mailing a love letter that your friend gave you and asked you to mail;
- Reading a love letter that your friend wrote
- (12 points) Please explain in detain why authentication is considered
an integrity service. Do not give as a reason that authentication is
neither a confidentiality mechanism nor an integrity mechanism. Use the meaning
of authentication and integrity to answer the question.
- (12 points) Please characterize each of the following as a component
of a policy or as a mechanism. Again, remember to explain your answers!
- You must be enrolled in an ECS class, or an ECS or CSE major, to have an
acount in the CSIF.
- The systems staff (who administer the CSIF) check the enrollment lists that
the registrar sends to the ECS department every night to determine who is
enrolled in an ECS course.
- Initial passwords are not to be posted downstairs because someone may copy
them and use others' accounts without authorization.
- The system staff runs the program crack, which guesses passwords, to
determine if users have selected passwords that are too easy to guess.
- (20 points) Recall that the four techniques of handling deadlock are:
ignoring it, detecting it, preventing it, and avoiding it. Please compare and
contrast these approaches with the strategies of implementing mechanisms to
meet a security policy.
- (88 points) The program
setdate runs setuid to root.
Its function is to change the date of the system. See the attached manual page
for its use. Please analyze the robustness of this program using the source
code (available from the class web page).
- (150 points) Please read the book The Art of War by Sun Tzu.
Then take the examples in Ira Winkler's paper and show how they embody the
principles that Sun Tzu presents. Your essay should be at least 4 pages long
and no more than 8 pages long (or between 240 and 480 lines, if you submit
ASCII text).
NAME
setdate - change the date on the system
SYNOPSIS
setdate [ -d mmddyy ] hhmm [ ss ]
DESCRIPTION
Setdate sets the system's idea of the current time, and (optionally) the
date.
USAGE
Setdate takes its argument to represent the current time, and sets the system
clock to that time. The argument may be either four or six digits. If it is
four digits, the first two represent the hour (using a 24-hour clock) and the
next two represent the minutes. If the argument is six digits, the first four
are interpreted as before, but the last two digits represent the seconds.
If the optional argument -d is present, its option sets the date. The
option to -d is a six digit string; the first two digits represent the
year (relative to 1900), the next two the month (with January as 00 and
December as 11), and the last two the day of the month.
Setdate prints the new date after it runs.
EXAMPLES
Set the date to December 31, 1975 and the time to 12:53PM:
% setdate -d 751131 1253
Set the current time to 10:34:56AM:
% setdate 103456
Set the current time to 10:34:56PM:
% setdate 223456
SEE ALSO
date(1), ntpd(8)
DIAGNOSTICS
Setdate complains if the attempt to change the date fails.
NOTES
Only the superuser can run setdate.
AUTHOR
Matt Bishop, Department of Computer Science, University of California at Davis,
1998 ([email protected])
You can also see this document
in its native format,
in Postscript,
in PDF,
or
in ASCII text.
Send email to
[email protected].
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 10/3/98