4. Privilege Separation

Published 2017-03-30
MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security.

License: Creative Commons BY-NC-SA
More information at ocw.mit.edu/terms
More courses at ocw.mit.edu/

All Comments (10)
  • @veramentegina
    fascinating lecture. and i thought i knew unix well. thanks MIT!
  • @IshanJain
    I think professor misunderstood something. At 1:09:46, He mentions each okcupid user won't correspond to a linux uid. The linux uid would be basically service id. So, Each of the different services(signup, forget password, etc) will be running under a different user. At 1:10:13, Some student, elaborated the advantages of aforementioned point. i.e. If one service is compromised, attacker can only get access to the service running under that user and everything else will be safe. Db proxy can have seperate instances running corresponding to each of the services that need db running under the same user as that service. At 1:10:42, He went off the tangent and said, Ok cupid probably didn't did that because there will be millions of process for each service and immediately after said, Spawning processes with appropriate user permission dynamically would be costly and perf would take a hit..
  • @user-eg9rj8ot7p
    It's a good lecture, but it's almost like he didn't want to mention that peripheral devices are a necessary component to a working os.