some questions about audit
Wayne Salamon
wsalamon at computer.org
Sat Oct 15 19:48:12 GMT 2005
On Oct 15, 2005, at 2:21 AM, xuejian03 at ios.cn wrote:
>
> The following is what my mentor and I would do in the next few months:
> (1) Add object’s security level to the audit trail
Can you describe where this security level is maintained? Is there a
program running that will submit the label to the kernel for
inclusion in the audit trail?
> (2) Add the event of overriding of human readable output markings
I'm not sure what you mean here.
> (3) Try to provide more choices when the audit trail overflow
> happens. At present there are only two policies available: drop
> records, or panic. Maybe rotating to the oldest file could be
> another choice.
By "audit trail overflow", I assume you mean out of disk space. This
condition is different than when the audit log is full, where the
kernel keeps writing anyway.
There are more choices, depending on the implementation of the /etc/
security/audit_warn script. This script is executed from the audit
daemon when it receives a low disk space trigger, or a no disk space
trigger. The script could clear some disk space, for example.
The behaviors you describe (drop records or panic) are performed by
the kernel, while audit log management is done by the audit daemon.
Your proposed behavior of rotating the log file should be done by the
audit_warn script, and agent of the daemon, and not by the kernel.
> (4) We want to add a command to dynamically adjust the state of
> auditing while a user's process are active, as audit_config does on
> solaris with the -setpmask options.
>
A command similar to the Solaris auditconfig command would be nice to
have. The system call is in place (auditon()) to change a process'
audit masks, as well as many other audit settings.
> Besides, after analyzing the code carefully, I have some more
> detailed questions
> (a)The AUE_WAIT4 event is not correctly dealt with in the
> kaudit_to_bsm() function. So the unfriendly warning "BSM conversion
> requested for unknown event 370" jumps every now and then. Maybe
> it's a bug?
> (b) Why is the terminal ID always 0? Can we assign something more
> meaningful?
I'll look at these two problems shortly.
> (c) The A_SETPOLICY cmd of auditon system call sets audit policy
> flags. Currently, only AUDIT_CNT and AUDIT_AHLT are implemented.
> But why they can occur at the same time? Maybe it’s confusable.
The interaction of these flags are a bit confusing, and I'll have to
examine the behavior in more depth. Right now, the CNT flag controls
whether the kernel should panic or continue when an audit record
couldn't be written because the file system containing the audit
trail has fallen below the free block count. The AHLT flag is used to
control whether the kernel should panic when the record write failed
for any other reason (file error, record conversion, etc.).
These failure modes are one area of the kernel where more code review
and testing needs to be done. I'm sure there's some things that
should change there.
> (d) The ai_mask of child process is copied from parent without any
> modification. So, if a user login while auditing is disabled, then
> none of his action would be recorded, even after auditing is
> enabled. I think it’s necessary to do some checking in function
> audit_proc_fork(). If the auditing condition has been changed, then
> the children’s mask will be recomputed.
The login command sets the audit masks of the user that logs in.
By "auditing is disabled" do you mean "disabled because the masks for
the process are cleared" or "disabled because the auditing state is
OFF"? In the second case, having login set the audit masks should
allow for the auditing of a user's process commence once auditing is
turned ON.
> (e) Some global variables are not be initiated in audit_init(),
> such as audit_in_failure, audit_fail_stop, audit_panic_on_write_fail.
Thanks for pointing those out. I'll fix them.
Wayne
------------------------
Wayne Salamon
wsalamon at computer.org
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-audit" in the body of the message
More information about the trustedbsd-audit
mailing list