From: Steve Grubb <sgrubb@redhat.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: Darrel Goeddel <dgoeddel@TrustedCS.com>,
James Morris <jmorris@namei.org>,
Amy Griffis <amy.griffis@hp.com>,
Dustin Kirkland <dustin.kirkland@us.ibm.com>,
Linux Audit Discussion <linux-audit@redhat.com>,
"selinux@tycho.nsa.gov" <selinux@tycho.nsa.gov>
Subject: Re: [PATCH] context based audit filtering (take 3)
Date: Fri, 24 Feb 2006 10:08:33 -0500 [thread overview]
Message-ID: <200602241008.33479.sgrubb@redhat.com> (raw)
In-Reply-To: <1140787945.21179.149.camel@moss-spartans.epoch.ncsc.mil>
On Friday 24 February 2006 08:32, Stephen Smalley wrote:
> > > Should this be a printk or an audit_log call?
> >
> > Steve G had suggested syslogging it, so I went with the printk. What
> > would be more noticeable?
Yes I did. The reasoning is that the rule is still there and waiting to become
valid. I believe there was also some conversation about making a retry
whenever policy was reloaded. So, in effect, I think this is something worthy
of a syslog and not an audit event. I think it falls into the same category
as doing an audit on an inode that doesn't exist.
> Anything user-triggerable should likely be using audit_log.
Its not really user triggerable. You have to be capable of loading audit
rules....which is an auditable event.
> Internal kernel errors reflecting a bug within the kernel might still use
> printk(KERN_ERR...).
> But I think we want to migrate SELinux and audit over to using audit_log
> whenever possible, only using printk as the fallback for things like
> audit_panic, no audit daemon, etc.
This should be the current state right now. If we have a place where something
auditable does not create an event, please point it out.
-Steve
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2006-02-24 15:08 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-02-16 15:19 [RFC] [PATCH] Darrel Goeddel
2006-02-16 18:12 ` Stephen Smalley
2006-02-16 20:09 ` Darrel Goeddel
2006-02-16 20:36 ` Stephen Smalley
2006-02-17 14:43 ` Darrel Goeddel
[not found] ` <1140192267.3083.119.camel@kirkland1.austin.ibm.com>
2006-02-17 16:23 ` Darrel Goeddel
2006-02-17 18:26 ` Stephen Smalley
2006-02-21 21:32 ` [PATCH] context based audit filtering (take 3) Darrel Goeddel
2006-02-21 23:59 ` Darrel Goeddel
2006-02-22 14:58 ` Stephen Smalley
2006-02-23 23:31 ` Darrel Goeddel
2006-02-24 13:32 ` Stephen Smalley
2006-02-24 15:08 ` Steve Grubb [this message]
2006-02-22 15:07 ` Stephen Smalley
2006-02-22 15:24 ` Stephen Smalley
[not found] ` <d9c105ea0602212217g2f255fd8gbf6ac190d7ccd751@mail.gmail.com>
2006-02-22 15:09 ` Stephen Smalley
2006-02-22 14:46 ` Stephen Smalley
2006-02-23 17:42 ` [PATCH] context based audit filtering (take 4) Darrel Goeddel
2006-02-24 13:27 ` Stephen Smalley
2006-02-24 21:44 ` [PATCH] support for context based audit filtering Darrel Goeddel
2006-02-24 22:26 ` Darrel Goeddel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200602241008.33479.sgrubb@redhat.com \
--to=sgrubb@redhat.com \
--cc=amy.griffis@hp.com \
--cc=dgoeddel@TrustedCS.com \
--cc=dustin.kirkland@us.ibm.com \
--cc=jmorris@namei.org \
--cc=linux-audit@redhat.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.