* Auditing File Changes
@ 2006-07-10 17:29 eklinger
2006-07-10 17:42 ` Valdis.Kletnieks
` (2 more replies)
0 siblings, 3 replies; 23+ messages in thread
From: eklinger @ 2006-07-10 17:29 UTC (permalink / raw)
To: Linux-audit
Good morning. Please forgive me if this has been asked, but will the file
watch functionality be able to intercept writes and/or be able to
intercept the actual changes to the file and report those, in addition to
the fact that the file was modified?
Thank you
Evan
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 17:29 Auditing File Changes eklinger
@ 2006-07-10 17:42 ` Valdis.Kletnieks
2006-07-10 17:44 ` Steve Grubb
2006-07-10 19:32 ` Casey Schaufler
2 siblings, 0 replies; 23+ messages in thread
From: Valdis.Kletnieks @ 2006-07-10 17:42 UTC (permalink / raw)
To: eklinger; +Cc: Linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 655 bytes --]
On Mon, 10 Jul 2006 10:29:38 PDT, eklinger@uci.edu said:
> Good morning. Please forgive me if this has been asked, but will the file
> watch functionality be able to intercept writes and/or be able to
> intercept the actual changes to the file and report those, in addition to
> the fact that the file was modified?
No. In particular, logging the actual changes is out of the question,
because of the volume-of-data issue. Even logging the fact that writes
occurred is painful - that's why the filter usually used is "file being
opened with write permission" and make the assumption that if it opened
it for write, it will/did actually write to it....
[-- Attachment #1.2: Type: application/pgp-signature, Size: 226 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 17:29 Auditing File Changes eklinger
2006-07-10 17:42 ` Valdis.Kletnieks
@ 2006-07-10 17:44 ` Steve Grubb
2006-07-10 19:32 ` Casey Schaufler
2 siblings, 0 replies; 23+ messages in thread
From: Steve Grubb @ 2006-07-10 17:44 UTC (permalink / raw)
To: linux-audit
On Monday 10 July 2006 13:29, eklinger@uci.edu wrote:
> Please forgive me if this has been asked, but will the file watch
> functionality
We only go after an open command with write permission turned on. The case
being that you can fill up your logs quickly by intercepting all writes.
> be able to intercept writes and/or be able to intercept the
> actual changes to the file and report those, in addition to the fact that
> the file was modified?
No, it will not. If you need to see actual changes, then you need to
instrument the program in question to log changes. You can look at passwd or
hwclock as an example of this.
-Steve
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 17:29 Auditing File Changes eklinger
2006-07-10 17:42 ` Valdis.Kletnieks
2006-07-10 17:44 ` Steve Grubb
@ 2006-07-10 19:32 ` Casey Schaufler
2006-07-10 19:42 ` Valdis.Kletnieks
2006-07-10 19:46 ` Klaus Weidner
2 siblings, 2 replies; 23+ messages in thread
From: Casey Schaufler @ 2006-07-10 19:32 UTC (permalink / raw)
To: eklinger, Linux-audit
--- eklinger@uci.edu wrote:
> Good morning. Please forgive me if this has been
> asked, but will the file
> watch functionality be able to intercept writes
> and/or be able to
> intercept the actual changes to the file and report
> those, in addition to
> the fact that the file was modified?
As others have mentioned, the answer is no.
It might be an interesting project to create
a file system that does this level of audit.
Start with efs3's journaling mechanism and
retain all of the update information. True,
you'll run out of space in a hurry, but there
may be environments that would accept that.
Casey Schaufler
casey@schaufler-ca.com
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:32 ` Casey Schaufler
@ 2006-07-10 19:42 ` Valdis.Kletnieks
2006-07-10 19:56 ` LC Bruzenak
2006-07-10 19:46 ` Klaus Weidner
1 sibling, 1 reply; 23+ messages in thread
From: Valdis.Kletnieks @ 2006-07-10 19:42 UTC (permalink / raw)
To: casey; +Cc: Linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 595 bytes --]
On Mon, 10 Jul 2006 12:32:14 PDT, Casey Schaufler said:
> It might be an interesting project to create
> a file system that does this level of audit.
> Start with efs3's journaling mechanism and
> retain all of the update information. True,
> you'll run out of space in a hurry, but there
> may be environments that would accept that.
I'm not sure whether the right answer here is VMS style file versions,
or IBM big iron style database transaction logs (replaying the IMS logs
on restart, yippee! :)
Probably depends on what actual problem he's trying to solve by recording
all the changes.
[-- Attachment #1.2: Type: application/pgp-signature, Size: 226 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:32 ` Casey Schaufler
2006-07-10 19:42 ` Valdis.Kletnieks
@ 2006-07-10 19:46 ` Klaus Weidner
2006-07-10 20:24 ` Casey Schaufler
1 sibling, 1 reply; 23+ messages in thread
From: Klaus Weidner @ 2006-07-10 19:46 UTC (permalink / raw)
To: Casey Schaufler; +Cc: Linux-audit
On Mon, Jul 10, 2006 at 12:32:14PM -0700, Casey Schaufler wrote:
> It might be an interesting project to create
> a file system that does this level of audit.
> Start with efs3's journaling mechanism and
> retain all of the update information. True,
> you'll run out of space in a hurry, but there
> may be environments that would accept that.
How about using FUSE (userspace file system) on top of a version control
system (git, subversion, ...), and using the version control system's
change records to keep track of the full history?
-Klaus
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:42 ` Valdis.Kletnieks
@ 2006-07-10 19:56 ` LC Bruzenak
2006-07-10 20:38 ` Valdis.Kletnieks
` (3 more replies)
0 siblings, 4 replies; 23+ messages in thread
From: LC Bruzenak @ 2006-07-10 19:56 UTC (permalink / raw)
To: Valdis.Kletnieks; +Cc: Linux-audit
On Mon, 2006-07-10 at 15:42 -0400, Valdis.Kletnieks@vt.edu wrote:
...
>
> Probably depends on what actual problem he's trying to solve by recording
> all the changes.
Most likely the same one I have been working on all my career:
Security guy: Please deliver system with maximum security.
System guy (me): What do you need to know?
Security guy: Any and all changes to security-relevant files.
System guy: Which ones are those?
Security guy: All of 'em.
Basically my plan is this:
As Steve Grubb said, instrument the processes with trusted access.
Have file watches which note when certain "critical" files are opened
for write/append.
Have an audit analysis program which compares the trusted accesses to
the total accesses; the delta shows potentially interesting mods.
LCB.
--
LC Bruzenak
lenny@bruzenak.com
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:46 ` Klaus Weidner
@ 2006-07-10 20:24 ` Casey Schaufler
2006-07-10 21:15 ` Klaus Weidner
0 siblings, 1 reply; 23+ messages in thread
From: Casey Schaufler @ 2006-07-10 20:24 UTC (permalink / raw)
To: Klaus Weidner, Casey Schaufler; +Cc: Linux-audit
--- Klaus Weidner <klaus@atsec.com> wrote:
> On Mon, Jul 10, 2006 at 12:32:14PM -0700, Casey
> Schaufler wrote:
> > It might be an interesting project to create
> > a file system that does this level of audit.
> > Start with efs3's journaling mechanism and
> > retain all of the update information. True,
> > you'll run out of space in a hurry, but there
> > may be environments that would accept that.
>
> How about using FUSE (userspace file system) on top
> of a version control
> system (git, subversion, ...), and using the version
> control system's
> change records to keep track of the full history?
I donno, those small writes are going to be
kind of slow.
Casey Schaufler
casey@schaufler-ca.com
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:56 ` LC Bruzenak
@ 2006-07-10 20:38 ` Valdis.Kletnieks
2006-07-10 20:51 ` Valdis.Kletnieks
` (2 subsequent siblings)
3 siblings, 0 replies; 23+ messages in thread
From: Valdis.Kletnieks @ 2006-07-10 20:38 UTC (permalink / raw)
To: LC Bruzenak; +Cc: Linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 1097 bytes --]
On Mon, 10 Jul 2006 14:56:47 CDT, LC Bruzenak said:
> Security guy: Please deliver system with maximum security.
At this point, we already know the request is a crock. Even fascist
military-style security recognizes that there exist tradeoffs (which is
why "Secret" and "Top Secret" have different requirements to prevent
disclosure, and so on).
> System guy (me): What do you need to know?
> Security guy: Any and all changes to security-relevant files.
You missed the obvious questions here:
Do you need the exact change, or is the fact that an unauthorized change
happened sufficient (you can always just get the over version off backups
and diff them)?
Do you need to know about unexplained failed attempts as well?
> System guy: Which ones are those?
> Security guy: All of 'em.
*all* files are security relevant? Yowza. :)
There's not much that the audit code can do to support an unrealistic
design. There may not be much it can do to support a *realistic* one that
has certain requirements - but at least at that point we can point you
at other tools to address the issues...
[-- Attachment #1.2: Type: application/pgp-signature, Size: 226 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:56 ` LC Bruzenak
2006-07-10 20:38 ` Valdis.Kletnieks
@ 2006-07-10 20:51 ` Valdis.Kletnieks
2006-07-10 21:01 ` Klaus Weidner
2006-07-10 21:02 ` Timothy R. Chavez
2006-07-10 20:55 ` Timothy R. Chavez
2006-07-10 21:11 ` eklinger
3 siblings, 2 replies; 23+ messages in thread
From: Valdis.Kletnieks @ 2006-07-10 20:51 UTC (permalink / raw)
To: LC Bruzenak; +Cc: Linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 1329 bytes --]
On Mon, 10 Jul 2006 14:56:47 CDT, LC Bruzenak said:
(Addressing the actual design seperately)
> As Steve Grubb said, instrument the processes with trusted access.
> Have file watches which note when certain "critical" files are opened
> for write/append.
> Have an audit analysis program which compares the trusted accesses to
> the total accesses; the delta shows potentially interesting mods.
Ahh... but to find that delta, you don't really need to record the actual
changes, do you? You can (hopefully/presumably) then recover the old version
of the modified file and diff it.
And "comparing trusted accesses to total accesses" is quite possibly flawed as
well - I've lost count of times that the audit trail has clearly said that a
"trusted program" did something, and the *actual* security issue was the user
went to the bathroom and a locking screensaver wasn't engaged, allowing
somebody else to run the program surreptitiously....
Yes, a proper and correct audit trail is required - but on *any* realistic
system, the result is a fire hose of data, and no amount of data mining will
produce anything but wrong answers if you ask it the wrong questions....
(Sorry for those on the list who have a grasp on that - I find an incredible
number of people in the security industry need reminding on a regular basis..)
[-- Attachment #1.2: Type: application/pgp-signature, Size: 226 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:56 ` LC Bruzenak
2006-07-10 20:38 ` Valdis.Kletnieks
2006-07-10 20:51 ` Valdis.Kletnieks
@ 2006-07-10 20:55 ` Timothy R. Chavez
2006-07-10 21:08 ` Timothy R. Chavez
2006-07-10 21:11 ` eklinger
3 siblings, 1 reply; 23+ messages in thread
From: Timothy R. Chavez @ 2006-07-10 20:55 UTC (permalink / raw)
To: LC Bruzenak; +Cc: Linux-audit, Valdis.Kletnieks
On Mon, 2006-07-10 at 14:56 -0500, LC Bruzenak wrote:
> On Mon, 2006-07-10 at 15:42 -0400, Valdis.Kletnieks@vt.edu wrote:
> ...
> >
> > Probably depends on what actual problem he's trying to solve by recording
> > all the changes.
>
> Most likely the same one I have been working on all my career:
>
> Security guy: Please deliver system with maximum security.
> System guy (me): What do you need to know?
> Security guy: Any and all changes to security-relevant files.
> System guy: Which ones are those?
> Security guy: All of 'em.
If you issue 100 writes() in between an open() and an exit(), what does
write() #97 tell you that write() #26 doesn't? You'd pretty much have
to log what changed per-write, which would consume a ridiculous amount
of space in addition to what would be consumed by logging write()'s in
general. I think, from a security stand point, it's more interesting to
know if, when, and by whom the file was open'ed() for write.
-tim
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 20:51 ` Valdis.Kletnieks
@ 2006-07-10 21:01 ` Klaus Weidner
2006-07-10 21:39 ` Casey Schaufler
2006-07-10 21:02 ` Timothy R. Chavez
1 sibling, 1 reply; 23+ messages in thread
From: Klaus Weidner @ 2006-07-10 21:01 UTC (permalink / raw)
To: Valdis.Kletnieks; +Cc: Linux-audit
On Mon, Jul 10, 2006 at 04:51:31PM -0400, Valdis.Kletnieks@vt.edu wrote:
> And "comparing trusted accesses to total accesses" is quite possibly flawed as
> well - I've lost count of times that the audit trail has clearly said that a
> "trusted program" did something, and the *actual* security issue was the user
> went to the bathroom and a locking screensaver wasn't engaged, allowing
> somebody else to run the program surreptitiously....
That one is easy to fix by including a current webcam picture of the user
in each audit record in addition to the auid ;-)
-Klaus
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 20:51 ` Valdis.Kletnieks
2006-07-10 21:01 ` Klaus Weidner
@ 2006-07-10 21:02 ` Timothy R. Chavez
1 sibling, 0 replies; 23+ messages in thread
From: Timothy R. Chavez @ 2006-07-10 21:02 UTC (permalink / raw)
To: Valdis.Kletnieks; +Cc: Linux-audit
On Mon, 2006-07-10 at 16:51 -0400, Valdis.Kletnieks@vt.edu wrote:
> On Mon, 10 Jul 2006 14:56:47 CDT, LC Bruzenak said:
>
> (Addressing the actual design seperately)
>
> > As Steve Grubb said, instrument the processes with trusted access.
> > Have file watches which note when certain "critical" files are opened
> > for write/append.
> > Have an audit analysis program which compares the trusted accesses to
> > the total accesses; the delta shows potentially interesting mods.
>
> Ahh... but to find that delta, you don't really need to record the actual
> changes, do you? You can (hopefully/presumably) then recover the old version
> of the modified file and diff it.
Assuming you were wanting to audit write()'s, maybe the record could
include the offset into the file where writing began and how many bytes
were written. This obviously has some pretty major limitations in
usefulness, but would be more feasible than actually logging the
differences!
<snip>
-tim
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 20:55 ` Timothy R. Chavez
@ 2006-07-10 21:08 ` Timothy R. Chavez
0 siblings, 0 replies; 23+ messages in thread
From: Timothy R. Chavez @ 2006-07-10 21:08 UTC (permalink / raw)
To: LC Bruzenak; +Cc: Linux-audit, Valdis.Kletnieks
On Mon, 2006-07-10 at 15:55 -0500, Timothy R. Chavez wrote:
> If you issue 100 writes() in between an open() and an exit(), what does
^^^^^
*cough* close() *cough* oops ;-)
-tim
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 19:56 ` LC Bruzenak
` (2 preceding siblings ...)
2006-07-10 20:55 ` Timothy R. Chavez
@ 2006-07-10 21:11 ` eklinger
2006-07-10 21:22 ` Valdis.Kletnieks
2006-07-10 21:37 ` Timothy R. Chavez
3 siblings, 2 replies; 23+ messages in thread
From: eklinger @ 2006-07-10 21:11 UTC (permalink / raw)
To: LC Bruzenak; +Cc: linux-audit
> On Mon, 2006-07-10 at 15:42 -0400, Valdis.Kletnieks@vt.edu wrote:
> ...
>>
>> Probably depends on what actual problem he's trying to solve by
>> recording
>> all the changes.
>
> Most likely the same one I have been working on all my career:
>
Actually I'm trying to prevent certain files from leaving the computer,
specifically source code. However, that means I need to watch for file
copies, renames, cut and pastes, emails, etc. The idea was to encapsulate
the actual file data in an encrypted wrapper that would have to be
opened/decrypted by our program. The wrapper would also contain the
allowed operations on the file data itself, which is where auditing would
come in so that we can see what the user is attempting to do with the
file. After we decrypt the file and remove the wrapper, the raw data would
be opened in the appropriate application on the system (e.g.
OpenOffice.org). However, at the save we would want to add that wrapper
back in so they could not simply circumvent the wrapper protection. Of
course, we don't want to have to modify any of the user level applications
to achieve this functionality.
Thanks
Evan
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 20:24 ` Casey Schaufler
@ 2006-07-10 21:15 ` Klaus Weidner
0 siblings, 0 replies; 23+ messages in thread
From: Klaus Weidner @ 2006-07-10 21:15 UTC (permalink / raw)
To: Casey Schaufler; +Cc: Linux-audit
On Mon, Jul 10, 2006 at 01:24:05PM -0700, Casey Schaufler wrote:
> --- Klaus Weidner <klaus@atsec.com> wrote:
> > How about using FUSE (userspace file system) on top of a version
> > control system (git, subversion, ...), and using the version control
> > system's change records to keep track of the full history?
>
> I donno, those small writes are going to be kind of slow.
Hmm, I wonder how much would break if the filesystem treated the close()
as a commit in the version control system, with the changes not being
visible to other processes until that happens...
(or exit() instead of close() for a more transactional approach)
-Klaus
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 21:11 ` eklinger
@ 2006-07-10 21:22 ` Valdis.Kletnieks
2006-07-10 21:37 ` Timothy R. Chavez
1 sibling, 0 replies; 23+ messages in thread
From: Valdis.Kletnieks @ 2006-07-10 21:22 UTC (permalink / raw)
To: eklinger; +Cc: linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 1037 bytes --]
On Mon, 10 Jul 2006 14:11:42 PDT, eklinger@uci.edu said:
> file. After we decrypt the file and remove the wrapper, the raw data would
> be opened in the appropriate application on the system (e.g.
> OpenOffice.org). However, at the save we would want to add that wrapper
> back in so they could not simply circumvent the wrapper protection. Of
> course, we don't want to have to modify any of the user level applications
> to achieve this functionality.
OpenOffice 'Save As...' will be a can of worms, as will the fact that it
can have multiple documents open at once, and you can slice-n-mice between
them. Do you have an X server that properly enforces MLS/MCS restrictions
so cut-n-paste between documents won't work? Otherwise, they can just
cut it from their OpenOffice document, paste it into Evilution, and hit 'send'.
You're much better off just fixing the machines so you can't attach removable
media to them (no USB/firewire/etc), and then restrict the network access
so they can't send the bits anyplace interesting....
[-- Attachment #1.2: Type: application/pgp-signature, Size: 226 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 21:11 ` eklinger
2006-07-10 21:22 ` Valdis.Kletnieks
@ 2006-07-10 21:37 ` Timothy R. Chavez
2006-07-10 22:09 ` eklinger
1 sibling, 1 reply; 23+ messages in thread
From: Timothy R. Chavez @ 2006-07-10 21:37 UTC (permalink / raw)
To: eklinger; +Cc: linux-audit
On Mon, 2006-07-10 at 14:11 -0700, eklinger@uci.edu wrote:
> > On Mon, 2006-07-10 at 15:42 -0400, Valdis.Kletnieks@vt.edu wrote:
> > ...
> >>
> >> Probably depends on what actual problem he's trying to solve by
> >> recording
> >> all the changes.
> >
> > Most likely the same one I have been working on all my career:
> >
> Actually I'm trying to prevent certain files from leaving the computer,
> specifically source code. However, that means I need to watch for file
> copies, renames, cut and pastes, emails, etc. The idea was to encapsulate
> the actual file data in an encrypted wrapper that would have to be
> opened/decrypted by our program. The wrapper would also contain the
> allowed operations on the file data itself, which is where auditing would
> come in so that we can see what the user is attempting to do with the
> file. After we decrypt the file and remove the wrapper, the raw data would
> be opened in the appropriate application on the system (e.g.
> OpenOffice.org). However, at the save we would want to add that wrapper
> back in so they could not simply circumvent the wrapper protection
Maybe it's the way you've described it, but this sounds like a very
contrived and fickle security mechanism. I really don't understand the
purpose of your encryption, can you elaborate any? Maybe I'm just
confused with the example you gave. Further more, if you want to
restrict operations on a given a file, why reinvent the wheel, it's
already doable. Also, the audit subsystem does log events describing
"copy" events, renames, linking, unlinking, open's, close's, file
attribute modifications, etc, without the need for modifying specific
programs. Decompose the "abstract" event of cut and paste into its
system-calls and there you go.
> . Of
> course, we don't want to have to modify any of the user level applications
> to achieve this functionality.
You'd have to modify OpenOffice to decrypt and re-encrypt documents,
right?
-tim
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 21:01 ` Klaus Weidner
@ 2006-07-10 21:39 ` Casey Schaufler
0 siblings, 0 replies; 23+ messages in thread
From: Casey Schaufler @ 2006-07-10 21:39 UTC (permalink / raw)
To: Klaus Weidner, Valdis.Kletnieks; +Cc: Linux-audit
--- Klaus Weidner <klaus@atsec.com> wrote:
> That one is easy to fix by including a current
> webcam picture of the user
> in each audit record in addition to the auid ;-)
This was in the spec for Irix 6.6 auditing.
Really, I'm not kidding.
Casey Schaufler
casey@schaufler-ca.com
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 21:37 ` Timothy R. Chavez
@ 2006-07-10 22:09 ` eklinger
2006-07-10 23:37 ` Darren Cole
` (2 more replies)
0 siblings, 3 replies; 23+ messages in thread
From: eklinger @ 2006-07-10 22:09 UTC (permalink / raw)
To: Timothy R. Chavez; +Cc: linux-audit
> Maybe it's the way you've described it, but this sounds like a very
> contrived and fickle security mechanism. I really don't understand the
> purpose of your encryption, can you elaborate any? Maybe I'm just
> confused with the example you gave. Further more, if you want to
> restrict operations on a given a file, why reinvent the wheel, it's
> already doable. Also, the audit subsystem does log events describing
> "copy" events, renames, linking, unlinking, open's, close's, file
> attribute modifications, etc, without the need for modifying specific
> programs. Decompose the "abstract" event of cut and paste into its
> system-calls and there you go.
>
The original idea was to prevent the user from opening the file in any
text or hex editor and changing the file or the file's allowed operations,
which would be stored in the file itself. However, if we can capture the
open call we may not need the the encryption afterall. All of this is just
a proof of concept. It will need to be refined much more before we do the
actual implementation, which is why I'm here to get these comments and
ideas from the community. :) We do not want to reinvent the wheel but the
permissions need to go beyond the basic read-write-exec since engineers
will need to modify the source code files but we may not want them to copy
them to a usb drive or email them, and we want the permissions to be in
place across platforms.
>
> You'd have to modify OpenOffice to decrypt and re-encrypt documents,
> right?
The idea was that we would capture the writes and the data and then
encrypt it ourselves so OO would not need to care.
Evan
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 22:09 ` eklinger
@ 2006-07-10 23:37 ` Darren Cole
2006-07-11 12:56 ` Stephen John Smoogen
2006-07-11 13:20 ` Steve Grubb
2 siblings, 0 replies; 23+ messages in thread
From: Darren Cole @ 2006-07-10 23:37 UTC (permalink / raw)
To: eklinger; +Cc: linux-audit
> The original idea was to prevent the user from opening the file in any
> text or hex editor and changing the file or the file's allowed
> operations,
> which would be stored in the file itself. However, if we can
> capture the
> open call we may not need the the encryption afterall. All of this
> is just
> a proof of concept. It will need to be refined much more before we
> do the
> actual implementation, which is why I'm here to get these comments and
> ideas from the community. :) We do not want to reinvent the wheel
> but the
> permissions need to go beyond the basic read-write-exec since
> engineers
> will need to modify the source code files but we may not want them
> to copy
> them to a usb drive or email them, and we want the permissions to
> be in
> place across platforms.
selinux can do this using policy (MLS policy specifically) and of
course auditting. The idea is that you can label a file to be
Secret. To access this file the user must be at Secret. When at
Secret they can only write at Secret, so even if they change
permissions or copy the data, it will still be at Secret and only
users allowed Secret access can see these files. You can then define
at what level a usb device is mounted, or what level the email system
runs at, so that Secret data cannot be written to the device or sent
through email. This is greatly simplified explanation of MLS and
more detail is probably outside the scope of the audit list. You
might try looking at the lssp-redhat list <http://www.redhat.com/
mailman/listinfo/redhat-lspp>, or Fedora MLS wiki <http://
www.fedoraproject.org/wiki/SELinux/FedoraMLSHowto>.
The above is of course specific to MLS systems (selinux, Trusted
Solaris, HP-UX 10.26 and several others), so it isn't really cross
platform in they way you probably want. Still it might give you a
place to start so you don't reinvent the wheel.
>>
>> You'd have to modify OpenOffice to decrypt and re-encrypt documents,
>> right?
>
> The idea was that we would capture the writes and the data and then
> encrypt it ourselves so OO would not need to care.
In an MLS system OO should not care either.
>
> Evan
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 22:09 ` eklinger
2006-07-10 23:37 ` Darren Cole
@ 2006-07-11 12:56 ` Stephen John Smoogen
2006-07-11 13:20 ` Steve Grubb
2 siblings, 0 replies; 23+ messages in thread
From: Stephen John Smoogen @ 2006-07-11 12:56 UTC (permalink / raw)
To: eklinger@uci.edu; +Cc: linux-audit
On 7/10/06, eklinger@uci.edu <eklinger@uci.edu> wrote:
> > Maybe it's the way you've described it, but this sounds like a very
> > contrived and fickle security mechanism. I really don't understand the
> > purpose of your encryption, can you elaborate any? Maybe I'm just
> > confused with the example you gave. Further more, if you want to
> > restrict operations on a given a file, why reinvent the wheel, it's
> > already doable. Also, the audit subsystem does log events describing
> > "copy" events, renames, linking, unlinking, open's, close's, file
> > attribute modifications, etc, without the need for modifying specific
> > programs. Decompose the "abstract" event of cut and paste into its
> > system-calls and there you go.
> >
> The original idea was to prevent the user from opening the file in any
> text or hex editor and changing the file or the file's allowed operations,
> which would be stored in the file itself. However, if we can capture the
> open call we may not need the the encryption afterall. All of this is just
> a proof of concept. It will need to be refined much more before we do the
> actual implementation, which is why I'm here to get these comments and
> ideas from the community. :) We do not want to reinvent the wheel but the
> permissions need to go beyond the basic read-write-exec since engineers
> will need to modify the source code files but we may not want them to copy
> them to a usb drive or email them, and we want the permissions to be in
> place across platforms.
>
Well a lot of things I think you need are not in place yet (MLS/MCS X
server, and some other parts (webcam audit :)))
If you need a solution now then you need to go to the standard
physical beats technical listings:
1) Dont put the boxes on the internet. If they need internet access it
is done via a two system enclave and/or a one way transfer of data via
diode.
2) KVM with a trusted KVM system and put the CPU/hard-disks in a
controlled vault type enviroment. If a system has to be in the
physical control of the engineer then epoxy any port that isnt in use
(USB, Firewire) and physically tie down the keyboard/mouse etc to the
box.
3) Design processes for handling data between enclaves, handling data,
how to handle removable media, etc.
--
Stephen J Smoogen.
CSIRT/Linux System Administrator
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Auditing File Changes
2006-07-10 22:09 ` eklinger
2006-07-10 23:37 ` Darren Cole
2006-07-11 12:56 ` Stephen John Smoogen
@ 2006-07-11 13:20 ` Steve Grubb
2 siblings, 0 replies; 23+ messages in thread
From: Steve Grubb @ 2006-07-11 13:20 UTC (permalink / raw)
To: linux-audit
On Monday 10 July 2006 18:09, eklinger@uci.edu wrote:
> The original idea was to prevent the user from opening the file in any
> text or hex editor and changing the file or the file's allowed operations,
> which would be stored in the file itself.
The access has already occured by the time the audit system tells you about
it. You are simply too late. What you need its access control. The MCS
capabilities in SE Linux/FC5 may help you. You can google for MCS.
-Steve
^ permalink raw reply [flat|nested] 23+ messages in thread
end of thread, other threads:[~2006-07-11 13:20 UTC | newest]
Thread overview: 23+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-07-10 17:29 Auditing File Changes eklinger
2006-07-10 17:42 ` Valdis.Kletnieks
2006-07-10 17:44 ` Steve Grubb
2006-07-10 19:32 ` Casey Schaufler
2006-07-10 19:42 ` Valdis.Kletnieks
2006-07-10 19:56 ` LC Bruzenak
2006-07-10 20:38 ` Valdis.Kletnieks
2006-07-10 20:51 ` Valdis.Kletnieks
2006-07-10 21:01 ` Klaus Weidner
2006-07-10 21:39 ` Casey Schaufler
2006-07-10 21:02 ` Timothy R. Chavez
2006-07-10 20:55 ` Timothy R. Chavez
2006-07-10 21:08 ` Timothy R. Chavez
2006-07-10 21:11 ` eklinger
2006-07-10 21:22 ` Valdis.Kletnieks
2006-07-10 21:37 ` Timothy R. Chavez
2006-07-10 22:09 ` eklinger
2006-07-10 23:37 ` Darren Cole
2006-07-11 12:56 ` Stephen John Smoogen
2006-07-11 13:20 ` Steve Grubb
2006-07-10 19:46 ` Klaus Weidner
2006-07-10 20:24 ` Casey Schaufler
2006-07-10 21:15 ` Klaus Weidner
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.