From: Steve Grubb <sgrubb@redhat.com>
To: linux-audit@redhat.com
Subject: Re: Dropping auid for daemons started via sudo
Date: Mon, 17 May 2010 09:48:04 -0400 [thread overview]
Message-ID: <201005170948.05227.sgrubb@redhat.com> (raw)
In-Reply-To: <AANLkTimA9PQflCs58p6wPLxEdhdys4jUJ33OQw37sPbU@mail.gmail.com>
On Monday 17 May 2010 09:32:15 am Konstantin Ryabitsev wrote:
> It mostly does the right thing, except for cases when an admin logs in
> and restarts a service. If it's running a privileged process, that
> process will have an auid of the user that last ran "service foo
> restart".
Yep.
> Is there a way to drop auid for services restarted by individual
> admins?
No, because that would allow the audit system to be attacked so that it
misrepresents who actually did something. This would be on the short list of
things to do like cleaning up logs after successfully compromising a system.
> I'm not sure if run_init does it, but I can't use it anyway
> because selinux is disabled on those machines.
What I would really like to see is daemons not being started directly. Meaning
that when you run "service httpd restart", this would tell init to restart
httpd so that httpd does not inherit anything in the admin's environment. This
would clean up SE Linux rules a bit too since there wouldn't be a need to
transition from the admin's context to the daemon's. The path would always be
admin->init->daemon. Of course starting up a service in this way should be an
auditable event, too.
> Thanks for any advice.
No so much advice as just an understanding of why its this way. I won't have
time to look into upstart any time soon, but it would be nice if someone else
did some digging into this and perhaps even fix it for everyone.
-Steve
prev parent reply other threads:[~2010-05-17 13:48 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-05-17 13:32 Dropping auid for daemons started via sudo Konstantin Ryabitsev
2010-05-17 13:48 ` Steve Grubb [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=201005170948.05227.sgrubb@redhat.com \
--to=sgrubb@redhat.com \
--cc=linux-audit@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.