public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
* labeled ipsec auditing
@ 2006-10-05 21:23 Joy Latten
  2006-10-05 22:04 ` Steve Grubb
  2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
  0 siblings, 2 replies; 10+ messages in thread
From: Joy Latten @ 2006-10-05 21:23 UTC (permalink / raw)
  To: linux-audit, redhat-lspp

I am auditing when an ipsec policy is added and removed from the 
Security Policy Database. Should I also add audit when an SA is 
added and removed? SAs can quickly fill up log since there can be many of them
and they also have a lifetime associated with them that can result in 
continuous renewal. I looked at how Paul implemented netlabel auditing, 
but was wondering is there any specific info I should audit for 
labeled ipsec?

Regards,
Joy   

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: labeled ipsec auditing
  2006-10-05 21:23 labeled ipsec auditing Joy Latten
@ 2006-10-05 22:04 ` Steve Grubb
  2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
  1 sibling, 0 replies; 10+ messages in thread
From: Steve Grubb @ 2006-10-05 22:04 UTC (permalink / raw)
  To: Joy Latten; +Cc: redhat-lspp, linux-audit

On Thursday 05 October 2006 17:23, Joy Latten wrote:
> I am auditing when an ipsec policy is added and removed from the
> Security Policy Database. Should I also add audit when an SA is
> added and removed? 

What we need to capture is the changes to configuration that affects the 
access decisions. Klaus may be better person to judge SP vs SA.

> I looked at how Paul implemented netlabel auditing, but 
> was wondering is there any specific info I should audit for
> labeled ipsec?

We need auid and subj of the process that loads the "rules". Is there any 
security relevant data in the rules that you want to log to help get a better 
idea of what is being inserted/deleted?

Thanks,
-Steve

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [redhat-lspp] labeled ipsec auditing
  2006-10-05 21:23 labeled ipsec auditing Joy Latten
  2006-10-05 22:04 ` Steve Grubb
@ 2006-10-05 22:15 ` Paul Moore
  2006-10-09 19:09   ` Klaus Weidner
  1 sibling, 1 reply; 10+ messages in thread
From: Paul Moore @ 2006-10-05 22:15 UTC (permalink / raw)
  To: Joy Latten; +Cc: redhat-lspp, linux-audit

Joy Latten wrote:
> I am auditing when an ipsec policy is added and removed from the 
> Security Policy Database. Should I also add audit when an SA is 
> added and removed? SAs can quickly fill up log since there can be many of them
> and they also have a lifetime associated with them that can result in 
> continuous renewal. I looked at how Paul implemented netlabel auditing, 
> but was wondering is there any specific info I should audit for 
> labeled ipsec?

Hmm, good question.  I'm looking at 5.2.4.4 of the LSPP doc and I see this
paragraph at the end (in part "d"):

"An LSPP-conformant TOE must only use protocols to export data with security
attributes that provide unambiguous pairings of security attributes and the
information being exported. Further, the ST author must make it clear that the
mechanisms, or devices, used to export data with security attributes cannot be
used to export data without security attributes unless this change in state can
only be done manually and is audited. In addition, the security attributes must
be exported to the same mechanism or device as the information. Also, any change
in the security attributes settings of a device must be audited."

The sentence that concerns me the most is the following: "Also, any change in
the security attributes settings of a device must be audited".  I guess it boils
down if we consider a SA a "device" ...

-- 
paul moore
linux security @ hp

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [redhat-lspp] labeled ipsec auditing
  2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
@ 2006-10-09 19:09   ` Klaus Weidner
  2006-10-09 19:15     ` Paul Moore
  0 siblings, 1 reply; 10+ messages in thread
From: Klaus Weidner @ 2006-10-09 19:09 UTC (permalink / raw)
  To: Paul Moore; +Cc: redhat-lspp, linux-audit

On Thu, Oct 05, 2006 at 06:15:44PM -0400, Paul Moore wrote:
> Hmm, good question.  I'm looking at 5.2.4.4 of the LSPP doc and I see this
> paragraph at the end (in part "d"):
> 
> "An LSPP-conformant TOE must only use protocols to export data with security
> attributes that provide unambiguous pairings of security attributes and the
> information being exported. Further, the ST author must make it clear that the
> mechanisms, or devices, used to export data with security attributes cannot be
> used to export data without security attributes unless this change in state can
> only be done manually and is audited. In addition, the security attributes must
> be exported to the same mechanism or device as the information. Also, any change
> in the security attributes settings of a device must be audited."
> 
> The sentence that concerns me the most is the following: "Also, any change in
> the security attributes settings of a device must be audited".  I guess it boils
> down if we consider a SA a "device" ...

I don't think that there a need to treat all SAs as devices. The
requirement is to have audit capability for all changes of device state
that affect MLS import/export, for example establishing or deleting an SA
with an associated MLS label, or modifying the MLS label of an SA (if
that's supported). Any operations on SAs that do not involve an MLS label
are out of scope for the "Export of Labeled User Data (FDP_ETC.2)" SFR
whose application note you are quoting.

-Klaus

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [redhat-lspp] labeled ipsec auditing
  2006-10-09 19:09   ` Klaus Weidner
@ 2006-10-09 19:15     ` Paul Moore
  2006-10-09 19:30       ` Klaus Weidner
  0 siblings, 1 reply; 10+ messages in thread
From: Paul Moore @ 2006-10-09 19:15 UTC (permalink / raw)
  To: Klaus Weidner; +Cc: redhat-lspp, linux-audit

Klaus Weidner wrote:
> On Thu, Oct 05, 2006 at 06:15:44PM -0400, Paul Moore wrote:
> 
>>Hmm, good question.  I'm looking at 5.2.4.4 of the LSPP doc and I see this
>>paragraph at the end (in part "d"):
>>
>>"An LSPP-conformant TOE must only use protocols to export data with security
>>attributes that provide unambiguous pairings of security attributes and the
>>information being exported. Further, the ST author must make it clear that the
>>mechanisms, or devices, used to export data with security attributes cannot be
>>used to export data without security attributes unless this change in state can
>>only be done manually and is audited. In addition, the security attributes must
>>be exported to the same mechanism or device as the information. Also, any change
>>in the security attributes settings of a device must be audited."
>>
>>The sentence that concerns me the most is the following: "Also, any change in
>>the security attributes settings of a device must be audited".  I guess it boils
>>down if we consider a SA a "device" ...
> 
> 
> I don't think that there a need to treat all SAs as devices. The
> requirement is to have audit capability for all changes of device state
> that affect MLS import/export, for example establishing or deleting an SA
> with an associated MLS label, or modifying the MLS label of an SA (if
> that's supported). Any operations on SAs that do not involve an MLS label
> are out of scope for the "Export of Labeled User Data (FDP_ETC.2)" SFR
> whose application note you are quoting.

Going back to Joy's original mail I think it was the establishing or deleting of
an SA with SELinux context that we were concerned about (at least that is what I
was concerned about) as that could generate quite a bit of traffic.  Based on
your comments above it looks like that is something we need to do.

-- 
paul moore
linux security @ hp

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [redhat-lspp] labeled ipsec auditing
  2006-10-09 19:15     ` Paul Moore
@ 2006-10-09 19:30       ` Klaus Weidner
  2006-10-10 23:25         ` Joy Latten
  0 siblings, 1 reply; 10+ messages in thread
From: Klaus Weidner @ 2006-10-09 19:30 UTC (permalink / raw)
  To: Paul Moore; +Cc: redhat-lspp, linux-audit

On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> Going back to Joy's original mail I think it was the establishing or deleting of
> an SA with SELinux context that we were concerned about (at least that is what I
> was concerned about) as that could generate quite a bit of traffic.  Based on
> your comments above it looks like that is something we need to do.

Here's what Joy wrote: 

> I am auditing when an ipsec policy is added and removed from the
> Security Policy Database. Should I also add audit when an SA is
> added and removed? 

If I understand it correctly, SAs can also be added and removed manually,
and unless we forbid that admins do that, it would need to be audited.

If the SPD completely determines the rules for ipsec related to MLS, it
would not be necessary to audit the individual additions and deletions,
but I'm not convinced that's the case. Does modifying the SPD
automatically tear down any currently active SAs that do not match the
updated policy?

As always, keep in mind that the system only needs to be capable of
auditing these events, not that these events always need to be
generating. It's fine to keep the audit events off by default.

-Klaus

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [redhat-lspp] labeled ipsec auditing
  2006-10-09 19:30       ` Klaus Weidner
@ 2006-10-10 23:25         ` Joy Latten
  2006-10-11  0:00           ` Klaus Weidner
  2006-10-11 13:38           ` Serge E. Hallyn
  0 siblings, 2 replies; 10+ messages in thread
From: Joy Latten @ 2006-10-10 23:25 UTC (permalink / raw)
  To: Klaus Weidner; +Cc: redhat-lspp, linux-audit

On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > Going back to Joy's original mail I think it was the establishing or deleting of
> > an SA with SELinux context that we were concerned about (at least that is what I
> > was concerned about) as that could generate quite a bit of traffic.  Based on
> > your comments above it looks like that is something we need to do.
> 
> Here's what Joy wrote: 
> 
> > I am auditing when an ipsec policy is added and removed from the
> > Security Policy Database. Should I also add audit when an SA is
> > added and removed? 
> 
> If I understand it correctly, SAs can also be added and removed manually,
> and unless we forbid that admins do that, it would need to be audited.
> 

Then do I only want to audit when an SA or SPD is manually added or
deleted? Or just audit them regardless?

Joy  

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: labeled ipsec auditing
  2006-10-10 23:25         ` Joy Latten
@ 2006-10-11  0:00           ` Klaus Weidner
  2006-10-11 13:38           ` Serge E. Hallyn
  1 sibling, 0 replies; 10+ messages in thread
From: Klaus Weidner @ 2006-10-11  0:00 UTC (permalink / raw)
  To: Joy Latten; +Cc: redhat-lspp, linux-audit, Paul Moore

On Tue, Oct 10, 2006 at 06:25:01PM -0500, Joy Latten wrote:
> On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> > On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > > Going back to Joy's original mail I think it was the establishing or deleting of
> > > an SA with SELinux context that we were concerned about (at least that is what I
> > > was concerned about) as that could generate quite a bit of traffic.  Based on
> > > your comments above it looks like that is something we need to do.
> > 
> > Here's what Joy wrote: 
> > 
> > > I am auditing when an ipsec policy is added and removed from the
> > > Security Policy Database. Should I also add audit when an SA is
> > > added and removed? 
> > 
> > If I understand it correctly, SAs can also be added and removed manually,
> > and unless we forbid that admins do that, it would need to be audited.
> > 
> 
> Then do I only want to audit when an SA or SPD is manually added or
> deleted? Or just audit them regardless?

I don't really know the logic well enough to give a definitive answer.
The point is that the audit trail should provide enough information to
see changes to the IPSec state that affect MLS.

If you can make a clear distinction between manually and automatically
created ones in the code, it would be okay to have no audit record for
changes to an SA that was added or removed automatically based on the
SPD, as long as changes to the SPD are audited. If it's not clear how to
distinguish them, it's safest to have audit capability for all SA events.

-Klaus

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: labeled ipsec auditing
  2006-10-10 23:25         ` Joy Latten
  2006-10-11  0:00           ` Klaus Weidner
@ 2006-10-11 13:38           ` Serge E. Hallyn
  2006-10-11 18:07             ` [redhat-lspp] " Joy Latten
  1 sibling, 1 reply; 10+ messages in thread
From: Serge E. Hallyn @ 2006-10-11 13:38 UTC (permalink / raw)
  To: Joy Latten; +Cc: redhat-lspp, Klaus Weidner, linux-audit

Quoting Joy Latten (latten@austin.ibm.com):
> On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> > On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > > Going back to Joy's original mail I think it was the establishing or deleting of
> > > an SA with SELinux context that we were concerned about (at least that is what I
> > > was concerned about) as that could generate quite a bit of traffic.  Based on
> > > your comments above it looks like that is something we need to do.
> > 
> > Here's what Joy wrote: 
> > 
> > > I am auditing when an ipsec policy is added and removed from the
> > > Security Policy Database. Should I also add audit when an SA is
> > > added and removed? 
> > 
> > If I understand it correctly, SAs can also be added and removed manually,
> > and unless we forbid that admins do that, it would need to be audited.
> > 
> 
> Then do I only want to audit when an SA or SPD is manually added or
> deleted? Or just audit them regardless?

Hi Joy,

you didn't quote the part of Klaus' email which I was hoping you'd
answer:

> If the SPD completely determines the rules for ipsec related to MLS, it
> would not be necessary to audit the individual additions and deletions,
> but I'm not convinced that's the case. Does modifying the SPD
> automatically tear down any currently active SAs that do not match the
> updated policy?

-serge

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [redhat-lspp] labeled ipsec auditing
  2006-10-11 13:38           ` Serge E. Hallyn
@ 2006-10-11 18:07             ` Joy Latten
  0 siblings, 0 replies; 10+ messages in thread
From: Joy Latten @ 2006-10-11 18:07 UTC (permalink / raw)
  To: Serge E. Hallyn; +Cc: redhat-lspp, linux-audit

On Wed, 2006-10-11 at 08:38 -0500, Serge E. Hallyn wrote:
> Quoting Joy Latten (latten@austin.ibm.com):
> > On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> > > On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > > > Going back to Joy's original mail I think it was the establishing or deleting of
> > > > an SA with SELinux context that we were concerned about (at least that is what I
> > > > was concerned about) as that could generate quite a bit of traffic.  Based on
> > > > your comments above it looks like that is something we need to do.
> > > 
> > > Here's what Joy wrote: 
> > > 
> > > > I am auditing when an ipsec policy is added and removed from the
> > > > Security Policy Database. Should I also add audit when an SA is
> > > > added and removed? 
> > > 
> > > If I understand it correctly, SAs can also be added and removed manually,
> > > and unless we forbid that admins do that, it would need to be audited.
> > > 
> > 
> > Then do I only want to audit when an SA or SPD is manually added or
> > deleted? Or just audit them regardless?
> 
> Hi Joy,
> 
> you didn't quote the part of Klaus' email which I was hoping you'd
> answer:
> 
> > If the SPD completely determines the rules for ipsec related to MLS, it
> > would not be necessary to audit the individual additions and deletions,
> > but I'm not convinced that's the case. Does modifying the SPD
> > automatically tear down any currently active SAs that do not match the
> > updated policy?

Sorry about that. :-) Ok, I used Eric's kernel and determined the
following. First, it doesn't seem the SPD completely determines the
rules for ipsec related to MLS. I set my spd to have "s2", and the SAs
created by racoon all had "s0-s15:c0.c1023". In fact they get this no
matter what. This does not seem correct behavior to me. I looked at the
code and it seems we are tacking on the mls label of the flow's secid to
our SA's security context. But I could not find where the flow's secid
gets set on output anywhere in xfrm code. I do not understand this.

Ok, next, I removed the policy in my spd, but SAs created by racoon
stayed around. I had to manually flush them to remove them. 

Joy

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2006-10-11 18:07 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-05 21:23 labeled ipsec auditing Joy Latten
2006-10-05 22:04 ` Steve Grubb
2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
2006-10-09 19:09   ` Klaus Weidner
2006-10-09 19:15     ` Paul Moore
2006-10-09 19:30       ` Klaus Weidner
2006-10-10 23:25         ` Joy Latten
2006-10-11  0:00           ` Klaus Weidner
2006-10-11 13:38           ` Serge E. Hallyn
2006-10-11 18:07             ` [redhat-lspp] " Joy Latten

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox