* labeled ipsec auditing
@ 2006-10-05 21:23 Joy Latten
2006-10-05 22:04 ` Steve Grubb
2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
0 siblings, 2 replies; 10+ messages in thread
From: Joy Latten @ 2006-10-05 21:23 UTC (permalink / raw)
To: linux-audit, redhat-lspp
I am auditing when an ipsec policy is added and removed from the
Security Policy Database. Should I also add audit when an SA is
added and removed? SAs can quickly fill up log since there can be many of them
and they also have a lifetime associated with them that can result in
continuous renewal. I looked at how Paul implemented netlabel auditing,
but was wondering is there any specific info I should audit for
labeled ipsec?
Regards,
Joy
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: labeled ipsec auditing
2006-10-05 21:23 labeled ipsec auditing Joy Latten
@ 2006-10-05 22:04 ` Steve Grubb
2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
1 sibling, 0 replies; 10+ messages in thread
From: Steve Grubb @ 2006-10-05 22:04 UTC (permalink / raw)
To: Joy Latten; +Cc: redhat-lspp, linux-audit
On Thursday 05 October 2006 17:23, Joy Latten wrote:
> I am auditing when an ipsec policy is added and removed from the
> Security Policy Database. Should I also add audit when an SA is
> added and removed?
What we need to capture is the changes to configuration that affects the
access decisions. Klaus may be better person to judge SP vs SA.
> I looked at how Paul implemented netlabel auditing, but
> was wondering is there any specific info I should audit for
> labeled ipsec?
We need auid and subj of the process that loads the "rules". Is there any
security relevant data in the rules that you want to log to help get a better
idea of what is being inserted/deleted?
Thanks,
-Steve
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [redhat-lspp] labeled ipsec auditing
2006-10-05 21:23 labeled ipsec auditing Joy Latten
2006-10-05 22:04 ` Steve Grubb
@ 2006-10-05 22:15 ` Paul Moore
2006-10-09 19:09 ` Klaus Weidner
1 sibling, 1 reply; 10+ messages in thread
From: Paul Moore @ 2006-10-05 22:15 UTC (permalink / raw)
To: Joy Latten; +Cc: redhat-lspp, linux-audit
Joy Latten wrote:
> I am auditing when an ipsec policy is added and removed from the
> Security Policy Database. Should I also add audit when an SA is
> added and removed? SAs can quickly fill up log since there can be many of them
> and they also have a lifetime associated with them that can result in
> continuous renewal. I looked at how Paul implemented netlabel auditing,
> but was wondering is there any specific info I should audit for
> labeled ipsec?
Hmm, good question. I'm looking at 5.2.4.4 of the LSPP doc and I see this
paragraph at the end (in part "d"):
"An LSPP-conformant TOE must only use protocols to export data with security
attributes that provide unambiguous pairings of security attributes and the
information being exported. Further, the ST author must make it clear that the
mechanisms, or devices, used to export data with security attributes cannot be
used to export data without security attributes unless this change in state can
only be done manually and is audited. In addition, the security attributes must
be exported to the same mechanism or device as the information. Also, any change
in the security attributes settings of a device must be audited."
The sentence that concerns me the most is the following: "Also, any change in
the security attributes settings of a device must be audited". I guess it boils
down if we consider a SA a "device" ...
--
paul moore
linux security @ hp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [redhat-lspp] labeled ipsec auditing
2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
@ 2006-10-09 19:09 ` Klaus Weidner
2006-10-09 19:15 ` Paul Moore
0 siblings, 1 reply; 10+ messages in thread
From: Klaus Weidner @ 2006-10-09 19:09 UTC (permalink / raw)
To: Paul Moore; +Cc: redhat-lspp, linux-audit
On Thu, Oct 05, 2006 at 06:15:44PM -0400, Paul Moore wrote:
> Hmm, good question. I'm looking at 5.2.4.4 of the LSPP doc and I see this
> paragraph at the end (in part "d"):
>
> "An LSPP-conformant TOE must only use protocols to export data with security
> attributes that provide unambiguous pairings of security attributes and the
> information being exported. Further, the ST author must make it clear that the
> mechanisms, or devices, used to export data with security attributes cannot be
> used to export data without security attributes unless this change in state can
> only be done manually and is audited. In addition, the security attributes must
> be exported to the same mechanism or device as the information. Also, any change
> in the security attributes settings of a device must be audited."
>
> The sentence that concerns me the most is the following: "Also, any change in
> the security attributes settings of a device must be audited". I guess it boils
> down if we consider a SA a "device" ...
I don't think that there a need to treat all SAs as devices. The
requirement is to have audit capability for all changes of device state
that affect MLS import/export, for example establishing or deleting an SA
with an associated MLS label, or modifying the MLS label of an SA (if
that's supported). Any operations on SAs that do not involve an MLS label
are out of scope for the "Export of Labeled User Data (FDP_ETC.2)" SFR
whose application note you are quoting.
-Klaus
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [redhat-lspp] labeled ipsec auditing
2006-10-09 19:09 ` Klaus Weidner
@ 2006-10-09 19:15 ` Paul Moore
2006-10-09 19:30 ` Klaus Weidner
0 siblings, 1 reply; 10+ messages in thread
From: Paul Moore @ 2006-10-09 19:15 UTC (permalink / raw)
To: Klaus Weidner; +Cc: redhat-lspp, linux-audit
Klaus Weidner wrote:
> On Thu, Oct 05, 2006 at 06:15:44PM -0400, Paul Moore wrote:
>
>>Hmm, good question. I'm looking at 5.2.4.4 of the LSPP doc and I see this
>>paragraph at the end (in part "d"):
>>
>>"An LSPP-conformant TOE must only use protocols to export data with security
>>attributes that provide unambiguous pairings of security attributes and the
>>information being exported. Further, the ST author must make it clear that the
>>mechanisms, or devices, used to export data with security attributes cannot be
>>used to export data without security attributes unless this change in state can
>>only be done manually and is audited. In addition, the security attributes must
>>be exported to the same mechanism or device as the information. Also, any change
>>in the security attributes settings of a device must be audited."
>>
>>The sentence that concerns me the most is the following: "Also, any change in
>>the security attributes settings of a device must be audited". I guess it boils
>>down if we consider a SA a "device" ...
>
>
> I don't think that there a need to treat all SAs as devices. The
> requirement is to have audit capability for all changes of device state
> that affect MLS import/export, for example establishing or deleting an SA
> with an associated MLS label, or modifying the MLS label of an SA (if
> that's supported). Any operations on SAs that do not involve an MLS label
> are out of scope for the "Export of Labeled User Data (FDP_ETC.2)" SFR
> whose application note you are quoting.
Going back to Joy's original mail I think it was the establishing or deleting of
an SA with SELinux context that we were concerned about (at least that is what I
was concerned about) as that could generate quite a bit of traffic. Based on
your comments above it looks like that is something we need to do.
--
paul moore
linux security @ hp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [redhat-lspp] labeled ipsec auditing
2006-10-09 19:15 ` Paul Moore
@ 2006-10-09 19:30 ` Klaus Weidner
2006-10-10 23:25 ` Joy Latten
0 siblings, 1 reply; 10+ messages in thread
From: Klaus Weidner @ 2006-10-09 19:30 UTC (permalink / raw)
To: Paul Moore; +Cc: redhat-lspp, linux-audit
On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> Going back to Joy's original mail I think it was the establishing or deleting of
> an SA with SELinux context that we were concerned about (at least that is what I
> was concerned about) as that could generate quite a bit of traffic. Based on
> your comments above it looks like that is something we need to do.
Here's what Joy wrote:
> I am auditing when an ipsec policy is added and removed from the
> Security Policy Database. Should I also add audit when an SA is
> added and removed?
If I understand it correctly, SAs can also be added and removed manually,
and unless we forbid that admins do that, it would need to be audited.
If the SPD completely determines the rules for ipsec related to MLS, it
would not be necessary to audit the individual additions and deletions,
but I'm not convinced that's the case. Does modifying the SPD
automatically tear down any currently active SAs that do not match the
updated policy?
As always, keep in mind that the system only needs to be capable of
auditing these events, not that these events always need to be
generating. It's fine to keep the audit events off by default.
-Klaus
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [redhat-lspp] labeled ipsec auditing
2006-10-09 19:30 ` Klaus Weidner
@ 2006-10-10 23:25 ` Joy Latten
2006-10-11 0:00 ` Klaus Weidner
2006-10-11 13:38 ` Serge E. Hallyn
0 siblings, 2 replies; 10+ messages in thread
From: Joy Latten @ 2006-10-10 23:25 UTC (permalink / raw)
To: Klaus Weidner; +Cc: redhat-lspp, linux-audit
On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > Going back to Joy's original mail I think it was the establishing or deleting of
> > an SA with SELinux context that we were concerned about (at least that is what I
> > was concerned about) as that could generate quite a bit of traffic. Based on
> > your comments above it looks like that is something we need to do.
>
> Here's what Joy wrote:
>
> > I am auditing when an ipsec policy is added and removed from the
> > Security Policy Database. Should I also add audit when an SA is
> > added and removed?
>
> If I understand it correctly, SAs can also be added and removed manually,
> and unless we forbid that admins do that, it would need to be audited.
>
Then do I only want to audit when an SA or SPD is manually added or
deleted? Or just audit them regardless?
Joy
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: labeled ipsec auditing
2006-10-10 23:25 ` Joy Latten
@ 2006-10-11 0:00 ` Klaus Weidner
2006-10-11 13:38 ` Serge E. Hallyn
1 sibling, 0 replies; 10+ messages in thread
From: Klaus Weidner @ 2006-10-11 0:00 UTC (permalink / raw)
To: Joy Latten; +Cc: redhat-lspp, linux-audit, Paul Moore
On Tue, Oct 10, 2006 at 06:25:01PM -0500, Joy Latten wrote:
> On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> > On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > > Going back to Joy's original mail I think it was the establishing or deleting of
> > > an SA with SELinux context that we were concerned about (at least that is what I
> > > was concerned about) as that could generate quite a bit of traffic. Based on
> > > your comments above it looks like that is something we need to do.
> >
> > Here's what Joy wrote:
> >
> > > I am auditing when an ipsec policy is added and removed from the
> > > Security Policy Database. Should I also add audit when an SA is
> > > added and removed?
> >
> > If I understand it correctly, SAs can also be added and removed manually,
> > and unless we forbid that admins do that, it would need to be audited.
> >
>
> Then do I only want to audit when an SA or SPD is manually added or
> deleted? Or just audit them regardless?
I don't really know the logic well enough to give a definitive answer.
The point is that the audit trail should provide enough information to
see changes to the IPSec state that affect MLS.
If you can make a clear distinction between manually and automatically
created ones in the code, it would be okay to have no audit record for
changes to an SA that was added or removed automatically based on the
SPD, as long as changes to the SPD are audited. If it's not clear how to
distinguish them, it's safest to have audit capability for all SA events.
-Klaus
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: labeled ipsec auditing
2006-10-10 23:25 ` Joy Latten
2006-10-11 0:00 ` Klaus Weidner
@ 2006-10-11 13:38 ` Serge E. Hallyn
2006-10-11 18:07 ` [redhat-lspp] " Joy Latten
1 sibling, 1 reply; 10+ messages in thread
From: Serge E. Hallyn @ 2006-10-11 13:38 UTC (permalink / raw)
To: Joy Latten; +Cc: redhat-lspp, Klaus Weidner, linux-audit
Quoting Joy Latten (latten@austin.ibm.com):
> On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> > On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > > Going back to Joy's original mail I think it was the establishing or deleting of
> > > an SA with SELinux context that we were concerned about (at least that is what I
> > > was concerned about) as that could generate quite a bit of traffic. Based on
> > > your comments above it looks like that is something we need to do.
> >
> > Here's what Joy wrote:
> >
> > > I am auditing when an ipsec policy is added and removed from the
> > > Security Policy Database. Should I also add audit when an SA is
> > > added and removed?
> >
> > If I understand it correctly, SAs can also be added and removed manually,
> > and unless we forbid that admins do that, it would need to be audited.
> >
>
> Then do I only want to audit when an SA or SPD is manually added or
> deleted? Or just audit them regardless?
Hi Joy,
you didn't quote the part of Klaus' email which I was hoping you'd
answer:
> If the SPD completely determines the rules for ipsec related to MLS, it
> would not be necessary to audit the individual additions and deletions,
> but I'm not convinced that's the case. Does modifying the SPD
> automatically tear down any currently active SAs that do not match the
> updated policy?
-serge
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [redhat-lspp] labeled ipsec auditing
2006-10-11 13:38 ` Serge E. Hallyn
@ 2006-10-11 18:07 ` Joy Latten
0 siblings, 0 replies; 10+ messages in thread
From: Joy Latten @ 2006-10-11 18:07 UTC (permalink / raw)
To: Serge E. Hallyn; +Cc: redhat-lspp, linux-audit
On Wed, 2006-10-11 at 08:38 -0500, Serge E. Hallyn wrote:
> Quoting Joy Latten (latten@austin.ibm.com):
> > On Mon, 2006-10-09 at 14:30 -0500, Klaus Weidner wrote:
> > > On Mon, Oct 09, 2006 at 03:15:09PM -0400, Paul Moore wrote:
> > > > Going back to Joy's original mail I think it was the establishing or deleting of
> > > > an SA with SELinux context that we were concerned about (at least that is what I
> > > > was concerned about) as that could generate quite a bit of traffic. Based on
> > > > your comments above it looks like that is something we need to do.
> > >
> > > Here's what Joy wrote:
> > >
> > > > I am auditing when an ipsec policy is added and removed from the
> > > > Security Policy Database. Should I also add audit when an SA is
> > > > added and removed?
> > >
> > > If I understand it correctly, SAs can also be added and removed manually,
> > > and unless we forbid that admins do that, it would need to be audited.
> > >
> >
> > Then do I only want to audit when an SA or SPD is manually added or
> > deleted? Or just audit them regardless?
>
> Hi Joy,
>
> you didn't quote the part of Klaus' email which I was hoping you'd
> answer:
>
> > If the SPD completely determines the rules for ipsec related to MLS, it
> > would not be necessary to audit the individual additions and deletions,
> > but I'm not convinced that's the case. Does modifying the SPD
> > automatically tear down any currently active SAs that do not match the
> > updated policy?
Sorry about that. :-) Ok, I used Eric's kernel and determined the
following. First, it doesn't seem the SPD completely determines the
rules for ipsec related to MLS. I set my spd to have "s2", and the SAs
created by racoon all had "s0-s15:c0.c1023". In fact they get this no
matter what. This does not seem correct behavior to me. I looked at the
code and it seems we are tacking on the mls label of the flow's secid to
our SA's security context. But I could not find where the flow's secid
gets set on output anywhere in xfrm code. I do not understand this.
Ok, next, I removed the policy in my spd, but SAs created by racoon
stayed around. I had to manually flush them to remove them.
Joy
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2006-10-11 18:07 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-05 21:23 labeled ipsec auditing Joy Latten
2006-10-05 22:04 ` Steve Grubb
2006-10-05 22:15 ` [redhat-lspp] " Paul Moore
2006-10-09 19:09 ` Klaus Weidner
2006-10-09 19:15 ` Paul Moore
2006-10-09 19:30 ` Klaus Weidner
2006-10-10 23:25 ` Joy Latten
2006-10-11 0:00 ` Klaus Weidner
2006-10-11 13:38 ` Serge E. Hallyn
2006-10-11 18:07 ` [redhat-lspp] " Joy Latten
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox