From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: plugin auditing approach question Date: Mon, 23 Jun 2008 13:36:18 -0400 Message-ID: <200806231336.18477.sgrubb@redhat.com> References: <1214242045.6564.25.camel@homeserver> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1214242045.6564.25.camel@homeserver> Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Monday 23 June 2008 13:27:25 LC Bruzenak wrote: > I would create a library call and matching executable audit proxy. I'd > give CAP_AUDIT_WRITE to the proxy. Then, the library call would > fork/exec the audit proxy child, create a socket pair, and give each > side their half of the pair. So then you have shifted access control issues to the proxy. Once you have a proxy, then other potentially misleading apps can write to it in order to hide or make it hard to analyze a suspicious event. So, you need a way of making sure that only certain apps can connect to the proxy...and bash should not be one of them. :) Anyways, that is the core issue that I see. -Steve