public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
* prelude events
@ 2008-08-25 20:20 LC Bruzenak
  2008-08-25 20:24 ` LC Bruzenak
  0 siblings, 1 reply; 7+ messages in thread
From: LC Bruzenak @ 2008-08-25 20:20 UTC (permalink / raw)
  To: Linux Audit

I don't think file watch events are reported to prelude...right?

Thx,
LCB.

-- 
LC (Lenny) Bruzenak
lenny@magitekltd.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: prelude events
  2008-08-25 20:20 prelude events LC Bruzenak
@ 2008-08-25 20:24 ` LC Bruzenak
  2008-08-25 20:41   ` Steve Grubb
  0 siblings, 1 reply; 7+ messages in thread
From: LC Bruzenak @ 2008-08-25 20:24 UTC (permalink / raw)
  To: Linux Audit

I think I just saw the answer in the audisp-prelude man page:

...
-w /etc/shadow -p wa

       and you want idmef alerts on this, you need to add -k
ids-file-med  or something appropriate to signal  to  the  plugin
       that  this  message is for it.
...

LCB.

On Mon, 2008-08-25 at 15:20 -0500, LC Bruzenak wrote:
> I don't think file watch events are reported to prelude...right?
> 
> Thx,
> LCB.
> 
-- 
LC (Lenny) Bruzenak
lenny@magitekltd.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: prelude events
  2008-08-25 20:24 ` LC Bruzenak
@ 2008-08-25 20:41   ` Steve Grubb
  2008-08-25 20:47     ` LC Bruzenak
  0 siblings, 1 reply; 7+ messages in thread
From: Steve Grubb @ 2008-08-25 20:41 UTC (permalink / raw)
  To: linux-audit

On Monday 25 August 2008 16:24:35 LC Bruzenak wrote:
> I think I just saw the answer in the audisp-prelude man page:
> ...
> -w /etc/shadow -p wa
>
>        and you want idmef alerts on this, you need to add -k
> ids-file-med  or something appropriate to signal  to  the  plugin
>        that  this  message is for it.

Yes, you'd add  -k ids-file-  and the one of: info, low, med, or high 
depending on how severe you consider this access.

-Steve

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: prelude events
  2008-08-25 20:41   ` Steve Grubb
@ 2008-08-25 20:47     ` LC Bruzenak
  2008-08-25 21:03       ` LC Bruzenak
  2008-08-25 21:09       ` Steve Grubb
  0 siblings, 2 replies; 7+ messages in thread
From: LC Bruzenak @ 2008-08-25 20:47 UTC (permalink / raw)
  To: Steve Grubb; +Cc: linux-audit


On Mon, 2008-08-25 at 16:41 -0400, Steve Grubb wrote:
> On Monday 25 August 2008 16:24:35 LC Bruzenak wrote:
> > I think I just saw the answer in the audisp-prelude man page:
> > ...
> > -w /etc/shadow -p wa
> >
> >        and you want idmef alerts on this, you need to add -k
> > ids-file-med  or something appropriate to signal  to  the  plugin
> >        that  this  message is for it.
> 
> Yes, you'd add  -k ids-file-  and the one of: info, low, med, or high 
> depending on how severe you consider this access.
> 
> -Steve

...and of course then that made me think if we can do this for the file
watches, why not for user-submitted events also? Some of these I am
already sending into the prelude system via patched audisp-prelude.c
code, but I'd prefer to rip out this hack and instead just have a
matching key identified.

LCB.

-- 
LC (Lenny) Bruzenak
lenny@magitekltd.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: prelude events
  2008-08-25 20:47     ` LC Bruzenak
@ 2008-08-25 21:03       ` LC Bruzenak
  2008-08-25 21:09       ` Steve Grubb
  1 sibling, 0 replies; 7+ messages in thread
From: LC Bruzenak @ 2008-08-25 21:03 UTC (permalink / raw)
  To: Steve Grubb; +Cc: linux-audit


On Mon, 2008-08-25 at 15:47 -0500, LC Bruzenak wrote:
> On Mon, 2008-08-25 at 16:41 -0400, Steve Grubb wrote:
> > On Monday 25 August 2008 16:24:35 LC Bruzenak wrote:
> > > I think I just saw the answer in the audisp-prelude man page:
> > > ...
> > > -w /etc/shadow -p wa
> > >
> > >        and you want idmef alerts on this, you need to add -k
> > > ids-file-med  or something appropriate to signal  to  the  plugin
> > >        that  this  message is for it.
> > 
> > Yes, you'd add  -k ids-file-  and the one of: info, low, med, or high 
> > depending on how severe you consider this access.
> > 
> > -Steve
> 
> ...and of course then that made me think if we can do this for the file
> watches, why not for user-submitted events also? Some of these I am
> already sending into the prelude system via patched audisp-prelude.c
> code, but I'd prefer to rip out this hack and instead just have a
> matching key identified.


I don't know why I cannot think until after I hit the "send" button...
:)

The problem there is that I still want to build the prelude event with
some added name=value information I stuck in to the audit event text,
which I'd like to see in the prewikka viewer.

LCB.
-- 
LC (Lenny) Bruzenak
lenny@magitekltd.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: prelude events
  2008-08-25 20:47     ` LC Bruzenak
  2008-08-25 21:03       ` LC Bruzenak
@ 2008-08-25 21:09       ` Steve Grubb
  2008-08-25 23:41         ` LC Bruzenak
  1 sibling, 1 reply; 7+ messages in thread
From: Steve Grubb @ 2008-08-25 21:09 UTC (permalink / raw)
  To: LC Bruzenak; +Cc: linux-audit

On Monday 25 August 2008 16:47:38 LC Bruzenak wrote:
> > Yes, you'd add  -k ids-file-  and the one of: info, low, med, or high
> > depending on how severe you consider this access.
>
> ...and of course then that made me think if we can do this for the file
> watches, why not for user-submitted events also? 

The problem is that user space originating events do not have keys. So, there 
is no way to setup audit policy from the audit configuration. You could try 
adding them in the message being sent to the kernel. But this then means its 
hardcoded and no one can change it to something lower if they don't like it.


> Some of these I am already sending into the prelude system via patched
> audisp-prelude.c code, but I'd prefer to rip out this hack and instead just
> have a matching key identified.

There is a lot of specialized information aside from the key that must go into 
an alert. Source and target of attack must be clearly identified, impact, 
severity, category, etc. Not sure how to get that from a generic key. Any 
ideas along this line?

-Steve

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: prelude events
  2008-08-25 21:09       ` Steve Grubb
@ 2008-08-25 23:41         ` LC Bruzenak
  0 siblings, 0 replies; 7+ messages in thread
From: LC Bruzenak @ 2008-08-25 23:41 UTC (permalink / raw)
  To: Steve Grubb; +Cc: linux-audit

On Mon, 2008-08-25 at 17:09 -0400, Steve Grubb wrote:
> On Monday 25 August 2008 16:47:38 LC Bruzenak wrote:
> > > Yes, you'd add  -k ids-file-  and the one of: info, low, med, or high
> > > depending on how severe you consider this access.
> >
> > ...and of course then that made me think if we can do this for the file
> > watches, why not for user-submitted events also? 
> 
> The problem is that user space originating events do not have keys. So, there 
> is no way to setup audit policy from the audit configuration. You could try 
> adding them in the message being sent to the kernel. But this then means its 
> hardcoded and no one can change it to something lower if they don't like it.

Yes.

> 
> 
> > Some of these I am already sending into the prelude system via patched
> > audisp-prelude.c code, but I'd prefer to rip out this hack and instead just
> > have a matching key identified.
> 
> There is a lot of specialized information aside from the key that must go into 
> an alert. Source and target of attack must be clearly identified, impact, 
> severity, category, etc. Not sure how to get that from a generic key. Any 
> ideas along this line?

I think it would be quite difficult to figure out how to get that
information into/out of a key...

I only really care about the source (UID/GID/PID/processname) and the
audit text and serial number (added as additional data), assuming the
severity is high enough, to go into the prelude event. 

I guess the option still exists for users to just add their own
customized prelude plugin; essentially emulating all the same things
your code already does. But I didn't relish having to duplicate all the
administration and the code.

Along those lines, I was thinking that another option would be a
separate pass-through event, meant only for the plugin(s). If the event
was free-form from the audit perspective (maybe a structure with length
+ buffer), but its format was part of the audisp-plugins RPM, it would
probably work. 

In the end, this is what I'm really doing - sending a pass-through to
the established audit->prelude connection. I'm probably misusing the
intent to my own ends...

Thx,
LCB.

-- 
LC (Lenny) Bruzenak
lenny@magitekltd.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2008-08-25 23:41 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-08-25 20:20 prelude events LC Bruzenak
2008-08-25 20:24 ` LC Bruzenak
2008-08-25 20:41   ` Steve Grubb
2008-08-25 20:47     ` LC Bruzenak
2008-08-25 21:03       ` LC Bruzenak
2008-08-25 21:09       ` Steve Grubb
2008-08-25 23:41         ` LC Bruzenak

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox