public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
From: Steve Grubb <sgrubb@redhat.com>
To: linux-audit@redhat.com, burn@swtf.dyndns.org
Subject: Re: Question on the unset user in audit
Date: Tue, 05 Nov 2013 07:51:18 -0500	[thread overview]
Message-ID: <345916171.GNoEKTagHW@x2> (raw)
In-Reply-To: <1383650363.19466.78.camel@swtf.swtf.dyndns.org>

On Tuesday, November 05, 2013 10:19:23 PM Burn Alting wrote:
> All,
> 
> I have seen some audit.rules that ignore ALL events involving auid being
> the unset user ie a rule segment of
> 
> 	-F auid!=4294967295
> 
> What are the possible risks of excluding recording events from the unset
> auid? Especially since I believe root could override the auid by writing
> to /proc/self/loginuid.

In talking with agencies like DISA, what they wanted is to identify events 
originating from users as opposed to normal "system" activities. Meaning that 
if during startup disks are mounted, its an uninteresting event because its 
normal startup activity. However, if there is an associated auid >= 500, then 
its user originating and of interest.

Should an admin change their auid, there will be an audit event recording that 
fact. That said, Linux is not designed in any way to guard against a malicious 
admin. One of the assumptions in Common Criteria is A.NO_EVIL_ADMIN and there 
are training clauses. But there are some steps that can be taken. On newer 
kernels there is the object comparator commands '-C' where you can detect 
abuses of power such as an admin accessing a user's home directory.

If you are really wanting to use the audit system to even detect signs of 
compromise, then you can to some extent. You can see apps crashing, you can 
imagine SE Linux as a defined behavior of applications so that AVC's represent 
attempts at intrusion, you can also see other attempted changes to the system 
such as installing executables. But I think at some point the system may be 
compromised to the point that you can't detect it from the host, you have to 
have external monitoring and look for suspicious behavior outside the system.

Not sure if that was the direction you were going with your question. :-)

-Steve

  reply	other threads:[~2013-11-05 12:51 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-11-05 11:19 Question on the unset user in audit Burn Alting
2013-11-05 12:51 ` Steve Grubb [this message]
2013-11-05 13:07   ` Burn Alting

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=345916171.GNoEKTagHW@x2 \
    --to=sgrubb@redhat.com \
    --cc=burn@swtf.dyndns.org \
    --cc=linux-audit@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox