From: Eamon Walsh <ewalsh@tycho.nsa.gov>
To: Steve Grubb <sgrubb@redhat.com>
Cc: linux-audit@redhat.com, selinux@tycho.nsa.gov,
Steve G <linux_4ever@yahoo.com>
Subject: Re: missing avc message field names
Date: Mon, 29 Jan 2007 18:48:48 -0500 [thread overview]
Message-ID: <45BE87E0.5090109@tycho.nsa.gov> (raw)
In-Reply-To: <200701291749.21897.sgrubb@redhat.com>
>>>> Steve G wrote:
>>>>
> I'd also like to make sure that all AVCs really are AVCs. I think there are
> some error messages that come out as AVCs when they should be SE_ERR or
> USER_SE_ERR.
>
>
This is a separate issue, this results from the userspace AVC's logging
callback not having a type field. I'm aware of this problem and willing
to fix it but I'd like to get a clear picture of what the final auditing
format will be first, so I'm glad this discussion is taking place.
> You already have them split out...or did you totally skip AUDIT_USER_AVC? So,
> you already have to solve the problem so why not generalize the solution? The
> parsing API should be able to help with this. If you tell it to get all the
> different types and they don't exist, you don't get a hit except the ones
> that do exist.
>
>
My point here was simply to warn in advance that userspace object
managers will in general introduce widely varying fields to their AVC
messages and that the auditing record format should be equipped to deal
with that. Who knows what types of objects will appear in these
messages in the future: there might be SELinux-enhanced e-mail clients,
office applications, file managers in the future. Making the dictionary
easily extensible now will likely pay off later and the prefix idea is a
way to do that.
As far as binary records go, if that is the future direction then I
don't see why the disk space argument is being made for not having a
prefix. Presumably in binary form the keywords will be assigned
numbers that are fixed size, so that the length of the string
representation shouldn't matter. And even in text form if the logs are
compressed then the length issue will be mediated.
>>
> I doubt there very many security related pieces of information that is not
> already in the dictionary. There are a finite number of security objects and
> their attributes.
>
>
Again I think that the audit system should support future expansion if
it's going to be the new way for handling AVC's and other security events.
>> And what about third-party tools that are security critical?
>>
>
> They have the TRUSTED_APP message type and they can put anything in that they
> want. I consider that one completely freestyle.
>
>
How does this work with binary records? How will these messages be
searched?
> Nearly all names are unique (and the problem should be solved when I code up
> seperm and seresults). Adding more letters to the name eats the diskspace. We
> only do it when necessary. That is what drives the choice of "res" instead
> of "results" for the audit system.
>
I do think it should be selinux.perms, selinux.result and the other AVC
stuff should be selinux.foo. These are long names I concede but they
are clearer and log size is already an issue anyway, moving to
compressed or binary will solve the problem.
>
--
Eamon Walsh <ewalsh@tycho.nsa.gov>
National Security Agency
next prev parent reply other threads:[~2007-01-29 23:48 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20070129185542.32977.qmail@web51502.mail.yahoo.com>
2007-01-29 19:22 ` missing avc message field names Eamon Walsh
[not found] ` <45BE4971.6090601-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
2007-01-29 19:43 ` Karl MacMillan
2007-01-29 20:07 ` Eamon Walsh
2007-01-29 20:56 ` Steve Grubb
2007-01-29 21:16 ` Karl MacMillan
2007-01-29 22:49 ` Steve Grubb
2007-01-29 23:48 ` Eamon Walsh [this message]
[not found] ` <45BE87E0.5090109-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
2007-01-30 12:25 ` Russell Coker
[not found] ` <200701291749.21897.sgrubb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2007-01-30 14:49 ` Karl MacMillan
2007-01-30 17:06 ` Joshua Brindle
2007-01-30 17:28 ` Valdis.Kletnieks
2007-01-30 18:45 ` Casey Schaufler
2007-01-30 17:42 ` Steve Grubb
2007-01-30 22:53 ` James Antill
[not found] ` <1170197588.3373.28.camel-pBdgC7Q4sO52KDkfy0k2sw@public.gmane.org>
2007-01-31 0:50 ` Karl MacMillan
2007-01-31 5:29 ` Joshua Brindle
[not found] ` <45C02948.9090607-5TQdPaFcblfQT0dZR+AlfA@public.gmane.org>
2007-01-31 22:59 ` Russell Coker
2007-02-01 11:40 ` Steve Grubb
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=45BE87E0.5090109@tycho.nsa.gov \
--to=ewalsh@tycho.nsa.gov \
--cc=linux-audit@redhat.com \
--cc=linux_4ever@yahoo.com \
--cc=selinux@tycho.nsa.gov \
--cc=sgrubb@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox