From: Trevor Vaughan <peiriannydd@gmail.com>
To: linux-audit@redhat.com
Subject: Re: auditing activity where uid==0
Date: Fri, 04 Dec 2009 06:08:42 -0500 [thread overview]
Message-ID: <4B18EDBA.5070603@gmail.com> (raw)
In-Reply-To: <200910191114.45636.sgrubb@redhat.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>
> -a entry,always -S execve -F euid=0 -F auid>=500 -F auid!=4294967295
Be aware that this rule does grab the nfsnobody user, which has a uid > 500.
>
> The loginuid is only set for real logins. But if they issue "service httpd
> restart", then apache has their loginuid, too, and you will start getting
> apache events.
Yes, and this is quite painful.
>
>> I'm getting lots of extraneous chatter from sshd, automount, and cron, all
>> of which are from tty=(none), but I'm not sure it's possible to filter on
>> tty...
It's not as far as I could find, though this would be an awesome
feature. Basically, the ability to say, tty!=none.
>
> The way that we suggest auditing the actions of a root user is by using the
> tty audit capability. This is a little more specific about what is really
> happening. For example, someone could start a python shell and start issuing
> commands. If you audit by execve, then all you see is python start up and then
> you see nothing else. Also, bash can do networking. Its possible to transfer
> files using bash primitives that you won't pick up by auditing execve syscalls.
> Awk is also network aware...
One thing to note about the tty audit capability is that it is a forward
processing logger, not an echo logger. This means that it *will*
capture passwords that you type in at the command line even if they are
not echoed.
You may want to look at something like sudosh or the like which are echo
loggers and will not collect anything that is hidden from the terminal.
This presents it's own problems, but at least won't grab sensitive
passwords in general.
Trevor
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAksY7boACgkQyjMdFR1108BQxQCeNnLC/430OiNSHVZVhU2GdJ6h
BEwAn34K52cRhSZsDQ1PpFbtqP1tnqwa
=7MfW
-----END PGP SIGNATURE-----
next prev parent reply other threads:[~2009-12-04 11:09 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-10-19 15:02 auditing activity where uid==0 Rich Whitcroft
2009-10-19 15:14 ` Steve Grubb
2009-12-04 11:08 ` Trevor Vaughan [this message]
2009-12-04 14:35 ` Steve Grubb
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4B18EDBA.5070603@gmail.com \
--to=peiriannydd@gmail.com \
--cc=linux-audit@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox