From: Josh <jokajak@gmail.com>
To: linux-audit@redhat.com
Subject: Re: Auditing USB Question
Date: Fri, 02 Aug 2013 10:30:54 -0400 [thread overview]
Message-ID: <51FBC29E.4070603@gmail.com> (raw)
In-Reply-To: <CANs+FoW7O6Nxf6gfrf8-CjQ=d8Geqpy_PtWSN7WgTx2u4Yi4VQ@mail.gmail.com>
[-- Attachment #1.1: Type: text/plain, Size: 2610 bytes --]
On 08/01/2013 02:04 PM, Trevor Vaughan wrote:
> You don't have to mount media to pull off the data.
>
> dd + one of any number of user space utils can extract data.
>
> But, UDEV is probably the correct subsystem for this.
>
> Trevor
>
>
> On Thu, Aug 1, 2013 at 12:35 PM, Steve Grubb <sgrubb@redhat.com
> <mailto:sgrubb@redhat.com>> wrote:
>
> On Wednesday, July 31, 2013 08:15:21 PM Josh wrote:
> > That appears to only cover the mounting of filesystems, not any
> usb device
> > insertion. Specifically I'd like to capture the insertion of a USB
> > keyboard, USB mouse, or USB thumb-drive.
>
> There is no support for that. Auditing is mostly shaped by common
> criteria
> requirements. CC takes the point of view that data import and
> export is of
> interest. In order to do that, you have to mount a file system.
> So, the
> solution is to watch for mounts. The act of inserting a device has
> not been
> considered security relevant because it also says that there is
> physical
> security of the data center and random people can't stick random
> devices into
> the computer
>
> That said...there is the real world. I could see this being
> interesting for
> very paranoid setups where a random device could be inserted and
> start fuzzing
> the kernel to inject code. But if we consider this, there is also
> bluetooth
> and firewire and who knows what other interface to worry about.
>
> It might be possible to find the udev code that gets executed and
> place a watch
> on that. Or perhaps modify udev code to send a AUDIT_TRUSTED_APP
> event which
> ausearch/report will not impose and control over.
>
> -Steve
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com <mailto:Linux-audit@redhat.com>
> https://www.redhat.com/mailman/listinfo/linux-audit
>
>
>
>
> --
> Trevor Vaughan
> Vice President, Onyx Point, Inc
> (410) 541-6699
> tvaughan@onyxpoint.com <mailto:tvaughan@onyxpoint.com>
>
> -- This account not approved for unencrypted proprietary information --
>
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
I decided to write a simple udev rule that is triggered when a USB
device is added. From here I can use environment variables to choose
which data gets sent to the audit system as a USER message. This will be
enough for our purposes.
For reverence, here is the udev rule:
ACTION=="add", SUBSYSTEM=="usb", RUN+="/usr/local/sbin/usb_device_add.sh"
Thanks!
-josh
[-- Attachment #1.2: Type: text/html, Size: 4656 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
next prev parent reply other threads:[~2013-08-02 14:30 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-07-31 15:41 Auditing USB Question Josh
[not found] ` <CAP6dAmdUHdrxx7Y5XS9Otd2FV9bB9wLGy3-98dTpX20P_CQ8NA@mail.gmail.com>
2013-08-01 0:15 ` Josh
2013-08-01 16:35 ` Steve Grubb
2013-08-01 18:04 ` Trevor Vaughan
2013-08-02 14:30 ` Josh [this message]
2013-08-01 0:43 ` lists_todd
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=51FBC29E.4070603@gmail.com \
--to=jokajak@gmail.com \
--cc=linux-audit@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox