From: Paul Moore <paul@paul-moore.com>
To: Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp>
Cc: linux-audit@redhat.com, audit@vger.kernel.org,
Steve Grubb <sgrubb@redhat.com>,
linux-security-module <linux-security-module@vger.kernel.org>,
Casey Schaufler <casey@schaufler-ca.com>
Subject: Re: [PATCH] audit: add task history record
Date: Wed, 16 Aug 2023 09:53:58 -0400 [thread overview]
Message-ID: <CAHC9VhSz=3utr_CigGvkMEb6_avJUQq1Ak2smB7neSd76mzjFw@mail.gmail.com> (raw)
In-Reply-To: <b06dbdd8-d2f6-b190-5635-948c0a966103@I-love.SAKURA.ne.jp>
On Wed, Aug 16, 2023 at 6:10 AM Tetsuo Handa
<penguin-kernel@i-love.sakura.ne.jp> wrote:
> On 2023/08/16 3:44, Paul Moore wrote:
> > On Fri, Aug 11, 2023 at 6:58 AM Tetsuo Handa
> > <penguin-kernel@i-love.sakura.ne.jp> wrote:
> >>
> >> When an unexpected system event occurs, the administrator may want to
> >> identify which application triggered the event. For example, unexpected
> >> process termination is still a real concern enough to write articles
> >> like https://access.redhat.com/solutions/165993 .
> >>
> >> This patch adds a record which emits TOMOYO-like task history information
> >> into the audit logs for better understanding of unexpected system events.
> >>
> >> type=UNKNOWN[1340] msg=audit(1691750738.271:108): history="name=swapper/0;pid=1;start=20230811194329=>name=init;pid=1;start=20230811194343=>name=systemd;pid=1;start=20230811194439=>name=sshd;pid=3660;start=20230811104504=>name=sshd;pid=3767;start=20230811104535"
> >
> > While I respect your persistence, we've talked about this quite a bit
> > already in other threads. What you are trying to do is already
> > possible with audit
>
> How?
If you configure audit to record exec() and friends you should have a
proper history of the processes started on the system.
> > and/or TOMOYO enabled and configured
>
> Wrong. Since not all LSM hooks allow sleeping, TOMOYO is unable to
> check sending signals. Also, TOMOYO is not using audit interface.
I said "audit and/or TOMOYO"; I believe the "and/or" is important. If
I recall correctly, and perhaps I misunderstood you, you conceded that
a combination of audit *and/or* TOMOYO would solve this issue.
> > so I see no
> > reason why we want to merge this.
>
> This code makes it possible to record sending signals with TOMOYO-like context,
> and we can avoid assigning LSM ID for this code if we can merge this code as
> a part of audit.
If you want TOMOYO-like information, run TOMOYO. If your preferred
distribution doesn't support TOMOYO, you need to either ask them to
support it, find a new distribution that does, or build your own
kernel.
> > I understand your frustration that
> > TOMOYO is not enabled by your prefered distribution, but adding
> > additional (and arguably redundant code) code to the upstream kernel
> > is not a solution I am willing to support and maintain long term.
>
> Never a redundant code. Absolutely no reason we don't want to merge.
At this point in time, I obviously disagree.
> The only choice is which approach (a standalone LSM module or a part of audit)
> to go. Casey suggests this code as a part of audit. You must persuade Casey
> if you don't want this code as a part of audit.
To be very clear, it isn't my duty to persuade Casey about anything
(although if you've followed the LSM stacking saga you know I've
definitely tried on occasion! <g>). My role here is to maintain the
audit subsystem and LSM layer (along with others which aren't relevant
here) to the best of my ability. A big part of that is ensuring we
make "smart decisions" with respect to what code we merge as things
like new LSMs and new audit records are things that we have to support
*forever*. Because of this rather extreme support burden I need to
make sure that we aren't making our jobs (current developers, current
maintainers, and those that will follow us) more difficult than
absolutely necessary. From my current perspective, the benefits of
this patch, both in terms of unique functionality and durability of
the design/code, are not enough to outweigh the support burden.
--
paul-moore.com
next prev parent reply other threads:[~2023-08-16 13:55 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-08-11 10:58 [PATCH] audit: add task history record Tetsuo Handa
2023-08-11 17:50 ` Richard Guy Briggs
2023-08-12 10:08 ` Tetsuo Handa
2023-08-15 18:44 ` Paul Moore
2023-08-16 10:10 ` Tetsuo Handa
2023-08-16 13:53 ` Paul Moore [this message]
2023-08-18 10:29 ` Tetsuo Handa
2023-08-18 14:59 ` Paul Moore
2023-08-19 7:09 ` Tetsuo Handa
2023-08-21 16:04 ` Serge E. Hallyn
2023-08-21 22:23 ` Tetsuo Handa
2023-08-21 16:35 ` Paul Moore
2023-08-23 14:18 ` Tetsuo Handa
2023-08-23 14:48 ` Paul Moore
2023-08-24 13:21 ` Tetsuo Handa
2023-08-24 13:30 ` Paul Moore
2023-08-24 13:39 ` Tetsuo Handa
2023-08-24 13:47 ` Tetsuo Handa
2023-08-24 14:26 ` Paul Moore
2023-08-24 22:24 ` Tetsuo Handa
2023-08-25 3:36 ` Paul Moore
2023-08-26 6:38 ` Tetsuo Handa
2023-08-26 14:47 ` Paul Moore
2023-08-24 14:24 ` Paul Moore
2023-08-24 15:55 ` Steve Grubb
2023-08-24 17:02 ` Paul Moore
2023-08-22 16:29 ` Steve Grubb
2023-08-22 17:58 ` Paul Moore
2023-08-21 17:29 ` Serge Hallyn
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAHC9VhSz=3utr_CigGvkMEb6_avJUQq1Ak2smB7neSd76mzjFw@mail.gmail.com' \
--to=paul@paul-moore.com \
--cc=audit@vger.kernel.org \
--cc=casey@schaufler-ca.com \
--cc=linux-audit@redhat.com \
--cc=linux-security-module@vger.kernel.org \
--cc=penguin-kernel@i-love.sakura.ne.jp \
--cc=sgrubb@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).