* [PATCH] Add SELinux context and TTY name to AUDIT_TTY records
[not found] <230738142.1737601237483061914.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
@ 2009-03-19 17:18 ` Miloslav Trmac
2009-03-19 20:58 ` Paul Moore
0 siblings, 1 reply; 4+ messages in thread
From: Miloslav Trmac @ 2009-03-19 17:18 UTC (permalink / raw)
To: viro, Eric Paris; +Cc: linux-audit, linux-kernel, Steve Grubb
[-- Attachment #1: Type: text/plain, Size: 610 bytes --]
From: Miloslav Trmač <mitr@redhat.com>
Add SELinux context information and TTY name (consistent with the
AUDIT_SYSCALL record) to AUDIT_TTY. An example record after applying
this patch:
type=TTY msg=audit(1237480806.220:22): tty pid=2601 uid=0 auid=500 ses=1
subj=unconfined_u:unconfined_r:unconfined_t:s0 major=136 minor=1 tty=pts1
comm="bash" data=6361740D
(line wrapped, new fields are "subj" and "tty".)
Signed-off-by: Miloslav Trmač <mitr@redhat.com>
---
drivers/char/tty_audit.c | 57 ++++++++++++++++++++++++-------------
1 file changed, 38 insertions(+), 19 deletions(-)
[-- Attachment #2: audit-tty-more-fields.patch --]
[-- Type: application/octet-stream, Size: 4652 bytes --]
From: Miloslav Trmač <mitr@redhat.com>
Add SELinux context information and TTY name (consistent with the
AUDIT_SYSCALL record) to AUDIT_TTY. An example record after applying
this patch:
type=TTY msg=audit(1237480806.220:22): tty pid=2601 uid=0 auid=500 ses=1
subj=unconfined_u:unconfined_r:unconfined_t:s0 major=136 minor=1 tty=pts1
comm="bash" data=6361740D
(line wrapped, new fields are "subj" and "tty".)
Signed-off-by: Miloslav Trmač <mitr@redhat.com>
---
drivers/char/tty_audit.c | 57 ++++++++++++++++++++++++-------------
1 file changed, 38 insertions(+), 19 deletions(-)
diff --git a/drivers/char/tty_audit.c b/drivers/char/tty_audit.c
index 34ab6d7..1b7add4 100644
--- a/drivers/char/tty_audit.c
+++ b/drivers/char/tty_audit.c
@@ -12,6 +12,7 @@
#include <linux/audit.h>
#include <linux/file.h>
#include <linux/fdtable.h>
+#include <linux/security.h>
#include <linux/tty.h>
struct tty_audit_buf {
@@ -19,12 +20,21 @@ struct tty_audit_buf {
struct mutex mutex; /* Protects all data below */
int major, minor; /* The TTY which the data is from */
unsigned icanon:1;
+ char tty_name[sizeof(((struct tty_struct *)NULL)->name)];
size_t valid;
unsigned char *data; /* Allocated size N_TTY_BUF_SIZE */
};
-static struct tty_audit_buf *tty_audit_buf_alloc(int major, int minor,
- int icanon)
+static void tty_audit_buf_setup(struct tty_audit_buf *buf,
+ struct tty_struct *tty)
+{
+ buf->major = tty->driver->major;
+ buf->minor = tty->driver->minor_start + tty->index;
+ buf->icanon = tty->icanon;
+ strcpy(buf->tty_name, tty->name);
+}
+
+static struct tty_audit_buf *tty_audit_buf_alloc(struct tty_struct *tty)
{
struct tty_audit_buf *buf;
@@ -39,9 +49,7 @@ static struct tty_audit_buf *tty_audit_buf_alloc(int major, int minor,
goto err_buf;
atomic_set(&buf->count, 1);
mutex_init(&buf->mutex);
- buf->major = major;
- buf->minor = minor;
- buf->icanon = icanon;
+ tty_audit_buf_setup(buf, tty);
buf->valid = 0;
return buf;
@@ -69,7 +77,8 @@ static void tty_audit_buf_put(struct tty_audit_buf *buf)
static void tty_audit_log(const char *description, struct task_struct *tsk,
uid_t loginuid, unsigned sessionid, int major,
- int minor, unsigned char *data, size_t size)
+ int minor, const char *tty_name,
+ unsigned char *data, size_t size)
{
struct audit_buffer *ab;
@@ -77,11 +86,25 @@ static void tty_audit_log(const char *description, struct task_struct *tsk,
if (ab) {
char name[sizeof(tsk->comm)];
uid_t uid = task_uid(tsk);
-
- audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u "
- "major=%d minor=%d comm=", description,
- tsk->pid, uid, loginuid, sessionid,
- major, minor);
+ u32 sid;
+
+ audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u",
+ description, tsk->pid, uid, loginuid,
+ sessionid);
+ security_task_getsecid(tsk, &sid);
+ if (sid) {
+ char *ctx;
+ u32 len;
+
+ if (security_secid_to_secctx(sid, &ctx, &len))
+ audit_log_format(ab, " ssid=%u", sid);
+ else {
+ audit_log_format(ab, " subj=%s", ctx);
+ security_release_secctx(ctx, len);
+ }
+ }
+ audit_log_format(ab, " major=%d minor=%d tty=%s comm=", major,
+ minor, tty_name);
get_task_comm(name, tsk);
audit_log_untrustedstring(ab, name);
audit_log_format(ab, " data=");
@@ -105,7 +128,7 @@ static void tty_audit_buf_push(struct task_struct *tsk, uid_t loginuid,
if (audit_enabled == 0)
return;
tty_audit_log("tty", tsk, loginuid, sessionid, buf->major, buf->minor,
- buf->data, buf->valid);
+ buf->tty_name, buf->data, buf->valid);
buf->valid = 0;
}
@@ -191,7 +214,7 @@ void tty_audit_tiocsti(struct tty_struct *tty, char ch)
auid = audit_get_loginuid(current);
sessionid = audit_get_sessionid(current);
tty_audit_log("ioctl=TIOCSTI", current, auid, sessionid, major,
- minor, &ch, 1);
+ minor, tty->name, &ch, 1);
}
}
@@ -240,9 +263,7 @@ static struct tty_audit_buf *tty_audit_buf_get(struct tty_struct *tty)
}
spin_unlock_irq(¤t->sighand->siglock);
- buf2 = tty_audit_buf_alloc(tty->driver->major,
- tty->driver->minor_start + tty->index,
- tty->icanon);
+ buf2 = tty_audit_buf_alloc(tty);
if (buf2 == NULL) {
audit_log_lost("out of memory in TTY auditing");
return NULL;
@@ -294,9 +315,7 @@ void tty_audit_add_data(struct tty_struct *tty, unsigned char *data,
if (buf->major != major || buf->minor != minor
|| buf->icanon != tty->icanon) {
tty_audit_buf_push_current(buf);
- buf->major = major;
- buf->minor = minor;
- buf->icanon = tty->icanon;
+ tty_audit_buf_setup(buf, tty);
}
do {
size_t run;
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] Add SELinux context and TTY name to AUDIT_TTY records
2009-03-19 17:18 ` Miloslav Trmac
@ 2009-03-19 20:58 ` Paul Moore
0 siblings, 0 replies; 4+ messages in thread
From: Paul Moore @ 2009-03-19 20:58 UTC (permalink / raw)
To: linux-audit; +Cc: Miloslav Trmac, viro, Eric Paris, linux-kernel
On Thursday 19 March 2009 01:18:00 pm Miloslav Trmac wrote:
> From: Miloslav Trmač <mitr@redhat.com>
>
> Add SELinux context information and TTY name (consistent with the
> AUDIT_SYSCALL record) to AUDIT_TTY. An example record after applying
> this patch:
>
> type=TTY msg=audit(1237480806.220:22): tty pid=2601 uid=0 auid=500 ses=1
> subj=unconfined_u:unconfined_r:unconfined_t:s0 major=136 minor=1 tty=pts1
> comm="bash" data=6361740D
>
> (line wrapped, new fields are "subj" and "tty".)
>
> Signed-off-by: Miloslav Trmač <mitr@redhat.com>
> ---
> drivers/char/tty_audit.c | 57 ++++++++++++++++++++++++-------------
> 1 file changed, 38 insertions(+), 19 deletions(-)
Just a quick procedural comment, in the future you should include patches in
the body of the email; people will likely ignore your submission otherwise.
There are several audit experts which should review this code but two things
jumped out at me when glancing at your patch:
1. SELinux SIDs should not be recorded
2. From a SELinux/security point of view ttys are considered objects
and their labels/contexts should be recorded with "obj=" not "subj="
--
paul moore
linux @ hp
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] Add SELinux context and TTY name to AUDIT_TTY records
[not found] <1446383553.1772511237538977759.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
@ 2009-03-20 8:53 ` Miloslav Trmac
2009-03-20 13:51 ` Paul Moore
0 siblings, 1 reply; 4+ messages in thread
From: Miloslav Trmac @ 2009-03-20 8:53 UTC (permalink / raw)
To: Paul Moore; +Cc: viro, Eric Paris, linux-kernel, linux-audit
Paul,
Thanks for your review.
----- "Paul Moore" <paul.moore@hp.com> wrote:
> There are several audit experts which should review this code but two
> things
> jumped out at me when glancing at your patch:
>
> 1. SELinux SIDs should not be recorded
Almost all code that logs SELinux contexts in kernel/audit* does the same thing as this patch, falling back to a SID if it can't be converted to a string.
> 2. From a SELinux/security point of view ttys are considered objects
> and their labels/contexts should be recorded with "obj=" not
> "subj="
The patch logs the context of the process, not of the TTY.
Mirek
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] Add SELinux context and TTY name to AUDIT_TTY records
2009-03-20 8:53 ` [PATCH] Add SELinux context and TTY name to AUDIT_TTY records Miloslav Trmac
@ 2009-03-20 13:51 ` Paul Moore
0 siblings, 0 replies; 4+ messages in thread
From: Paul Moore @ 2009-03-20 13:51 UTC (permalink / raw)
To: Miloslav Trmac; +Cc: viro, Eric Paris, linux-kernel, linux-audit
On Friday 20 March 2009 04:53:27 am Miloslav Trmac wrote:
> ----- "Paul Moore" <paul.moore@hp.com> wrote:
> > There are several audit experts which should review this code but two
> > things jumped out at me when glancing at your patch:
> >
> > 1. SELinux SIDs should not be recorded
>
> Almost all code that logs SELinux contexts in kernel/audit* does the same
> thing as this patch, falling back to a SID if it can't be converted to a
> string.
Ungh, that's ugly and questionably useful (I suppose I know why this is done)
but if that convention then who am I to argue.
> > 2. From a SELinux/security point of view ttys are considered objects
> > and their labels/contexts should be recorded with "obj=" not
> > "subj="
>
> The patch logs the context of the process, not of the TTY.
Okay, that is what I get for just glancing at patches and not looking at them
closer :)
--
paul moore
linux @ hp
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2009-03-20 13:51 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <1446383553.1772511237538977759.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2009-03-20 8:53 ` [PATCH] Add SELinux context and TTY name to AUDIT_TTY records Miloslav Trmac
2009-03-20 13:51 ` Paul Moore
[not found] <230738142.1737601237483061914.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2009-03-19 17:18 ` Miloslav Trmac
2009-03-19 20:58 ` Paul Moore
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox