FB_security 板


freebsd-security folk may also be interested in this forthcoming addition to OpenBSM from Pawel. I plan to cut a new OpenBSM alpha rev with auditdistd in the next couple of days. Robert N M Watson Computer Laboratory University of Cambridge ---------- Forwarded message ---------- Date: Wed, 21 Nov 2012 00:42:45 +0100 From: Pawel Jakub Dawidek <[email protected]> To: [email protected] Subject: OpenBSM new addition: auditdistd. Hi. In the new release of OpenBSM one of the major additions would be the auditdistd daemon. The work was sponsored by the FreeBSD Foundation. Thank you! Auditdistd is used to reliably and securely transfer local audit trail files over the network to separate machine, so that in case of successful attack on the local machine, an attack is unable to tamper with already distributed audit records. The auditdistd can operate in two modes: as a sender and as a receiver. In the first mode (the sender), auditdistd is reponsible for sending audit events gathered locally to remote auditdistd that operates in the receiver mode. The auditdistd in the receiver mode is responsible for receiving and storing audit trail files locally. On the receiver side there is no need for audit subsystem to be turned on. Auditdistd for speed, reliability and also security doesn't interpret audit trail files. Any file could be send and receive. The receiver places the files in a directory dedicated to the sending system. Sending side has no control over the place where received trail files are stored. The receiver also accepts only new audit events. It works in append-only mode. Previously received trail files and audit records stored in most recent trail file cannot be modified by the sender. These restrictions allow to assume that even if sender side was compromised in the given point in time, all previous audit records from this host can be trusted. Auditdistd uses sandboxing (including Capsicum's capability mode if availble), which is especially important for the receiver mode. In the current implementation after breaking through auditdistd protocol into the receiver process, an attacker has no access to audit trail files from other senders. This may be improved to use Capsicum's capabilities and only provide append-only file descriptors to the receiver process. Unfortunately with the current Capsicum implementation it is not possible to limit file descriptor to append-only writes. As part of another projected I changed that, so it should be available in the future. The auditdistd is as autonomous as possible, but sometimes auditd help is needed. Audit trail files are created by auditd in response to a request from the kernel audit subsystem. Auditd creates a file in /var/audit/ directory and of <timestamp>.not_terminated format. It also creates symlink 'current' to this file. Auditdistd needs hardlink to audit trail file in /var/audit/dist/ directory. It could create the hardlink by itself by monitoring changes to the /var/audit/ directory, but it might not be reliable. It might be possible that new audit trail file is created, terminated and removed before auditdistd had a chance to notice the file. This way we would lose some audit events. That's why more reliable option is to modify auditd to create hardlink in the /var/audit/dist/ directory the same way it creates symlink to current audit trail file. Similarly, auditd might be responsible for renaming ..not_terminated files in /var/audit/dist/ directory to final name after termination for the same reason - auditdistd might not see the final name before trail expires and is removed from /var/audit/. Having a hardlink to trail file in /var/audit/dist/ eliminates the need for communication between auditd and auditdistd daemons. Each of them can remove their links whenever they want. If auditd decides that trail file expired and removes it from /var/audit/ directory, it doesn't affect link in /var/audit/dist/ directory that might not be sent yet by the auditdistd to the receiver side. And vice-versa - if auditdistd successfully sends trail file to the receiver side before it expires locally, it will just remove its link from /var/audit/dist/ without affecting /var/audit/ link. Configuration is pretty trivial. On the sender side where we gather audit records we have to add the following line to the /etc/security/audit_control file: dist:on And create /etc/security/auditdistd.conf file, eg.: sender { host "bigbrother.freebsd.org" { remote "tls://10.0.0.5" fingerprint "SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:53:E6:8F:B6:1C:55:30:14:D7:F9:AA:8B:3E:73:CD:F5:76:2B" password "YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG" } } Fingerprint from receiver's public key can be obtained by running: openssl x509 -in /etc/security/auditdistd.cert.pem -noout -fingerprint -sha256 | awk -F '[ =]' '{printf("%s=%s\n", $1, $3)}' On the receiver side we need to put certificate and private key into the following files: /etc/security/auditdistd.cert.pem /etc/security/auditdistd.key.pem And create the following /etc/security/auditdistd.conf: receiver { host "freefall.freebsd.org" { remote "tls://10.0.0.2" password "YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG" } } -- Pawel Jakub Dawidek http://www.wheelsystems.com FreeBSD committer http://www.FreeBSD.org Am I Evil? Yes, I Am! http://tupytaj.pl _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草
伺服器连线错误,造成您的不便还请多多包涵!
「赞助商连结」






like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草

请输入看板名称,例如:Soft_Job站内搜寻

TOP