FB_security 板


freebsd-security folk may also be interested in this forthcoming addition to OpenBSM from Pawel. I plan to cut a new OpenBSM alpha rev with auditdistd in the next couple of days. Robert N M Watson Computer Laboratory University of Cambridge ---------- Forwarded message ---------- Date: Wed, 21 Nov 2012 00:42:45 +0100 From: Pawel Jakub Dawidek <[email protected]> To: [email protected] Subject: OpenBSM new addition: auditdistd. Hi. In the new release of OpenBSM one of the major additions would be the auditdistd daemon. The work was sponsored by the FreeBSD Foundation. Thank you! Auditdistd is used to reliably and securely transfer local audit trail files over the network to separate machine, so that in case of successful attack on the local machine, an attack is unable to tamper with already distributed audit records. The auditdistd can operate in two modes: as a sender and as a receiver. In the first mode (the sender), auditdistd is reponsible for sending audit events gathered locally to remote auditdistd that operates in the receiver mode. The auditdistd in the receiver mode is responsible for receiving and storing audit trail files locally. On the receiver side there is no need for audit subsystem to be turned on. Auditdistd for speed, reliability and also security doesn't interpret audit trail files. Any file could be send and receive. The receiver places the files in a directory dedicated to the sending system. Sending side has no control over the place where received trail files are stored. The receiver also accepts only new audit events. It works in append-only mode. Previously received trail files and audit records stored in most recent trail file cannot be modified by the sender. These restrictions allow to assume that even if sender side was compromised in the given point in time, all previous audit records from this host can be trusted. Auditdistd uses sandboxing (including Capsicum's capability mode if availble), which is especially important for the receiver mode. In the current implementation after breaking through auditdistd protocol into the receiver process, an attacker has no access to audit trail files from other senders. This may be improved to use Capsicum's capabilities and only provide append-only file descriptors to the receiver process. Unfortunately with the current Capsicum implementation it is not possible to limit file descriptor to append-only writes. As part of another projected I changed that, so it should be available in the future. The auditdistd is as autonomous as possible, but sometimes auditd help is needed. Audit trail files are created by auditd in response to a request from the kernel audit subsystem. Auditd creates a file in /var/audit/ directory and of <timestamp>.not_terminated format. It also creates symlink 'current' to this file. Auditdistd needs hardlink to audit trail file in /var/audit/dist/ directory. It could create the hardlink by itself by monitoring changes to the /var/audit/ directory, but it might not be reliable. It might be possible that new audit trail file is created, terminated and removed before auditdistd had a chance to notice the file. This way we would lose some audit events. That's why more reliable option is to modify auditd to create hardlink in the /var/audit/dist/ directory the same way it creates symlink to current audit trail file. Similarly, auditd might be responsible for renaming ..not_terminated files in /var/audit/dist/ directory to final name after termination for the same reason - auditdistd might not see the final name before trail expires and is removed from /var/audit/. Having a hardlink to trail file in /var/audit/dist/ eliminates the need for communication between auditd and auditdistd daemons. Each of them can remove their links whenever they want. If auditd decides that trail file expired and removes it from /var/audit/ directory, it doesn't affect link in /var/audit/dist/ directory that might not be sent yet by the auditdistd to the receiver side. And vice-versa - if auditdistd successfully sends trail file to the receiver side before it expires locally, it will just remove its link from /var/audit/dist/ without affecting /var/audit/ link. Configuration is pretty trivial. On the sender side where we gather audit records we have to add the following line to the /etc/security/audit_control file: dist:on And create /etc/security/auditdistd.conf file, eg.: sender { host "bigbrother.freebsd.org" { remote "tls://10.0.0.5" fingerprint "SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:53:E6:8F:B6:1C:55:30:14:D7:F9:AA:8B:3E:73:CD:F5:76:2B" password "YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG" } } Fingerprint from receiver's public key can be obtained by running: openssl x509 -in /etc/security/auditdistd.cert.pem -noout -fingerprint -sha256 | awk -F '[ =]' '{printf("%s=%s\n", $1, $3)}' On the receiver side we need to put certificate and private key into the following files: /etc/security/auditdistd.cert.pem /etc/security/auditdistd.key.pem And create the following /etc/security/auditdistd.conf: receiver { host "freefall.freebsd.org" { remote "tls://10.0.0.2" password "YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG" } } -- Pawel Jakub Dawidek http://www.wheelsystems.com FreeBSD committer http://www.FreeBSD.org Am I Evil? Yes, I Am! http://tupytaj.pl _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草
伺服器連線錯誤,造成您的不便還請多多包涵!
「贊助商連結」






like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:BuyTogether站內搜尋

TOP