001 Audit Ids
001 Audit Ids
001 Audit Ids
outcome
● Sensitivity labels of subjects and objects
access to logs
● All uses of authentication mechanisms
-F can be one of: a0, a1, a2, a3, arch, auid, devmajor, dir, devminor, exit,
user/group ids, filetype, inode, msgtype, object/subject context parts,
path, perms, pid, ppid, or success.
The perm field selects the syscalls that are involved in file
writing, reading, execution, or attribute change.
Trusted Apps
● All entry point programs must set loginuid
● Apps that modify trusted databases were updated to send
audit event records:
● amtu, aide
● at, vixie-cron
● coreutils
● passwd, shadow
● nss
Pam IDS updates
pam_tally2
● Locks out an account for consecutive failed login attempts
● Sends ANOM_LOGIN_FAILURES
pam_access
● Used to forbid logins from certain locations, consoles, and accounts
● /etc/security/access.conf controls its config
● Sends ANOM_LOGIN_ACCT and ANOM_LOGIN_LOCATION
pam_time
● Used to forbid logins during non-business hours
● /etc/security/time.conf controls its config
● Sends ANOM_LOGIN_TIME
pam_limits
● Used to limit maximum concurrent sessions and other user restrictions
● /etc/security/limits.conf controls its config
● Sends ANOM_LOGIN_SESSIONS
ausearch results
type=PATH msg=audit(06/06/2008 14:15:19.373:3588) : item=1
name=/tmp/svck4.tmp/svd8l.tmp inode=168834 dev=08:07 mode=file,600
ouid=sgrubb ogid=sgrubb rdev=00:00
obj=unconfined_u:object_r:user_tmp_t:s0
type=PATH msg=audit(06/06/2008 14:15:19.373:3588) : item=0
name=/tmp/svck4.tmp/ inode=168794 dev=08:07 mode=dir,775
ouid=sgrubb ogid=sgrubb rdev=00:00
obj=unconfined_u:object_r:user_tmp_t:s0
type=CWD msg=audit(06/06/2008 14:15:19.373:3588) : cwd=/home/sgrubb
type=SYSCALL msg=audit(06/06/2008 14:15:19.373:3588) : arch=x86_64
syscall=unlink success=yes exit=0 a0=7fff66ec9340 a1=7fff66ec92a0
a2=14 a3=3e831eadc0 items=2 ppid=4030 pid=4041 auid=sgrubb
uid=sgrubb gid=sgrubb euid=sgrubb suid=sgrubb fsuid=sgrubb
egid=sgrubb sgid=sgrubb fsgid=sgrubb tty=(none) ses=1
comm=simpress.bin exe=/usr/lib64/openoffice.org/program/simpress.bin
subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=delete
aureport results
Summary Report
======================
Range of time in logs: 05/27/2008 09:28:34.600 - 06/07/2008 09:31:58.719
Selected time for report: 06/06/2008 00:00:00 - 06/07/2008 09:31:58.719
Number of changes in configuration: 113
Number of changes to accounts, groups, or roles: 0
Number of logins: 4
Number of failed logins: 0
Number of authentications: 17
Number of failed authentications: 0
Number of users: 2
Number of terminals: 13
Number of host names: 4
Number of executables: 115
Number of files: 41551
Number of AVC's: 10
Number of MAC events: 8
Number of failed syscalls: 1284
Number of anomaly events: 3
Number of responses to anomaly events: 0
Number of crypto events: 0
Number of keys: 4
Number of process IDs: 1006
Number of events: 44470
aureport --file
File Summary Report
===========================
total file
===========================
776 /usr/bin/
763 /usr/lib64/
690 /var/lib/PackageKit/
690 /var/lib/PackageKit/transactions.db-journal
670 /usr/include/linux/
366 /usr/share/mimelnk/application/
254 /usr/share/apps/katepart/syntax/
248 /usr/share/doc/HTML/en/kdelibs-apidocs/kio/bookmarks/html/
182 /dev/.udev/queue/
166 /var/run/hald/
166 /var/run/hald/acl-list
140 /usr/share/services/
108 /lib/modules/2.6.25.4-30.fc9.x86_64/kernel/drivers/ata/
41 /var/run/ConsoleKit/database~
Audit System Data Flow
Setroubleshoot
Kernel
Remote Logging
● Network protocol
● Account changes
● Crypto failures
Future Directions
Correlation when Engine is ready
● Provide framework for higher level analysis
● Reactive Countermeasure
Visualization tools
● PIG – Prelude IDMEF Grapher
Nessus Scan
Future Directions
There are weaknesses in the IDMEF spec
● Seems to have been designed from snort's PoV
● No concept of sensitivity
HOWTO
http://people.redhat.com/sgrubb/audit/prelude.txt
Audit Info
http://people.redhat.com/sgrubb/audit