Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933105AbcDEMC4 (ORCPT ); Tue, 5 Apr 2016 08:02:56 -0400 Received: from xspv0103.northgrum.com ([134.223.120.78]:22872 "EHLO xspv0103.northgrum.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932837AbcDEMAi convert rfc822-to-8bit (ORCPT ); Tue, 5 Apr 2016 08:00:38 -0400 X-Greylist: delayed 625 seconds by postgrey-1.27 at vger.kernel.org; Tue, 05 Apr 2016 08:00:38 EDT From: "Boyce, Kevin P (AS)" To: Wade Mealing , =?iso-8859-1?Q?Bj=F8rn_Mork?= CC: Oliver Neukum , "linux-kernel@vger.kernel.org" , linux-usb , "linux-audit@redhat.com" Subject: RE: EXT :Re: [RFC] Create an audit record of USB specific details Thread-Topic: EXT :Re: [RFC] Create an audit record of USB specific details Thread-Index: AQHRjnajr8CMeRZg9kWDTC+7Q34XI597ZGmA///fn3A= Date: Tue, 5 Apr 2016 11:49:14 +0000 Message-ID: <889498a2eca043d5af1fe23ffb574284@XCGVAG30.northgrum.com> References: <1459742562-22803-1-git-send-email-wmail@redhat.com> <1459752519.24025.5.camel@suse.com> <87bn5pzuh1.fsf@nemi.mork.no> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [134.223.82.114] Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3198 Lines: 46 Wade, Wouldn't this imply that every time the system is booted and the PCI bus for example is enumerated and all of the devices are created that all of those activities generate audit events? That sounds less than desiriable. Does this imply that the audit subsystem should maintain a "baseline" of hardware that is always present on the system? Couldn't you audit a directory under /proc/usb? Correct me if I am wrong, but doesn't audititing of the syscall mknod create an event when devices are "added" to the system? Kevin -----Original Message----- From: linux-audit-bounces@redhat.com [mailto:linux-audit-bounces@redhat.com] On Behalf Of Wade Mealing Sent: Tuesday, April 05, 2016 4:40 AM To: Bj?rn Mork Cc: Oliver Neukum; linux-kernel@vger.kernel.org; linux-usb; linux-audit@redhat.com Subject: EXT :Re: [RFC] Create an audit record of USB specific details I'm reframing my use case as follows to try and better explain the situation I am trying to track. It might seem that I am duplicating existing functionality, rather I am trying to augment functionality that seems to be unavailable.Replication of existing functionality is not my intention. Consider the following scenario. Currently we have device drivers that emit text via a printk request which is eventually picked up by syslog like implementation (not the audit subsystem). The goal of these message is to let a system administrator see in the audit logs, that a device has been plugged in and the basic details about this. Having this only in userspace means that (and Greg alludes to this ) that this will be for human eyes only and not be machine usable in the kernels. Without it being in kernel, it can't be extended for manipulation by auditctl at some point in the future. Specifically I am trying to create a well formed audit trail when devices are added or removed from the system by the userspace audit tools. The implementation at the moment does not do any filtering, but rather creates the raw audit events. In some ways this is similar to a decorated class in say java. In this case the class is unaware it is being decorated yet we can monitor what is happening in that class without polluting the class code with messy log or trace information. I don't see either kernel or user-space applications create add or remove events in the audit subsystem. I understand that some events are placed into uevents (To be intercepted by udevd), while this also exports the same information it is not in the audit subsystem in kernel. > I think the generic layer implementation is already there. The > proposed USB specific solution adds nothing, as pointed out by Greg > the last time this was discussed. I agree it would be ideal to use existing userspace or kernelspace facilities for auditing and not duplicating efforts, it seems that the specific case I am trying to track isn't covered. Maybe I missed it be can you indicate where device add/remove audit (not log messages) are being generated/implemented in the kernel or userspace for the scenario I described? Thanks, Wade Mealing -- Linux-audit mailing list Linux-audit@redhat.com https://www.redhat.com/mailman/listinfo/linux-audit