2010-03-19 15:21:53

by Daniel Walsh

[permalink] [raw]
Subject: [refpolicy] Fwd: Re: system_logging.patch

On 03/19/2010 11:02 AM, Steve Grubb wrote:
> On Friday 19 March 2010 10:44:22 am Christopher J. PeBenito wrote:
>
>>> The socket is the realtime interface for audit data, so yes its got
>>> sensitive data.
>>>
>> No, it is a means to connect to the daemon, like the port in internet
>> domain sockets (which are all system low in refpolicy). In my opinion
>> the process-process connectto permission is where the most
>> confidentiality-relevant check happens.
>>
> I would keep it high to make sure a process at system low cannot gain access
> to audit data that it should not. Sure, the DAC check will require root. But
> not all root roles are the security officer. There are no checks done by the
> daemon to see who is connecting.
>
>
>
SELinux will check.
>>> The pid file is high because the audit daemon is. It can be argued that
>>> the pid file is used by the initscripts to locate the daemon for
>>> signalling to reload, rotate logs, terminate, or other actions that
>>> should be limited to the security officer.
>>>
>> Knowing the pid of the auditd doesn't mean you can do anything to it.
>> What you seem to be implying is that the integrity of the file needs to
>> be preserved, which is what TE is for.
>>
> Sure. There is that reason, too. :)
>
> Thanks,
> -Steve
>