[PATCH] Add audit uid to netlink credentials
Chris Wright
chrisw at osdl.org
Wed Feb 9 18:37:47 UTC 2005
* Stephen Smalley (sds at epoch.ncsc.mil) wrote:
> On Wed, 2005-02-09 at 09:50, Serge Hallyn wrote:
> > CAP_AUDIT_WRITE is needed, but not CAP_AUDIT_CONTROL, which is needed to
> > set the loginuid. Of course, an LSM could check at
> > security_netlink_send whether the login_uid in the payload is the same
> > as the real loginuid. Otherwise, we're wasting a (very precious)
> > capability bit.
> >
> > In either case, have we decided we don't want it in the netlink
> > credentials after all?
>
> If the audit subsystem truly needs to include the loginuid in audit
> messages generated upon processing netlink messages, then I think it
> belongs in the control buffer as per your patch. Alexey has confirmed
> that we cannot use the current task's audit context regardless.
>
> As a side bar, a similar security field in the control buffer would
> likewise be very useful so that SELinux could set the SID for use in
> permission checks by receive functions.
This means sendmsg hook would set the SID? And in that case, you'd
stomp on loginuid for audit messages unless they are special cased.
The loginuid is special case to audit, it doesn't make sense to me that
it is in generic netlink_skb_parms structure unless it's used by more
netlink users.
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
More information about the Linux-audit
mailing list