[PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions

Lenny Bruzenak lenny at magitekltd.com
Thu May 31 00:46:24 UTC 2018


On 05/30/2018 06:54 PM, Paul Moore wrote:

...

> Finally, since you probably haven't followed all of the discussion
> around associating records into a single event, I wanted to give you
> my side of the story (if you don't care, you can simply skip the rest
> of this email).  Currently an audit "event" can consist of multiple
> audit "records"; these records can contain PATH information, SYSCALL
> information, SELinux AVC information, as well as INTEGRITY_PCR
> information.  The current kernel code does a poor job of associating
> some of these record types, which can make a single user action look
> like multiple audit events.  For example, a single user action/event
> (writing a new IMA policy) could result in multiple audit "events"
> because the SYSCALL record for the write() syscall is not associated
> with the INTEGRITY_POLICY_RULE record; this is bogus because the write
> syscall is inherently linked with the IMA policy update.  Keeping the
> records as separate audit "events" is not only conceptually odd, it is
> misleading.
A vote of support from the user side; thanks Paul for this. The
misleading part of having multiple events for what is conceptually a
unitary event makes life really hard on guys like me trying to explain
to security people what happened when. So while I understand it can be
challenging to associate those events in the kernel, particularly when
they occur at spaced times, trying to patch those together on the
analysis side is problematic too (which I know you well understand). So
- your effort to keep these these records tied to one event is very much
appreciated!

LCB

-- 
Lenny Bruzenak
MagitekLTD






More information about the Linux-audit mailing list