Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Sep 1999 07:08:08 -0700
From:      Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To:        "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>
Cc:        imp@village.org (Warner Losh), wes@softweyr.com (Wes Peters), brett@lariat.org (Brett Glass), security@FreeBSD.ORG
Subject:   Auditing (was Re: BPF on in 3.3-RC GENERIC kernel) 
Message-ID:  <199909211409.HAA06629@cwsys.cwsent.com>
In-Reply-To: Your message of "Fri, 17 Sep 1999 23:24:07 PDT." <199909180624.XAA50611@gndrsh.dnsmgr.net> 

index | next in thread | previous in thread | raw e-mail

In message <199909180624.XAA50611@gndrsh.dnsmgr.net>, "Rodney W. 
Grimes" writes
:
> > In message <37E32365.B9F9573B@softweyr.com> Wes Peters writes:
> > : Worked for me.  A well-written, accurate analogy too.
> > 
> > I'll have to try again later...  I'd be very interested in this.  I
> > personally think that schg is useful against accidental mistakes, but
> > flawed in implementation.
> > 
> > Although some of that may be due to inperfections in /etc/rc and
> > friends.
> 
> Once you read the article you will see just how flawed ``schg'' is.  It
> only attempts to prevent action, it does not send out any alarms.
> 
> The propasal that jdp has on a socket sort of notification facility for
> all file system modifications is a long was ahead of what could ever
> be done with schg, as that tool would give us the ability to real time
> audit even attempts at cracking on the system.  ACF2 in the mainframe
> world, and the VMS AUDIT tools are good examples of what can be done
> with this type of feature.  Real time alarms if someone even _tries_
> to modify a schg file is what is missing...  someone turning off
> schg on a file is another thing missing... or accessing the disk
> through the raw device to reset the bit, etc, etc...

If I may add, in my former life we even monitored the actions users 
were allowed to do, e.g. delete their own files, on MVS systems using 
RACF, ACF2 or or even turned on the SMF facility to monitor which files 
were created, opened, deleted, etc.  The reason for this had less to do 
with security and more to do with users complaining "my file just 
disappeared" and proving that they or a person who borrowed their 
account [bad idea] were the ones who had actually removed a file.

The other things we did (at one shop with RACF) were to audit all 
actions performed by any accounts with the operations (read/write any 
object) or RACF special (alter the security profile of any object) 
flags set; and audit all actions performed against files defined as APF 
authorized (security sensitive) libraries -- APF authorization is 
loosely akin to setuid root, though the analogy easily breaks.

Finally the people doing the auditing, security administration, and 
operations could not have all three attributes assigned to their 
accounts.  According to an IBM course I too approximately 20 years ago, 
each of the auditor, operations, and security staff would watch each 
other.  The reason IBM gave for this separation was that it was harder 
for three persons to conspire to undermine security than it was for two 
to do so.


Regards,                       Phone:  (250)387-8437
Cy Schubert                      Fax:  (250)387-5766
Open Systems Group          Internet:  Cy.Schubert@uumail.gov.bc.ca
ITSD                                   Cy.Schubert@gems8.gov.bc.ca
Province of BC
                      "e**(i*pi)+1=0"





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199909211409.HAA06629>