* Discard log events (unacceptable for security - anyone could just turn off
logging whenever they want by spamming the system with spurious log events)
* Block the producer
So, really, you have no choice but to block the producer of the log events, eg.
block all logged system calls until the buffer is depleted again.
Of course, this leads to all sorts of enjoyable deadlock conditions in the
system... The audit daemon itself cannot block on anything safely, really.
Eg:
What if the audit daemon is just passing the log events on to a log daemon on
the same machine? The log daemon itself gets logged, so it gets blocked
waiting for the audit buffer. The audit daemon is trying to deplete its own
buffer by sending to the log daemon, which will never be available... Poof!
What if the audit daemon is just passing the log events on to an external log
daemon on another machine? This seems ok, as long as the other machine is
visible. As soon as it dies, the audited machine will hang until the log host
comes back. It can't even be shut down, since the shutdown command will be
logged ...
... But what if the logging machine itself is just a router that sends off
streams from multiple machines to be warehoused? This seems fine, except...
What if the warehousing machine is itself audited? It tries to log its audit
stream back to the router, which comes back to itself, which blocks the entire
computer network until someone kicks something. Ack!
So it seems that to avoid losing a few system calls in a kernel ring buffer,
you've now crashed an entire NOC. :-)
The audit daemon will have to be smart and log to some sort of ring buffer on
disk, but of course, disk space is not infinite, so eventually it will have to
start throwing away old log events, just as the kernel does. So we're right
back where we started. But perhaps it will take a few days before you have to
do this, with a big disk buffer.
(Or perhaps not... If you logged every lstat(), and each log line was 100
bytes, it seems a malicious user could generate 103 gigabytes of log data in 1
hour, thus erasing their malicious actions at the start of the hour.)
-J
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/