Michael C Thompson wrote:
Daniel J Walsh wrote:
Michael C Thompson wrote:
Michael C Thompson wrote:
Hey all,

Right now, we have sysadm_r and secadm_r as our administrative roles. I believe Russel said he had done some work on the policy to add an audit administrator as well, although I'm not able to find it in the latest policy - what's the new name?

My question is what are the responsibilities of these 3 adminstrators (assuming 3, are there plans for more?); I would like to know so that I might be able to test this.

A breakdown of their responsibilities and the over-lap of those responsibilities would be most helpful.

I just checked, and with policy selinux-policy-mls-2.2.35-2, sysadm_r and secadm_r can modify /etc/auditd.conf, /etc/audit.rules, /etc/init.d/auditd can read and write these files.

secadm should not be able to edit auditd.conf or audit.rules. That is a bug. I do not know about sysadm

Do I need to file a bugzilla? (I'd rather not if I can avoid it). Who can answer the sysadm_r question?

yes. Klaus?
sysadm_r and secadm_r can not use service auditd X or /etc/init.d/auditd X to manipulate the daemon, so that at least is good, but neither can auditadm_r.

Are you using run_init?

OK, I've never heard of run_init until now... I tried run_init auditd status, which failed to do anything useful, it printed a usage message saying -f was a valid option. So I tried this, and got locked out of my shell...

run_init service auditd status

Why does service auditd status not work?
I believe the designers were concerned about a transition happening accidentily or via an app doing it without the admin knowing. run_init is used to confirm the admins intentions.

Wasn't the purpose of auditadm_r to be able to control the daemon and modify the config files? I believe it was said on the call that sysadm_r and secadm_r should be able to read, but not modify the audit config files.

Again secadm_r but I am not sure we can easily stop sysadm_r.

Why can't we easily stop sysadm_r? I'm not familiar enough with the policy to answer this myself.

Because sysadm_r is allowed to start/stop all services. The act of stopping the service is auditable.
Thanks,
Mike


--
redhat-lspp mailing list
[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to