Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Daniel J Walsh
Yes that would be the long term fix. But it would involve journal labelling individual data records. IE Records from audit.log would be audit_log_t, while messages from syslog would be var_log_t, Or some other kind of crazyness. On 04/24/2014 11:03 AM, Eric Paris wrote: > On Thu, 2014-04-24

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Eric Paris
On Thu, 2014-04-24 at 10:59 -0400, Daniel J Walsh wrote: > I don't disagree. I would think the real solution to this would be to > not allow sysadm_t to get to SystemHigh, where all of the logging data > will be stored. make journalctl a userspace object manager and do selinux checks on if it

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Daniel J Walsh
I don't disagree. I would think the real solution to this would be to not allow sysadm_t to get to SystemHigh, where all of the logging data will be stored. On 04/24/2014 09:22 AM, Eric Paris wrote: > They would be equivalent if and only if journald had CAP_AUDIT_READ. > > I suggest you take

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Eric Paris
They would be equivalent if and only if journald had CAP_AUDIT_READ. I suggest you take CAP_AUDIT_READ away from journald on systems which need the secadm/sysadmin split (which is a ridiculously stupid split anyway, but who am I to complain?) On Wed, Apr 23, 2014 at 11:52 AM, Daniel J Walsh

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Eric Paris
They would be equivalent if and only if journald had CAP_AUDIT_READ. I suggest you take CAP_AUDIT_READ away from journald on systems which need the secadm/sysadmin split (which is a ridiculously stupid split anyway, but who am I to complain?) On Wed, Apr 23, 2014 at 11:52 AM, Daniel J Walsh

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Daniel J Walsh
I don't disagree. I would think the real solution to this would be to not allow sysadm_t to get to SystemHigh, where all of the logging data will be stored. On 04/24/2014 09:22 AM, Eric Paris wrote: They would be equivalent if and only if journald had CAP_AUDIT_READ. I suggest you take

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Eric Paris
On Thu, 2014-04-24 at 10:59 -0400, Daniel J Walsh wrote: I don't disagree. I would think the real solution to this would be to not allow sysadm_t to get to SystemHigh, where all of the logging data will be stored. make journalctl a userspace object manager and do selinux checks on if it can

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-24 Thread Daniel J Walsh
Yes that would be the long term fix. But it would involve journal labelling individual data records. IE Records from audit.log would be audit_log_t, while messages from syslog would be var_log_t, Or some other kind of crazyness. On 04/24/2014 11:03 AM, Eric Paris wrote: On Thu, 2014-04-24 at

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Daniel J Walsh
Meaning looking at the journal would be equivalent to looking at /var/log/audit/audit.log. On 04/23/2014 11:37 AM, Eric Paris wrote: > On Wed, 2014-04-23 at 11:36 -0400, Daniel J Walsh wrote: >> I guess the problem would be that the sysadm_t would be able to look at >> the journal which would

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Daniel J Walsh
I guess the problem would be that the sysadm_t would be able to look at the journal which would now contain the audit content. On 04/23/2014 10:42 AM, Eric Paris wrote: > On Wed, 2014-04-23 at 09:40 -0400, Daniel J Walsh wrote: >> Here are the capabilities we currently give to sysadm_t with >>

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Eric Paris
On Wed, 2014-04-23 at 11:36 -0400, Daniel J Walsh wrote: > I guess the problem would be that the sysadm_t would be able to look at > the journal which would now contain the audit content. right. so include it in the sysadm_secadm bool > > On 04/23/2014 10:42 AM, Eric Paris wrote: > > On Wed,

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Eric Paris
On Wed, 2014-04-23 at 09:40 -0400, Daniel J Walsh wrote: > Here are the capabilities we currently give to sysadm_t with > sysadm_secadm1.0.0Disabled > >allow sysadm_t sysadm_t : capability { chown dac_override > dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Daniel J Walsh
Here are the capabilities we currently give to sysadm_t with sysadm_secadm1.0.0Disabled allow sysadm_t sysadm_t : capability { chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Daniel J Walsh
Here are the capabilities we currently give to sysadm_t with sysadm_secadm1.0.0Disabled allow sysadm_t sysadm_t : capability { chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Eric Paris
On Wed, 2014-04-23 at 09:40 -0400, Daniel J Walsh wrote: Here are the capabilities we currently give to sysadm_t with sysadm_secadm1.0.0Disabled allow sysadm_t sysadm_t : capability { chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Eric Paris
On Wed, 2014-04-23 at 11:36 -0400, Daniel J Walsh wrote: I guess the problem would be that the sysadm_t would be able to look at the journal which would now contain the audit content. right. so include it in the sysadm_secadm bool On 04/23/2014 10:42 AM, Eric Paris wrote: On Wed,

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Daniel J Walsh
I guess the problem would be that the sysadm_t would be able to look at the journal which would now contain the audit content. On 04/23/2014 10:42 AM, Eric Paris wrote: On Wed, 2014-04-23 at 09:40 -0400, Daniel J Walsh wrote: Here are the capabilities we currently give to sysadm_t with

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-23 Thread Daniel J Walsh
Meaning looking at the journal would be equivalent to looking at /var/log/audit/audit.log. On 04/23/2014 11:37 AM, Eric Paris wrote: On Wed, 2014-04-23 at 11:36 -0400, Daniel J Walsh wrote: I guess the problem would be that the sysadm_t would be able to look at the journal which would now

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Eric Paris
On Tue, 2014-04-22 at 22:25 -0400, Steve Grubb wrote: > On Tuesday, April 22, 2014 09:31:52 PM Richard Guy Briggs wrote: > > This is a patch set Eric Paris and I have been working on to add a > > restricted capability read-only netlink multicast socket to kernel audit to > > enable userspace

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread David Miller
From: Richard Guy Briggs Date: Tue, 22 Apr 2014 21:49:29 -0400 > On 14/04/22, David Miller wrote: >> From: Richard Guy Briggs >> Date: Tue, 22 Apr 2014 21:31:52 -0400 >> >> > This is a patch set Eric Paris and I have been working on to add a >> > restricted >> > capability read-only netlink

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Steve Grubb
On Tuesday, April 22, 2014 09:31:52 PM Richard Guy Briggs wrote: > This is a patch set Eric Paris and I have been working on to add a > restricted capability read-only netlink multicast socket to kernel audit to > enable userspace clients such as systemd/journald to receive audit logs, in >

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Richard Guy Briggs
On 14/04/22, David Miller wrote: > From: Richard Guy Briggs > Date: Tue, 22 Apr 2014 21:31:52 -0400 > > > This is a patch set Eric Paris and I have been working on to add a > > restricted > > capability read-only netlink multicast socket to kernel audit to enable > > userspace clients such as

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread David Miller
From: Richard Guy Briggs Date: Tue, 22 Apr 2014 21:31:52 -0400 > This is a patch set Eric Paris and I have been working on to add a restricted > capability read-only netlink multicast socket to kernel audit to enable > userspace clients such as systemd/journald to receive audit logs, in addition

[PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Richard Guy Briggs
This is a patch set Eric Paris and I have been working on to add a restricted capability read-only netlink multicast socket to kernel audit to enable userspace clients such as systemd/journald to receive audit logs, in addition to the bidirectional auditd userspace client. Currently, auditd has

[PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Richard Guy Briggs
This is a patch set Eric Paris and I have been working on to add a restricted capability read-only netlink multicast socket to kernel audit to enable userspace clients such as systemd/journald to receive audit logs, in addition to the bidirectional auditd userspace client. Currently, auditd has

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread David Miller
From: Richard Guy Briggs r...@redhat.com Date: Tue, 22 Apr 2014 21:31:52 -0400 This is a patch set Eric Paris and I have been working on to add a restricted capability read-only netlink multicast socket to kernel audit to enable userspace clients such as systemd/journald to receive audit logs,

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Richard Guy Briggs
On 14/04/22, David Miller wrote: From: Richard Guy Briggs r...@redhat.com Date: Tue, 22 Apr 2014 21:31:52 -0400 This is a patch set Eric Paris and I have been working on to add a restricted capability read-only netlink multicast socket to kernel audit to enable userspace clients such

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Steve Grubb
On Tuesday, April 22, 2014 09:31:52 PM Richard Guy Briggs wrote: This is a patch set Eric Paris and I have been working on to add a restricted capability read-only netlink multicast socket to kernel audit to enable userspace clients such as systemd/journald to receive audit logs, in addition

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread David Miller
From: Richard Guy Briggs r...@redhat.com Date: Tue, 22 Apr 2014 21:49:29 -0400 On 14/04/22, David Miller wrote: From: Richard Guy Briggs r...@redhat.com Date: Tue, 22 Apr 2014 21:31:52 -0400 This is a patch set Eric Paris and I have been working on to add a restricted capability

Re: [PATCH 0/6][v2] audit: implement multicast socket for journald

2014-04-22 Thread Eric Paris
On Tue, 2014-04-22 at 22:25 -0400, Steve Grubb wrote: On Tuesday, April 22, 2014 09:31:52 PM Richard Guy Briggs wrote: This is a patch set Eric Paris and I have been working on to add a restricted capability read-only netlink multicast socket to kernel audit to enable userspace clients such