Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update fbash rules to use proc.sname. #87

Merged
merged 2 commits into from
Jun 6, 2016
Merged

Update fbash rules to use proc.sname. #87

merged 2 commits into from
Jun 6, 2016

Commits on Jun 1, 2016

  1. Update fbash rules to use proc.sname.

    Update fbash rules to use proc.sname instead of proc.aname and to rely
    on sessions instead of process ancestors.
    
    I also wanted to add details on the address/port being listened to but
    that's blocked on #86.
    
    Along with this change, there are new positive trace files
    installer-bash-starts-network-server.scap and
    installer-bash-starts-session.scap that test these updated rules.
    mstemm committed Jun 1, 2016
    Configuration menu
    Copy the full SHA
    31c87c2 View commit details
    Browse the repository at this point in the history

Commits on Jun 6, 2016

  1. Add additional rules/tests for pipe installers.

    Add additional rules related to using pipe installers within a fbash
    session:
    
     - Modify write_etc to only trigger if *not* in a fbash session. There's
       a new rule write_etc_installer which has the same conditions when in
       a fbash session, logging at INFO severity.
    
     - A new rule write_rpm_database warns if any non package management
       program tries to write below /var/lib/rpm.
    
     - Add a new warning if any program below a fbash session tries to open
       an outbound network connection on ports other than http(s) and dns.
    
     - Add INFO level messages when programs in a fbash session try to run
       package management binaries (rpm,yum,etc) or service
       management (systemctl,chkconfig,etc) binaries.
    
    In order to test these new INFO level rules, make up a third class of
    trace files traces-info.zip containing trace files that should result in
    info-level messages.
    
    To differentiate warning and info level detection, add an attribute to
    the multiplex file "detect_level", which is "Warning" for the files in
    traces-positive and "Info" for the files in traces-info. Modify
    falco_test.py to look specifically for a non-zero count for the given
    detect_level.
    
    Doing this exposed a bug in the way the level-specific counts were being
    recorded--they were keeping counts by level name, not number. Fix that.
    mstemm committed Jun 6, 2016
    Configuration menu
    Copy the full SHA
    fc6d775 View commit details
    Browse the repository at this point in the history