Skip to content

RFE Audit Multicast Socket Join Part

Richard Guy Briggs edited this page Jan 15, 2020 · 1 revision

Feature Description

Log information about programs connecting to and disconnecting from the audit netlink multicast socket. This is needed so that during investigations a security officer can tell who or what had access to the audit trail. This helps to meet the FAU_SAR.2 requirement for Common Criteria.

Feature Design

TODO - a technical explanation of what you are changing to achieve this new functionality, it should be possible to write the code using the information in this section. When a program connects to or disconnects from the audit netlink multicast socket, issue an audit record of type AUDIT_EVENT_LISTENER with a nl-mcgrp= field to indicate the group number and op= field to indicate the action along with a res= field to indicate success or failure. If an accompanying syscall record is not reliably included with the audit_context (this can happen with systemd process 1), prefix these fields with subject attributes: pid= uid= auid= tty= ses= subj= comm= exe=

Development Tasks

  • create the RFE page
  • create an audit_testsuite test
  • create patch
  • post upstream

Functional Testing and Verification

The test should make provisions for a program to connect to the audit netlink multicast socket and disconnect from it, then check the logs for both messages, formatted as expected, given the example format below.

Example Usage

Issuing the following command can suppress any of these messages: auditctl -a always,exclude -m event_listener

Example Audit Records

type=EVENT_LISTENER msg=audit(2020-01-07 10:15:05.754:6) : pid=1 uid=root auid=unset tty=(none) ses=unset subj=kernel comm=systemd exe=/usr/lib/systemd/systemd nl-mcgrp=1 op=connect res=yes

Bugzilla and Issue Trackers

https://github.com/linux-audit/audit-kernel/issues/28