From mboxrd@z Thu Jan 1 00:00:00 1970 From: "paul moore" Subject: (no subject) Date: Fri, 20 Apr 2007 15:13:17 -0700 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mx1.redhat.com (mx1.redhat.com [172.16.48.31]) by int-mx1.corp.redhat.com (8.13.1/8.13.1) with ESMTP id l3KMkdMt012255 for ; Fri, 20 Apr 2007 18:46:39 -0400 Received: from bay0-omc1-s3.bay0.hotmail.com (bay0-omc1-s3.bay0.hotmail.com [65.54.246.75]) by mx1.redhat.com (8.13.1/8.13.1) with ESMTP id l3KMkbC6002419 for ; Fri, 20 Apr 2007 18:46:38 -0400 Message-ID: <000301c78399$1924de30$656fa8c0@centrify.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com My understanding is that the auid/loginid process property is to allow the audit system to *really* know who did things In particular it seems to be for tracking who did things when they run su or sudo But it seems to be trivial to spoof it login as: paul paul@192.168.111.40's password: Last login: Fri Apr 13 13:34:26 2007 from 192.168.111.101 [paul@rhes5-wa-1 ~]$ sudo bash [root@rhes5-wa-1 ~]# cat /proc/self/loginuid 556[root@rhes5-wa-1 ~]# echo 600 > /proc/self/loginuid [root@rhes5-wa-1 ~]# cat /proc/self/loginuid 600[root@rhes5-wa-1 ~]# exit [paul@rhes5-wa-1 ~]$ cat /proc/self/loginuid 556[paul@rhes5-wa-1 ~]$ I was 556 at login, after sudo i am still 556 but then as root I can now change it to 600 and the audit log for my actions has auid=600 in it doesnt that undermine the whole point of the login id? Surely once it has been set it should not be possible to change it again. I see a debate in the thread "proc_loginuid_write() checks wrong capability" about who should be able to do this but it misses the point. It should only be writtable if its -1 at the moment. Otherwise it must be unconditionally rejected. The argument for it being like it is is that root is all powerfull so they should be allowed to do anything. But the beauty of auid is that it lets me see who the root sudoer really is. (BTW - my 10$ says its should be a new capability since it doesn't match either CONTROL or WRITE, But if that's not possible then it should be CONTROL) Any insights gratefully received Paul Moore