linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
From: Lenny Bruzenak <lenny@magitekltd.com>
To: linux-audit@redhat.com
Subject: Re: Identifying thread/process termination
Date: Tue, 24 Nov 2020 09:43:11 -0600	[thread overview]
Message-ID: <a1fbfa76-beb1-ffb7-da0a-5a451d163f4f@magitekltd.com> (raw)
In-Reply-To: <5FB81C79.9090103@tlinx.org>

On 11/20/20 1:43 PM, L. A. Walsh wrote:

> Repost from right address.
> On 2020/10/08 08:33, Lenny Bruzenak wrote:
>
>> On 10/7/20 7:27 PM, Paul Moore wrote:
>>
>>  
>>> Almost everywhere in the kernel we record the TGID for the "pid="
>>> values and not the actual task/thread ID.  That decision was made
>>> before my heavy involvement with audit, but my guess is that most
>>> audit users are focused more on security relevant events at the
>>> process level, not the thread level.  After all, there isn't really
>>> much in the way of significant boundaries between threads.
>>>     
>>
>> That's right, Paul. The process (exe/comm) is the discriminator from
>> a security perspective.
>>   
> ----
>  So, when different threads perform / execute different functionality
> as loaded by a runtime loadable libraries, how is that discriminated
> from the initially started program?
>
>  Often, programs with many threads will rename the threads so they
> show up differently, though some of those may be processes, on linux
> there really aren't any threads as being separate from processes -- i.e.
> threads, at the linux kernel level are built on processes AFAIK.  Either
> way, there can be a separation of what is executed based on what threads
> are assigned what purposes.  I'd be hesitant to label the exe/comm as
> the only discriminator in an "arbitrary target environment".  Certainly
> it can be in some, but that doesn't mean it has to be sole discriminator
> when different threads can be mapped to different functions in
> 1 starting binary.
>
>  In a similar way, coreutils, can be used as 1 library/binary where
> functionality is determined by the invoking name.  While coreutils uses
> separate names for each function, there's nothing stopping creating
> 1 binary with all functions launched in separate threads launched out of
>  some shell performing diverse functions based on a thread ID or name.
> Certainly it isn't the common case, but it would be a way for a hacker
> to make their actions more opaque given current limitations.  At the
> same time, it might be the way to create some type of 'all-in-one' shell
> that could be configured by runtime presence of loadable objects.
>
>  An audit system supporting appending of arbitrary data types could
> support appending new data items/types as needed for extension.  Such
> was the Irix audit system that was ported to sgi's linux before the
> project was cancelled. It had similar benefits to the various layers and
> protocols that have been added on top of IPv4 networking, with wrappers
> around the low-level IP layer being added as new protocols demanded.
>
>  Just saying, a case can be made for needed additions not originally
> planned -- something that is almost always needed in time.
>
Sorry for the belated reply. Good points.

The main focus (of an audit system) is on being able to prove
accountability. Because threads cannot be initiated directly by a
person, only the parent executable, this is as much as is reasonably
required, currently.

Sure, technically all you say is pretty reasonable, but using your
example of RTLs, extend that to those entities as well. You often don't
have insight into their internals except via the audit trail (syscalls)
- and you know the launched executable.

Threads/libraries/executables don't face consequences, people do. So
until a person (or systemd/cron/...) can launch a thread on its own, it
doesn't make a lot of difference, as it is identifiable to the parent
process, which so far, gives us enough traceability.

The rules need to be such that for a given system security stance, Who
launched Which When causing What is the main focus. Definitely the more
relevant information the better from a forensics perspective. However,
I'd submit that having the thread ID would not lend much to an
investigation. Probably not even in a subsequent attempt to recreate the
issue you would be investigating. But it is possible I'm overlooking
something. As Paul said in the OP, there isn't that much boundary
between threads instantiated from a common parent process, so examining
the process entity as a whole is what would need to happen.

Your point about differently-named executables being the same is a good
one, sure there are lots of executables hard-linked to the same code,
look at /sbin/lvm - I see :

% ls -al /sbin | grep "\-> lvm" | wc -l
43

Doesn't really matter; you still should have the syscall records you
need, surrounded by all the relevant facts (auid, date/time, executable
name, etc., etc.). The thread ID (maybe really even the parent process
ID, except possibly for inclusion with other events, but that's a
stretch) is irrelevant AFAIK.

If the current granularity proves inadequate to achieve the auditing
goals, then IMHO this would need to be revisited, because I agree, as
I'm sure most everyone would, with your final statement - things change.


V/R,

LCB

-- 
Lenny Bruzenak
MagitekLTD

--
Linux-audit mailing list
Linux-audit@redhat.com
https://www.redhat.com/mailman/listinfo/linux-audit

  reply	other threads:[~2020-11-24 15:43 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-11-20 19:43 Identifying thread/process termination L. A. Walsh
2020-11-24 15:43 ` Lenny Bruzenak [this message]
  -- strict thread matches above, loose matches on Subject: below --
2020-11-20 19:45 L. A. Walsh
2020-10-05 19:07 Natan Yellin
2020-10-06 20:20 ` Steve Grubb
2020-10-08  1:27   ` Paul Moore
2020-10-08  7:59     ` Natan Yellin
2020-10-09  1:12       ` Paul Moore
2020-10-08 12:49     ` Richard Guy Briggs
2020-10-08 15:33     ` Lenny Bruzenak
2020-11-16  6:41       ` L. A. Walsh
2020-11-16 13:43         ` Paul Moore
2020-11-17 15:22           ` L A Walsh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=a1fbfa76-beb1-ffb7-da0a-5a451d163f4f@magitekltd.com \
    --to=lenny@magitekltd.com \
    --cc=linux-audit@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).