On Wednesday, March 13, 2013 10:55:29 AM Richard Guy Briggs wrote:
On Tue, Mar 12, 2013 at 05:09:15PM -0400, Steve Grubb wrote:
> On Tuesday, March 12, 2013 04:47:42 PM Richard Guy Briggs wrote:
> > On Tue, Mar 12, 2013 at 07:06:59AM -0400, Miloslav Trmac wrote:
> > > ----- Original Message -----
> > >
> > > > I am resurrecting this old thread from last summer because I ran
> > > > into
> > > > the same issue and found the thread in the archives via Google. It
> > > > would be very nice if everything could be logged except passwords.
> > >
> > > There is work being done. Sorry, I don't have more specifics as to
> > > availability, perhaps others do.
> >
> > Hi Tracy,
> >
> > I'm actually working on that right now. I have a patch I am in the
> > process of testing. It implements a new sysctl.
>
> Why would this be done as a sysctl? Everything else in the audit system is
> configured through the netlink API. I would think that we would want to
> have it configured by the same pam module that we currently use to enable
> tty auditing. So, why not make a new netlink command that pam can use?
The lazy and naive answer is that that was the approach that was
suggested by two developers much more familiar with this code than me (I
expect that to balance out with time.)
Now that you suggest this, I agree that approach makes a lot of sense.
The more technical answer might be that it is much more expedient to do
it with a sysctl since it involves fewer compiled entities to implement
and hence can be rolled out faster with less co-ordination of other
software projects.
To me, its more important to not have a proliferation of places that must be
tweaked for the audit system. Its not a big deal to patch pam to have a new
argument.
After the kernel is recompiled (needed in any case)
it can be implemented with one line added to a file in /etc/sysctl.d/
while your approach requires adding code to audit and pam, waiting for
it to be released by their respective teams, then the user adding a
config option to the pam module invocation. I agree that would be more
convenient for end users since it can be an option added in the same
place as the module is invoked.
The problem that I have had for a long time is that there is no way to query
the kernel and ask what its audit capabilities are so that meaningful user
space warnings can be given.
I haven't seen a lot of requests for this feature yet, but it
sounds
like there could be a lot of interest, so it may be worth doing
correctly, rather than as a quick fix.
Am I missing anything?
Nope. Let's make it nice and easy to configure in the same place that its
already being done. :-)
Thanks,
-Steve