On Thursday, August 05, 2010 10:02:12 am Miloslav Trmac wrote:
I'm posting these patches for early review; users of the code are
not in
the kernel yet.
Quick public comment (we chatted on IRC), there are already a number of user
space crypto events. I think what is in the logs here can be fit into the
existing categories and the user space ones can be replicated in the kernel.
-Steve
Two new records are defined; in each case output of records is caused
by a
syscall, and all other syscall-related data (process identity, syscall
result) is audited in the usual records.
AUDIT_CRYPTO_STORAGE_KEY is used when a system-wide storage wrapping key is
changed.
AUDIT_CRYPTO_USERSPACE_OP is used when any user-space program performs a
crypto operation. To disable auditing these records by default and to
allow the users to selectively enable them using filters, a new filter
field AUDIT_CRYPTO_OP is defined; auditing of all crypto operations can
thus be enabled using (auditctl -a exit,always -F crypto_op!=0).
Attached for review are:
- A kernel patch
- An userspace audit patch
- A few example audit entries
Mirek