Re: F36 Change proposal: No ifcfg by default (Self-Contained Change)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 06, 2022 at 01:55:50PM -0500, Steve Grubb wrote:
> Hello,
> 
> On Thursday, January 6, 2022 1:02:36 PM EST Zbigniew Jędrzejewski-Szmek 
> wrote:
> > On Thu, Jan 06, 2022 at 08:48:52AM -0800, Adam Williamson wrote:
> > > On Thu, 2022-01-06 at 16:16 +0000, Zbigniew Jędrzejewski-Szmek wrote:
> > > > I know that you said that the scripts are needed because of "magic
> > > > stuff™" that the scripts do, but sorry, that's not a justification:
> 
> It is the justification. The audit system has regulatory requirements imposed 
> on it. This is required by common criteria and subsequently depended on for 
> PCI-DSS, CIS, DISA STIG, NIST risk management framework, and many other 
> security or regulatory schemes.
> 
> 
> > > > *everything* that can be done using a shell script can also be
> > > > reimplemented independently. Right now audit pulls in the whole
> > > > initscripts stack, this should all be replaced by some small helper.
> 
> I moved it to initscripts-service in rawhide.
> 
> > > > (Maybe a separate binary, or a small shell script, or maybe something
> > > > in auditctl…. I don't know because I don't know audit.)> 
> 
> It would be better if there was a systemctl solution. Any solution I 
> implement will be met with you need to migrate to systemctl. There have been 
> multiple bz opened and closed on this.
> 
> > > As I understand the bug, it's not a question of whether the thing can
> > > be done, but whether it can be known *who did it*.
> 
> Exactly. And "who" means login uid, pid, and their security label. You can 
> only get this if the signal is sent from the user's context.
> 
> > There is no magic functionality in the kernel that specifically records
> > that something was executed by some specific script.
> 
> There actually is magic in the kernel that records who sent a signal to the 
> audit daemon and the  necessary atributes. This functionality has been there 
> since at least 2005. It's not new.

Right, so is /usr/bin/stop-audit with the following contents the solution:
---------------
#!/bin/sh
set -e
exec kill $(systemctl show -P MainPID auditd)
---------------
?

Zbyszek
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux