Re: auid

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>so in the absence of SELinux (e.g. CAPP-only configuration), any uid 0 process
>can mutate its loginuid later to mask the original one,

Or it can delete the audit logs or re-write syslog or install a rootkit covering
everything up. The only defence against this kind of tampering is remote logging.

>and in the presence of SELinux, any program authorized for audit_control can 
>mutate its loginuid later (so a smaller exposure, but still a possibility).

So...why doesn't policy restrict this even further so that the 10 apps that need
to set this are the *only* ones that can do so?

The list is: login, sshd, vsftpd, postfix, procmail, cron, at, gdm, kdm, & xdm.

-Steve

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux