SUMMARY: Tru64 v4.0F file auditing of critical O/S files

From: Chris Los <clos_at_trentu.ca>
Date: Fri, 04 May 2001 22:36:35 -0400

Thanks to all who responded. Here are the responses i received.

From: Joe Fletcher <joe_at_meng.ucl.ac.uk

Hi,

The prime target for modifications to ls/ps etc recently is Solaris.
There's an exploit based on either ntp or snmpdmiX which allows to
hacker
to "root kit" the system. To date I've not seen the same exploit used on
on Tru64. The way most people find out they've been hacked is any file
with 01 in the name disappears from ls listings. The hack may get ported
to
Tru64 but hopefully Compaq will preepmt this. The built-in fverify may
be
of some use to you.


From: lrs22_at_att.net

Tru64 auditing can be used to monitor activity against
selected files.

For the example you present, I would enable the
object_selection mode which will reduce the level of
auditing to cover only those files you designate.
Then, specify the files and the system calls of concern.
The resulting audit data will reflect the specified
syscall activity performed on the specified files.
(A more comprehensive explanation is in the Security
book.)

To enable object selection
   # auditmask -s obj_sel

To mark the files of concern
   # auditmask -x /usr/bin/login -x /usr/bin/ps \
   -x /usr/bin/ls

 -or-

create a list of files, then
   # auditmask -X file_list
where "file_list" is the name of this list

To specify the syscalls
   # auditmask obj_creat obj_delete
where "obj_creat" and "obj_delete" are aliases for sets
of syscalls which can either open or remove an object
(data within an object cannot be modified without first
opening the object). These aliases are defined in
/etc/sec/event_aliases. Or, you can specify any set of
syscalls which are relevant for your environment. You
can also selectively audit just the successful opens and
removes, or all the opens and removes (or just the
failed attempts).

This approach to monitoring your files will be able to
tell when the file was modified and who did the
modification. Tools which monitor the file checksum
can only tell you whether a file was modified, not who,
when, nor tell you about any failed attempts. Which tool
you select depends on the information you wish to
collect.

Side issue: In order to modify any of the files you
listed, a process would need to be running as root. If
this is happening, then it would be difficult to
guarantee most security mechanisms. Databases of
checksums, if online, can be altered. The checksum
utility can be altered. Audit data can be deleted. The
truly paranoid might need to write the audit data either
to a device, such as a WORM, or over the network to a
(more) secure system. In practice, any security measure
provides just a level of assurance.

For information on setting up auditing, the relevant
manpages are:
     audit_setup
     auditmask
     auditd
and for analyzing the data:
     audit_tool

Additional information is available in the Security
book.

Hope this helps.

lrs


Final Note:

Another person said they were using COPS but wanted to move to TripWire
but had been unsuccessful in compiling it on Tru64 so far.


Original post:

We're running tru64 v4.0f pk0005 and i would like to start monitoring
changes to certain O/S files such as "/usr/bin/login", "/usr/bin/ls"
and "/usr/bin/ps". I've read recently in an issue of Sys Admin that
these, as well as some others
are well known targets for hackers. Is the native tru64 file auditing
system
a good way of monitoring these types of files????? Or would i be better
off
using TripWire???

I would also be interested in any good pointers on how to setup either
of these tools.

TIA,

clos_at_trentu.ca
--
Received on Sat May 05 2001 - 02:38:18 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:42 NZDT