Auditing
Chapter 25
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-1
Auditing Chapter 25 Computer Security: Art and Science , 2 nd - - PowerPoint PPT Presentation
Auditing Chapter 25 Computer Security: Art and Science , 2 nd Edition Version 1.0 Slide 25-1 Outline Overview What is auditing? What does an audit system look like? How do you design an auditing system? Auditing mechanisms
Chapter 25
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-2
system use and performance
system in a clear, understandable manner
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-3
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-4
violations
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-5
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-6
program configuration parameters
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-7
and (if desired) RACF interactions
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-8
USER=EW125004 NAME=S.J.TURNER OWNER=SECADM CREATED=88.004 DEFAULT-GROUP=HUMRES PASSDATE=88.004 PASS-INTERVAL=30 ATTRIBUTES=ADSP REVOKE DATE=NONE RESUME-DATE=NONE LAST-ACCESS=88.020/14:15:10 CLASS AUTHORIZATIONS=NONE NO-INSTALLATION-DATA NO-MODEL-NAME LOGON ALLOWED (DAYS) (TIME)
GROUP=HUMRES AUTH=JOIN CONNECT-OWNER=SECADM CONNECT-DATE=88.004 CONNECTS= 15 UACC=READ LAST-CONNECT=88.018/16:45:06 CONNECT ATTRIBUTES=NONE REVOKE DATE=NONE RESUME DATE=NONE GROUP=PERSNL AUTH=JOIN CONNECT-OWNER=SECADM CONNECT-DATE:88.004 CONNECTS= 25 UACC=READ LAST-CONNECT=88.020/14:15:10 CONNECT ATTRIBUTES=NONE REVOKE DATE=NONE RESUME DATE=NONE SECURITY-LEVEL=NONE SPECIFIED CATEGORY AUTHORIZATION NONE SPECIFIED
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-9
accesses, and other events
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-10
Log Name: Security Source: Microsoft Logged: 03/20/2017 Windows security 12:02:59 PM Event ID: 4634 Task Category: Logoff Level: Information Keywords: Audit Success User: N/A Computer: McLaren OpCode: Info General: An account was logged off. Subject: Security ID: MCLAREN\matt Account Name: matt Account Domain: MCLAREN Logon ID: 0xACBA30 Details: + System
TargetUserSID S-1-5-22-2039872233-608055118-4446661516-2001 TargetUserName matt TargetDomainName MCLAREN TargetLogonId Oxacba30
[would be in graphical format]
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-11
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-12
/telnet/&!/localhost/&!/*.site.com/
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-13
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-14
/telnet/&!/localhost/&!/*.site.com/ mail staff
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-15
constraints that the set of possible actions must satisfy
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-16
Simple security condition and *-property
action (read, write), and result (success, failure)
user attempting the violation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-17
information
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-18
¬san(O´))
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-19
result (success, failure)
¬san(O¢))
action (write), and result (success, failure)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-20
your auditing system determine which file?)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-21
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-22
entry : date host prog [ bad ] user [ “from” host ] “to” user “on” tty date : daytime host : string prog : string “:” bad : “FAILED” user : string tty : “/dev/” string
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-23
directory, /etc/passwd refers to /var/ftp/etc/passwd
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-24
see; log sanitized when all information in C(U) deleted from log
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-25
administrative personnel
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-26
Logging System Logging System Sanitizer Log Log Sanitizer Users viewing Users viewing
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-27
analysis
resanitize information
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-28
consultant to analyze logs for an address scanning attack
10.163.5.13, 10.163.5.14, 10.163.5.15
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-29
scheme to share key
enforcement) need to
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-30
a whole, are associated either with a specific entity or a very small set
state employees
gender, and date of birth of patient
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-31
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-32
subject to some perturbation
3,000,000 ratings
system
set
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-33
su: bishop to root on /dev/ttyp0
parameters, etc.
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-34
3876 ktrace CALL execve(0xbfbff0c0,0xbfbff5cc,0xbfbff5d8) 3876 ktrace NAMI "/usr/bin/su" 3876 ktrace NAMI "/usr/libexec/ld-elf.so.1" 3876 su RET xecve 0 3876 su CALL __sysctl(0xbfbff47c,0x2,0x2805c928,0xbfbff478,0,0) 3876 su RET __sysctl 0 3876 su CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0) 3876 su RET mmap 671473664/0x2805e000 3876 su CALL geteuid 3876 su RET geteuid 0
above)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-35
password, and the broad operation (what was the reason for the access attempt?)
accesses, and the underlying causes (why did access fail?)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-36
known
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-37
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-38
algorithm, to obtain this
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-39
relevant parts of system state may have changed between the first test and the last
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-40
proposed transition to determine if new state would be disallowed
initial state
example, change of privilege)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-41
against a list of connections to be blocked
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-42
security policy occur?
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-43
expects ACK(t+1), but gets ACK(s+1).
number s+1—but it receives packet and ACK number is incorrect. So it repeats this … system hangs or runs very slowly, depending on whether interrupts are disabled
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-44
Normal:
Land:
s+1
Source Destination SYN(s) ACK(s+1) SYN(t) ACK(t+1)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-45
same
destination IP address, packet is part of a Land attack
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-46
disable logging that is unnecessary
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-47
implementation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-48
kernel
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-49
from result)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-50
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-51
different levels of sensitivity
audited
then the auditable events are changed
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-52
that entry is turned on
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-53
logging
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-54
(application logging)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-55
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-56
completed
support audit subsystem
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-57
network, system call and result, etc. as appropriate
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-58
generation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-59
header,35,AUE_EXIT,Wed Sep 18 11:35:28 1991, + 570000 msec, process,bishop,root,root,daemon,1234, return,Error 0,5 trailer,35
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-60
where exported file system imported called client mount point
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-61
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-62
file to server’s NFS server using LOOKUP request
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-63
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-64
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-65
can search all parent directories, user can access file as requested, file is descendent of server’s file system mount point
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-66
ways
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-67
command occurs
for file_name
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-68
requesting it, client host making request
later requests
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-69
containing object
searched
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-70
to import file system that host exports
exported), 4 (result)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-71
user has search permission on directory
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-72
to that of root of pseudo-file system
1. Check server denies all requests by unauthorized client hosts or users to execute the PUTROOTFH operation 2. Check that directory being looked up in pseudo-file system can be searched by user
3. Check that the file being looked up is pseudo-file system and that the user has search permission on the containing directory and read permission on the file
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-73
policies
lmkdir /usr/home/xyzzy/project policy lattach /usr/home/xyzzy/project /lafs/xyzzy/project
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-74
protection mechanisms
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-75
policy for file
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-76
prohibit:0900-1700:*:*:wumpus:exec
allow:*:Makefile:*:make:read allow:*:Makefile:Owner:makedepend:write allow:*:*.o,*.out:Owner,Group:gcc,ld:write allow:-010929:*.c,*.h:Owner:emacs,vi,ed:write
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-77
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-78
perhaps?
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-79
and use
format or meaning
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-80
associations are of interest
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-81
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-82
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-83
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-84
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-85
period of time; click to get entries
appearance frequency area
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-86
and reconstruct patterns
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-87
after it is implemented
audit (and effectiveness of audit mechanisms!)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 25-88