<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: trusted system auditlogs in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504631#M745098</link>
    <description>The only ways I can think of to deal with this are to &lt;BR /&gt;&lt;BR /&gt;A. copy the audit logs off-host (which I would recommend) or &lt;BR /&gt;&lt;BR /&gt;B. get a B-level certified operating system (which can be a pain to administer).&lt;BR /&gt;&lt;BR /&gt;Trusted HP-UX is approximately C2 level (was certified back in the 10.x days I think) which means that root is still all-powerful.  &lt;BR /&gt;&lt;BR /&gt;chmod -w audfile1 &lt;BR /&gt;&lt;BR /&gt;will not change the fact that root has write access to the file, because root can easily&lt;BR /&gt;&lt;BR /&gt;chmod +w audfile1&lt;BR /&gt;&lt;BR /&gt;for example.  If you made the file owned by someone other than root so root can't chmod it, root can still chown the file back to himself.  You can see this is starting to get a bit silly...&lt;BR /&gt;&lt;BR /&gt;Option A actually accomplishes something as long as root on the local host doesn't also have access to the remote host.  Note that root on the remote host can still muck with the logs.  Some ways to deal with that are to cryptographically sign the logs or print them on paper or other write-only media.&lt;BR /&gt;&lt;BR /&gt;Hope that helps.&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
    <pubDate>Wed, 16 Mar 2005 11:28:51 GMT</pubDate>
    <dc:creator>Keith Buck</dc:creator>
    <dc:date>2005-03-16T11:28:51Z</dc:date>
    <item>
      <title>trusted system auditlogs</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504628#M745094</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;after converting to trusted system and turning on auditing, the audit logs have been capturing whatever has been defined to be audited accordingly.&lt;BR /&gt;&lt;BR /&gt;By default, the audit log has permission as shown below, with read/write permssion soley to root owner.&lt;BR /&gt;&lt;BR /&gt;-rw-------   1 root       sys        1101171 Mar 15 16:23 audfile1&lt;BR /&gt;&lt;BR /&gt;However, now my external auditor is insisting that root owner must not have write access to the audit logs &lt;BR /&gt;&lt;BR /&gt;But I don't see how that is possible !&lt;BR /&gt;&lt;BR /&gt;I like to find out if that is a reasonable demand by my external auditor ?&lt;BR /&gt;&lt;BR /&gt;And if it's reasonable, how can I achieve that ? Through a 3rd party s/w ???&lt;BR /&gt;&lt;BR /&gt;Really appreciate any feedback and advise.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Mar 2005 03:35:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504628#M745094</guid>
      <dc:creator>Ng Kim Meng</dc:creator>
      <dc:date>2005-03-15T03:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: trusted system auditlogs</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504629#M745095</link>
      <description>hi,&lt;BR /&gt;&lt;BR /&gt;i see, those auditors again.&lt;BR /&gt;&lt;BR /&gt;i presume they would think u r going to make changes to that file. but audfile1 is not a ascii type but a data file. u may like to show or prove to them by doing the file command, i.e.:&lt;BR /&gt;&lt;BR /&gt;# file audfile1&lt;BR /&gt;&lt;BR /&gt;unless after running audisp command to display and output the content of that file, u amend the generated output.&lt;BR /&gt;&lt;BR /&gt;regards.</description>
      <pubDate>Tue, 15 Mar 2005 03:45:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504629#M745095</guid>
      <dc:creator>Joseph Loo</dc:creator>
      <dc:date>2005-03-15T03:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: trusted system auditlogs</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504630#M745096</link>
      <description>Hi Joseph,&lt;BR /&gt;&lt;BR /&gt;thank for your feedback. &lt;BR /&gt;&lt;BR /&gt;I already explained to the auditor on this and even did a cat on the auditlog to show them its garbage and cannot simply vi to change it.&lt;BR /&gt;&lt;BR /&gt;But he insisted that as long as the auditlog is writable, a technically competant person with root access can perhaps used other tools to modify the content and write it back. Or even if cannot, can simply delete the entire auditlog for cover up.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Mar 2005 04:02:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504630#M745096</guid>
      <dc:creator>Ng Kim Meng</dc:creator>
      <dc:date>2005-03-15T04:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: trusted system auditlogs</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504631#M745098</link>
      <description>The only ways I can think of to deal with this are to &lt;BR /&gt;&lt;BR /&gt;A. copy the audit logs off-host (which I would recommend) or &lt;BR /&gt;&lt;BR /&gt;B. get a B-level certified operating system (which can be a pain to administer).&lt;BR /&gt;&lt;BR /&gt;Trusted HP-UX is approximately C2 level (was certified back in the 10.x days I think) which means that root is still all-powerful.  &lt;BR /&gt;&lt;BR /&gt;chmod -w audfile1 &lt;BR /&gt;&lt;BR /&gt;will not change the fact that root has write access to the file, because root can easily&lt;BR /&gt;&lt;BR /&gt;chmod +w audfile1&lt;BR /&gt;&lt;BR /&gt;for example.  If you made the file owned by someone other than root so root can't chmod it, root can still chown the file back to himself.  You can see this is starting to get a bit silly...&lt;BR /&gt;&lt;BR /&gt;Option A actually accomplishes something as long as root on the local host doesn't also have access to the remote host.  Note that root on the remote host can still muck with the logs.  Some ways to deal with that are to cryptographically sign the logs or print them on paper or other write-only media.&lt;BR /&gt;&lt;BR /&gt;Hope that helps.&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Wed, 16 Mar 2005 11:28:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-auditlogs/m-p/3504631#M745098</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2005-03-16T11:28:51Z</dc:date>
    </item>
  </channel>
</rss>

