- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Protect log files
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 09:36 PM
тАО07-27-2005 09:36 PM
Does anyone know of a facility which will allow a logfile to be appended to, but prevent existing data from being modified? The auditors do not like the fact that system administrators can amend logfiles.
So far our only options appear to be writing the logfiles to a write once/read many device such as a cdrom, or to have the logfiles on a seperate host which is not accessable by the users. We are running HP-UX 11.0 and HP-UX 11i.
Thanks.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 09:44 PM
тАО07-27-2005 09:44 PM
Re: Protect log files
If there is reason to think logfiles are being amended, then disciplinary procedures should cover these - let administrators get on with their jobs!
If they really want logfiles to be non-editable, then the only way is to restrict root access! I do know of companies that have an audit department that change root passwords to allow UNIX admins on to do a piece of work then change it again! Needless to say these companies don't keep their good administrator for long!
I'd say that a WORM device isn't really a feasible solution, unless you want a potentially huge stack of CDs with logs going back to the year dot.
All opinion of course, but as far as I'm concerned if you start to limit the administrators power beyond change control, then you're on a sinking ship.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 09:51 PM
тАО07-27-2005 09:51 PM
Re: Protect log files
Regards,
Carles
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:00 PM
тАО07-27-2005 10:00 PM
SolutionIn classical Unix it's quite binary, either nothing, or all.
That's why it was so important to keep your root passwords sound and secret.
However, as there seem to appear ever more auditors who dislike these unconfined root powers, most Unices recently came up with Role Based Access Control.
I saw that there's also a HP-UX implementation.
Maybe you can find out more about it and if it suits you here?
http://docs.hp.com/en/5991-0709/ch01s01.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:02 PM
тАО07-27-2005 10:02 PM
Re: Protect log files
Hang on though you can just change syslog.conf to stop logging briefly if you really wanted to.
Although no access to log files does seem a little heavy to say the least.
Perhaps you should look at HIDs if you haven't already.
Which logfiles do they not like admins having access to?
Having a policy of logging in as an identifiable login name and then su - root, would give you a bit of an audit trail about who was in as root.
Surely if you were up to no good you could just switch off whatever was logging. Seems like your auditors want a whole new operating system to me.
I think I'm ranting a little, administrators have to be given at least a little trust. They/we have access to all sorts of critical processes not just log files and we have a responsilbity to look after them.
I should think that these people who changed the password straight after admins logged in were creating a great deal of temptation for those admins to create back doors, which doesn't help anyone.
I shall be watching this thread with interest. Now I'm going to lie down in a darkened room for a bit.
I hope you find the answer you are looking for.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:06 PM
тАО07-27-2005 10:06 PM
Re: Protect log files
I can't think of a utility which would allow what you want.
As Gavin mentioned, so not allow users to log in directly as root, and setup individual shell histories for users when they switch ie. .sh_history.
Ask the auditors for a utility that does what they want, after all they are the ones making the request.
Regards,
Hilary
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:13 PM
тАО07-27-2005 10:13 PM
Re: Protect log files
NOTE: Even a B2 system would not meet the auditors' requirements as there nothing special about any log file. syslog.log is defined in /etc/syslog.conf or redefined in /sbin/init.d/syslogd with the -f option for syslogd. You could hook up some writable CDROMs, spend a lot of cash to have a special driver written to append to the CDROM, then have armed guards monitor the CDROM around the clock.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:16 PM
тАО07-27-2005 10:16 PM
Re: Protect log files
Then someone could borrow someone else's card...
Besides consoles aren't what they used to be, they are mostly LAN consoles.
I feel like I'm playing chess against myself.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:31 PM
тАО07-27-2005 10:31 PM
Re: Protect log files
Gavin - let me know if you win the chess game.
What exactly are the auditors worried about? If someone wants to do any malicious damage, if they know their stuff they will cover their tracks. If you manage to tie the system up as securely as the auditors want, no-one will be able to their jobs.
Hilary
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 10:39 PM
тАО07-27-2005 10:39 PM
Re: Protect log files
Mark Syder (like the drink but spelt different)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-27-2005 11:02 PM
тАО07-27-2005 11:02 PM
Re: Protect log files
folks who don't know what requires administering a Unix system.
Even if you could lock out your root account almost completely, what's it worth in the end?
Any decent root kit is wiping out its traces.
In fact the latest breed of root kits have reached such a high sophistication that even well devised IDS and most alert sysadmins would have a hard and long time before they even detected a compromise.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-28-2005 02:01 AM
тАО07-28-2005 02:01 AM
Re: Protect log files
To answer some of your questions - they have not specified any logs in particular - but it looks like any logs which capture user logon/activity, system logs, I/O device logs, network management logs.
We currently ensure that all a administrators log on as ourselves before switching user to root.
The auditors have already asked us to sign a form every time we do this and state the reason for this - very tedious, and to be honest just encourages us to login once as root then carry out multiple tasks which wont be logged anyway.
I am also not supposed to know the root password, one of my colleagues supposedly logs in for me each time, but thankfully my manager does not enforce this and the auditors haven't quite got round to checking this yet.
I will look into RBAC and HIDS, thanks to Gavin and Ralph.
It looks like we will probably be transferring our logfiles to a separate host which is only accessible by a limited number of users, but how workable this is I don't yet know.
Once again, thanks for your comments.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-28-2005 02:12 AM
тАО07-28-2005 02:12 AM
Re: Protect log files
You are not limited in your sys admin powers but you do provide greater information flow to the auditors - lots of logs files!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-28-2005 02:28 AM
тАО07-28-2005 02:28 AM
Re: Protect log files
Sounds like you got a nasty auditor indeed. If you are looking for a mechanism whereby the standard of proof that a file has not been tampered with is greater than normal then you could make regular writes from your logfiles to a different server that your sys admins don├в t have access to (maybe using a cron).
It should give some sort of assurance that log tampering can be detected but it's by no means absolute.
Hope you keep you're auditors happy!!!
John :-)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-28-2005 03:21 AM
тАО07-28-2005 03:21 AM
Re: Protect log files
It is reasonable to require login as a normal user and then su but as mentioned, sudo is MUCH MORE preferred in the security community. The reason is that you can limit the commands allowed for specific users and every command is logged. As far as other users logging in as root, there are some sysadmins (totally paranoid) that do not allow root login ever and enforce this by changing the root password every 5 minutes to another (unknown) random string. Sysadmins must use sudo for all tasks.
As you are seeing, human nature takes over when unreasonable and inconsistent rules make the job intolerable. Users will secretly share passwords, they will wipe out or overlay .sh_history (in case anyone is looking), they will (if alloed) use sudo to run /usr/old/bin/sh which is the Bourne shell to by pass .sh_history but still have root access.
And of course, the auditors have told your managment that additional people are required to check on everything everyday, to read every signed paper about root access for appropriateness, to have regular reviews of all sysadmin tasks, to prepare reports for the auditors and upper management, and if these audits are for SOX compliance, upper management must sign off on all the reports indicating that they understand and approve each task. (they don't? hummmm)
And of course, all these requirements must be applied to a PC-based and mainframe systems too (they aren't? hummmm).
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-03-2005 12:39 AM
тАО08-03-2005 12:39 AM
Re: Protect log files
Did your auditors accept any of the responses?
Please remember to assign Points.