HPE GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: trusted system auditlogs
Operating System - HP-UX
1833913
Members
2323
Online
110063
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-14-2005 07:35 PM
03-14-2005 07:35 PM
trusted system auditlogs
Hi,
after converting to trusted system and turning on auditing, the audit logs have been capturing whatever has been defined to be audited accordingly.
By default, the audit log has permission as shown below, with read/write permssion soley to root owner.
-rw------- 1 root sys 1101171 Mar 15 16:23 audfile1
However, now my external auditor is insisting that root owner must not have write access to the audit logs
But I don't see how that is possible !
I like to find out if that is a reasonable demand by my external auditor ?
And if it's reasonable, how can I achieve that ? Through a 3rd party s/w ???
Really appreciate any feedback and advise.
after converting to trusted system and turning on auditing, the audit logs have been capturing whatever has been defined to be audited accordingly.
By default, the audit log has permission as shown below, with read/write permssion soley to root owner.
-rw------- 1 root sys 1101171 Mar 15 16:23 audfile1
However, now my external auditor is insisting that root owner must not have write access to the audit logs
But I don't see how that is possible !
I like to find out if that is a reasonable demand by my external auditor ?
And if it's reasonable, how can I achieve that ? Through a 3rd party s/w ???
Really appreciate any feedback and advise.
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-14-2005 07:45 PM
03-14-2005 07:45 PM
Re: trusted system auditlogs
hi,
i see, those auditors again.
i presume they would think u r going to make changes to that file. but audfile1 is not a ascii type but a data file. u may like to show or prove to them by doing the file command, i.e.:
# file audfile1
unless after running audisp command to display and output the content of that file, u amend the generated output.
regards.
i see, those auditors again.
i presume they would think u r going to make changes to that file. but audfile1 is not a ascii type but a data file. u may like to show or prove to them by doing the file command, i.e.:
# file audfile1
unless after running audisp command to display and output the content of that file, u amend the generated output.
regards.
what you do not see does not mean you should not believe
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-14-2005 08:02 PM
03-14-2005 08:02 PM
Re: trusted system auditlogs
Hi Joseph,
thank for your feedback.
I already explained to the auditor on this and even did a cat on the auditlog to show them its garbage and cannot simply vi to change it.
But he insisted that as long as the auditlog is writable, a technically competant person with root access can perhaps used other tools to modify the content and write it back. Or even if cannot, can simply delete the entire auditlog for cover up.
thank for your feedback.
I already explained to the auditor on this and even did a cat on the auditlog to show them its garbage and cannot simply vi to change it.
But he insisted that as long as the auditlog is writable, a technically competant person with root access can perhaps used other tools to modify the content and write it back. Or even if cannot, can simply delete the entire auditlog for cover up.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-16-2005 03:28 AM
03-16-2005 03:28 AM
Re: trusted system auditlogs
The only ways I can think of to deal with this are to
A. copy the audit logs off-host (which I would recommend) or
B. get a B-level certified operating system (which can be a pain to administer).
Trusted HP-UX is approximately C2 level (was certified back in the 10.x days I think) which means that root is still all-powerful.
chmod -w audfile1
will not change the fact that root has write access to the file, because root can easily
chmod +w audfile1
for example. If you made the file owned by someone other than root so root can't chmod it, root can still chown the file back to himself. You can see this is starting to get a bit silly...
Option A actually accomplishes something as long as root on the local host doesn't also have access to the remote host. Note that root on the remote host can still muck with the logs. Some ways to deal with that are to cryptographically sign the logs or print them on paper or other write-only media.
Hope that helps.
-Keith
A. copy the audit logs off-host (which I would recommend) or
B. get a B-level certified operating system (which can be a pain to administer).
Trusted HP-UX is approximately C2 level (was certified back in the 10.x days I think) which means that root is still all-powerful.
chmod -w audfile1
will not change the fact that root has write access to the file, because root can easily
chmod +w audfile1
for example. If you made the file owned by someone other than root so root can't chmod it, root can still chown the file back to himself. You can see this is starting to get a bit silly...
Option A actually accomplishes something as long as root on the local host doesn't also have access to the remote host. Note that root on the remote host can still muck with the logs. Some ways to deal with that are to cryptographically sign the logs or print them on paper or other write-only media.
Hope that helps.
-Keith
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP