Difference between revisions of "Projects/Audit"
(Project page skeleton.) |
(State the purpose of the project) |
||
Line 1: | Line 1: | ||
{{project-early}} |
{{project-early}} |
||
+ | == Purpose == |
||
− | == Pluggability == |
||
+ | The primary focus of this project will be on creating an Audit infrastructure within MIT Kerberos to monitor security related events on the KDC. The initial set of the audible events will be identified. Also, the special attention will be paid to the content of the log entries so they would be relevant and useful for effective audit analysis. |
||
+ | |||
⚫ | |||
− | * Run-time pluggable. Registered via plugin framework. The "audit" subsection of [plugins] in kdc.conf points to the module. |
||
+ | The new audit system should be: |
||
− | * Build-time enabled using --with-audit-pl configure flag. |
||
+ | |||
+ | * build-time enabled; |
||
+ | * run-time pluggable; |
||
⚫ | |||
+ | * if possible, record the i18n- and l10n-ready log messages. |
||
== Events == |
== Events == |
||
⚫ | |||
+ | TODO. |
||
⚫ | |||
− | * Ticket renewed |
||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
− | * Password expired |
||
⚫ | |||
⚫ | |||
⚫ | |||
− | (When/if assigning the numbers to the events, consider using odd numbers for errors and other "bad" things and even numbers for informational messages.) |
||
+ | This section details the list of the events, the content of the log entries and their nature. The latter indicates if the event should be classified as an alert or just a warning on some detected activity. Potentially, the events can be further categorized into some logical groups (for example, policy related events, general KDC events, security violation, etc). |
||
+ | {| class="wikitable" |
||
+ | |- |
||
+ | ! Event |
||
+ | ! Nature |
||
+ | ! Log entries |
||
+ | |- |
||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
+ | | Configuration changed|| || |
||
+ | |- |
||
⚫ | |||
+ | |- |
||
⚫ | |||
+ | |- |
||
+ | |} |
||
⚫ | |||
+ | where "G" stands for general "good" activity, while 'E' denotes an alert/error. |
||
− | |||
⚫ | |||
− | * If possible, make the log messages i18n-ready |
||
== Design details == |
== Design details == |
||
⚫ | |||
+ | TODO |
||
+ | |||
+ | == Test implementation == |
||
+ | |||
⚫ |
Revision as of 15:17, 5 July 2012
Purpose
The primary focus of this project will be on creating an Audit infrastructure within MIT Kerberos to monitor security related events on the KDC. The initial set of the audible events will be identified. Also, the special attention will be paid to the content of the log entries so they would be relevant and useful for effective audit analysis.
Requirements
The new audit system should be:
- build-time enabled;
- run-time pluggable;
- simple, so it could be easily replaced with the OS specific implementations;
- if possible, record the i18n- and l10n-ready log messages.
Events
TODO.
This section details the list of the events, the content of the log entries and their nature. The latter indicates if the event should be classified as an alert or just a warning on some detected activity. Potentially, the events can be further categorized into some logical groups (for example, policy related events, general KDC events, security violation, etc).
Event | Nature | Log entries |
---|---|---|
Ticket requested | G | |
Ticket issued/renewed | ||
Ticket is forwardable | ||
Constrained delegation | ||
Service ticket requested | ||
Service ticket renewed | ||
Password modified/expired | ||
KDC referral activity | ||
Configuration changed | ||
Policy allowed/disallowed event X | ||
Replay attack detected | E |
where "G" stands for general "good" activity, while 'E' denotes an alert/error.
Design details
TODO
Test implementation
We will use libaudit module available on Fedora, Debian, Suse for the first round.