OS Support for Auditing

I spent most of last week in Boston, attending the Red Hat Summit. This is an annual show put on by Red Hat to discuss various topics of interest to their customers, partners and analysis. I was there because Likewise is a Red Hat partner and because we received an Innovator of the Year award.

I sat in on various sessions. One of the most interesting ones was an update on changes to the auditing system in the Linux kernel and in the associated Red Hat tools.

What is auditing? Auditing is the ability to detect access to specific resources and to note who performed the access and when the access was performed. Examples of this are auditing when someone reads from or writes to the /etc/passwd  in UNIX or when someone tries to add a member to the Domain Admins group in Windows Active Directory. In both of these cases, there might be completely legitimate reasons for such access. Auditing is about collecting information, not about enforcing security. Of course, if security is violated, auditing information can provide forensic evidence to discover whodunnit and what was dun.

The auditing system in Red Hat and others versions of Linux is implemented by a combination of kernel modifications and code in the auditd daemon. Auditd reads configuration files and informs the kernel what information it’s interested in. When relevant events are detected in the kernel, it signals back to auditd that, in turn, generates log information and/or passes information to other interested parties.

Auditd provides a rich set of things that can be audited. For example, any system call can be logged as can access to any file.

Configuring auditd is not trivial. Here’s a link to a page that describes how it’s done. Additionally, if you want to read audit output, it can be messy, too.

As with most things UNIX-y, there’s little consistency between versions. Linux offers one thing. Solaris, HPUX and AIX all offer something different (from Linux and from each other!). They all do more or less the same thing.

And then there’s Windows.

Windows takes a fundamentally different approach to auditing. In Windows, the auditing mechanism is almost identical to its security mechanism. Security is implemented by using access control lists (ACLs). So is auditing.

Windows supports two types of ACLs: discretionary ACLs (DACLs) and system ACLs (SACLs). The former is used for security, the latter for auditing. Just as Windows uses a DACL to determine if a user has access to a resource, it uses the SACL to determine whether or not the access should be logged. Log output is sent to event logs.

The ACL approach means that Windows can audit access to any resource that has ACLs associated with it. You can audit access to a file (or to entire directories since ACLs are “inherited”). You can also audit access to registry entries or nodes in Active Directory. Of course, things without ACLs cannot be audited. You can’t audit when an application calls a specific system call, for example.

OS auditing is a very powerful feature that can give you assurances that your security systems are working effectively and that your privileged users are not unnecessarily accessing restricted data. Even in Windows, however, where configuring the audit system is easy, I think the features are underutilized. In UNIX/Linux/Mac I suspect they’re used by fewer than 5% of users.

16 Responses to “OS Support for Auditing”

  1. Freda Filkey says:

    They call the creator Shonda while she doesn’t actually like getting identified as like that. He is currently a manufacturing and distribution officer but he strategies on changing it. Jogging is the issue I adore most. Texas is his start spot but he desires to move simply because of his relatives.

  2. I know this web site offers quality dependent
    articles or reviews and other data, is there any other web page which provides such things in quality?

  3. You see things there that you just don’t see anyplace else. The reason behind this is that players have a tendency to get even if they reduction in a particular game. It is much better to do it now than to wait until it is as well late.

  4. Adan Bonsee says:

    Hiya, I am really glad I have found this info. Today bloggers publish just about gossip and web stuff and this is actually irritating. A good site with interesting content, this is what I need. Thanks for making this web site, and I will be visiting again. Do you do newsletters by email?

  5. Thank you for the good writeup. It in truth used to be a amusement account it. Glance advanced to far introduced agreeable from you! By the way, how could we keep in touch?|

  6. 0y92de83c932lzyz9spwwdtp32fgo7kobd14brv9l5y7jil6q5ct

  7. marketing says:

    Hi, are you promoting your business with Social Media Marketing?? There’s a non-exploited market on Social Media that most people don’t take advantage of. If you’d like to learn how to promote on Instagram effectively, we’re giving a Limited time offer now due to COVID19 for our course, it used to be $297, you can get it now for only $7! Here’s the link to the course: https://www.digistore24.com/redir/319134/larrosamarcelo/

  8. 7g8xj2td15bt5brzvjurg7590thp080nfqz2w3210lwyhi1u881r

  9. 463p0f035fmjwqhi055yf81080e71fznmtc25x0cw2c7uq07s660

  10. Rita Prawl says:


  11. buying viagra online https://usggrxmed.com/ buy viagra online cheap

  12. order cialis says:

    Cialis price https://cialedrx.com/ viagra fast shipping

  13. nice blog keep up the good work

  14. Bank of america personal loans loanspersonal365.com unsecured personal loans bad credit

Leave a Reply