avatar
[转载] 大家来讨论讨论# Unix - 噫吁兮,危乎高哉
g*s
1
【 以下文字转载自 Linux 讨论区 】
【 原文由 GTS 所发表 】
My new boss is pushing me at this question so much. :(
I think it over and over but can not get it.
- Today, you mentioned the role of a secure logging facility to
help admins discover penetrations (after the fact).
Design such a logging facility for an open system such as Linux.
Assume that the attacker's penetration will be logged, but the attacker
will then have root privilege. How do we ensure that the attacker cannot
then modify the log without the ad
avatar
z*w
2
Check out LIDS, it can limit the root user's priviledge. I am
not sure if it can restrict a file can be "append" only.
If it can, then the problem can be solved easily.
1. Install LIDS
2. set the log file to be "append" only
3. start the logger
By the way, you can write the logger as a kernel module and use
LIDS to seal the kernel. If the logger is running as a process,
I think LIDS can hide it so that no user can kill it.

【在 g*s 的大作中提到】
: 【 以下文字转载自 Linux 讨论区 】
: 【 原文由 GTS 所发表 】
: My new boss is pushing me at this question so much. :(
: I think it over and over but can not get it.
: - Today, you mentioned the role of a secure logging facility to
: help admins discover penetrations (after the fact).
: Design such a logging facility for an open system such as Linux.
: Assume that the attacker's penetration will be logged, but the attacker
: will then have root privilege. How do we ensure that the attacker cannot
: then modify the log without the ad

相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。