[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200527145317.GI2915@breakpoint.cc>
Date: Wed, 27 May 2020 16:53:17 +0200
From: Florian Westphal <fw@...len.de>
To: Richard Guy Briggs <rgb@...hat.com>
Cc: Linux-Audit Mailing List <linux-audit@...hat.com>,
LKML <linux-kernel@...r.kernel.org>,
netfilter-devel@...r.kernel.org, Paul Moore <paul@...l-moore.com>,
sgrubb@...hat.com, omosnace@...hat.com, fw@...len.de,
twoerner@...hat.com, eparis@...isplace.org, tgraf@...radead.org
Subject: Re: [PATCH ghak124 v1] audit: log nftables configuration change
events
Richard Guy Briggs <rgb@...hat.com> wrote:
> iptables, ip6tables, arptables and ebtables table registration,
> replacement and unregistration configuration events are logged for the
> native (legacy) iptables setsockopt api, but not for the
> nftables netlink api which is used by the nft-variant of iptables in
> addition to nftables itself.
>
> Add calls to log the configuration actions in the nftables netlink api.
>
> This uses the same NETFILTER_CFG record format.
I know little about audit records. Does this allow the user to figure
out that this record is created via nf_tables/netlink rather than xtables?
> For further information please see issue
> https://github.com/linux-audit/audit-kernel/issues/124
>
> Signed-off-by: Richard Guy Briggs <rgb@...hat.com>
> ---
> This is an RFC patch.
> Note: I have questions about the "entries" count. Is there a more
> appropriate or relevant item to report here?
> Note: It might make sense to differentiate in the op= field that this
> was a legacy call vs an nft call. At the moment, legacy calls overlap
> with nft table calls, which are similar calls.
>
> include/linux/audit.h | 7 +++++++
> kernel/auditsc.c | 12 +++++++++---
> net/netfilter/nf_tables_api.c | 14 ++++++++++++++
> 3 files changed, 30 insertions(+), 3 deletions(-)
>
> diff --git a/include/linux/audit.h b/include/linux/audit.h
> index 3fcd9ee49734..b10f54103a82 100644
> --- a/include/linux/audit.h
> +++ b/include/linux/audit.h
> @@ -12,6 +12,7 @@
> #include <linux/sched.h>
> #include <linux/ptrace.h>
> #include <uapi/linux/audit.h>
> +#include <uapi/linux/netfilter/nf_tables.h>
>
> #define AUDIT_INO_UNSET ((unsigned long)-1)
> #define AUDIT_DEV_UNSET ((dev_t)-1)
> @@ -98,6 +99,12 @@ enum audit_nfcfgop {
> AUDIT_XT_OP_REGISTER,
> AUDIT_XT_OP_REPLACE,
> AUDIT_XT_OP_UNREGISTER,
> + AUDIT_XT_OP_CHAIN_REGISTER = NFT_MSG_NEWCHAIN,
Hmm, this means AUDIT_XT_OP_CHAIN_REGISTER overlaps with the 4th
audit_nfcfgop value...?
> + AUDIT_XT_OP_CHAIN_NOOP = NFT_MSG_GETCHAIN,
GETCHAIN can't appear in the commit path (its not changing anything).
Same for all other NFT_MSG_FOO that use ".call_rcu" action.
Futhermore, I wonder what is to be logged by audit.
The fact that there was 'some change'? If so, its enough to log
the increment of the generation count during the commit phase.
(After that, kernel can't back down anymore, i.e. all errors are
caught/handled beforehand).
If its 'any config change', then you also need to handle adds
or delete from sets/maps, since that may allow something that wasn't
allowed before, e.g. consider
ip saddr @trused accept
and then, later on,
nft add element ip filter @trusted { 10.0.0.0/8, 192.168.0.1 }
This would not add a table, or chain, or set, but it does implicitly
alter the ruleset.
> + case NFT_MSG_DELRULE:
> + audit_log_nfcfg(trans->ctx.table->name,
> + trans->ctx.family,
> + atomic_read(&trans->ctx.table->chains_ht.ht.nelems),
> + trans->msg_type);
> + break;
Is that record format expected to emit the current number of chains?
I'm not sure if that info is meaningful.
Since table names can be anything in nf_tables (they have no special
properties anymore), the table name is interesting from a informational
pov, but not super interesting.
This will also emit the same message/record multiple times, with only
difference being the msg_type. I'm not sure thats interesting.
Consider a batch update that commits 100 new rules in chain x,
this would result in 100 audit_log_nfcfg() calls, each with the
same information.
There are test cases in nftables.git, you could run them to see what
kind of audit events are generated and how redundant they might be.
Powered by blists - more mailing lists