由买买提看人间百态

boards

本页内容为未名空间相应帖子的节选和存档,一周内的贴子最多显示50字,超过一周显示500字 访问原贴
Unix版 - [转载] 大家来讨论讨论
相关主题
[转载] 一个问题Glib install problem with Sparc 2.5?
普通用户的login attempt failed le...remove history logs in CSH
他可以做什么?? (在unix)help: wtmpx
Tomcat 3.1 + apache 1.3.9一问请教一个UNIX问题, 也许很低级, 谢谢
How unix keep track of the registry?急!unix 好像是down掉了
Is that possible to run a matlab program in background?[转载] help: a question about xwin32
help on directory access[转载] 问一个 shell script 和 rsh 的问题
How to kick a hidden user?solaris 9 ufs has logging (journal)
相关话题的讨论汇总
话题: attacker话题: lids话题: logging话题: facility话题: 讨论
进入Unix版参与讨论
1 (共1页)
g*s
发帖数: 12
1
【 以下文字转载自 Linux 讨论区 】
【 原文由 GTS 所发表 】
My new boss is pushing me at this question so much. :(
I think it over and over but can not get it.
- Today, you mentioned the role of a secure logging facility to
help admins discover penetrations (after the fact).
Design such a logging facility for an open system such as Linux.
Assume that the attacker's penetration will be logged, but the attacker
will then have root privilege. How do we ensure that the attacker cannot
then modify the log without the ad
z*******w
发帖数: 79
2
Check out LIDS, it can limit the root user's priviledge. I am
not sure if it can restrict a file can be "append" only.
If it can, then the problem can be solved easily.
1. Install LIDS
2. set the log file to be "append" only
3. start the logger
By the way, you can write the logger as a kernel module and use
LIDS to seal the kernel. If the logger is running as a process,
I think LIDS can hide it so that no user can kill it.

【在 g*s 的大作中提到】
: 【 以下文字转载自 Linux 讨论区 】
: 【 原文由 GTS 所发表 】
: My new boss is pushing me at this question so much. :(
: I think it over and over but can not get it.
: - Today, you mentioned the role of a secure logging facility to
: help admins discover penetrations (after the fact).
: Design such a logging facility for an open system such as Linux.
: Assume that the attacker's penetration will be logged, but the attacker
: will then have root privilege. How do we ensure that the attacker cannot
: then modify the log without the ad

1 (共1页)
进入Unix版参与讨论
相关主题
solaris 9 ufs has logging (journal)How unix keep track of the registry?
question on user log inIs that possible to run a matlab program in background?
how to count the times a function is calledhelp on directory access
Open Solaris 疑问How to kick a hidden user?
[转载] 一个问题Glib install problem with Sparc 2.5?
普通用户的login attempt failed le...remove history logs in CSH
他可以做什么?? (在unix)help: wtmpx
Tomcat 3.1 + apache 1.3.9一问请教一个UNIX问题, 也许很低级, 谢谢
相关话题的讨论汇总
话题: attacker话题: lids话题: logging话题: facility话题: 讨论