-
Notifications
You must be signed in to change notification settings - Fork 905
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide parity with Linux Audit system for logging real user identity in case sudo/sudo su
is used (%user.auid property is needed)
#318
Comments
sudo/sudo su
is used (auid property)sudo/sudo su
is used (%user.auid property is needed)
related? added loginuid on |
@mstemm are we pulling in the changes from draios/sysdig#1008 to address this issue? |
This would be great to have! |
draios/sysdig#1189 is an updated version of the changes that will address this feature. |
The PR is merged. I'm going to keep this falco issue open until I also update the ruleset to take advantage of |
Hey @mstemm what's the state of this? |
We haven't updated the rules yet to take advantage of the changes in draios/sysdig#1189, so we should keep it open. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
We should keep this on the roadmap. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Absolutely keep!
…On Fri, Oct 11, 2019, 6:39 PM stale[bot] ***@***.***> wrote:
This issue has been automatically marked as stale because it has not had
recent activity. It will be closed if no further activity occurs. Thank you
for your contributions.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#318?email_source=notifications&email_token=AAA5J42QEE72KN3VXK2COX3QOCT25A5CNFSM4END57C2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEBARRAY#issuecomment-541137027>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAA5J4ZEU5CHLO45GXPMSLLQOCT25ANCNFSM4END57CQ>
.
|
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I don't want to tell you guys to work on but I think it's a pretty important issue to be closed automatically so I'm going to bump. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I think this issue is important. Looks like the simplest solution would be to find any I can should be able to provide a pull request if this is ok? |
Agreed. This is still important and a pretty naive oversight for a security product. Would love to see it fixed |
When Falco is configured to log EXECVE calls it is not possible to track ID of actual executing user -
%user.name
returnsroot
and%user.uid
return 0.But Linux auditing system always provides an identity of actual executing user via
auid
field.So if user with ID = 1002 runs
the Falco log with rule
looks like this
while audit record looks like this (note
auid=1002
there) which makes it easy to correlate which user run this command assudo
and provide automated response if suspicious activity is spottedThe text was updated successfully, but these errors were encountered: