logo_kerberos.gif

Projects/Audit

From K5Wiki
< Projects
Revision as of 16:17, 5 July 2012 by Tsitkova (talk | contribs) (State the purpose of the project)

Jump to: navigation, search
This is an early stage project for MIT Kerberos. It is being fleshed out by its proponents. Feel free to help flesh out the details of this project. After the project is ready, it will be presented for review and approval.


Purpose

The primary focus of this project will be on creating an Audit infrastructure within MIT Kerberos to monitor security related events on the KDC. The initial set of the audible events will be identified. Also, the special attention will be paid to the content of the log entries so they would be relevant and useful for effective audit analysis.

Requirements

The new audit system should be:

  • build-time enabled;
  • run-time pluggable;
  • simple, so it could be easily replaced with the OS specific implementations;
  • if possible, record the i18n- and l10n-ready log messages.


Events

TODO.

This section details the list of the events, the content of the log entries and their nature. The latter indicates if the event should be classified as an alert or just a warning on some detected activity. Potentially, the events can be further categorized into some logical groups (for example, policy related events, general KDC events, security violation, etc).

Event Nature Log entries
Ticket requested G
Ticket issued/renewed
Ticket is forwardable
Constrained delegation
Service ticket requested
Service ticket renewed
Password modified/expired
KDC referral activity
Configuration changed
Policy allowed/disallowed event X
Replay attack detected E

where "G" stands for general "good" activity, while 'E' denotes an alert/error.

Design details

TODO

Test implementation

We will use libaudit module available on Fedora, Debian, Suse for the first round.