Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Investigate auditd as a tool for monitoring/validating system state #951

Open
rocodes opened this issue Feb 15, 2024 · 1 comment
Open

Comments

@rocodes
Copy link
Contributor

rocodes commented Feb 15, 2024

There are cases where we need to install and ascertain the state of certain files, both in dom0 and in other vms, such as the release pubkey, or other configurable files.

[auditd](https://www.redhat.com/sysadmin/configure-linux-auditing-auditd)/auditctl are available in dom0, and allow for the configuration of custom rules with various possible actions.

At minimum we could write logs to journalctl, but we could also consider triggering custom actions (for example, if a certain file changes, ask a trusted channel like dom0 rpc to show the user a confirmation dialog), or as a trigger to notify us that some provisioning steps may need to be rerun.

Possible use cases:

  • a set of rules that 'validate' a prod config (similar idea to make test in dom0 that developers do)
  • Help with the followup of [4.2] Write vm-specific config values to qubesdb #936 or with other provisioning aspects where we try to ascertain the system state, and/or ascertain if we need to rerun any provisioning steps

I haven't looked into this a ton, but just putting it out there, thoughts are welcome.

@cfm
Copy link
Member

cfm commented Feb 22, 2024 via email

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants