-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rsyslog write permissions #124
Comments
Hmm, I just checked auth.log and noticed that nothing had been written to the log since I ran the cis role to update those permissions but also other logs in var/log aren't getting written to so maybe it's something else...I'll do some more checking. |
http://serverfault.com/questions/518975/rsyslog-is-not-working-properly-it-does-not-log-anything 8.2.4.3 is the one that breaks rsyslog so that it won't log anymore. Need to fix so it doesn't change it to root:root |
Yeah I've changed my logs to syslog:adm which counts against the CIS score, but it seems like a more secure solution than keeping rsyslog running as root. |
Looks like the Ubuntu 16.04 benchmarks don't modify log permissions, so they must have realized that wasn't good or something... |
Nice spot! How should we modify 8.2.4.3 to have /var/log/auth.log with the correct permissions? |
I'm hesitant to modify the roles as any fix would not be compliant with v1.0 of the CIS PDF. I do think it's an oversight of the PDF, but those looking for strict compliance should probably keep things as they are. |
I haven't tried this on 14.04 but on 16.04 if you change the permissions to root:root rsyslogd won't have permissions to write to any of the log files any more which seems like a larger security risk... |
Ok, I think we will need a @eastokes, @adespain, does it sound like a solution for this issue? |
I just looked and CIS 14.04 v2 benchmarks also remove the permissions change...maybe put a warning that says "some CIS 14.04 v1 benchmarks are insecure and that is why they published version2 -version 2 is recommended..." or something :) |
I'm wondering if anyone has experience with the following issue while trying to meet CIS recommendations:
CIS recommends all log files be owned by root:root or root:<secure group>.
Rsyslog is configure by default to run and write to logs as syslog:adm.
Rsyslog starts elevated as root:root and then drops privileges, thus is still able to write to files owned by root:root as long as they were opened on startup. There are several log files that don't seem to be opened on startup, and thus rsyslog is not able to open them after dropping privileges, and these logs are never written to.
Notably /var/log/auth.log
The text was updated successfully, but these errors were encountered: