[Auditbeat] System module documentation#9512
[Auditbeat] System module documentation#9512cwurm merged 19 commits intoelastic:feature-auditbeat-hostfrom
Conversation
|
Pinging @elastic/secops |
18a294b to
d2f064d
Compare
auditbeat/scripts/docs_collector.py
Outdated
There was a problem hiding this comment.
@cwurm Could we use the same script also for metricbeat?
@kaiyan-sheng @sayden In case one of you is already working on this.
There was a problem hiding this comment.
@ruflin They look rather similar for sure, though there are also some differences.
@andrewkroh might know more about why they are separate?
|
@dedemorton @karenzone FYI, if one of you wants to review the text here. |
There was a problem hiding this comment.
Should we add here a warning box to explicitly call out the danger of dictionary attacks on beat.db?
There was a problem hiding this comment.
I think I wouldn't. The scenario is very remote, where an attacker would have to reverse with exact collisions 10 successive rounds of SHA-512 hashes, and then would still have to break the original salt and hash combination.
It seems more likely to needlessly scare users that are not familiar with how passwords and hashes work.
But I'm open to other opinions here. @joshbressers maybe?
There was a problem hiding this comment.
If someone has root on the system, they have access to the hash directly from passwd, and they have access to a hashed version of the Linux hash in beats.db. Leveraging what's in beats.db is more difficult than leveraging the standard passwd/shadow files. So brute force is not the risk I would warn about.
Perhaps instead we should insist on the fact that this file now contains a copy of the hashes. So users should ensure it's as well scrutinized (e.g. FIM) as /etc/passwd and /etc/shadow, and that the file is not copied around lightly (e.g. for diagnostics, misconfigured backups).
There was a problem hiding this comment.
How about adding this sentence:
The
beat.dbfile should be readable only by the root user and be treated similar to the shadow file itself.
tsg
left a comment
There was a problem hiding this comment.
Docs look reasonable to me. Thanks!
webmat
left a comment
There was a problem hiding this comment.
A few minor issues. I'm only commenting on the documentation itself. I'm not the best person to review the code here (although the changes looked ok to me).
- Suggesting a few ways to clarify the doc
- Suggestion for a different security/auditing warning
- A few nits, feel free to ignore those
Overall I'm good with this PR.
I think in all cases, the script should generate the full doc including x-pack. It shouldn't depend on which directory it's being run from. This can be addressed as a separate PR, however.
There was a problem hiding this comment.
You can remove "for controlling its behavior".
There was a problem hiding this comment.
I copied it from auditd which says "tuning its behavior". I agree the whole sentence doesn't add a lot of value - the title already says what this section is about. But anyway, I think I like this flow better than if it just said "This module has some configuration options. The
following example shows all configuration options ...". Seems abrupt.
There was a problem hiding this comment.
If someone has root on the system, they have access to the hash directly from passwd, and they have access to a hashed version of the Linux hash in beats.db. Leveraging what's in beats.db is more difficult than leveraging the standard passwd/shadow files. So brute force is not the risk I would warn about.
Perhaps instead we should insist on the fact that this file now contains a copy of the hashes. So users should ensure it's as well scrutinized (e.g. FIM) as /etc/passwd and /etc/shadow, and that the file is not copied around lightly (e.g. for diagnostics, misconfigured backups).
|
Thanks @webmat I've incorporated most feedback. The |
|
@dedemorton I'm experiencing build errors, and wonder if they could be related to generated IDs: |
|
@karenzone Sorry, the system module fields were missing from |
|
Did you remember to add fields.yml? |
|
@dedemorton Ah, you're right. Now that |
d972baa to
0bbeaed
Compare
|
I've merged this now so we can get the feature branch merged into master. I assume we will have to do more work on the documentation - I found one or two things myself when browsing through before the merge - but we can do these on master. |
Adds config and asciidoc documentation for the four metricsets of the system module that are ready today: host, process, socket, user. Also adjusts the doc generation to include files from x-pack/auditbeat.
Adds config and asciidoc documentation for the four metricsets of the system module that are ready today (
host,process,socket,user).Also adjusts the doc generation to work with files from
x-pack/auditbeat. The result is still written toauditbeat/docs, but depending on whethermage docsormage updateis run inauditbeatorx-pack/auditbeatthe modules documentation will contain the system module (or any other modules in the future) or not.