Douglas Garstang <doug.garst...@gmail.com> writes:
> On Sat, Apr 24, 2010 at 4:27 PM, Russ Allbery <r...@stanford.edu> wrote:

>> I think that if you're installing Tripwire policy files on local disk,
>> I would take a step back and see if you have a better design available.
>> Tripwire is the poster child for something that really wants a
>> read-only network file system.  You want to only be able to update the
>> files in one place that requires secure access, and then have all your
>> systems read the signed database files from that one place but not have
>> the ability to change them.

> A read-only network file system... Well, all I can think of there that
> would be appropriate would be sshfs. Having never implemented it, I'm
> not sure what's involved in that. I'm not sure why a read-only file
> system is required though. What's wrong with puppet managing the files?

If I'm an attacker, and I want to fool Tripwire once I've taken over the
system, I change the Tripwire keys and then reinitialize the database.
Tada, now there are clean Tripwire reports.

Of course, you may have other ways of detecting that Puppet isn't running
regularly if the attacker stops it, in which case Puppet has a chance of
detecting that the keys have been changed (although even that can be a bit
tricky).

If the database is in a location that's read-only from the perspective of
the system running Tripwire, then there isn't any way to just quietly
update the database without your knowledge.  This is why the Tripwire
documentation recommends a write-protected floppy disk.  I find a network
file system like a read-only NFS export to be a lot easier to manage than
read-only floppy disks.  Of course, I'm spoiled by having AFS available
everywhere, and if you don't already have any network file system handy,
setting one up may be more trouble than it's worth.

> PCI compliance doesn't go into details. The whole thing is a crock of
> shit really. Installation of tripwire was one of the requirements on the
> list of 10,000 or so, so that's what I am trying to implement.  Then
> again, so was anti-virus software on Linux...

Welcome to the wonderful world of PCI.  Have fun with password lockout!  I
love security standards that require you to turn an unsuccessful
compromise attempt into a successful denial of service attack.

-- 
Russ Allbery (r...@stanford.edu)             <http://www.eyrie.org/~eagle/>

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-us...@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to