Sebek2 - A Kernel-based Data Capture Tool 74
LogError writes "Sebek is a piece of code the lives entirely in kernel space and records either some or all data accessed by users on the system. This paper is a detailed discussion of Sebek, how it works and its value."
Re:Sigh (Score:2, Funny)
1) Beer.
2) Cops (on TV)
3) Food. p All I need on a Saturday evening.
Yet, here you are, posting on Slashdot
re-incorporation? (Score:2)
Re:re-incorporation? (Score:3, Informative)
Re:re-incorporation? (Score:2)
Re:re-incorporation? (Score:3, Informative)
SELinux is about mandatory access controls and control policy enforcement. See the SELinux FAQ [nsa.gov] for more info about SE Linux.
Sebek (now version 2) is an kernel level logger. It does not stop users from doing anything. In fact if it did, that would make it useless for its primary job, as a tool for building HoneyNets [honeynet.org], an controlled network of systems designed to be compromised by attackers, and the methods (and related) studied by security geeks.
Re:re-incorporation? (Score:1)
Because if I wanted big brother in my box, I would use SELinux. There is no need for anyone to mandate total logging of what I do. If SELinux merges with Linux, them I'm off to BSD, or somewhere where big brother is not.
"I intend to honor my family by maintaining the freedoms they died for!"
Re: SELinux (Score:1, Informative)
That was a really dumb statement.
SELinux is merging with Linux, but it is an optional component, like ALSA or a NIC driver. It's a tool, and a useful one. Get over it.
BTW, FreeBSD (arguably the most advanced BSD) already has a very similar framework, the "TrustedBSD Mandatory Access Control Framework." It does similar things as SELinux, and in fact has an optional port of the SELinux stuff in development. (I for o
Re: SELinux (Score:2)
Great tool in the right hands (Score:4, Insightful)
Re:Great tool in the right hands (Score:5, Insightful)
Thus the impact of malicuous use of this technology could be mitigated by disabling loadable modules once booted, limiting access to kernel structures by loaded modules, using some varient of TCPA (rootkit module not signed), and/or only accepting shutdown signals from the local console.
In a corporate environment however I could see this used as a virtually undetectable piece of snitch software, ie for spying on employees at their workstation, even if they have root.
Regards
Alex
Re:Great tool in the right hands (Score:1, Offtopic)
Re:Great tool in the right hands (Score:2)
So now the question is.. do you even trust the systems you have accounts on, even when you use gpg and ssh to access them or get data from untrusted systems TO them?
I regularly use client networks and systems, generally with ssh/vpn/ipsec/gpg, but now I have no idea if I should trust these "trusted" systems.
So what we need
Re:Great tool in the right hands (Score:2)
Re:Great tool in the right hands (Score:1)
As an aside, I hadn't even considered what might happen to the logs on a compromised host. Seeing as they don't exist locally, that shouldn't be an issue. Thanks for pointing that out.
Re:Great tool in the right hands (Score:1)
Since as part of the design a Sebek-enabled host will not see any Sebek packets, someone who has rooted the box already could merely send it Sebek packets and observe whether he/she could capture the packets or if they were lost.
This can be prevented to some degree with having the module rewrite outgoing Sebek-like packets which it did not create and similarly recognize these when they arr
Umm... (Score:2)
So, uh, they already have this. But I doubt they'll put them up on freshmeat...
weird name (Score:4, Funny)
Re:weird name (Score:3, Funny)
Re:weird name (Score:1)
Re:weird name (Score:1, Flamebait)
Re:weird name (Score:2)
Re:weird name (Score:2)
Heh, funny you should say that...for one of my particular spiritual bent, they ARE. Even Christians & Satanists are at least two sides of the same coin.
Re:weird name (Score:2)
It's weird that people always talk about two sides of a coin, but they never think of the fact that all coins are (at least) three-dimensional. Nobody ever says "Hey, if two things are two sides of the same coin, then what's on the rim?" And what's inside it? I mean, there's practically nothing (usually it's air or the linings of your pocket or other coins) on the outer sides of the coin, everything interesting is inside it...
Re:weird name (Score:2)
And inside? Some soft nougat-like material, I'm guessing. Either that, or Moon Cheese(tm).
That's my story, and I'm sticking to it!
Re:weird name (Score:2)
sebek, sbeek, skeeb, skebe, sbkee, skbee, sekbe, sebke, ee
Wow! (Score:4, Interesting)
Actually, doesn't Windows come with some pretty fancy-schmancy documented (and undocumented) kernel-level logging APIs?
Or is this *nix? I should RTFA.
Re:Wow! (Score:1)
I'm sure the speed of a kernel-level logger will be amazing. I bet WinXP comes with one already running and recording everything.
Yeah, maybe that's why it needs so much disk space
Re:Wow! (Score:2)
nothing. Imagine logging every song you played
in the decoded form...
Re:Wow! (Score:2)
Why the hell is this on Slashdot now? (Score:3, Interesting)
This tool has been out at honeynet.org for months now.I've been using it for at least 2 months.
THIS IS NOT NEWS,
Re:Why the hell is this on Slashdot now? (Score:3, Informative)
because it wasn't before (Score:2)
Re:because it wasn't before (Score:2)
After all, we know slashdotters click on the link, but 95% of them are windows users (roughly the similar percentage as every other site). Slashdot is a site where people whine about MS and parade Linux news around, so why attempt to submit an article HERE?
Even better yet, if you're soo interested in linux stuf, check out Fravia's lessons on Searching. There's interesting bla
Plonked off the high horse (Score:2, Insightful)
this article is interesting. I'm not an admin of a corporate wan and there's only so much damage that can be done to a home network, so my interest is not sufficient to compel me to "
Re:Plonked off the high horse (Score:2)
Mirror (Score:4, Informative)
-----
Palladium can fix this. (Score:1, Insightful)
If I remember right, one component dealt with keycodes being replaced with encrypted and digitally signed packets that could only be decoded by the process authenticated by the palladium hardware.
Any spyware, even in the kernel couldn't get the key to decrypt these packets.
If this is right, and if anyone remembers the details, please help fill me in. No doubt, dozens or hundreds will correct me if I'm wrong
Re:Palladium can fix this. (Score:1, Flamebait)
I have another, far more entertaining solution. Let the government post an official list of individuals and companies that are considered "persona non grata" in cyberspace. Call it the "Internet Black List" (IBL.) At a minimum this should include known spammers, their providers, and the RIAA. Now, under my plan, being on this list would legally entitle anyone to att
Re:Palladium can fix this. (Score:2)
Probable origin of name? (Score:5, Informative)
I couldn't see it mentioned anywhere, but I found this on www.kemet.org, a site about the religious tradition of Ancient Egypt:
Sebek (Sobek; G/R Suchos) - "Watching over You" Son of Nit (and also, according to some myths, Set), Sebek is either depicted as a full crocodile, or, less often, as a crocodile-headed man. He is often given the epithets of Heru-sa-Aset as a Netjer [manifestation of god] of protection, healing and vengeance over the wrongdoer. In some mythologies Sebek is a powerful and awe-inspiring denizen of the underworld, and was invoked to do away with annoyances and negative situations, in the phrase "to Sebek with it(him)!," much as modern-day slang consigns bothersome things and persons "to Hell."
Re:Probable origin of name? (Score:1)
Application for Knowledge Management (Score:2)
What I want is something that lets me monitor all the calls to string-related objects (Sebak only seems to watch calls to read() ). Processing all of an appl
Re:Application for Knowledge Management (Score:1)
doing that will likely result in high CPU load which tips off your cracker.
Re:After 20+ years of buffer overflow exploits... (Score:1)
And what do you suggest we use?
C is powerfull, fast, and well known. The advantages are clear, and buffer overflows are the product of poor coding, where a coder misuses memory, and lapses to forget that all input is infact, quite evil.
The very concept of secure computing is a very new one. Yes, 20 years ago, Buffer Overflows were possible, however 20 years ago, we werent worrying about them, becua
Sounds Vulcan. (Score:1)
Am I wrong (Score:2)
Re:Am I wrong (Score:2)