Hello,
> Von: Jacques Gélinas [mailto:jacques@croesus.com]
>
> Hello!
>
> This is to announce a new project called for-rest. It is an intrusion detection
> system that works on a host runing vservers. It is using the bsd process
> accounting in the kernel with a little enhancement. Using it, it can build a set
> of process trees (a little like the pstree command).
>
> Interestingly the bsd process accounting is already PID namespace aware. So
> you end up with one accounting file per vserver. Each file is tracking all
> processes in a vserver. Normally process accounting is done at process end
> time. With the patch, an accounting record is produced at process creation
> time (fork()) and each time the process execs (thus changes name). Using this,
> it is possible to build the complete execution tree up to PID 1 (init) for every
> processes.
OK, this is a simple and lean approach. What was the rationale to not fixing the audit subsystem, like e.g. done with [1], which would be very generic (should also work for other pid-ns cases, e.g. lxc or google chrome launcher if I remember correctly). Apart from that, audit logs can be used by other SIEM/IDS systems, some of those are already using audit data as input source, e.g. searching for "Intrusion detection system linux syscall" (and subtracting the entries for syscall-table-modification-checkers)
> .....
Roman
[1] https://www.redhat.com/archives/linux-audit/2013-August/msg00021.html