SELinux logging and auditing
SELinux developers are well aware that a security-oriented subsystem such as SELinux can only succeed if it is capable of enhanced logging and even debugging. Every action that SELinux takes, as part of the LSM hooks that it implements, should be auditable. Denials (actions that SELinux prevents) should always be logged so that administrators can take due action. SELinux tuning and changes, such as loading new policies or altering SELinux booleans, should always result in an audit message being displayed.
Following audit events
By default, SELinux will send its messages to the Linux audit subsystem (assuming the Linux kernel is configured with the audit subsystem enabled through the CONFIG_AUDIT
kernel configuration). There, the messages are picked up by the Linux audit daemon (auditd
) and logged in the /var/log/audit/audit.log
file. Additional handling rules can be defined through the audit dispatcher process (audisp
), which picks up audit events and dispatches...