-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit and server log the unseal and generate-root operations #2244
Comments
I am concerned that the decode command line is stored in the bash history and in some cases, logged for audit purposes. This command: Am I missing something? |
Depending on your shell configuration it could be. You can:
You have lots of options! |
I just came across this and I'm very surprised it's missing from the audit log. This seems like an operation one definitely wants to see in an audit log. I notice there's no activity on this in over a year. Could anyone provide an update on the status of this effort? |
Even though the keys are not associated with vault users, they could be associated with GPG keys if they were used during keying. Could the log indicate which keys were used based on the GPG key they were originally encrypted-with? |
@rtlong I'd guess this is mainly due to the fact that only an active node writes audits and that an unsealed node by definition is inactive. But I agree that a standby node should either forward these operations to the active node for auditing or buffer it and then audit it when it becomes active itself. |
Also seal operators are not correctly logged: the audit log will contain a request object but not the corresponding response object. Unseal requests are not logged at all. This is very disappointing for me, because I have been trying to make root access to the server conditional on Vault being sealed. |
This is unfortunate but not surprising: once Vault is sealed just about everything internal shuts down, making it difficult to ensure that the response gets written.
generate-root operations are now audit logged, as of 1.3. This is the first exception to the general rule that only authenticated and login endpoints are audit logged. In principle we could extend this to audit log unseal requests, but I'm less persuaded of the benefit of auditing unseal requests. Note that we won't be able to record failed unseal attempts, since the audit device configuration is kept behind the sealed barrier.
I don't understand this goal. When Vault is sealed, no vault-token using operations can succeed, only unseal requests - and those use unseal keys, not root tokens. |
I mean OS-level root access to the server, not using Vault root tokens. The goal is to make harder for the local system administrator to tamper with Vault, e.g. with ptrace. |
My mistake, as of 1.4 (#8301). |
Issues that are not reproducible and/or not had any interaction for a long time are stale issues. Sometimes even the valid issues remain stale lacking traction either by the maintainers or the community. In order to provide faster responses and better engagement with the community, we strive to keep the issue tracker clean and the issue count low. In this regard, our current policy is to close stale issues after 30 days. Closed issues will still be indexed and available for future viewers. If users feel that the issue is still relevant but is wrongly closed, we encourage reopening them. Please refer to our contributing guidelines for details on issue lifecycle. |
No description provided.
The text was updated successfully, but these errors were encountered: