Getting Started with the Linux Intrusion Detection System

Sometimes file permissions aren't enough. LIDS gives you kernel-level access control that goes beyond filesystem settings.

With increasing usage of Linux in various computing environments, a lot of security vulnerabilities are being discovered in GNU/Linux-based systems. Due to the open nature of application development in the Open Source world, a lot of vulnerabilities are being addressed very quickly. But, it may happen that a patch is not addressed in a timely manner, and in the meantime, all the systems running the application are exposed. Malicious users can possibly gain root privileges and wreak havoc with these systems. This is where the Linux Intrusion Detection System (LIDS) comes to the rescue.

LIDS is a patch to the Linux kernel; it implements access control and a reference monitor. LIDS is configured with its two admin tools, lidsconf and lidsadm.

lidsadm is the utility that allows you to disable LIDS in a terminal, so that you can set various settings, which LIDS, when enabled, won't allow you to do, and you can view the current status of your LIDS installation with this tool.

lidsconf is the tool that allows you to add and remove access control to certain files, which can be binaries or any other files. LIDS refers to these files as objects, and the capabilities we allow or disallow are referred to as subjects. LIDS overrides things like filesystem permissions. You can literally use LIDS to make it impossible to access virtually any object, whether it's a file, raw device, memory or I/O, even if you're trying to access the object as the root user.

In short, LIDS is a complete security model implementation for the Linux kernel.

Installation

The developers of LIDS have included installation instructions in the INSTALL file. However, I describe the main tasks in this article.

The stable releases of LIDS are created against a vanilla source of the Linux kernel. It is recommended that the LIDS patch be applied only to the original kernel source, not to the distribution-specific source, as it may lead to various compilation errors, as most distributions customize the kernel for their own use. LIDS is known to have problems when used on non-i386 architectures.

For example, lids-2.2.1-2.6.13.tar.gz should be applied to the 2.6.13 kernel.

After patching the kernel with:

patch -p1 /dir_to_the_patch_file/patch-lids-2.2.1-2.6.13

You can run make [x/menu]config and select the LIDS options from the security section and compile the kernel with:

make

make modules_install

(if you configured any parts of the kernel as modules).

Copy the bzImage from /kernelpath/arch/i386/boot to your /boot directory, and re-initialize your bootloader. Restart into your LIDS-enhanced kernel.

You can see the status of your LIDS installation by typing:

lidsadm -V

If you get an error, LIDS was not installed into the kernel; check your kernel configurations and recompile.

Setting Access Controls

Before we set access controls for various server applications, here is the general syntax of lidsconf:

lidsconf -A [-s subject] -o object [-d] [-t from-to] [-i level] -j ACTION

The subject is a program upon which a capability is added. The object can be a binary, directory, socket name or a capability.

The -d switch tells LIDS that the domain is an exec domain. The -t lets you set a specific time dependency for the capability and -i defines the inheritance level.

The -j switch is an action that can be one of the following:

  • DENY: denies access to the object.

  • READONLY: sets the object to read-only.

  • APPEND: mostly used for logs, this allows a certain program to append only that file, not remove it.

  • WRITE: allows other binaries to write on the file.

  • GRANT: used in conjunction with a capability, used to grant the subject a capability.

  • IGNORE and DISABLE: two options that allow you to disable the setting of any permission on a certain object and disable some extension features, respectively.

The capabilities LIDS supports are the following, as can be seen by typing:

lidsadm -h|grep CAP

  • CAP_CHOWN: chown/chgrp.

  • CAP_DAC_OVERRIDE: DAC access.

  • CAP_DAC_READ_SEARCH: DAC read.

  • CAP_FOWNER: owner ID, not equal user.

  • ID CAP_FSETID: effective user ID, not equal owner.

  • ID CAP_KILL: real/effective ID, not equal process.

  • ID CAP_SETGID: set*gid(2).

  • CAP_SETUID: set*uid(2).

  • CAP_SETPCAP: transfer capability.

  • CAP_LINUX_IMMUTABLE: immutable and append file attributes.

  • CAP_NET_BIND_SERVICE: binding to ports below 1024.

  • CAP_NET_BROADCAST: broadcasting/listening to multicast.

  • CAP_NET_ADMIN: interface/firewall/routing changes.

  • CAP_NET_RAW: raw sockets.

  • CAP_IPC_LOCK: locking of shared memory segments.

  • CAP_IPC_OWNER: IPC-ownership checks.

  • CAP_SYS_MODULE: insertion and removal of kernel modules.

  • CAP_SYS_RAWIO: ioperm(2)/iopl(2) access.

  • CAP_SYS_CHROOT: chroot(2).

  • CAP_SYS_PTRACE: ptrace(2).

  • CAP_SYS_PACCT: configuration of process accounting.

  • CAP_SYS_ADMIN: tons of admin stuff.

  • CAP_SYS_BOOT: reboot(2).

  • CAP_SYS_NICE: nice(2).

  • CAP_SYS_RESOURCE: sets resource limits.

  • CAP_SYS_TIME: sets system time.

  • CAP_SYS_TTY_CONFIG: tty configuration.

  • CAP_MKNOD: mknod operation.

  • CAP_LEASE: taking leases on files.

  • CAP_HIDDEN: hidden process.

  • CAP_KILL_PROTECTED: kill protected programs.

  • CAP_PROTECTED: protect the process from signals.

______________________

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Access controls for Jboss server.

Anonymous's picture

Hi Irfan,

Your post had been very useful. Thanks first.

I was given the task of binding port 443 to JBoss server.

i have granted the NET_BIND capability on 443 port to Jboss/bin/run.sh subject. But the problem persists with exception as Permission denied :443

Can u pls help wid this.

More Information on LIDS please

Matt's picture

Hello Irfan.

I liked your article on LIDS, but am a bit confused by the phrase:

"It is recommended that the LIDS patch be applied only to the original kernel source, not to the distribution-specific source".

I use Suse Linux 10. Does your statement mean I must somehow 'retrofit' a vanilla kernel into my distribution? This would be something well beyond my capabilities and I presume Novell wouldn't like it much either.

Where can I find LIDS?

White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState