Cellcrypt Federal Stack Auditing and Monitoring User Guide
- June 12, 2024
- Cellcrypt
Table of Contents
Cellcrypt Federal Stack Auditing and Monitoring
Legal
Copyright © Cellcrypt Inc. All rights reserved. Neither the whole nor any part
of the information contained in this document may be adapted or reproduced in
any material or electronic form without the prior written consent of the
copyright holder. Information in this document is subject to change without
notice. Cellcrypt Inc. makes no warranty of any kind with regard to this
information, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Cellcrypt Inc. and the
authors shall not be liable for errors contained herein or for incidental or
consequential damages concerned with the furnishing, performance, or use of
this material.
Warning: This document is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this document, or any portion of it, may result in severe civil and criminal penalties and will be prosecuted to the maximum extent possible under law.
Patents pending Cellcrypt Inc
Every effort has been made to ensure that the contents of this document are
correct. However, neither the authors nor Cellcrypt Inc. accept any liability
for loss or damage caused or alleged to be caused directly or indirectly by
this document.
Introduction
This manual will provide instructions on how to audit each component of the
Cellcrypt Stack. As this is a technical manual, it is worth mentioning that
more information about how auditing works is available in the Auxiliary
Services – Audit section of the Technical Specifications and Requirements
manual.
If you have any questions or concerns, please contact us at
support@csghq.com.
Paths to Logs
Detailed location of the log files for every instance of the Cellcrypt Stack.
DB
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FMT_SMF.1| Database query| –| –
MariaDB
- Database Errors and Warnings:/var/log/mariadb/mariadb.log
API
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FCS_HTTP S_EXT.1| Failure to establish an HTTPS Session.| /var/log/ nginx/api-
[DOMAIN]-
error.log
|
FCSTLSC EXT.1| Failure to establish a TLS Session| /var/log/ nginx/api-
[DOMAIN]-
error.log
|
FCSTLSS EXT.1| Failure to establish a TLS Session| /var/log/ nginx/api-
[DOMAIN]-
error.log
|
---|---|---|---
EMP
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FIA_AFL.1| Unsuccessful login attempts limit is met or exceeded.| –| –
FAU_GEN. 1.1| Resetting passwords| /var/log/ messages|
| | /opt/secure/ portal/app/ storage/logs/ laravel.log
FCS_HTTP S_EXT.1| Failure to establish a HTTPS Session.| /var/log/ nginx/emp-
[DOMAIN]-
error.log
|
FCSTLSC EXT.1| Failure to establish a TLS Session| /var/log/ nginx/emp-
[DOMAIN]-
error.log
|
FCSTLSS EXT.1| Failure to establish a TLS Session| /var/log/ nginx/emp-
[DOMAIN]-
error.log
|
---|---|---|---
MY
Network Device NDcPP
Ref
| Event| Where to find it| Evidence
---|---|---|---
FCS_HTTP S_EXT.1| Failure to establish a HTTPS Session.| /var/log/nginx/my-
[DOMAIN]-
error.log
|
FCS_TLSC
_EXT.1
| Failure to establish a TLS Session| /var/log/nginx/my- [DOMAIN]-
error.log
|
FCS_TLSS
_EXT.1
| Failure to establish a TLS Session| /var/log/nginx/my- [DOMAIN]-
error.log
|
SAS
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FIA_UIA_E XT.1| All use of identification and authentication mechanism.|
/var/log/ messages|
FIA_UAU_E XT.2| All use of identification and authentication mechanism.|
/var/log/ messages|
---|---|---|---
FMT_SMF.1| All management activities of TSF data.| /var/log/ messages|
FCSTLSC EXT.1| Failure to establish a TLS Session| /var/log/ stunnel/
stunnel.log|
FCSTLSS EXT.1| Failure to establish a TLS Session| /var/log/ stunnel/
stunnel.log|
FCSTLSS EXT.2| Failure to authenticate the client| /var/log/ stunnel/
stunnel.log|
–| activate_remote_wipe –| /var/log/ messages|
–| authenticate_admin_user| /var/log/ messages|
–| admin_logout| /var/log/ messages|
–| admin_session_expired| /var/log/ messages|
–| send_password_reset_mail| /var/log/ messages|
–| check_password_reset| /var/log/ messages|
–| reset_password| /var/log/ messages|
---|---|---|---
–| add_admin_user_partner_g roup| /var/log/ messages|
–| create_admin_user| /var/log/ messages|
–| delete_admin_user| /var/log/ messages|
–| user_register| /var/log/ messages|
–| modify_user_roles| /var/log/ messages|
–| update_by_id| /var/log/ messages|
–| device_update_status| /var/log/ messages|
–| add_alias| /var/log/ messages|
–| remove_alias| /var/log/ messages|
–| remove_account| /var/log/ messages|
–| auth_my_user| /var/log/ messages|
–| user_logout| /var/log/ messages|
---|---|---|---
Vault
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FCS_HTTP S_EXT.1| Failure to establish a HTTPS Session.| /var/log/nginx/
vault- [DOMAIN]-
error.log
|
FCSTLSC EXT.1| Failure to establish a TLS Session| /var/log/nginx/ vault-
[DOMAIN]-
error.log
|
FCSTLSS EXT.1| Failure to establish a TLS Session| /var/log/nginx/ vault-
[DOMAIN]-
error.log
|
SIP
Network Device NDcPP
Ref
| Event| Where to find it| Evidence
---|---|---|---
FAU_GEN
.1/CDR
| Audit Data Generation (Call Detail Record)| /var/log/ opensips.log| 2022-12-07T19:17:55.672734+00:00 sip-* /usr/
local/sbin/opensips[35710]: ACC: call ended: created=1645211866;call_start_time=16452118 67;duration=8;ms_duration=8296;setuptime=1; method=INVITE;from_tag=fa6f84b3-38a2-4709- 8ffd-3e10f52df51d;to_tag=809ab268 -06ba-41e 1-9f03-4270ebe692af;call_id=ba07fafd-963c-46 39-
a454-6bba4627c887;code=200;reason=OK;src_i p=;dst_ip=13.90.174.9;call_end_time=1645211 875;call_type=Audio;caller=;callee=
---|---|---|---
FIA_UAU. 2/VVoIP| Successful or failed registration of VVoIP endpoint/device|
/var/log/ opensips.log|
FIA_UAU. 2/VVoIP| Authentication of external VvoIP endpoint/device| /var/log/
opensips.log|
FMT_SMF
.1
| Enabling/disabling VVoIP endpoint/device features| /var/log/ opensips.log|
FCS_TLS S_EXT.2| Failure to authenticate the client| /var/log/ opensips.log|
N ginx
- TLS Access – Registers every TLS connection to the HTTPS Proxy/var/log/nginx/api.domain.com-access.log
- TLS Error – Registers every TLS error when connecting to the HTTPS Proxy/var/log/nginx/api.domain.com-error.log
Stunnel
Stunnel service logs /var/log/stunnel/stunnel.log
ECS
ECS Supervisor
ECS actions and errors
/var/log/supervisor/ecs-stderr
ECS Connectivity errors
/var/log/supervisor/ecs-stdout-
Sync actions and errors
/var/log/supervisor/sync-emp-stderr
Sync Connectivity error
/var/log/supervisor/sync-emp-stdout-
Supervisor
Log – Registers whenever the server is spawned, stopped, or rebooted.
/var/log/supervisor/supervidord.log
Asterisk
Asterisk logs, actions, and error messages
Nginx
TLS Access – Registers every TLS connection to the HTTPS
Proxy/var/log/nginx/ecs.domain.com-access.log
TLS Error – Registers every TLS error when connecting to the HTTPS Proxy/var/log/nginx/ecs.domain.com-error.log
SAS
SAS Supervisor
SAS NodeJS Workers’ logs, actions, and error messages
/var/log/supervisor/*
Backend-v4 transactions, messages, and logs
/var/log/supervisor/backend-v4-*
Supervisor Log
Registers whenever the server is spawned, stopped, or rebooted.
/var/log/supervisor/supervidord.log
Secure Application Server
SAS Gearman Workers’ logs, actions, and error messages
/var/log/secure-application-server/*
German
German server runtime errors
/var/log/gearman-job-server/gearman.log
Redis
Redis operations logs
/var/log/redis/redis-server.log
Revinetd
Revinetd transactions and connections logs
/var/log/supervisor/sip-reverse-stderr-*
Stunnel
Stunnel service logs
/var/log/stunnel/stunnel.log
SIP
SIP Supervisor
Revinetd – SIP Reverse service logs
/var/log/supervisor/sip-reverse-stderr-*Supervisor Log – Registers whenever
server is spawned, stopped or rebooted. /var/log/supervisor/supervidord.log
Opensips
Registers every SIP connection attempt
/var/log/opensips.log
Stunnel
Stunnel service logs
/var/log/stunnel/stunnel.log
Vault
Vault Supervisor
Vault service file download/upload notices and error logs
/var/log/supervisor/vault-v3-stderr-*
Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy
/var/log/nginx/vault.domain.com-access.log
TLS Error – Registers every TLS error when connecting to the HTTPS Proxy /var/log/nginx/vault.domain.com-error.log
Portal (EMP/My)
Laravel
Registers Portal events, actions, and errors
/opt/secure/portal/app/storage/logs/laravel.log
Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy (EMP)
/var/log/nginx/emp.domain.com-access.log
TLS Error – Registers every
TLS error when connecting to the HTTPS Proxy (EMP)
/var/log/nginx/emp.domain.com-error.log
TLS Access – Registers every
TLS connection to the HTTPS Proxy (MY)
/var/log/nginx/my.domain.com-access.log
TLS Error – Registers every
TLS error when connecting to the HTTPS Proxy (MY)
/var/log/nginx/my.domain.com-error.log
Stunnel
Stunnel service logs
/var/log/stunnel/stunnel.log
AUX
Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy
/var/log/nginx/aux.domain.com-access.log
TLS Error – Registers every
TLS error when connecting to the HTTPS Proxy
/var/log/nginx/aux.domain.com-error.log
Shared logs
Syslog
All log messages are sent to syslog.
/var/log/messages
NTP
Every NTP-related statistic and log.
/var/log/ntpstats/*
SSH
SSH daemon logs.
/var/log/secure
Stack Auditing
Many of the auditing features of the application were designed in order to
comply with NIAP Requirements and are enabled by default.
This informative section provides insights into what requirements are
fulfilled and where you can find those pieces of information.
Aux
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FCS_HTTP S_EXT.1| Failure to establish a HTTPS Session.| /var/log/nginx/
aux-[DOMAIN]-
error.log
|
---|---|---|---
NIAP Compliant Auditing Features
Some of the auditing features required by NIAP are available once the audit module is installed. This section explains in further detail each of the available features provided.
Start-up/shutdown date/time of audit functions
FAU_GEN.1.1 mandates that the TOE shall generate an audit record of the start-
up and shutdown of the audit functions
- Jul 23 14:49:34 ip-172-31-33-210.us-west-2.compute.internal auditd[2207]: The audit daemon is exiting.
- Jul 23 14:49:36 ip-172-31-33-210.us-west-2.compute.internal systemd[1]: Starting Security Auditing Service…
- Jul 23 14:49:36 ip-172-31-33-210.us-west-2.compute.internal auditd[22693]: Started dispatcher: /sbin/ audited paid: 22695
- Jul 23 14:49:36 ip-172-31-33-210.us-west-2.compute.internal auditd[22693]: Init complete, auditd 2.8.4 listening for events (startup state enabled)
IP connections
FAU_GEN.1.1/Log states that the TSF shall be able to generate a system log
record of IP connections.
Nftables outputs any IP connections directly into the syslog file.
Example output for IP Connections
- Aug 5 19:07:41 ip-172-31-33-210 kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
- MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00
- PREC=0x00 TTL=38 ID=6627 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=200
- Aug 5 19:07:42 ip-172-31-33-210 kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
- MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00
- PREC=0x00 TTL=38 ID=6791 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=201
- Aug 5 19:07:43 ip-172-31-33-210 kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
- MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00
- PREC=0x00 TTL=38 ID=6835 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=202
- Note: Per FAU_GEN.1/CDR’s test no. 1, the IP connections are tested through the “ping” command (hence the log format shown above)
Miscellaneous status logs
FAU_GEN.1.1/Log also calls for disk and file storage capacity, NTP status, CPU
usage, memory usage, audit storage capacity, and fan status. The evaluation
tests revolve around monitoring said parameters for a 10-minute period and
performing calls/messaging. These are handled using a simple shell script to
forward the outputs from existing OS monitoring services. The OS utility top
is used for CPU/memory status, and df, for available disk space. These outputs
are redirected to the syslog log file.
Disk/file storage capacity
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: Filesystem Size Used Avail Use% Mounted on
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: /dev/xvda2 10G 3.4G 6.7G 34% /
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: devtmpfs 897M 0 897M 0% /dev
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 919M 0 919M 0% /dev/shm
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 919M 79M 840M 9% /run
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 919M 0 919M 0% /sys/fs/cgroup
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 184M 0 184M 0% /run/user/1000
- Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 184M 0 184M 0% /run/user/0
- Aug 5 18:55:01 ip-172-31-33-210 ntpstat: synchronised to NTP server (204.11.201.10) at stratum 3
- Aug 5 18:55:01 ip-172-31-33-210 ntpstat: time correct to within 37 ms
- Aug 5 18:55:01 ip-172-31-33-210 ntpstat: polling server every 1024 s
CPU/Memory usage
- Aug 6 14:41:54 ip-172-31-33-210 top: top – 14:41:54 up 19 days, 3:04, 2 users, load average: 0.00, 0.01, 0.05
- Aug 6 14:41:54 ip-172-31-33-210 top: Tasks: 182 total, 2 running, 180 sleeping, 0 stopped, 0 zombie
- Aug 6 14:41:54 ip-172-31-33-210 top: %Cpu(s): 0.0 us, 6.2 sy, 0.0 ni, 93.8 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
- Aug 6 14:41:54 ip-172-31-33-210 top: KiB Mem : 1880524 total, 64660 free, 1247988 used, 567876 buff/cache
- Aug 6 14:41:54 ip-172-31-33-210 top: KiB Swap: 0 total, 0 free, 0 used. 352988 avail Mem
- Aug 6 14:41:54 ip-172-31-33-210 top: mbie
- Aug 6 14:41:54 ip-172-31-33-210 top: PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
- Aug 6 14:41:54 ip-172-31-33-210 top: 21324 ec2-user 20 0 162028 2104 1540 R 6.2 0.1 0:00.01 top
- Aug 6 14:41:54 ip-172-31-33-210 top: 1 root 20 0 128148 5032 2504 S 0.0 0.3 4:03.70 systemd
- Aug 6 14:41:54 ip-172-31-33-210 top: 2 root 20 0 0 0 0 S 0.0 0.0 0:00.36 kthreadd
Local Administrative Logins
The first item of FAU_GEN.1.1 states that all administrative login and logout
events must be accounted for, as well as the start/stop of trusted channels.
The stack handles this by setting watching rules on login/logout binaries,
which, in addition to “report -l” functionality produces reports on all login
attempts on the server. The last package is used for trusted channels
initiation/termination info. Additionally, Syslog is configured to audit all
attempts to initiate a super-user session (including commands such as sudo).
Login info:
Login Report
date time auid host term exe success event
- 08/06/2019 15:50:09 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 919456
- 08/06/2019 18:13:41 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 919808
- 08/07/2019 09:17:17 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 921179
- 08/07/2019 13:24:55 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 921613
- 08/07/2019 13:27:52 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 921820
- 08/07/2019 14:46:53 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 924724
- 08/07/2019 16:05:17 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 926211
Trusted channel info
- ec2-user pts/0 179.184.19.129.s Mon Aug 5 18:16 – 19:58 (01:41)
- ec2-user ssh 200.175.61.81.st Mon Aug 5 20:27 – 20:27 (00:00)
- ec2-user pts/2 200.175.61.81.st Mon Aug 5 19:24 – 22:42 (03:17)
- ec2-user pts/5 200.175.61.81.st Mon Aug 5 19:52 – 23:59 (04:06)
- ec2-user pts/2 200.175.61.81.st Tue Aug 6 14:28 – 14:38 (00:09)
- ec2-user pts/0 179.184.19.129.s Tue Aug 6 14:20 – 14:43 (00:23)
- ec2-user pts/2 200.175.61.81.st Tue Aug 6 14:38 still logged in
Super-user sessions
- Aug 8 20:40:20 ip-172-31-33-210 sudo: pam_unix(sudo:session): session opened for user root by ec2- user(uid=0)
- Aug 8 20:40:20 ip-172-31-33-210 sudo: pam_tty_audit(sudo:session): unknown option `ec2-user’
- Aug 8 20:40:20 ip-172-31-33-210 sudo: pam_tty_audit(sudo:session): changed status from 1 to 1
- Aug 8 20:41:39 ip-172-31-33-210 sudo: pam_unix(sudo:session): session closed for user root
- Aug 8 20:41:54 ip-172-31-33-210 sudo: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/ bin/systemctl restart rsyslog
Bad SH Authentication
- FAU_GEN.1.1 also requires the TOE to log unsuccessful login attempts, including when they exceed some preset limit.
- The TOE uses auditd’s own summary reporting plugin – report – and specifies auditing rules for the pam_tty service.
- Example output: report -i -au –failed
- Authentication Report date time acct host term exe success event
- 07/31/2019 12:29:42 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 845672
- 07/31/2019 13:12:40 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 845839
- 07/31/2019 13:31:19 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 845872
- 07/31/2019 19:01:13 ec2-user 200.175.61.81 ssh /usr/sbin/sshd no 848199
- 07/31/2019 19:28:00 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 848260
Changes to Time and Date
The FPT_STM_EXT.1 requirement makes it necessary to audit any discontinuous
changes in time. Monitoring time-related binaries and executables (see example
below) audit any attempts to discontinuous time changes on the stack.
Example output
Summary report of executables involved in changing the TOE server’s timezone
Executable Report
-
date time exe term host auid event
- 332. 08/06/2019 13:23:34 /usr/lib/systemd/systemd ? ? unset 877714
- 333. 08/06/2019 13:23:34 /usr/lib/systemd/systemd-timedated (none) ? unset 877713
- 334. 08/06/2019 13:23:34 /usr/lib/systemd/systemd-timedated (none) ? unset 877715
- 335. 08/06/2019 13:24:04 /usr/lib/systemd/systemd ? ? unset 877716
- 336. 08/06/2019 13:25:45 /usr/lib/systemd/systemd ? ? unset 877729
- 337. 08/06/2019 13:25:45 /usr/bin/timedatectl pts0? administrator 877726
- 338. 08/06/2019 13:25:45 /usr/lib/systemd/systemd-timedated (none) ? unset 877728
- 339. 08/06/2019 13:25:45 /usr/lib/systemd/systemd-timedated (none) ? unset 877731
- 340. 08/06/2019 13:25:45 /usr/lib/systemd/systemd-timedated (none) ? unset 877732
Manual Update Attempts
- FMT_MOF.1/ManualUpdate mandates that all attempts to initiate a manual code update must be audited. Even though FPT_TUD_EXT.
- events are no longer need to be audited (initiation/result of update attempts), logging the outputs of the manual updates fulfills both requirements.
- Direct modifications to the setup script were made to log all update messages prompted. E.g.:
- Aug 6 18:31:54 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.
- Aug 6 18:32:50 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.
- Aug 6 18:32:50 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Configuring system.
- Aug 6 18:32:53 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Starting services.
- Aug 6 18:32:53 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Running final checks.
- Aug 6 18:32:53 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Installed.
Call Detail Records
The protected local logs include the Call Detail Records (CDRs). These
permissions are automatically set during the
- TOE software installation process. The CDR’s are generated by the ESC OpenSIPS service and consist of the following information:
- TOE unique identifier
- Call originator identifier
- Call receiver identifier
- Unique transaction sequence number
- Call status (missed/connected/terminated / failures)
- Call type (voice/voice + video)
- Call start time
- Call end time
- Call duration
- Call direction (incoming/outgoing)
- Call routing into TOE
- Call routing out of TOE
Time zone
Example call log showing CDR details: 2022-02-18T19:17:55.672734+00:00 sip-
alpha /usr/local/bin/opensips[35710]: ACC: call
ended:created=1645211866;call_start_time=1645211867;duration=8;ms_duration=8296;setuptime=1;method=INVIT
E;from_tag=fa6f84b3-38a2-4709-8ffd-3e10f52df51d;to_tag=809ab268-06ba-
41e1-9f03-4270ebe692af;call_id= ba07fafd-963c-4639-
a454-6bba4627c887;code=200;reason=OK;src_ip=;dst_ip=13.90.174.9;call_end_time=1645211875;call_type=A
audio;caller=;callee=
Shared auditing information
This information is produced on every machine running any of the Cellcrypt
stack services.
SSH / Direct access
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FCSSSHS EXT.1| Failure to establish an SSH session| /var/ log/ messag es|
NTP
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FCSSSHS EXT.1| Failure to establish an SSH session| /var/ log/ messag es|
Hardware information
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FAU_GEN.
1/Log
| CPU and Memory usage| /var/ log/ messag es| 2021-12-06T11:09:30.302105-05:00 api-* top: top –
14:41:54 up 19 days, 3:04, 2 users, load average: 0.00,
0.01, 0.05
2021-12-06T11:09:30.302105-05:00 api-* top: Tasks:
182 total, 2 running, 180 sleeping, 0 stopped, 0 zombie
2021-12-06T11:09:30.302105-05:00 api-* top: %Cpu(s):
0.0 us, 6.2 sy, 0.0 ni, 93.8 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
2021-12-06T11:09:30.302105-05:00 api-* top: KiB
Mem : 1880524 total, 64660 free, 1247988 used,
567876 buff/cache
2021-12-06T11:09:30.302105-05:00 api-* top: KiB
Swap: 0 total, 0 free, 0 used. 352988 avail Mem
2021-12-06T11:09:30.302105-05:00 api-* top: mbie
2021-12-06T11:09:30.302105-05:00 api- top: PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 2021-12-06T11:09:30.302105-05:00 api- top: 21324 admin 20 0 162028 2104 1540 R 6.2 0.1 0:00.01 top
2021-12-06T11:09:30.302105-05:00 api-* top: 1 root 20
0 128148 5032 2504 S 0.0 0.3 4:03.70 systemd
2021-12-06T11:09:30.302105-05:00 api-* top: 2 root 20
0 0 0 0 S 0.0 0.0 0:00.36 kthreadd
---|---|---|---
FAU_GEN.
1/Log
| NTP Status| /var/ log/ messag es| 2021-12-06T11:09:30.302105-05:00 api-* ntpstat:
synchronised to NTP server (204.11.201.10) at stratum 3
2021-12-06T11:09:30.302105-05:00 api-* ntpstat: time
correct to within 37 ms
2021-12-06T11:09:30.302105-05:00 api-* ntpstat:
polling server every 1024 s
FAU_GEN.
1/Log
| Disk and file storage capacity| /var/ log/ messag es| 2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
Filesystem Size Used Avail Use% Mounted on
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h: /
dev/xvda2 10G 3.4G 6.7G 34% /
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
devtmpfs 897M 0 897M 0% /dev
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
tmpfs 919M 0 919M 0% /dev/shm
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
tmpfs 919M 79M 840M 9% /run
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
tmpfs 919M 0 919M 0% /sys/fs/cgroup
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
tmpfs 184M 0 184M 0% /run/user/1000
2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:
tmpfs 184M 0 184M 0% /run/user/0
---|---|---|---
General system activity
Network Device NDcPP Ref| Event| Where to find it|
Evidence
---|---|---|---
FAU_GEN.1.1| Start-up and shutdown of the audit functions| /var/log/ messages|
2021-12-06T11:09:31.340131-05:00 api-*
auditd[1548]: Init complete, auditd 2.8.5 listening for events (startup state enable)
FAU_GEN.1.1| Changes to TSF data related to configuration changes| /var/log/
aide/ aide.log|
FAU_GEN.1.1| Generating/import of, changing, or deleting of cryptographic
keys| –|
---|---|---|---
FAU_GEN.1.1| Administrative login and| /var/log/| Login Report
| logout| audit/| ===========================================
| | audit.log| =
| | | # date time auid host term exe success event
| | | ===========================================
| | | =
| | | 1. 08/06/2019 15:50:09 admin 172.31.33.210 /dev/
| | | pts/0 /usr/sbin/sshd yes 919456
| | | 2. 08/06/2019 18:13:41 admin 172.31.33.210 /dev/
| | | pts/0 /usr/sbin/sshd yes 919808
| | | 3. 08/07/2019 09:17:17 admin 172.31.33.210 /dev/
| | | pts/0 /usr/sbin/sshd yes 921179
| | | 4. 08/07/2019 13:24:55 admin 172.31.33.210 /dev/
| | | pts/0 /usr/sbin/sshd yes 921613
| | | ****
admin pts/5 172.31.33.210.st Mon Aug 5 19:52 –
| | | 23:59 (04:06)
| | | admin pts/2 172.31.33.210.st Tue Aug 6 14:28 –
| | | 14:38 (00:09)
| | | admin pts/0 179.184.19.129.s Tue Aug 6 14:20 –
| | | 14:43 (00:23)
| | | admin pts/2 172.31.33.210.st Tue Aug 6 14:38 still
| | | logged in
| | | Aug 8 20:40:20 ip-172-31-33-210 sudo:
pam_unix(sudo:session): session opened for user root by admin(uid=0)
Aug 8 20:40:20 ip-172-31-33-210 sudo:
pam_tty_audit(sudo:session): unknown option
`administrator’
Aug 8 20:40:20 ip-172-31-33-210 sudo:
pam_tty_audit(sudo:session): changed status from 1 to 1
Aug 8 20:41:39 ip-172-31-33-210 sudo:
pam_unix(sudo:session): session closed for user root
Aug 8 20:41:54 ip-172-31-33-210 sudo: admin : TTY=pts/0 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl restart rsyslog
---|---|---|---
FAU_GEN.1.1/
Log
| Current IP connections| /var/log/ messages| 2021-12-06T11:09:33.134510-05:00
api-* kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129
DST=172.31.33.210 LEN=84 TOS=0x00 PREC=0x00 TTL=38 ID=6627 DF PROTO=ICMP
TYPE=8 CODE=0 ID=32536 SEQ=200
FMT_MOF.1/
ManualUpdat e
| Any attempt to initiate a manual update.| /var/log/ messages| 2021-12-06T18:31:54 ip-172-31-33-210 journal: SW
upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.
2021-12-06T18:32:50 ip-172-31-33-210 journal: SW
upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.
2021-12-06T18:32:50 ip-172-31-33-210 journal: SW
upgrade: #033[1;32mmariadb#033[0m: Configuring system.
2021-12-06T18:32:53 ip-172-31-33-210 journal: SW
upgrade: #033[1;32mmariadb#033[0m: Starting services.
2021-12-06T18:32:53 ip-172-31-33-210 journal: SW
upgrade: #033[1;32mmariadb#033[0m: Running final checks.
2021-12-06T18:32:53 ip-172-31-33-210 journal: SW
upgrade: #033[1;32mmariadb#033[0m: Installed.
---|---|---|---
FIA_X509_EXT
.1/ITT
| • Unsuccessful attempt to validate a certificate| |
| • Any addition, replacement or removal of trust anchors in the TOE’s
trust store
FPT_STM_EX T.1| Discontinuous changes to time – either Administrator actuated
or changed via an automated process. (Note that no continuous changes to time
need to be logged. See also application note on FPT_STM_EXT.1).| /var/log/
audit/ audit.log| ====================================
date time exe term host auid event
====================================
332. 08/06/2019 13:23:34 /usr/lib/systemd/ systemd ? ? unset 877714
333. 08/06/2019 13:23:34 /usr/lib/systemd/ systemd-timedated (none) ? unset 877713 334. 08/06/2019 13:23:34 /usr/lib/systemd/ systemd-timedated (none) ? unset 877715 335. 08/06/2019 13:24:04 /usr/lib/systemd/ systemd ? ? unset 877716
336. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd ? ? unset 877729
337. 08/06/2019 13:25:45 /usr/bin/timedatectl pts0 ? admin 877726
338. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd-timedated (none) ? unset 877728 339. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd-timedated (none) ? unset 877731 340. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd-timedated (none) ? unset 877732
---|---|---|---
FTA_SSL_EXT
.1 (if “lock the session” is selected)
| Any attempts at unlocking of an interactive session.| |
FTA_SSL_EXT
.1 (if “terminate the session” is selected)
| The termination of a local session by the session locking mechanism.| |
FTA_SSL.3| The termination of a remote session by the session locking
mechanism.| |
---|---|---|---
FTA_SSL.4| The termination of an interactive session.| |
FPT_TUD_EX T.2| Failure of update| |
FIA_UAU.2/TC| Successful or failed authentication of trunk connected network
component| |
FAU_STG_EXT
.3/LocSpace
| Low storage space for audit events.| |
FIA_X509_EXT
.1/ITT
| • Unsuccessful attempt to validate a certificate| |
| • Any addition, replacement or removal of trust anchors in the TOE’s
trust store
FPT_ITT.1| • Initiation of the trusted channel.
• Termination of the trusted channel.
• Failure of the trusted channel functions.
| |
---|---|---|---
FTP_TRP.1/
Join
| • Initiation of the trusted path.
• Termination of the trusted path.
• Failure of the trusted path functions.
| |
Copyright © Cellcrypt Inc. Each page of this document is subject to the confidentiality provision on the cover page. “CELLCRYPT” is a trademark of Cellcrypt Inc. All other trademarks are registered to their respective owners.
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>