* auditctl Question
@ 2007-03-21 17:03 Khoa V. Nguyen
2007-03-22 13:57 ` Steve Grubb
0 siblings, 1 reply; 15+ messages in thread
From: Khoa V. Nguyen @ 2007-03-21 17:03 UTC (permalink / raw)
To: Linux-audit
Hello,
I want to be able to audit failed access to /etc/inittab but I don't think the
current auditctl features able to accomplish it.
auditctl -a watch,always /etc/inittab -F success=no
This would be a syntax error..but
auditctl -a exit,always -w /etc/inittab -F success=no
How can I do it?
Thanks,
____________________________________________________________________________________
Need Mail bonding?
Go to the Yahoo! Mail Q&A for great tips from Yahoo! Answers users.
http://answers.yahoo.com/dir/?link=list&sid=396546091
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl Question
2007-03-21 17:03 auditctl Question Khoa V. Nguyen
@ 2007-03-22 13:57 ` Steve Grubb
0 siblings, 0 replies; 15+ messages in thread
From: Steve Grubb @ 2007-03-22 13:57 UTC (permalink / raw)
To: linux-audit; +Cc: Khoa V. Nguyen
On Wednesday 21 March 2007 13:03, Khoa V. Nguyen wrote:
> I want to be able to audit failed access to /etc/inittab but I don't think
> the current auditctl features able to accomplish it.
>
> auditctl -a watch,always /etc/inittab -F success=no
>
> This would be a syntax error..but
>
> auditctl -a exit,always -w /etc/inittab -F success=no
>
>
> How can I do it?
It depends on the kernel you are running on. For 2.6.19 and higher, you'd just
do:
auditctl -a exit,always -F perm=rwa -F path=/etc/inittab -F success=no
If you have an earlier kernel, you are limited to -S open -F success=no and
you could limit its scope by using -F devmajor and devminor.
-Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
* New List Member: Intro & comments
@ 2006-07-31 17:14 Clif Flynt
2006-07-31 20:05 ` SQLite Clarification Clif Flynt
0 siblings, 1 reply; 15+ messages in thread
From: Clif Flynt @ 2006-07-31 17:14 UTC (permalink / raw)
To: linux-audit
Hi,
I'm primarily an applications developer, though I wear a
sys-admin/security-admin hat when necessary. I've done kernel hacking
on V-7 and System-3 in the bad old days, but mostly stick in userland
now.
My current goal is to get some OpenSuse 10.1 systems DSS certified.
I've been a RedHat user since about RH4 or 5, but this project decided
to standardize on SuSE. My focus for using auditd isn't so much to
make a truly secure and well audited system, but to answer the specific
DSS/NISPOM Chapter 8 requirements.
SuSE supports AppArmor and the auditd security products, but has
very little SELinux support.
As I read things, AppArmor doesn't support the file audit
requirements, but Auditd can meet the DSS requirements.
I've updated the standard SuSE 10.1 kernel to 2.6.17.6 and brought in
the 3.0 glibc kernel headers. With these hacks, I can get the 1.2.5
auditd package to compile and install. It appears to be working.
Auditd 1.2.5 doesn't quite do what I need, but I'm getting close.
It has the framework, but it seems to take a little work to get the
answers I really want, and to handle the requirements for record
maintenance.
1) Auditing and reporting
I've copied the SYSCALL rules from the capp.rules sample, and I
think that covers what DSS will need audited. (Still checking and
confirming that I haven't missed anything obvious.)
To get the answers I wanted a bit more easily, I've made a GUI based
search tool that lets me specify reports with a bit more precision and
build customized reports. It's functional code, but is not pretty, and
gets pretty ugly when the data is way outside what I expected.
2) Maintaining records
The traditional log-rotate with N logs makes it difficult to keep X
days of logs. When the system is busy, I can rotate the logs every 10
minutes.
I've put together a small cron job that looks for audit.log.1,
filters out some data I know I won't want, and zips it into a file with
a name based on the timestamp.
My current report generator builds an SQLite database on the fly from
the flat ASCII logs. I'm thinking that the next rev of the file
rotation code will move the data to an SQLite database instead of
gzipped flat files and save that step.
I'm using SQLite instead of mySQL or Postgres because it it's fast,
mature and robust and doesn't require any database server (or dbadmin)
to run it.
I put together a small audisp test application to read from stdin and
save data in a timestamped file. When I run this, I get nothing but
empty reads, and finally an EOF from auditd. I'm expecting to see
plain ASCII input.
Is this not what is sent to the audisp target?
I just tried the sample.c application, compiled it to a.out and put
that into the auditd.conf file. When I restart audispd, I see no
output in /var/log/messages, and a.out does not show in the process
stack. If I just run /tmp/a.out and type something, output appears
in /var/log/messages.
If any of this is of interest or use, let me know, and I'll make it
available to the community.
Thanks,
Clif
--
.... Clif Flynt ... http://www.cflynt.com ... clif@cflynt.com ...
.. Tcl/Tk: A Developer's Guide (2nd edition) - Morgan Kauffman ..
..13th Annual Tcl/Tk Conference: Oct 9-13, 2006, Chicago, IL ..
............. http://www.tcl.tk/community/tcl2006/ ............
^ permalink raw reply [flat|nested] 15+ messages in thread
* SQLite Clarification
2006-07-31 17:14 New List Member: Intro & comments Clif Flynt
@ 2006-07-31 20:05 ` Clif Flynt
2006-07-31 21:13 ` Steve Grubb
0 siblings, 1 reply; 15+ messages in thread
From: Clif Flynt @ 2006-07-31 20:05 UTC (permalink / raw)
To: Steve Grubb; +Cc: linux-audit, Clif Flynt
On Mon, Jul 31, 2006 at 01:54:30PM -0400, Steve Grubb wrote:
> On Monday 31 July 2006 13:14, Clif Flynt wrote:
>
> > Â My current report generator builds an SQLite database on the fly from
> > the flat ASCII logs.
>
> Seems like this would be ideal to marry to the realtime audit event interface.
> You would set log_format = nolog, dispatcher = /sbin/your-dispatcher, and
> disp_qos = lossless to keep the audit system from writing to disk, send
> events to a program, and use blocking comminucation to do it.
>
> > Â I'm using SQLite instead of mySQL or Postgres because it it's fast,
> > mature and robust and doesn't  require any database server (or dbadmin)
> > to run it.
>
> I've been looking at using it too. I read some issues that made me wonder if
> it was really suitable:
>
> http://www.sqlite.org/whentouse.html
>
> At the bottom it mentions that if something has the database open for read,
> then writing is blocked. And the issue about the journal using 256 bytes for
> event MB of data made me wonder also.
My other reason for using SQLite is that I'm working with the
developer. I forwarded your concerns to Richard Hipp, and received
this response:
> The database file is only locked for the duration
> of the write operation - not while the database is open. A write
> normally takes a few milliseconds, then the lock goes away.
>
> Why is 256 bytes of data for each 1MiB of database a problem?
> Is memory so short and databases so large that this might cause
> a problem?
>
> If it is, then increase the page size from the default 1K.
> The actually usage is 2 bits per page of data. So if pages
> are 32KiB bytes instead of 1KiB, a 1MiB database only needs
> 8 bytes of storage for the bitmap.
>
> --
> D. Richard Hipp <drh@hwaci.com>
Clif
--
.... Clif Flynt ... http://www.cflynt.com ... clif@cflynt.com ...
.. Tcl/Tk: A Developer's Guide (2nd edition) - Morgan Kauffman ..
..13th Annual Tcl/Tk Conference: Oct 9-13, 2006, Chicago, IL ..
............. http://www.tcl.tk/community/tcl2006/ ............
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: SQLite Clarification
2006-07-31 20:05 ` SQLite Clarification Clif Flynt
@ 2006-07-31 21:13 ` Steve Grubb
2006-08-02 20:49 ` auditctl question Lane Williams
0 siblings, 1 reply; 15+ messages in thread
From: Steve Grubb @ 2006-07-31 21:13 UTC (permalink / raw)
To: Clif Flynt; +Cc: linux-audit
On Monday 31 July 2006 16:05, Clif Flynt wrote:
> > The database file is only locked for the duration
> > of the write operation - not while the database is open. A write
> > normally takes a few milliseconds, then the lock goes away.
The issue here is that you may need write to have priority since there is
potentially a backlog building in the kernel. If the backlog gets too big you
will get a panic. The write operation has to be fast.
But suppose there are readers. Does the write block or fail? More of a
curiosity to me.
> > Why is 256 bytes of data for each 1MiB of database a problem?
> > Is memory so short and databases so large that this might cause
> > a problem?
Database could be huge. A paranoid admin could easily get gigabytes of data in
a short time. Or maybe someone that wrote a rule that captures too much data
could run into a problem.
> > If it is, then increase the page size from the default 1K.
> > The actually usage is 2 bits per page of data. So if pages
> > are 32KiB bytes instead of 1KiB, a 1MiB database only needs
> > 8 bytes of storage for the bitmap.
This is good to know. That would probably help.
-Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
* auditctl question
2006-07-31 21:13 ` Steve Grubb
@ 2006-08-02 20:49 ` Lane Williams
2006-08-02 22:03 ` Steve Grubb
2006-08-03 0:22 ` Klaus Weidner
0 siblings, 2 replies; 15+ messages in thread
From: Lane Williams @ 2006-08-02 20:49 UTC (permalink / raw)
To: linux-audit
Should the following work???
auditctl -a exit,always -S all -F exit=-13
When I use a negative value for exit, I get no output into the logs when
I should.
I am using audit-1.2.3 on SuSE Enterprise 10 with the 2.6.16.21 kernel.
Thanks,
Lane
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-02 20:49 ` auditctl question Lane Williams
@ 2006-08-02 22:03 ` Steve Grubb
2006-08-02 22:15 ` Linda Knippers
2006-08-03 0:22 ` Klaus Weidner
1 sibling, 1 reply; 15+ messages in thread
From: Steve Grubb @ 2006-08-02 22:03 UTC (permalink / raw)
To: linux-audit, lane.williams
On Wednesday 02 August 2006 16:49, Lane Williams wrote:
> Should the following work???
Yes.
> auditctl -a exit,always -S all -F exit=-13
If this does not work, we will need a kernel patch for it.
-Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-02 22:03 ` Steve Grubb
@ 2006-08-02 22:15 ` Linda Knippers
2006-08-02 22:29 ` Steve Grubb
0 siblings, 1 reply; 15+ messages in thread
From: Linda Knippers @ 2006-08-02 22:15 UTC (permalink / raw)
To: Steve Grubb; +Cc: linux-audit
Hi Steve,
I tried it on Fedora with audit 1.2.4 and the 2.6.17-based lspp.41
kernel and it seems to work there.
It doesn't work on RHEL4 U2. I seem to recall that there was
something funky about how to get failed syscalls back then but
I don't recall the details.
-- ljk
Steve Grubb wrote:
> On Wednesday 02 August 2006 16:49, Lane Williams wrote:
>
>>Should the following work???
>
>
> Yes.
>
>
>>auditctl -a exit,always -S all -F exit=-13
>
>
> If this does not work, we will need a kernel patch for it.
>
> -Steve
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-02 22:15 ` Linda Knippers
@ 2006-08-02 22:29 ` Steve Grubb
0 siblings, 0 replies; 15+ messages in thread
From: Steve Grubb @ 2006-08-02 22:29 UTC (permalink / raw)
To: Linda Knippers; +Cc: linux-audit
On Wednesday 02 August 2006 18:15, Linda Knippers wrote:
> It doesn't work on RHEL4 U2. I seem to recall that there was
> something funky about how to get failed syscalls back then but
> I don't recall the details.
Right, but that was not fixed due to audit system being under certification
and a workaround was available and documented. At this point, the upstream
kernel *should* work correctly or we forgot to fix it.
-Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-02 20:49 ` auditctl question Lane Williams
2006-08-02 22:03 ` Steve Grubb
@ 2006-08-03 0:22 ` Klaus Weidner
2006-08-03 13:00 ` Williams, P. Lane
1 sibling, 1 reply; 15+ messages in thread
From: Klaus Weidner @ 2006-08-03 0:22 UTC (permalink / raw)
To: Lane Williams; +Cc: linux-audit
On Wed, Aug 02, 2006 at 04:49:02PM -0400, Lane Williams wrote:
> Should the following work???
>
> auditctl -a exit,always -S all -F exit=-13
>
> When I use a negative value for exit, I get no output into the logs when
> I should.
> I am using audit-1.2.3 on SuSE Enterprise 10 with the 2.6.16.21 kernel.
What do the audit records look like that you expect to be matching, and
what architecture are you running on? I recall a bug on ia64 where failed
system calls were being audited with "success=yes" and the positive errno,
and a patch to change that to negative errno to be consistent with other
architectures.
Cf.:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=173500
which claims to be fixed by:
http://rhn.redhat.com/errata/RHSA-2006-0132.html
-Klaus
^ permalink raw reply [flat|nested] 15+ messages in thread
* RE: auditctl question
2006-08-03 0:22 ` Klaus Weidner
@ 2006-08-03 13:00 ` Williams, P. Lane
2006-08-03 15:18 ` Klaus Weidner
0 siblings, 1 reply; 15+ messages in thread
From: Williams, P. Lane @ 2006-08-03 13:00 UTC (permalink / raw)
To: Klaus Weidner; +Cc: linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 2153 bytes --]
The records that I care about are the permission denied records.
If I do...
auditctl -a exit,always -S all -F success=0
I get ....
----
type=PATH msg=audit(08/03/06 08:49:37.229:78293) : item=0 name=/var/log/messages flags=follow,open inode=53150921 dev=08:03 mode=file,640 ouid=root ogid=root rdev=00:00
type=CWD msg=audit(08/03/06 08:49:37.229:78293) : cwd=/home/someuser
type=SYSCALL msg=audit(08/03/06 08:49:37.229:78293) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=7ffff362f541 a1=0 a2=1b6 a3=0 items=1 pid=6334 auid=unknown(4294967295) uid=someuser gid=users euid=someuser suid=someuser fsuid=someuser egid=users sgid=users fsgid=users comm=more exe=/bin/more
----
but, I also get a lot of other garbage that I do not want.....such as all of the "exit=-2(No such file or directory)".
I would like to....
auditctl -a exit,always -S all -F exit=-13
so I only get permission denied entries. Auditctl allows me to create the rule, and it list the rule. But nothing is logged, when I know it should be.
I am running the 2.6.16.21 kernel (SUSE Enterprise Desktop 10) on AMD64 dual core machines.
Lane
-----Original Message-----
From: Klaus Weidner [mailto:klaus@atsec.com]
Sent: Wed 8/2/2006 8:22 PM
To: Williams, P. Lane
Cc: linux-audit@redhat.com
Subject: Re: auditctl question
On Wed, Aug 02, 2006 at 04:49:02PM -0400, Lane Williams wrote:
> Should the following work???
>
> auditctl -a exit,always -S all -F exit=-13
>
> When I use a negative value for exit, I get no output into the logs when
> I should.
> I am using audit-1.2.3 on SuSE Enterprise 10 with the 2.6.16.21 kernel.
What do the audit records look like that you expect to be matching, and
what architecture are you running on? I recall a bug on ia64 where failed
system calls were being audited with "success=yes" and the positive errno,
and a patch to change that to negative errno to be consistent with other
architectures.
Cf.:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=173500
which claims to be fixed by:
http://rhn.redhat.com/errata/RHSA-2006-0132.html
-Klaus
[-- Attachment #1.2: Type: text/html, Size: 3059 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-03 13:00 ` Williams, P. Lane
@ 2006-08-03 15:18 ` Klaus Weidner
2006-08-03 20:02 ` Williams, P. Lane
0 siblings, 1 reply; 15+ messages in thread
From: Klaus Weidner @ 2006-08-03 15:18 UTC (permalink / raw)
To: Williams, P. Lane; +Cc: linux-audit
On Thu, Aug 03, 2006 at 09:00:25AM -0400, Williams, P. Lane wrote:
> I get ....
>
> ----
> type=SYSCALL msg=audit(08/03/06 08:49:37.229:78293) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=7ffff362f541 a1=0 a2=1b6 a3=0 items=1 pid=6334 auid=unknown(4294967295) uid=someuser gid=users euid=someuser suid=someuser fsuid=someuser egid=users sgid=users fsgid=users comm=more exe=/bin/more
> ----
This is from "ausearch -i"? The raw audit log shouldn't have the
"(Permission denied)" part in it, but apart from that it seems that the
kernel is auditing things correctly and this is unrelated to the bug I
had referred to.
> so I only get permission denied entries. Auditctl allows me to create the rule, and it list the rule. But nothing is logged, when I know it should be.
>
> I am running the 2.6.16.21 kernel (SUSE Enterprise Desktop 10) on AMD64 dual core machines.
This kernel has a snapshot of the audit code that was in development at
the time. Can you please try with a newer upstream kernel and/or bug SUSE
to incorporate the current audit fixes in an update?
-Klaus
^ permalink raw reply [flat|nested] 15+ messages in thread
* RE: auditctl question
2006-08-03 15:18 ` Klaus Weidner
@ 2006-08-03 20:02 ` Williams, P. Lane
2006-08-03 20:29 ` Klaus Weidner
2006-08-03 21:06 ` Steve Grubb
0 siblings, 2 replies; 15+ messages in thread
From: Williams, P. Lane @ 2006-08-03 20:02 UTC (permalink / raw)
To: Klaus Weidner; +Cc: linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 3917 bytes --]
OK.
I installed the 2.6.17.7 kernel and then tried to build audit-1.2.5 and received the following...
make[2]: Entering directory `/tmp/audit/audit-1.2.5/src'
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -fPIE -DPIE -g -D_REENTRANT -D_GNU_SOURCE -g -O2 -c -o auditd-auditd.o `test -f 'auditd.c' || echo './'`auditd.c
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -fPIE -DPIE -g -D_REENTRANT -D_GNU_SOURCE -g -O2 -c -o auditd-auditd-event.o `test -f 'auditd-event.c' || echo './'`auditd-event.c
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -fPIE -DPIE -g -D_REENTRANT -D_GNU_SOURCE -g -O2 -c -o auditd-auditd-config.o `test -f 'auditd-config.c' || echo './'`auditd-config.c
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -fPIE -DPIE -g -D_REENTRANT -D_GNU_SOURCE -g -O2 -c -o auditd-auditd-reconfig.o `test -f 'auditd-reconfig.c' || echo './'`auditd-reconfig.c
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -fPIE -DPIE -g -D_REENTRANT -D_GNU_SOURCE -g -O2 -c -o auditd-auditd-sendmail.o `test -f 'auditd-sendmail.c' || echo './'`auditd-sendmail.c
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -fPIE -DPIE -g -D_REENTRANT -D_GNU_SOURCE -g -O2 -c -o auditd-auditd-dispatch.o `test -f 'auditd-dispatch.c' || echo './'`auditd-dispatch.c
/bin/sh ../libtool --tag=CC --mode=link gcc -D_REENTRANT -D_GNU_SOURCE -g -O2 -o auditd -pie -Wl,-z,relro auditd-auditd.o auditd-auditd-event.o auditd-auditd-config.o auditd-auditd-reconfig.o auditd-auditd-sendmail.o auditd-auditd-dispatch.o -lpthread -Lmt -lauditmt
mkdir .libs
gcc -D_REENTRANT -D_GNU_SOURCE -g -O2 -o auditd -pie -Wl,-z -Wl,relro auditd-auditd.o auditd-auditd-event.o auditd-auditd-config.o auditd-auditd-reconfig.o auditd-auditd-sendmail.o auditd-auditd-dispatch.o -lpthread -L/tmp/audit/audit-1.2.5/src/mt -lauditmt
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -D_REENTRANT -D_GNU_SOURCE -g -O2 -c auditctl.c
auditctl.c: In function audit_print_reply:
auditctl.c:1046: error: AUDIT_SE_USER undeclared (first use in this function)
auditctl.c:1046: error: (Each undeclared identifier is reported only once
auditctl.c:1046: error: for each function it appears in.)
auditctl.c:1047: error: AUDIT_SE_CLR undeclared (first use in this function)
make[2]: *** [auditctl.o] Error 1
make[2]: Leaving directory `/tmp/audit/audit-1.2.5/src'
make[1]: *** [all-recursive] Error 1
make[1]: Leaving directory `/tmp/audit/audit-1.2.5'
make: *** [all] Error 2
I also received the same error with the other kernel. I did not build the SE-Linux stuff into the kernel, should I have?
thanks,
Lane
-----Original Message-----
From: Klaus Weidner [mailto:klaus@atsec.com]
Sent: Thu 8/3/2006 11:18 AM
To: Williams, P. Lane
Cc: linux-audit@redhat.com
Subject: Re: auditctl question
On Thu, Aug 03, 2006 at 09:00:25AM -0400, Williams, P. Lane wrote:
> I get ....
>
> ----
> type=SYSCALL msg=audit(08/03/06 08:49:37.229:78293) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=7ffff362f541 a1=0 a2=1b6 a3=0 items=1 pid=6334 auid=unknown(4294967295) uid=someuser gid=users euid=someuser suid=someuser fsuid=someuser egid=users sgid=users fsgid=users comm=more exe=/bin/more
> ----
This is from "ausearch -i"? The raw audit log shouldn't have the
"(Permission denied)" part in it, but apart from that it seems that the
kernel is auditing things correctly and this is unrelated to the bug I
had referred to.
> so I only get permission denied entries. Auditctl allows me to create the rule, and it list the rule. But nothing is logged, when I know it should be.
>
> I am running the 2.6.16.21 kernel (SUSE Enterprise Desktop 10) on AMD64 dual core machines.
This kernel has a snapshot of the audit code that was in development at
the time. Can you please try with a newer upstream kernel and/or bug SUSE
to incorporate the current audit fixes in an update?
-Klaus
[-- Attachment #1.2: Type: text/html, Size: 4736 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-03 20:02 ` Williams, P. Lane
@ 2006-08-03 20:29 ` Klaus Weidner
2006-08-03 21:06 ` Steve Grubb
1 sibling, 0 replies; 15+ messages in thread
From: Klaus Weidner @ 2006-08-03 20:29 UTC (permalink / raw)
To: Williams, P. Lane; +Cc: linux-audit
On Thu, Aug 03, 2006 at 04:02:56PM -0400, Williams, P. Lane wrote:
> I installed the 2.6.17.7 kernel and then tried to build audit-1.2.5 and received the following...
>
> make[2]: Entering directory `/tmp/audit/audit-1.2.5/src'
> gcc -D_REENTRANT -D_GNU_SOURCE -g -O2 -o auditd -pie -Wl,-z -Wl,relro auditd-auditd.o auditd-auditd-event.o auditd-auditd-config.o auditd-auditd-reconfig.o auditd-auditd-sendmail.o auditd-auditd-dispatch.o -lpthread -L/tmp/audit/audit-1.2.5/src/mt -lauditmt
> gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I../lib -D_REENTRANT -D_GNU_SOURCE -g -O2 -c auditctl.c
> auditctl.c: In function audit_print_reply:
> auditctl.c:1046: error: AUDIT_SE_USER undeclared (first use in this function)
> auditctl.c:1046: error: (Each undeclared identifier is reported only once
> auditctl.c:1046: error: for each function it appears in.)
> auditctl.c:1047: error: AUDIT_SE_CLR undeclared (first use in this function)
>
> I also received the same error with the other kernel. I did not build the SE-Linux stuff into the kernel, should I have?
Audit should not require SELinux, but I don't think it currently gets
much testing with SELinux turned off which can cause such build issues.
Steve, do you have a fix for this?
-Klaus
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-03 20:02 ` Williams, P. Lane
2006-08-03 20:29 ` Klaus Weidner
@ 2006-08-03 21:06 ` Steve Grubb
2006-08-04 1:50 ` Williams, P. Lane
1 sibling, 1 reply; 15+ messages in thread
From: Steve Grubb @ 2006-08-03 21:06 UTC (permalink / raw)
To: linux-audit; +Cc: Williams, P. Lane
On Thursday 03 August 2006 16:02, Williams, P. Lane wrote:
> I also received the same error with the other kernel. I did not build the
> SE-Linux stuff into the kernel, should I have?
I think the kernel headers are your problem. I don't think I'd replace that.
And you do not have to have SE Linux enabled since this is a define from the
audit kernel headers. That said, I don't think you need to rebuild the user
space package.
The problem you are seeing would be a kernel bug most likely. It is what
evaluates the rules and decides if it needs to output an event. So, with the
new kernel and auditctl from Suse, do you see the problem?
Thanks,
-Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
* RE: auditctl question
2006-08-03 21:06 ` Steve Grubb
@ 2006-08-04 1:50 ` Williams, P. Lane
2006-08-04 10:28 ` Steve Grubb
0 siblings, 1 reply; 15+ messages in thread
From: Williams, P. Lane @ 2006-08-04 1:50 UTC (permalink / raw)
To: Steve Grubb, linux-audit
[-- Attachment #1.1: Type: text/plain, Size: 1282 bytes --]
I built the kernel from the Linux Kernel Archives, not SuSE. I got the latest audit source from the audit-1.2.x site. The audit software seems to compile fine upto audit-1.2.3, but it fails with the compile errors as described earlier, with versions audit-1.2.4 upwards. Is audit being developed strictly under the Red Hat build? Do I need some package that I am missing?
Thanks,
Lane
-----Original Message-----
From: Steve Grubb [mailto:sgrubb@redhat.com]
Sent: Thu 8/3/2006 5:06 PM
To: linux-audit@redhat.com
Cc: Williams, P. Lane; Klaus Weidner
Subject: Re: auditctl question
On Thursday 03 August 2006 16:02, Williams, P. Lane wrote:
> I also received the same error with the other kernel. I did not build the
> SE-Linux stuff into the kernel, should I have?
I think the kernel headers are your problem. I don't think I'd replace that.
And you do not have to have SE Linux enabled since this is a define from the
audit kernel headers. That said, I don't think you need to rebuild the user
space package.
The problem you are seeing would be a kernel bug most likely. It is what
evaluates the rules and decides if it needs to output an event. So, with the
new kernel and auditctl from Suse, do you see the problem?
Thanks,
-Steve
[-- Attachment #1.2: Type: text/html, Size: 1829 bytes --]
[-- Attachment #2: Type: text/plain, Size: 0 bytes --]
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-04 1:50 ` Williams, P. Lane
@ 2006-08-04 10:28 ` Steve Grubb
2006-08-04 12:48 ` Lane Williams
0 siblings, 1 reply; 15+ messages in thread
From: Steve Grubb @ 2006-08-04 10:28 UTC (permalink / raw)
To: Williams, P. Lane; +Cc: linux-audit
On Thursday 03 August 2006 21:50, Williams, P. Lane wrote:
> The audit software seems to compile fine upto audit-1.2.3, but it fails
> with the compile errors as described earlier, with versions audit-1.2.4
> upwards. Is audit being developed strictly under the Red Hat build?
Yes.
> Do I need some package that I am missing?
Well, /usr/include/linux/audit.h is the only other thing that would be needed.
That is in the glibc-kernheaders package. I do not recommend a wholesale
replacement of header files between distros.
-Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: auditctl question
2006-08-04 10:28 ` Steve Grubb
@ 2006-08-04 12:48 ` Lane Williams
0 siblings, 0 replies; 15+ messages in thread
From: Lane Williams @ 2006-08-04 12:48 UTC (permalink / raw)
To: Steve Grubb; +Cc: linux-audit
Maybe next time I will try everything, before I speak.....probably not.
Well I recompiled the audit-1.2.3 with the new kernel and it works as it
should. The newer audit releases still do not compile, but I am almost
certain it is the fact that I did not compile in the SE-Linux support.
audit.h does mention something about SE-Linux, when dealing with those
includes.
Thanks for the help,
Lane
On Fri, 2006-08-04 at 06:28 -0400, Steve Grubb wrote:
> On Thursday 03 August 2006 21:50, Williams, P. Lane wrote:
> > The audit software seems to compile fine upto audit-1.2.3, but it fails
> > with the compile errors as described earlier, with versions audit-1.2.4
> > upwards. Is audit being developed strictly under the Red Hat build?
>
> Yes.
>
> > Do I need some package that I am missing?
>
> Well, /usr/include/linux/audit.h is the only other thing that would be needed.
> That is in the glibc-kernheaders package. I do not recommend a wholesale
> replacement of header files between distros.
>
> -Steve
^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2007-03-22 13:57 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-03-21 17:03 auditctl Question Khoa V. Nguyen
2007-03-22 13:57 ` Steve Grubb
-- strict thread matches above, loose matches on Subject: below --
2006-07-31 17:14 New List Member: Intro & comments Clif Flynt
2006-07-31 20:05 ` SQLite Clarification Clif Flynt
2006-07-31 21:13 ` Steve Grubb
2006-08-02 20:49 ` auditctl question Lane Williams
2006-08-02 22:03 ` Steve Grubb
2006-08-02 22:15 ` Linda Knippers
2006-08-02 22:29 ` Steve Grubb
2006-08-03 0:22 ` Klaus Weidner
2006-08-03 13:00 ` Williams, P. Lane
2006-08-03 15:18 ` Klaus Weidner
2006-08-03 20:02 ` Williams, P. Lane
2006-08-03 20:29 ` Klaus Weidner
2006-08-03 21:06 ` Steve Grubb
2006-08-04 1:50 ` Williams, P. Lane
2006-08-04 10:28 ` Steve Grubb
2006-08-04 12:48 ` Lane Williams
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.