* auid bug
@ 2006-07-20 14:08 Steve
2006-07-20 15:19 ` Linda Knippers
0 siblings, 1 reply; 12+ messages in thread
From: Steve @ 2006-07-20 14:08 UTC (permalink / raw)
To: linux-audit
I am receiving audit events with an odd auid... I am not sure if this
is something wrong in the kernel or in audit. The auid I am receiving
is 4294967295 (the max value for an unsigned long). The other uid/gid
information is normal.
I have seen this on all audit versions since audit-1.2.3, and noticed it
using the following kernels:
2.6.17-1.2293.2.2_FC6.lspp.38.i686
2.6.17-1.2293.2.2_FC6.lspp.44.i686
The first time I noticed this was after the filter_key patch I applied
to audit-1.2.3, but it may have nothing to do with that patch. I
mentioned it then:
https://www.redhat.com/archives/linux-audit/2006-June/msg00086.html
There is an example record from the audit dispatcher there.
These events are coming straight from the real-time audit dispatcher.
Steve
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auid bug
2006-07-20 14:08 auid bug Steve
@ 2006-07-20 15:19 ` Linda Knippers
2006-07-20 19:44 ` auditd/auditctl SLED10 Lane Williams
2006-07-24 16:04 ` auid bug Steve
0 siblings, 2 replies; 12+ messages in thread
From: Linda Knippers @ 2006-07-20 15:19 UTC (permalink / raw)
To: Steve; +Cc: linux-audit
Are you sure you have pam_loginuid.so configured in the appropriate
/etc/pam.d/* files, such as login and sshd?
I'm running the .41 kernel and the audit-1.2.4 tools and
the auid is correct in the audit records on my system.
This is what my /etc/pam.d/login file looks like:
#%PAM-1.0
auth required pam_securetty.so
auth include system-auth
account required pam_nologin.so
account include system-auth
password include system-auth
# pam_selinux.so close should be the first session rule
session required pam_selinux.so close
session include system-auth
session required pam_loginuid.so
session optional pam_console.so
# pam_selinux.so open should be the last session rule
session required pam_selinux.so open
-- ljk
Steve wrote:
> I am receiving audit events with an odd auid... I am not sure if this
> is something wrong in the kernel or in audit. The auid I am receiving
> is 4294967295 (the max value for an unsigned long). The other uid/gid
> information is normal.
>
> I have seen this on all audit versions since audit-1.2.3, and noticed it
> using the following kernels:
>
> 2.6.17-1.2293.2.2_FC6.lspp.38.i686
> 2.6.17-1.2293.2.2_FC6.lspp.44.i686
>
> The first time I noticed this was after the filter_key patch I applied
> to audit-1.2.3, but it may have nothing to do with that patch. I
> mentioned it then:
>
> https://www.redhat.com/archives/linux-audit/2006-June/msg00086.html
>
> There is an example record from the audit dispatcher there.
>
> These events are coming straight from the real-time audit dispatcher.
>
> Steve
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
^ permalink raw reply [flat|nested] 12+ messages in thread
* auditd/auditctl SLED10
2006-07-20 15:19 ` Linda Knippers
@ 2006-07-20 19:44 ` Lane Williams
2006-07-20 20:08 ` Linda Knippers
2006-07-21 0:54 ` Klaus Weidner
2006-07-24 16:04 ` auid bug Steve
1 sibling, 2 replies; 12+ messages in thread
From: Lane Williams @ 2006-07-20 19:44 UTC (permalink / raw)
To: Linux-audit
I am using audit 1.1.3 under SuSE Enterprise 10. I was wondering if
anyone could give me an idea of how to log when someone tries to open a
file which they do not have access to.
I've tried the example
auditctl -a exit,always -S open -F success=0
When I do this I get nothing in the logs. But if I add the following
auditctl -a entry,always -S open
I get all of the entries and the open failures when there is "No such
file or directory", but no access violations...
Thanks for any help,
Lane
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-20 19:44 ` auditd/auditctl SLED10 Lane Williams
@ 2006-07-20 20:08 ` Linda Knippers
2006-07-21 12:14 ` Lane Williams
2006-07-21 0:54 ` Klaus Weidner
1 sibling, 1 reply; 12+ messages in thread
From: Linda Knippers @ 2006-07-20 20:08 UTC (permalink / raw)
To: lane.williams; +Cc: Linux-audit
There was a bug at one point where the '-F success=0' didn't
work but '-F success!=1' did work. You might want to try that
as a workaround. You might also try an strace on whatever program
you're using to test with to make sure there there isn't an access()
system call before the open. If there is, then you'll want to audit
access failures.
-- ljk
Lane Williams wrote:
> I am using audit 1.1.3 under SuSE Enterprise 10. I was wondering if
> anyone could give me an idea of how to log when someone tries to open a
> file which they do not have access to.
>
> I've tried the example
>
> auditctl -a exit,always -S open -F success=0
>
> When I do this I get nothing in the logs. But if I add the following
>
> auditctl -a entry,always -S open
>
> I get all of the entries and the open failures when there is "No such
> file or directory", but no access violations...
>
> Thanks for any help,
>
> Lane
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-20 20:08 ` Linda Knippers
@ 2006-07-21 12:14 ` Lane Williams
2006-07-21 14:31 ` Linda Knippers
0 siblings, 1 reply; 12+ messages in thread
From: Lane Williams @ 2006-07-21 12:14 UTC (permalink / raw)
To: Linda Knippers; +Cc: Linux-audit
Yeah, I had tried that. There is an access syscall. From the looks of
things the audit version that comes with SuSE has a few problems. I
know in Red Hat it seems to work as I need it to. SuSE is also using
Apparmor in place of SELinux, or at least they make it appear that way.
The audit deamon also does not support file system watches.
Seems the only success=no returns that I receive are when the file does
not exist. I may also have to add more to my filter in order to get
what I want. Unfortunately I am stuck with SuSE and will have to
continue troubleshooting until the patches come out.
Thanks,
Lane
On Thu, 2006-07-20 at 16:08 -0400, Linda Knippers wrote:
> There was a bug at one point where the '-F success=0' didn't
> work but '-F success!=1' did work. You might want to try that
> as a workaround. You might also try an strace on whatever program
> you're using to test with to make sure there there isn't an access()
> system call before the open. If there is, then you'll want to audit
> access failures.
>
> -- ljk
>
> Lane Williams wrote:
> > I am using audit 1.1.3 under SuSE Enterprise 10. I was wondering if
> > anyone could give me an idea of how to log when someone tries to open a
> > file which they do not have access to.
> >
> > I've tried the example
> >
> > auditctl -a exit,always -S open -F success=0
> >
> > When I do this I get nothing in the logs. But if I add the following
> >
> > auditctl -a entry,always -S open
> >
> > I get all of the entries and the open failures when there is "No such
> > file or directory", but no access violations...
> >
> > Thanks for any help,
> >
> > Lane
> >
> > --
> > Linux-audit mailing list
> > Linux-audit@redhat.com
> > https://www.redhat.com/mailman/listinfo/linux-audit
>
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-21 12:14 ` Lane Williams
@ 2006-07-21 14:31 ` Linda Knippers
2006-07-21 14:35 ` Marcus Meissner
0 siblings, 1 reply; 12+ messages in thread
From: Linda Knippers @ 2006-07-21 14:31 UTC (permalink / raw)
To: lane.williams; +Cc: Linux-audit
Lane Williams wrote:
> Yeah, I had tried that. There is an access syscall. From the looks of
> things the audit version that comes with SuSE has a few problems. I
> know in Red Hat it seems to work as I need it to. SuSE is also using
> Apparmor in place of SELinux, or at least they make it appear that way.
> The audit deamon also does not support file system watches.
File system watches aren't supported in the upstream kernel until
2.6.18.
> Seems the only success=no returns that I receive are when the file does
> not exist. I may also have to add more to my filter in order to get
> what I want. Unfortunately I am stuck with SuSE and will have to
> continue troubleshooting until the patches come out.
If you're using a 2.6.16 kernel and 1.1.3 audit tools, that seems like
a mismatch. There was a 1.1.4 audit package released back in February
and the release mail mentions apparmor support.
https://www.redhat.com/archives/linux-audit/2006-February/msg00036.html
You could try:
http://people.redhat.com/sgrubb/audit/audit-1.1.4-1.src.rpm
Good luck,
-- ljk
>
> Thanks,
> Lane
>
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-21 14:31 ` Linda Knippers
@ 2006-07-21 14:35 ` Marcus Meissner
2006-07-21 20:49 ` Lane Williams
0 siblings, 1 reply; 12+ messages in thread
From: Marcus Meissner @ 2006-07-21 14:35 UTC (permalink / raw)
To: Linda Knippers; +Cc: Linux-audit
On Fri, Jul 21, 2006 at 10:31:22AM -0400, Linda Knippers wrote:
> Lane Williams wrote:
> > Yeah, I had tried that. There is an access syscall. From the looks of
> > things the audit version that comes with SuSE has a few problems. I
> > know in Red Hat it seems to work as I need it to. SuSE is also using
> > Apparmor in place of SELinux, or at least they make it appear that way.
> > The audit deamon also does not support file system watches.
>
> File system watches aren't supported in the upstream kernel until
> 2.6.18.
>
> > Seems the only success=no returns that I receive are when the file does
> > not exist. I may also have to add more to my filter in order to get
> > what I want. Unfortunately I am stuck with SuSE and will have to
> > continue troubleshooting until the patches come out.
>
> If you're using a 2.6.16 kernel and 1.1.3 audit tools, that seems like
> a mismatch. There was a 1.1.4 audit package released back in February
> and the release mail mentions apparmor support.
> https://www.redhat.com/archives/linux-audit/2006-February/msg00036.html
We have integrated AppArmor support in our 1.1.3 packages. (The
stuff we sent upstream for 1.1.4).
Ciao, Marcus
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-21 14:35 ` Marcus Meissner
@ 2006-07-21 20:49 ` Lane Williams
0 siblings, 0 replies; 12+ messages in thread
From: Lane Williams @ 2006-07-21 20:49 UTC (permalink / raw)
To: Marcus Meissner; +Cc: Linux-audit
I downloaded each of the audit version from 1.1.4 - 1.2.1 and compiled
from the tar balls...the source rpms kept bombing out on dependencies.
As of 1.2.1 with the SLED 10 distro, I was able to get it to tell me
permission denied when the syscall attempted an open
on /var/log/messages from an unpriviledged user.
Thanks everyone...
Lane
On Fri, 2006-07-21 at 16:35 +0200, Marcus Meissner wrote:
> On Fri, Jul 21, 2006 at 10:31:22AM -0400, Linda Knippers wrote:
> > Lane Williams wrote:
> > > Yeah, I had tried that. There is an access syscall. From the looks of
> > > things the audit version that comes with SuSE has a few problems. I
> > > know in Red Hat it seems to work as I need it to. SuSE is also using
> > > Apparmor in place of SELinux, or at least they make it appear that way.
> > > The audit deamon also does not support file system watches.
> >
> > File system watches aren't supported in the upstream kernel until
> > 2.6.18.
> >
> > > Seems the only success=no returns that I receive are when the file does
> > > not exist. I may also have to add more to my filter in order to get
> > > what I want. Unfortunately I am stuck with SuSE and will have to
> > > continue troubleshooting until the patches come out.
> >
> > If you're using a 2.6.16 kernel and 1.1.3 audit tools, that seems like
> > a mismatch. There was a 1.1.4 audit package released back in February
> > and the release mail mentions apparmor support.
> > https://www.redhat.com/archives/linux-audit/2006-February/msg00036.html
>
> We have integrated AppArmor support in our 1.1.3 packages. (The
> stuff we sent upstream for 1.1.4).
>
> Ciao, Marcus
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-20 19:44 ` auditd/auditctl SLED10 Lane Williams
2006-07-20 20:08 ` Linda Knippers
@ 2006-07-21 0:54 ` Klaus Weidner
2006-07-21 6:02 ` Marcus Meissner
2006-07-21 12:04 ` Lane Williams
1 sibling, 2 replies; 12+ messages in thread
From: Klaus Weidner @ 2006-07-21 0:54 UTC (permalink / raw)
To: Lane Williams; +Cc: Linux-audit
On Thu, Jul 20, 2006 at 03:44:07PM -0400, Lane Williams wrote:
> I am using audit 1.1.3 under SuSE Enterprise 10. I was wondering if
> anyone could give me an idea of how to log when someone tries to open a
> file which they do not have access to.
>
> I've tried the example
>
> auditctl -a exit,always -S open -F success=0
What base kernel version and audit patches is SLED10 using? Audit
development has been active until recently and it may not have all the
latest and greatest audit patches in it.
-Klaus
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-21 0:54 ` Klaus Weidner
@ 2006-07-21 6:02 ` Marcus Meissner
2006-07-21 12:04 ` Lane Williams
1 sibling, 0 replies; 12+ messages in thread
From: Marcus Meissner @ 2006-07-21 6:02 UTC (permalink / raw)
To: Klaus Weidner; +Cc: Linux-audit
On Thu, Jul 20, 2006 at 07:54:26PM -0500, Klaus Weidner wrote:
> On Thu, Jul 20, 2006 at 03:44:07PM -0400, Lane Williams wrote:
> > I am using audit 1.1.3 under SuSE Enterprise 10. I was wondering if
> > anyone could give me an idea of how to log when someone tries to open a
> > file which they do not have access to.
> >
> > I've tried the example
> >
> > auditctl -a exit,always -S open -F success=0
>
> What base kernel version and audit patches is SLED10 using? Audit
> development has been active until recently and it may not have all the
> latest and greatest audit patches in it.
Kernel 2.6.16.21. No additional audit patches as of now.
Ciao, Marcus
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auditd/auditctl SLED10
2006-07-21 0:54 ` Klaus Weidner
2006-07-21 6:02 ` Marcus Meissner
@ 2006-07-21 12:04 ` Lane Williams
1 sibling, 0 replies; 12+ messages in thread
From: Lane Williams @ 2006-07-21 12:04 UTC (permalink / raw)
To: Klaus Weidner; +Cc: Linux-audit
The kernel is 2.6.16.21-0.8, and the audit version is 1.1.3-23.2.
Lane
On Thu, 2006-07-20 at 19:54 -0500, Klaus Weidner wrote:
> On Thu, Jul 20, 2006 at 03:44:07PM -0400, Lane Williams wrote:
> > I am using audit 1.1.3 under SuSE Enterprise 10. I was wondering if
> > anyone could give me an idea of how to log when someone tries to open a
> > file which they do not have access to.
> >
> > I've tried the example
> >
> > auditctl -a exit,always -S open -F success=0
>
> What base kernel version and audit patches is SLED10 using? Audit
> development has been active until recently and it may not have all the
> latest and greatest audit patches in it.
>
> -Klaus
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: auid bug
2006-07-20 15:19 ` Linda Knippers
2006-07-20 19:44 ` auditd/auditctl SLED10 Lane Williams
@ 2006-07-24 16:04 ` Steve
1 sibling, 0 replies; 12+ messages in thread
From: Steve @ 2006-07-24 16:04 UTC (permalink / raw)
To: Linda Knippers; +Cc: linux-audit, Steve
> Are you sure you have pam_loginuid.so configured in the appropriate
> /etc/pam.d/* files, such as login and sshd?
I checked the login file and it matches yours, I am not using ssh on
this machine.
> I'm running the .41 kernel and the audit-1.2.4 tools and
> the auid is correct in the audit records on my system.
Most of the time, mine is correct as well. It seems to occur
sporadically. Usually, a reboot will fix the problem.
Steve
>> I am receiving audit events with an odd auid... I am not sure if this
>> is something wrong in the kernel or in audit. The auid I am receiving
>> is 4294967295 (the max value for an unsigned long). The other uid/gid
>> information is normal.
>>
>> I have seen this on all audit versions since audit-1.2.3, and noticed it
>> using the following kernels:
>>
>> 2.6.17-1.2293.2.2_FC6.lspp.38.i686
>> 2.6.17-1.2293.2.2_FC6.lspp.44.i686
>>
>> The first time I noticed this was after the filter_key patch I applied
>> to audit-1.2.3, but it may have nothing to do with that patch. I
>> mentioned it then:
>>
>> https://www.redhat.com/archives/linux-audit/2006-June/msg00086.html
>>
>> There is an example record from the audit dispatcher there.
>>
>> These events are coming straight from the real-time audit dispatcher.
>>
>> Steve
^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2006-07-24 16:04 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-07-20 14:08 auid bug Steve
2006-07-20 15:19 ` Linda Knippers
2006-07-20 19:44 ` auditd/auditctl SLED10 Lane Williams
2006-07-20 20:08 ` Linda Knippers
2006-07-21 12:14 ` Lane Williams
2006-07-21 14:31 ` Linda Knippers
2006-07-21 14:35 ` Marcus Meissner
2006-07-21 20:49 ` Lane Williams
2006-07-21 0:54 ` Klaus Weidner
2006-07-21 6:02 ` Marcus Meissner
2006-07-21 12:04 ` Lane Williams
2006-07-24 16:04 ` auid bug Steve
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.