linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
* auid of a script started by a daemon process.
@ 2017-02-20 16:50 Kaptaan
  2017-02-20 17:04 ` Steve Grubb
  0 siblings, 1 reply; 4+ messages in thread
From: Kaptaan @ 2017-02-20 16:50 UTC (permalink / raw)
  To: linux-audit@redhat.com


[-- Attachment #1.1: Type: text/plain, Size: 1145 bytes --]

Hello All,
I have recently been introduced to linux security. After going through man pages and some posts, I believe I have configured and setup my audit rules correctly. My need is to monitor and log access to all files in certain directories.
The problem.
Application1 - I log in using my id <user1>. I sudo to <super_user1> and start the application.
The application starts a few daemon process owned by <super_user1>.

User2 - uses the application to access the files (through some script). The script is actually executed by the application's daemon process.

The auid shown in the audit logs is always my id <user1> for all audit events.

So I started capturing the uid from the logs which shows <user2>.

Now user2 is smart, he/she sudo to <super_user2> and then runs the same script to access the files. This time the auid is shown as my user <user1> and the uid, euid is always shown as <super_user2>.

Is there a way I can get the auid of the person who started the script even after he/she sudoes to another user?

Any help/suggestion is much appreciated.

Thanks,
Amit.


Sent with [ProtonMail](https://protonmail.com) Secure Email.

[-- Attachment #1.2: Type: text/html, Size: 1731 bytes --]

[-- Attachment #2: Type: text/plain, Size: 0 bytes --]



^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-02-20 19:18 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-02-20 16:50 auid of a script started by a daemon process Kaptaan
2017-02-20 17:04 ` Steve Grubb
2017-02-20 18:24   ` Kaptaan
2017-02-20 19:18     ` Steve Grubb

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).