From: Steve Grubb <sgrubb@redhat.com>
To: linux-audit@redhat.com
Subject: Re: auid = unset
Date: Fri, 03 May 2019 15:43:49 -0400 [thread overview]
Message-ID: <1792452.mJhBpEhCa1@x2> (raw)
In-Reply-To: <MWHP100MB022241AAEC6251F1F37A6B34F2350@MWHP100MB0222.NAMP100.PROD.OUTLOOK.COM>
On Friday, May 3, 2019 3:31:39 PM EDT Joshua Ammons wrote:
> Hello, I just wanted to see if anyone has had much success with configuring
> redhat systems to reduce and/or eliminate the occurrence of auid = unset
> in the audit events?
auid = unset is a natural thing. Typically it indicates that a daemon has
tripped over an audit rule. If you are seeing auid = unset by actions that
you know a user caused, then you really want to find out how they logged in.
You may have an entry point daemon that is not audit friendly. For example,
login, sshd, gdm, kdm have all be modified to call the audit_setloginuid90
function.
> I found the following redhat article that provides a
> fix by updating a grub setting for auditd but this doesn't seem to have
> much of an effect, as I still see large number of unset values in the
> logs.
It does. But maybe not how you think it would. You need to boot with audit=1
and audit_backlog_limit=8192 (or some number). The first setting makes sure
that every process that gets launched is auditable. If this is not set, then
there can be processes that would cause audit events but will never ever be
detected. So, this is important. The second setting ensures that backlog is
big enough to hold events until the audit daemon starts. Otherwise you can
lose some events during boot.
> https://access.redhat.com/solutions/971883
>
> Thank you in advance for any information you may have on this.
Check you events and see what process is causing them:
ausearch --start today --loginuid unset --raw | aureport -x --summary
See if this is mostly daemons or scripts run on behalf of daemons. The fix
might be to alter the audit rules to avoid daemon activity. This is what the
-F auid>=1000 -F auid!=unset does in the shipped sample rules. And this is
completely expected that daemon activity auid == unset.
If these are from user sessions, check how they get into the system.
Something seems wrong there.
-Steve
next prev parent reply other threads:[~2019-05-03 19:43 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-05-03 19:31 auid = unset Joshua Ammons
2019-05-03 19:43 ` Steve Grubb [this message]
-- strict thread matches above, loose matches on Subject: below --
2007-12-06 18:01 auid unset Kirkwood, David A.
2007-12-06 19:07 ` klausk
2007-12-06 19:18 ` klausk
2007-12-06 19:42 ` Kirkwood, David A.
2007-12-06 22:25 ` Steve Grubb
2007-12-07 14:30 ` Kirkwood, David A.
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1792452.mJhBpEhCa1@x2 \
--to=sgrubb@redhat.com \
--cc=linux-audit@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox