From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: Executable permissions Date: Wed, 13 Dec 2006 11:11:41 -0500 Message-ID: <200612131111.42083.sgrubb@redhat.com> References: <458023AF.4030204@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <458023AF.4030204@redhat.com> Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Wednesday 13 December 2006 11:00, Karl MacMillan wrote: > Is there a reason that the audit tools that take a file name paramater > (-if) are not executable by non-root users? Current tools do not. [root src]# grep getuid *.c auditctl.c: if (getuid() != 0) { auditctl.c: if (getuid() != 0) { Must be root to send netlink auditd.c: if (getuid() != 0) { Must be root to read netlink autrace.c: if (getuid() != 0) { Must be root to write to netlink. -Steve