From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: Tracking account lockouts and permission denied Date: Wed, 1 Oct 2008 16:25:39 -0400 Message-ID: <200810011625.39328.sgrubb@redhat.com> References: <0FED9929-66E9-4A72-85B7-5DE790B06446@arlut.utexas.edu> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Return-path: In-Reply-To: <0FED9929-66E9-4A72-85B7-5DE790B06446@arlut.utexas.edu> Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Wednesday 01 October 2008 15:58:44 Starr-Renee Corbin wrote: > Hello, I am using RHEL 4 and need /var/log/audit/audit.log to show =A0 > when an account is locked out This is hardwired into the pam_talley2 code. As long as its in your login= =20 config and audit is enabled, you should get it. > and when a user is denied permission to=20 > security relevant files such as /etc/shadow. In RHEL4, you can get accesses to /etc/shadow via watches, but not just t= he=20 denied because of permission. aureport --file --failed would find them fo= r=20 you.=20 You can also get all opens that failed due to permission denied. This wou= ld=20 include more than /etc/shadow, though.=20 RHEL5 and current upstream kernels do not have this limitation and can re= cord=20 the permission denied access to security relevant files. -Steve