From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Flatley Subject: question Date: Fri, 31 Oct 2008 14:21:12 -0400 Message-ID: Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1259484205==" Return-path: Received: from mx3.redhat.com (mx3.redhat.com [172.16.48.32]) by int-mx1.corp.redhat.com (8.13.1/8.13.1) with ESMTP id m9VIqSoK010843 for ; Fri, 31 Oct 2008 14:52:28 -0400 Received: from e4.ny.us.ibm.com (e4.ny.us.ibm.com [32.97.182.144]) by mx3.redhat.com (8.13.8/8.13.8) with ESMTP id m9VIqFHw016735 for ; Fri, 31 Oct 2008 14:52:15 -0400 Received: from d01relay04.pok.ibm.com (d01relay04.pok.ibm.com [9.56.227.236]) by e4.ny.us.ibm.com (8.13.8/8.13.8) with ESMTP id m9VIqFPf018283 for ; Fri, 31 Oct 2008 14:52:15 -0400 Received: from d01av04.pok.ibm.com (d01av04.pok.ibm.com [9.56.224.64]) by d01relay04.pok.ibm.com (8.13.8/8.13.8/NCO v9.1) with ESMTP id m9VIqFYa108578 for ; Fri, 31 Oct 2008 14:52:15 -0400 Received: from d01av04.pok.ibm.com (loopback [127.0.0.1]) by d01av04.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id m9VIqFGo020969 for ; Fri, 31 Oct 2008 14:52:15 -0400 Received: from d01ml253.pok.ibm.com (d01ml253.pok.ibm.com [9.56.227.127]) by d01av04.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id m9VIobiE016191 for ; Fri, 31 Oct 2008 14:52:12 -0400 List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com --===============1259484205== Content-type: multipart/alternative; Boundary="0__=0ABBFE60DFF1988E8f9e8a93df938690918c0ABBFE60DFF1988E" Content-Disposition: inline --0__=0ABBFE60DFF1988E8f9e8a93df938690918c0ABBFE60DFF1988E Content-type: text/plain; charset=US-ASCII If you would indulge my simpler in comparison question of the group. I am setting up audit on heavy usage systems. I have setup my auditd.conf to rotate the files once they get to 70 meg and allow up to 12 rotated files. I created a cron that runs hourly to look and see if a ninth rotated file exists and if so run "ausearch -i" outputted to a file and store the file, then remove the rotated files. I run the cron to avoid losing data if there is alot of activity and rotated files are rolled off. I also have to balance performance with auditing in this arrangement. My question is: is there a better way to do this? Thanks. --0__=0ABBFE60DFF1988E8f9e8a93df938690918c0ABBFE60DFF1988E Content-type: text/html; charset=US-ASCII Content-Disposition: inline

If you would indulge my simpler in comparison question of the group. I am setting up audit
on heavy usage systems. I have setup my auditd.conf to rotate the files once they get to 70
meg and allow up to 12 rotated files. I created a cron that runs hourly to look and see if
a ninth rotated file exists and if so run "ausearch -i" outputted to a file and store the
file, then remove the rotated files. I run the cron to avoid losing data if there is alot of activity
and rotated files are rolled off. I also have to balance performance with auditing in this
arrangement.
My question is: is there a better way to do this?
Thanks. --0__=0ABBFE60DFF1988E8f9e8a93df938690918c0ABBFE60DFF1988E-- --===============1259484205== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline --===============1259484205==-- From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: question Date: Fri, 31 Oct 2008 15:50:12 -0400 Message-ID: <200810311550.12429.sgrubb@redhat.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Friday 31 October 2008 14:21:12 David Flatley wrote: > If you would indulge my simpler in comparison question of the group. I > am setting up audit on heavy usage systems. I have setup my auditd.conf to > rotate the files once they get to 70 meg and allow up to 12 rotated files. You don't need to limit the files to 12 unless you are short on disk space. you can use keep_logs as the max_log_file option and one will not be lost. > I created a cron that runs hourly to look and see if a ninth rotated file > exists and if so run "ausearch -i" outputted to a file and store the > file, You shouldn't need to ausearch the file? Are you doing that to split the file on a time hack? In that case you can just about as easily do a "service auditd rotate" and force auditd to end at a certain time rather than by size. > then remove the rotated files. I run the cron to avoid losing data if > there is alot of activity and rotated files are rolled off. I also have to > balance performance with auditing in this arrangement. Perhaps we need the capability of switching out partitions used for logging? Maybe that could be solved by using the space left action exec capability to run a custom program that re-writes the audit config file or changes a symlink to point to another config file to point to a new dir and then sends sighup to the parent (auditd). Maybe some others have ideas about how they solve the same problem. If we need to make changes to the audit daemon to make this smoother, let me know what's needed. -Steve From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Flatley Subject: Re: question Date: Sun, 2 Nov 2008 12:24:45 -0500 Message-ID: References: <200810311550.12429.sgrubb@redhat.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1681771857==" Return-path: In-Reply-To: <200810311550.12429.sgrubb@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Steve Grubb , linux-audit@redhat.com List-Id: linux-audit@redhat.com --===============1681771857== Content-type: multipart/related; Boundary="0__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F" --0__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F Content-type: multipart/alternative; Boundary="1__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F" --1__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F Content-type: text/plain; charset=US-ASCII Thanks for the reply Steve. On Friday 31 October 2008 14:21:12 David Flatley wrote: > If you would indulge my simpler in comparison question of the group. I > am setting up audit on heavy usage systems. I have setup my auditd.conf to > rotate the files once they get to 70 meg and allow up to 12 rotated files. You don't need to limit the files to 12 unless you are short on disk space. you can use keep_logs as the max_log_file option and one will not be lost. Disk space is not a problem if the day's logging is collected and stored, which is required, > I created a cron that runs hourly to look and see if a ninth rotated file > exists and if so run "ausearch -i" outputted to a file and store the > file, You shouldn't need to ausearch the file? Are you doing that to split the file on a time hack? In that case you can just about as easily do a "service auditd rotate" and force auditd to end at a certain time rather than by size. Yes and then I could use ausearch -if when I need to look at the logs after they have been moved to storage. Or apply the ausearch -i when I do the> storage of the file, I do this to convert from numerical to text on the file. > then remove the rotated files. I run the cron to avoid losing data if > there is alot of activity and rotated files are rolled off. I also have to > balance performance with auditing in this arrangement. Perhaps we need the capability of switching out partitions used for logging? Maybe that could be solved by using the space left action exec capability to run a custom program that re-writes the audit config file or changes a symlink to point to another config file to point to a new dir and then sends sighup to the parent (auditd). Maybe some others have ideas about how they solve the same problem. If we need to make changes to the audit daemon to make this smoother, let me know what's needed. -Steve --1__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F Content-type: text/html; charset=US-ASCII Content-Disposition: inline

Thanks for the reply Steve.

Inactive hide details for Steve Grubb <sgrubb@redhat.com>Steve Grubb <sgrubb@redhat.com>


On Friday 31 October 2008 14:21:12 David Flatley wrote:
>     If you would indulge my simpler in comparison question of the group. I
> am setting up audit on heavy usage systems. I have setup my auditd.conf to
> rotate the files once they get to 70 meg and allow up to 12 rotated files.

You don't need to limit the files to 12 unless you are short on disk space.
you can use keep_logs as the max_log_file option and one will not be lost.


Disk space is not a problem if the day's logging is collected and stored, which is required,

> I created a cron that runs hourly to look and see if a ninth rotated file
> exists and if so run "ausearch -i" outputted to a file and store the
> file,

You shouldn't need to ausearch the file? Are you doing that to split the file
on a time hack? In that case you can just about as easily do a "service
auditd rotate" and force auditd to end at a certain time rather than by size.

Yes and then I could use ausearch -if <file> when I need to look at the logs
after they have been moved to storage. Or apply the ausearch -i when I do the
storage of the file, I do this to convert from numerical to text on the file.

> then remove the rotated files. I run the cron to avoid losing data if
> there is alot of activity and rotated files are rolled off. I also have to
> balance performance with auditing in this arrangement.

Perhaps we need the capability of switching out partitions used for logging?
Maybe that could be solved by using the space left action exec capability to
run a custom program that re-writes the audit config file or changes a
symlink to point to another config file to point to a new dir and then sends
sighup to the parent (auditd).

Maybe some others have ideas about how they solve the same problem. If we need
to make changes to the audit daemon to make this smoother, let me know what's
needed.

-Steve

--1__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F-- --0__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F Content-type: image/gif; name="graycol.gif" Content-Disposition: inline; filename="graycol.gif" Content-ID: <1__=0ABBFE66DFCE340F8f9e8a93df938@us.ibm.com> Content-transfer-encoding: base64 R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7 --0__=0ABBFE66DFCE340F8f9e8a93df938690918c0ABBFE66DFCE340F-- --===============1681771857== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline --===============1681771857==-- From mboxrd@z Thu Jan 1 00:00:00 1970 From: LC Bruzenak Subject: Re: question Date: Sun, 02 Nov 2008 12:25:37 -0600 Message-ID: <1225650337.9388.425.camel@homeserver> References: <200810311550.12429.sgrubb@redhat.com> Mime-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <200810311550.12429.sgrubb@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Steve Grubb Cc: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Fri, 2008-10-31 at 15:50 -0400, Steve Grubb wrote: > On Friday 31 October 2008 14:21:12 David Flatley wrote: > ... > > Perhaps we need the capability of switching out partitions used for logging? > Maybe that could be solved by using the space left action exec capability to > run a custom program that re-writes the audit config file or changes a > symlink to point to another config file to point to a new dir and then sends > sighup to the parent (auditd). > > Maybe some others have ideas about how they solve the same problem. If we need > to make changes to the audit daemon to make this smoother, let me know what's > needed. David, I will have similar requirements and I've been thinking about this also. Not sure about you, but my audit data has the following requirements (and others): * archive to off-site storage * restore from archive * search capabilities (mostly covered in ausearch and audit-viewer) * robust (cannot lose any data received) * etc. Like you, I'm planning a periodic shift. This enables straightforward time-based restore/search for humans. Ideally, it would be totally automated, as in: 1: shift auditing to a new R/W partition each month. 2: Make the previous month audit data RO. 3: archive the previous month to tape/DVD 4: put the RO partition back into the "available" queue 5: ensure the current audit is also mirrored over to a big storage area with all the past data on it. 6: Send an email to the administrator that all the above has successfully occurred. Steve, as my testing progresses I'll add comments in this area. I had thought a cron-activated logrotate on the month would cover this, but it means 2 admin areas; if there is a way to do it inside the audit structure, that would be preferable to me. It would simplify/consolidate the config rpm(s) I create. Anything you could do to help facilitate a scheme as described above would be welcome. David, a couple of questions for you: * Have you looked at the audit-viewer, and do you intend to use this? * I assume "heavy usage systems" means lots of audit data...are your rules tuned appropriately? This is critical for me - one over-zealous rule will add a flood of unhelpful info. * You mention "balancing performance" - are you talking about per-machine or network (via aggregation)? When reading your post I assumed aggregation from my own perspective but you didn't actually specify so I thought maybe I should ask. I'm aggregating all audit from several machines to a single audit machine for storage/review/adminstration. You? Thx, LCB. -- LC (Lenny) Bruzenak lenny@magitekltd.com From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Flatley Subject: Re: question Date: Sun, 2 Nov 2008 21:42:47 -0500 Message-ID: References: Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1057790932==" Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com Cc: linux-audit@redhat.com, linux-audit-bounces@redhat.com List-Id: linux-audit@redhat.com --===============1057790932== Content-type: multipart/related; Boundary="0__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630" --0__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630 Content-type: multipart/alternative; Boundary="1__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630" --1__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630 Content-type: text/plain; charset=US-ASCII Sorry I am in error on the storage question. I do have limited storage on some of my systems and depending on my rules and what is running on the systems this could cause an issue. Presently I am using the S.T.I.G. recommendations but I may have to use more extensive rules which I am in the process of testing. Thanks for the reply Steve. Inactive hide details for Steve Grubb Steve Grubb On Friday 31 October 2008 14:21:12 David Flatley wrote: > If you would indulge my simpler in comparison question of the group. I > am setting up audit on heavy usage systems. I have setup my auditd.conf to > rotate the files once they get to 70 meg and allow up to 12 rotated files. You don't need to limit the files to 12 unless you are short on disk space. you can use keep_logs as the max_log_file option and one will not be lost. Disk space is not a problem if the day's logging is collected and stored, which is required, > I created a cron that runs hourly to look and see if a ninth rotated file > exists and if so run "ausearch -i" outputted to a file and store the > file, You shouldn't need to ausearch the file? Are you doing that to split the file on a time hack? In that case you can just about as easily do a "service auditd rotate" and force auditd to end at a certain time rather than by size. Yes and then I could use ausearch -if when I need to look at the logs after they have been moved to storage. Or apply the ausearch -i when I do the storage of the file, I do this to convert from numerical to text on the file. > then remove the rotated files. I run the cron to avoid losing data if > there is alot of activity and rotated files are rolled off. I also have to > balance performance with auditing in this arrangement. Perhaps we need the capability of switching out partitions used for logging? Maybe that could be solved by using the space left action exec capability to run a custom program that re-writes the audit config file or changes a symlink to point to another config file to point to a new dir and then sends sighup to the parent (auditd). Maybe some others have ideas about how they solve the same problem. If we need to make changes to the audit daemon to make this smoother, let me know what's needed. -Steve -- Linux-audit mailing list Linux-audit@redhat.com https://www.redhat.com/mailman/listinfo/linux-audit --1__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630 Content-type: text/html; charset=US-ASCII Content-Disposition: inline

Sorry I am in error on the storage question. I do have limited storage on some of my systems and depending on my rules
and what is running on the systems this could cause an issue. Presently I am using the S.T.I.G. recommendations but I may
have to use more extensive rules which I am in the process of testing.


Inactive hide details for David Flatley/Burlington/IBM@IBMUSDavid Flatley/Burlington/IBM@IBMUS




Thanks for the reply Steve.

Inactive hide details for Steve Grubb <sgrubb@redhat.com>Steve Grubb <sgrubb@redhat.com>


On Friday 31 October 2008 14:21:12 David Flatley wrote:
>     If you would indulge my simpler in comparison question of the group. I
> am setting up audit on heavy usage systems. I have setup my auditd.conf to
> rotate the files once they get to 70 meg and allow up to 12 rotated files.

You don't need to limit the files to 12 unless you are short on disk space.
you can use keep_logs as the max_log_file option and one will not be lost.


Disk space is not a problem if the day's logging is collected and stored, which is required,


> I created a cron that runs hourly to look and see if a ninth rotated file
> exists and if so run "ausearch -i" outputted to a file and store the
> file,

You shouldn't need to ausearch the file? Are you doing that to split the file
on a time hack? In that case you can just about as easily do a "service
auditd rotate" and force auditd to end at a certain time rather than by size.


Yes and then I could use ausearch -if <file> when I need to look at the logs
after they have been moved to storage. Or apply the ausearch -i when I do the
storage of the file, I do this to convert from numerical to text on the file.

> then remove the rotated files. I run the cron to avoid losing data if
> there is alot of activity and rotated files are rolled off. I also have to
> balance performance with auditing in this arrangement.

Perhaps we need the capability of switching out partitions used for logging?
Maybe that could be solved by using the space left action exec capability to
run a custom program that re-writes the audit config file or changes a
symlink to point to another config file to point to a new dir and then sends
sighup to the parent (auditd).

Maybe some others have ideas about how they solve the same problem. If we need
to make changes to the audit daemon to make this smoother, let me know what's
needed.

-Steve

--
Linux-audit mailing list
Linux-audit@redhat.com
https://www.redhat.com/mailman/listinfo/linux-audit
--1__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630-- --0__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630 Content-type: image/gif; name="graycol.gif" Content-Disposition: inline; filename="graycol.gif" Content-ID: <1__=0ABBFE65DF9F36308f9e8a93df938@us.ibm.com> Content-transfer-encoding: base64 R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7 --0__=0ABBFE65DF9F36308f9e8a93df938690918c0ABBFE65DF9F3630-- --===============1057790932== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline --===============1057790932==-- From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Flatley Subject: Re: question Date: Sun, 2 Nov 2008 22:54:09 -0500 Message-ID: References: <1225650337.9388.425.camel@homeserver> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1913660700==" Return-path: In-Reply-To: <1225650337.9388.425.camel@homeserver> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: LC Bruzenak Cc: linux-audit@redhat.com, linux-audit-bounces@redhat.com List-Id: linux-audit@redhat.com --===============1913660700== Content-type: multipart/related; Boundary="0__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF" --0__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF Content-type: multipart/alternative; Boundary="1__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF" --1__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF Content-type: text/plain; charset=US-ASCII On Fri, 2008-10-31 at 15:50 -0400, Steve Grubb wrote: >> On Friday 31 October 2008 14:21:12 David Flatley wrote: > ... > >> Perhaps we need the capability of switching out partitions used for logging? >> Maybe that could be solved by using the space left action exec capability to >> run a custom program that re-writes the audit config file or changes a >> symlink to point to another config file to point to a new dir and then sends >> sighup to the parent (auditd). >> >> Maybe some others have ideas about how they solve the same problem. If we need >> to make changes to the audit daemon to make this smoother, let me know what's >> needed. >David, I will have similar requirements and I've been thinking about >this also. Not sure about you, but my audit data has the following >requirements (and others): >* archive to off-site storage >* restore from archive >* search capabilities (mostly covered in ausearch and audit-viewer) >* robust (cannot lose any data received) >* etc. Yes my requirements are very similar. >Like you, I'm planning a periodic shift. This enables straightforward >time-based restore/search for humans. Ideally, it would be totally >automated, as in: >1: shift auditing to a new R/W partition each month. >2: Make the previous month audit data RO. >3: archive the previous month to tape/DVD >4: put the RO partition back into the "available" queue >5: ensure the current audit is also mirrored over to a big storage area >with all the past data on it. >6: Send an email to the administrator that all the above has >successfully occurred. >Steve, as my testing progresses I'll add comments in this area. I had >thought a cron-activated logrotate on the month would cover this, but it >means 2 admin areas; if there is a way to do it inside the audit >structure, that would be preferable to me. It would simplify/consolidate >the config rpm(s) I create. Anything you could do to help facilitate a >scheme as described above would be welcome. >David, a couple of questions for you: >* Have you looked at the audit-viewer, and do you intend to use this? No, have not looked at it, really would like to use Tivoli compliance insight manager. >* I assume "heavy usage systems" means lots of audit data...are your >rules tuned appropriately? This is critical for me - one over-zealous >rule will add a flood of unhelpful info. Yes I am in the process of evaluating rules, using S.T.I.G. recommendations. >* You mention "balancing performance" - are you talking about >per-machine or network (via aggregation)? Yes per machine, network is not an issue. >When reading your post I >assumed aggregation from my own perspective but you didn't actually >specify so I thought maybe I should ask. I'm aggregating all audit from >several machines to a single audit machine for >storage/review/administration. You? I remove the logs daily per machine and store them per system. >Thx, >LCB. -- LC (Lenny) Bruzenak lenny@magitekltd.com -- Linux-audit mailing list Linux-audit@redhat.com https://www.redhat.com/mailman/listinfo/linux-audit --1__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF Content-type: text/html; charset=US-ASCII Content-Disposition: inline



Inactive hide details for LC Bruzenak <lenny@magitekltd.com>LC Bruzenak <lenny@magitekltd.com>




On Fri, 2008-10-31 at 15:50 -0400, Steve Grubb wrote:
>> On Friday 31 October 2008 14:21:12 David Flatley wrote:
> ...
>
>> Perhaps we need the capability of switching out partitions used for logging?
>> Maybe that could be solved by using the space left action exec capability to
>> run a custom program that re-writes the audit config file or changes a
>> symlink to point to another config file to point to a new dir and then sends
>> sighup to the parent (auditd).
>>
>> Maybe some others have ideas about how they solve the same problem. If we need
>> to make changes to the audit daemon to make this smoother, let me know what's
>> needed.

>David, I will have similar requirements and I've been thinking about
>this also. Not sure about you, but my audit data has the following
>requirements (and others):

>* archive to off-site storage
>* restore from archive
>* search capabilities (mostly covered in ausearch and audit-viewer)
>* robust (cannot lose any data received)
>* etc.
 Yes my requirements are very similar.


>Like you, I'm planning a periodic shift. This enables straightforward
>time-based restore/search for humans. Ideally, it would be totally
>automated, as in:

>1: shift auditing to a new R/W partition each month.
>2: Make the previous month audit data RO.
>3: archive the previous month to tape/DVD
>4: put the RO partition back into the "available" queue
>5: ensure the current audit is also mirrored over to a big storage area
>with all the past data on it.
>6: Send an email to the administrator that all the above has
>successfully occurred.

>Steve, as my testing progresses I'll add comments in this area. I had
>thought a cron-activated logrotate on the month would cover this, but it
>means 2 admin areas; if there is a way to do it inside the audit
>structure, that would be preferable to me. It would simplify/consolidate
>the config rpm(s) I create. Anything you could do to help facilitate a
>scheme as described above would be welcome.

>David, a couple of questions for you:
>* Have you looked at the audit-viewer, and do you intend to use this?

No, have not looked at it, really would like to use Tivoli compliance insight manager.
>* I assume "heavy usage systems" means lots of audit data...are your
>rules tuned appropriately? This is critical for me - one over-zealous
>rule will add a flood of unhelpful info.

Yes I am in the process of evaluating rules, using S.T.I.G. recommendations.
 
>* You mention "balancing performance"  - are you talking about
>per-machine or network (via aggregation)?

Yes per machine, network is not an issue.

>When reading your post I
>assumed aggregation from my own perspective but you didn't actually
>specify so I thought maybe I should ask. I'm aggregating all audit from
>several machines to a single audit machine for
>storage/review/administration. You?

I remove the logs daily per machine and store them per system.

>Thx,
>LCB.

--
LC (Lenny) Bruzenak
lenny@magitekltd.com

--
Linux-audit mailing list
Linux-audit@redhat.com
https://www.redhat.com/mailman/listinfo/linux-audit

--1__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF-- --0__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF Content-type: image/gif; name="graycol.gif" Content-Disposition: inline; filename="graycol.gif" Content-ID: <1__=0ABBFE65DF8371CF8f9e8a93df938@us.ibm.com> Content-transfer-encoding: base64 R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7 --0__=0ABBFE65DF8371CF8f9e8a93df938690918c0ABBFE65DF8371CF-- --===============1913660700== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline --===============1913660700==-- From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: question Date: Mon, 3 Nov 2008 09:15:45 -0500 Message-ID: <200811030915.45658.sgrubb@redhat.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: David Flatley Cc: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Sunday 02 November 2008 21:42:47 David Flatley wrote: > Presently I am using the S.T.I.G. recommendations but I may > have to use more extensive rules which I am in the process of testing. Are you using the stig.rules from the audit package or something else? If I were you, I'd spend some time making sure your rules are tuned. Assuming that you have keys on you rules, you can run a key report to see what is causing you the most events: aureport --start this-week --key --summary. Then you'd want to dig into some of those records and see what kinds of things are happening. Assuming you have a key of delete and you wanted to see what syscalls are the most often logged: ausearch --start this-week -k delete --raw | aureport --syscall --summary -i Assuming that shows unlinkat the most prevalent syscall: ausearch --start this-week -k delete -sc unlinkat --raw | aureport --user --summary -i And so on until you see what is causing so much logging. This doesn't help with the archiving, but could help you get the right audit data recorded. -Steve From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Flatley Subject: Re: question Date: Mon, 3 Nov 2008 12:21:23 -0500 Message-ID: References: <200811030915.45658.sgrubb@redhat.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============0174751562==" Return-path: In-Reply-To: <200811030915.45658.sgrubb@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Steve Grubb Cc: linux-audit@redhat.com List-Id: linux-audit@redhat.com --===============0174751562== Content-type: multipart/related; Boundary="0__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD" --0__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD Content-type: multipart/alternative; Boundary="1__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD" --1__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: quoted-printable I am actually using the suggested parameters from the STIG for UNIX= guide. I have searched and found the stig.rules on the internet and we are going to try them. I also saw= the nispom.rules but apparently they are for Red hat 5 Kernel 2.6.25 it says in the file? We are not using ke= ying but will once we get the stig.rules installed they appear to be using the -k flag. We are using audit 1.0.15 and I see 1.0.16 is on the Red Hat site, = is there a compelling reason to update to the 1.0.16 version of audit?. Thanks Steve. = = = = On Sunday 02 November 2008 21:42:47 David Flatley wrote: > Presently I am using the S.T.I.G. recommendations but I may > have to use more extensive rules which I am in the process of testing= . Are you using the stig.rules from the audit package or something else? = If I were you, I'd spend some time making sure your rules are tuned. Assumin= g that you have keys on you rules, you can run a key report to see what is cau= sing you the most events: aureport --start this-week --key --summary. Then you'd want to dig into some of those records and see what kinds of= things are happening. Assuming you have a key of delete and you wanted to see = what syscalls are the most often logged: ausearch --start this-week -k delete --raw | aureport --syscall --summa= ry -i Assuming that shows unlinkat the most prevalent syscall: ausearch --start this-week -k delete -sc unlinkat --raw | aureport --user --summary -i And so on until you see what is causing so much logging. This doesn't h= elp with the archiving, but could help you get the right audit data recorde= d. -Steve = --1__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD Content-type: text/html; charset=US-ASCII Content-Disposition: inline Content-transfer-encoding: quoted-printable

I am actually using the suggested parameters from the STIG for U= NIX guide. I have searched and found
the stig.rules on the internet and we are going to try them. I also saw= the nispom.rules but apparently they are
for Red hat 5 Kernel 2.6.25 it says in the file? We are not using ke= ying but will once we get the stig.rules installed
they appear to be using the -k flag.
We are using audit 1.0.15 and I see 1.0.16 is on the Red Hat site, = is there a compelling reason to update to the
1.0.16 version of audit?
Thanks Steve.

3D"InactiveSteve Grubb <sgrubb@redhat.com>=


=
3D""3D""

On Sunday 02 November 2008 21:42:47 David Flatley wrote:
> Presently I am using the S.T.I.G. recommendations but I may
> have to use more extensive rules which I am in the process of test= ing.

Are you using the stig.rules from the audit package or something else? = If I
were you, I'd spend some time making sure your rules are tuned. Assumin= g that
you have keys on you rules, you can run a key report to see what is cau= sing
you the most events: aureport --start this-week --key --summary.

Then you'd want to dig into some of those records and see what kinds of= things
are happening. Assuming you have a key of delete and you wanted to see = what
syscalls are the most often logged:

ausearch --start this-week -k delete --raw | aureport --syscall --summa= ry -i

Assuming that shows unlinkat the most prevalent syscall:

ausearch --start this-week -k delete -sc unlinkat --raw |
aureport --user --summary -i

And so on until you see what is causing so much logging. This doesn't h= elp
with the archiving, but could help you get the right audit data recorde= d.

-Steve

= --1__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD-- --0__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD Content-type: image/gif; name="graycol.gif" Content-Disposition: inline; filename="graycol.gif" Content-ID: <1__=0ABBFE65DFCD0BCD8f9e8a93df938@us.ibm.com> Content-transfer-encoding: base64 R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7 --0__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD Content-type: image/gif; name="pic28634.gif" Content-Disposition: inline; filename="pic28634.gif" Content-ID: <2__=0ABBFE65DFCD0BCD8f9e8a93df938@us.ibm.com> Content-transfer-encoding: base64 R0lGODlhWABDALP/AAAAAK04Qf79/o+Gm7WuwlNObwoJFCsoSMDAwGFsmIuezf///wAAAAAAAAAA AAAAACH5BAEAAAgALAAAAABYAEMAQAT/EMlJq704682770RiFMRinqggEUNSHIchG0BCfHhOjAuh EDeUqTASLCbBhQrhG7xis2j0lssNDopE4jfIJhDaggI8YB1sZeZgLVA9YVCpnGagVjV171aRVrYR RghXcAGFhoUETwYxcXNyADJ3GlcSKGAwLwllVC1vjIUHBWsFilKQdI8GA5IcpApeJQt8L09lmgkH LZikoU5wjqcyAMMFrJIDPAKvCFletKSev1HBw8KrxtjZ2tvc3d5VyKtCKW3jfz4uMKmq3xu4N0nK BVoJQmx2LGVOmrqNjjJf2hHAQo/eDwJGTKhQMcgQEEAnEjFS98+RnW3smGkZU6ncCWav/4wYOnAI TihRL/4FEwbp28BXMMcoscQCVxlepL4IGDSCyJyVQOu0o7CjmLN50OZlqWmyFy5/6yBBuji0AxFR M00oQAqNIstqI6qKHUsWRAEAvagsmfUEAImyxgbmUpJk3IklNUtJOUAVLoUr1+wqDGTE4zk+T6FG uQb3SizBCwatiiUgCBN8vrz+zFjVyQ8FWkOlg4NQiZMB5QS8QO3mpOaKnL0Z2EKvNMSILEThKhCg zMKPVxYJh23qm9KNW7pArPynMqZDiErsTMqI+LRi3QAgkFUbXpuFKhSYZALd0O5RKa2z9EYKBbpb qxIKsjUPRgD7I2XYV6wyrOw92ykExP8NW4URhknC5dKGE4v4NENQj2jXjmfNgOZDaXb5glRmXQ33 YEWQYNcZFnrYcIQLNzyTFDQNkXIff0ExVlY4srziQk43inZgL4rwxxINMvpFFAz1KOODHiu+4aEw NEjFl5B3JIKWKF3k6I9bfUGp5ZZcdunll5IA4cuHvQQJ5gcsoCWOOUwgltIwAKRxJgbIkJAQZEq0 2YliZnpZZ4BH3CnYOXldOUOfQoYDqF1LFHbXCrO8xmRsfoXDXJ6ChjCAH3QlhJcT6VWE6FCkfCco CgrMFsROrIEX3o2whVjWDjoJccN3LdggSGXLCdLEgHr1lyU3O3QxhgohNKXJCWv8JQr/PDdaqd6w 2rj1inLiGeiCJoDspAoQlYE6QWLSECehcWIYxIQES6zhbn1iImTHEQyqJ4eIxJJoUBc+3CbBuwZE V5cJPPkIjFDdeEabQbd6WgICTxiiz0f5dBKquXF6k4senwEhYGnKEFJeGrxUZy8dB8gmAXI/sPvH ESfCwVt5hTgYiqQqtdRNHQIU1PJ33ZqmzgE90OwLaoJcnMop1WiMmgkPHQRIrwgFuNV90A3doNKT mrKIN07AnGcI9BQjhCBN4RfA1qIZnMqorJCogKfGQnxSCDilTVIA0yl5ciTovgLuBDKFUDE9aQcw 9SA+rjSNf9/M1gxrj6VwDTS0IUSElMzBfsj0NFXR2kwsV1A5IF1grLgLL/r1R40BZEnuBWgmQEyb jqRwSAt6bqMCOFkvKFN2GPPkUzIm/SCF8z8pVzpbjVnMsy0vOr1hw3SaSRUhpY09v0z0J1FnwzPl fmh+xl4WtR0zGu24I4KbMQm3lnVu2oNWxI9W/lcyzA+mCKF4DBikxb/+UWtOGRiFP8qEwAayIgIA Ow== --0__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD Content-type: image/gif; name="ecblank.gif" Content-Disposition: inline; filename="ecblank.gif" Content-ID: <3__=0ABBFE65DFCD0BCD8f9e8a93df938@us.ibm.com> Content-transfer-encoding: base64 R0lGODlhEAABAIAAAAAAAP///yH5BAEAAAEALAAAAAAQAAEAAAIEjI8ZBQA7 --0__=0ABBFE65DFCD0BCD8f9e8a93df938690918c0ABBFE65DFCD0BCD-- --===============0174751562== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline --===============0174751562==-- From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: question Date: Mon, 3 Nov 2008 12:57:27 -0500 Message-ID: <200811031257.27209.sgrubb@redhat.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Return-path: In-Reply-To: Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: David Flatley Cc: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Monday 03 November 2008 12:21:23 David Flatley wrote: > I am actually using the suggested parameters from the STIG for UNIX > guide. I have searched and found the stig.rules on the internet and we = are > going to try them. I also saw the nispom.rules but apparently they are > for Red hat 5 Kernel 2.6.25 it says in the file? Yes, those rules use some recent kernel functionality in order to cover a= ll=20 the requirements. Those recent kernel updates are in the RHEL5 kernels an= d=20 should work. They will take some re-engineeing to get working on RHEL4. > We are not using keying but will once we get the stig.rules installed > they appear to be using the -k flag. On RHEL4, you can only use keys on the file watches. RHEL5 you can use th= em on=20 both syscall and file watches. > =C2=A0 =C2=A0 We are using audit 1.0.15 and I see 1.0.16 is on the Red = Hat site, is > there a compelling reason to update to the > 1.0.16 version of audit?. The change log 1.0.16 - Update time handling for ausearch and aureport to add more keywords - Fix the ausearch on keyword to tolerate records with no key (#402941) - num_logs option wasn't working right on shifts (#325561) - In auditd, resume logging on SIGUSR2 (#325561) - ausearch needed update for escaped acct fields (#353241) - Fix parsing filterkeys in fs_watch records So, this has some fixups for using keys. -Steve