From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: need rules help Date: Sat, 8 Aug 2009 11:34:51 -0400 Message-ID: <200908081134.51817.sgrubb@redhat.com> References: <1249526745.12117.986.camel@homeserver> <1249571430.12117.1002.camel@homeserver> <1249593456.3048.70.camel@homeserver> Mime-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-15" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1249593456.3048.70.camel@homeserver> Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Thursday 06 August 2009 05:17:36 pm LC Bruzenak wrote: > So it appears that the "never" rule is not firing...right? No, its actually something else > I'm not sure if the rule applies to only the info in the "type=syscall" > line. Really I want to compare against the specific scontext/tcontext > pair in the "type=AVC" line. The issue is that SE Linux AVCs travel a different path. When an AVC denial occurs and there is not a dontaudit associated with it, it sends the event straight to the netlink queue. To suppress an AVC, you would need to make a change to SE Linux policy. The SE Linux folks wanted to make sure there was no way to suppress an AVC without explicitly stating so in policy. -Steve