From: PJB <pjb@decafgeek.org>
To: linux-audit@redhat.com
Subject: Re: Filtering out non-interactive users
Date: Sat, 15 Jan 2011 20:39:30 -0500 [thread overview]
Message-ID: <20110116013929.GA10485@monolith> (raw)
In-Reply-To: <201101141721.49236.sgrubb@redhat.com>
On Fri, Jan 14, 2011 at 05:21:49PM -0500, Steve Grubb [sgrubb@redhat.com] wrote:
> > In older versions of the audit code, we used the following type of system
> > call auditing rule which seemed to work pretty well:
> >
> > -a exit,always -S creat -S open -S openat -S truncate -S ftruncate -F
> > success=0 -F auid!=-1
>
> This rule looks correct except that if you have a 64 bit system, I would suggest a -F
> arch=b32 between the '-a' and '-S' and then another copy of the rule for the 64 bit
> arch.
We are running purely 32-bit systems so I left out the architecture
filter. However while trying to debug I did add it in and it seemed to
make no difference.
> > Can someone point me to documentation/examples or help me out with the
> > proper syntax for setting up rules that will exclude the background
> > processes? We are using auditd 1.7.4 now and the 'auid' filter above no
> > longer does the job.
>
> There's been a lot of bugs fixed since then. You might try building a newer auditctl
> and trying it out to see if that makes a difference. Also note that the event capturing
> is done by the kernel and the kernel version would matter more than the auditd
> version.
Unfortunately I'm in one of those situations where changing software
versions will cause severe heartburn with management and customer types
due to concerns about baseline stability, so I have to stick with what we
have right now. The kernel is 2.6.33.1 with no extra patches, as far as I
know.
> Are you getting other events like logins? Just making sure your disk isn't full or
> something else. And when you do auditctl -s, it shows the audit system is enabled?
We are getting CWD, PATH, and SYSCALL audit events in the log, but only
from files/directories that have an explicit watch set on them. I haven't
seen any other type of audit event other than those three come through,
and again only on things that we set explicit watches on.
Thanks,
Patrick
next prev parent reply other threads:[~2011-01-16 1:39 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-01-14 16:37 Filtering out non-interactive users PJB
2011-01-14 22:21 ` Steve Grubb
2011-01-16 1:39 ` PJB [this message]
2011-01-16 15:00 ` Steve Grubb
2011-01-19 14:01 ` PJB
2011-01-19 14:33 ` Steve Grubb
2011-01-19 14:48 ` PJB
2011-01-19 15:04 ` Steve Grubb
2011-01-20 19:28 ` Steve Grubb
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20110116013929.GA10485@monolith \
--to=pjb@decafgeek.org \
--cc=linux-audit@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox