public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
From: PJB <pjb@decafgeek.org>
To: linux-audit@redhat.com
Subject: Re: Filtering out non-interactive users
Date: Sat, 15 Jan 2011 20:39:30 -0500	[thread overview]
Message-ID: <20110116013929.GA10485@monolith> (raw)
In-Reply-To: <201101141721.49236.sgrubb@redhat.com>

On Fri, Jan 14, 2011 at 05:21:49PM -0500, Steve Grubb [sgrubb@redhat.com] wrote:
> > In older versions of the audit code, we used the following type of system
> > call auditing rule which seemed to work pretty well:
> > 
> > -a exit,always -S creat -S open -S openat -S truncate -S ftruncate -F
> > success=0 -F auid!=-1
> 
> This rule looks correct except that if you have a 64 bit system,  I would suggest a -F 
> arch=b32 between the '-a' and '-S' and then another copy of the rule for the 64 bit 
> arch.

We are running purely 32-bit systems so I left out the architecture
filter. However while trying to debug I did add it in and it seemed to
make no difference. 
  
> > Can someone point me to documentation/examples or help me out with the
> > proper syntax for setting up rules that will exclude the background
> > processes? We are using auditd 1.7.4 now and the 'auid' filter above no
> > longer does the job.
> 
> There's been a lot of bugs fixed since then. You might try building a newer auditctl 
> and trying it out to see if that makes a difference. Also note that the event capturing 
> is done by the kernel and the kernel version would matter more than the auditd 
> version.

Unfortunately I'm in one of those situations where changing software
versions will cause severe heartburn with management and customer types
due to concerns about baseline stability, so I have to stick with what we
have right now. The kernel is 2.6.33.1 with no extra patches, as far as I
know. 

> Are you getting other events like logins? Just making sure your disk isn't full or 
> something else. And when you do auditctl -s, it shows the audit system is enabled?

We are getting CWD, PATH, and SYSCALL audit events in the log, but only
from files/directories that have an explicit watch set on them. I haven't
seen any other type of audit event other than those three come through,
and again only on things that we set explicit watches on.

Thanks,
Patrick

  reply	other threads:[~2011-01-16  1:39 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-01-14 16:37 Filtering out non-interactive users PJB
2011-01-14 22:21 ` Steve Grubb
2011-01-16  1:39   ` PJB [this message]
2011-01-16 15:00     ` Steve Grubb
2011-01-19 14:01       ` PJB
2011-01-19 14:33         ` Steve Grubb
2011-01-19 14:48           ` PJB
2011-01-19 15:04             ` Steve Grubb
2011-01-20 19:28         ` Steve Grubb

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20110116013929.GA10485@monolith \
    --to=pjb@decafgeek.org \
    --cc=linux-audit@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox