From mboxrd@z Thu Jan 1 00:00:00 1970 From: Richard Guy Briggs Subject: Re: Seeking auditd help Date: Tue, 12 May 2015 08:13:16 -0400 Message-ID: <20150512121316.GA23513@madcap2.tricolour.ca> References: <3241881.s5W8vqYJFF@x2> <1431394570.4708.13.camel@swtf.swtf.dyndns.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Content-Disposition: inline In-Reply-To: <1431394570.4708.13.camel@swtf.swtf.dyndns.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Burn Alting Cc: Bill Jackson III , linux-audit@redhat.com List-Id: linux-audit@redhat.com On 15/05/12, Burn Alting wrote: > On Mon, 2015-05-11 at 15:52 -0400, Steve Grubb wrote: > > On Monday, May 11, 2015 11:50:19 AM Bill Jackson III wrote: > > > Any pointers for troubleshooting auditd missing events for file reads, > > > edits, etc. ( -w _path_ -p raw) on OEL5/RHEL 5/CentOS 5? > > > > > > http://security.stackexchange.com/q/89009/56827 > > > > The -w notation is the same as > > > > -a always,exit -F path=XXX -F perms=rwa > > > > What this does is audit the following functions defined in the syscall > > classifiers > > : > > http://lxr.free-electrons.com/source/include/asm-generic/audit_read.h > > http://lxr.free-electrons.com/source/include/asm-generic/audit_write.h > > http://lxr.free-electrons.com/source/include/asm-generic/audit_change_attr.h > > > > You are not going to get a hit for each and every read system call because > > read is not audited. > > Bill, > > Is your question > > "Can one apply a file watch using auditd if the file does not exist?" > > then I believe the answer is no. There is a patch set coming to be able to address this case if the directory exists. Down the road, I'm hoping to be able to accomodate non-existant directories too. > Options would be > - as part of your application deployment standard operating procedures > (SOPs) add appropriate watches to audit.rules and restart the auditd > service > - keep all you sensitive files in one directory location, set a > directory watch on this directory tree and then as part of your > application deployment SOPs, place the real files in the sensitive file > area and then link to them from the application area. (I've just tried > this on a fc22 system and it works) > > Regards - RGB -- Richard Guy Briggs Senior Software Engineer, Kernel Security, AMER ENG Base Operating Systems, Red Hat Remote, Ottawa, Canada Voice: +1.647.777.2635, Internal: (81) 32635, Alt: +1.613.693.0684x3545