From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: AUID question Date: Fri, 14 Nov 2014 10:26:26 -0500 Message-ID: <2358445.E63IALoBCF@x2> References: <9904045.iPF9lTPz31@x2> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Friday, November 14, 2014 10:16:12 AM David Flatley wrote: > While checking audit logs for failed logins, It was noticed that the > AUID was one name and there was a UID of the user that failed login. The > only thing we can figure is that the AUID user rebooted the system > by logging in as himself and then using sudo to reboot the system prior to > the fails. Are we correct in this assumption? Maybe. If the auid was someone with admin powers, they might have restarted a daemon which would insert their auid into the daemon and then cause other user's logins to be wrong. But generally when auid!=uid, then they have used sudo or su. -Steve