From mboxrd@z Thu Jan 1 00:00:00 1970 From: Linda Knippers Subject: Re: Executable permissions Date: Wed, 13 Dec 2006 11:19:10 -0500 Message-ID: <458027FE.6010709@hp.com> References: <458023AF.4030204@redhat.com> <200612131111.42083.sgrubb@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <200612131111.42083.sgrubb@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Steve Grubb Cc: linux-audit@redhat.com List-Id: linux-audit@redhat.com Steve Grubb wrote: > On Wednesday 13 December 2006 11:00, Karl MacMillan wrote: > >>Is there a reason that the audit tools that take a file name paramater >>(-if) are not executable by non-root users? > > > Current tools do not. > > [root src]# grep getuid *.c > auditctl.c: if (getuid() != 0) { > auditctl.c: if (getuid() != 0) { > > Must be root to send netlink > > auditd.c: if (getuid() != 0) { > > Must be root to read netlink > > autrace.c: if (getuid() != 0) { > > Must be root to write to netlink. I think Karl is talking about the mode bits. The audit tools are 750, owned by root,root, on my system, so not executable by non-root users. -- ljk