From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Cerri Subject: Re: Captured system calls that should be filtered out Date: Fri, 20 Jan 2012 14:49:57 -0200 Message-ID: <4F199B35.5070507@linux.vnet.ibm.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; Format="flowed" Content-Transfer-Encoding: 7bit Return-path: Received: from mx1.redhat.com (ext-mx11.extmail.prod.ext.phx2.redhat.com [10.5.110.16]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id q0KGo332013373 for ; Fri, 20 Jan 2012 11:50:03 -0500 Received: from e24smtp05.br.ibm.com (e24smtp05.br.ibm.com [32.104.18.26]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id q0KGo12E005313 for ; Fri, 20 Jan 2012 11:50:01 -0500 Received: from /spool/local by e24smtp05.br.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 20 Jan 2012 14:50:00 -0200 Received: from d24av04.br.ibm.com (d24av04.br.ibm.com [9.8.31.97]) by d24relay03.br.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id q0KGnwlV23920682 for ; Fri, 20 Jan 2012 14:49:58 -0200 Received: from d24av04.br.ibm.com (loopback [127.0.0.1]) by d24av04.br.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id q0KEnjKx007351 for ; Fri, 20 Jan 2012 12:49:45 -0200 Received: from oc8526070481.ibm.com (oc8526070481.ibm.com.br.ibm.com [9.7.38.28]) by d24av04.br.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id q0KEnj92007346 for ; Fri, 20 Jan 2012 12:49:45 -0200 In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com Hi, Try auid!=4294967295 instead of auid!=4294967296. Regards, Marcelo On 01/20/2012 02:27 PM, Kaplan, Eric D (IS) wrote: > I am trying to implement STIG rules for our system. I modified Steve > Grubbs' stig.rules for my audit.rules file. Included > was the rule > -a exit,always -F arch=b64 -S chmod -S fchmod -F auid>=500 -F > auid!=4294967296 -k perm_mod > which I understand should exempt root and unset processes from having > these system calls captured. Yet > in our audit.logs there was a torrent of records of the sort > type=SYSCALL msg=audit(1326897520.970:2005250): arch=c000003e > syscall=91 per=400000 success=yes exit=0 a0=1 a1=100 a2=0 > a3=7fff21800870 items=1 ppid=3536 pid=20965 auid=4294967295 uid=0 > gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) > ses=4294967295 comm="time_adjust.ksh" exe="/bin/ksh93" key="perm_mod" > type=PATH msg=audit(1326897520.970:2005250): item=0 name=(null) > inode=25631356 dev=00:05 mode=0140777 ouid=0 ogid=0 rdev=00:00 > and > type=SYSCALL msg=audit(1326897480.144:2005238): arch=c000003e > syscall=91 per=400000 success=yes exit=0 a0=5 a1=100 a2=0 > a3=7fffa8f157d0 items=1 ppid=20707 pid=20726 auid=4294967295 uid=0 > gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) > ses=4294967295 comm="find_client_sta" exe="/bin/ksh93" key="perm_mod" > type=PATH msg=audit(1326897480.144:2005238): item=0 name=(null) > inode=25630808 dev=00:05 mode=0140777 ouid=0 ogid=0 rdev=00:00 > I need to get rid of them to make annalysis possible and to avoid > soaking up disk space. > find_client_status.ksh and time_adjust.ksh are both scripts that are > spawned by a daemon running as root. > I attach my version of audit.rules. > > > -- > Linux-audit mailing list > Linux-audit@redhat.com > https://www.redhat.com/mailman/listinfo/linux-audit