* "echo" not logged in auditd @ 2019-10-29 3:27 杨海 2019-10-29 12:29 ` Richard Guy Briggs 2019-10-30 1:04 ` Steve Grubb 0 siblings, 2 replies; 3+ messages in thread From: 杨海 @ 2019-10-29 3:27 UTC (permalink / raw) To: linux-audit [-- Attachment #1.1: Type: text/plain, Size: 336 bytes --] Hi We are experiencing the same issue below, that "echo" cannot be logged in auditd. Would like to know some detailed explanation here, and understand in general what would NOT be in the scope of auditd log. https://serverfault.com/questions/871343/why-does-auditd-only-log-echo-when-i-use-the-absolute-path Regards Hai [-- Attachment #1.2: Type: text/html, Size: 421 bytes --] [-- Attachment #2: Type: text/plain, Size: 0 bytes --] ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: "echo" not logged in auditd 2019-10-29 3:27 "echo" not logged in auditd 杨海 @ 2019-10-29 12:29 ` Richard Guy Briggs 2019-10-30 1:04 ` Steve Grubb 1 sibling, 0 replies; 3+ messages in thread From: Richard Guy Briggs @ 2019-10-29 12:29 UTC (permalink / raw) To: 杨海; +Cc: linux-audit On 2019-10-29 11:27, 杨海 wrote: > Hi > > We are experiencing the same issue below, that "echo" cannot be logged in auditd. Would like to know some detailed explanation here, and understand in general what would NOT be in the scope of auditd log. > > https://serverfault.com/questions/871343/why-does-auditd-only-log-echo-when-i-use-the-absolute-path This explanation is pretty clear. The "shell builtin" means that whatever shell you are already using (bash, sh, ash, dash, zsh, ...) is the one running this command in the already-executing shell rather than starting a new kernel-tracked process (task). This would be similar to running python or perl in interactive mode and typing commands to one of those prompts. Once you have seen python or perl started as a new task, any commands native to either of those two interpreters would not start a new kernel-tracked task. To try to solve your issue you would need to track the invocation of every shell but not know what's running inside it, or use pam_tty_audit to track the keystrokes of that shell. You might also be able to monitor .bash_history for that account, but since the user is able to influence the configuration of bash history, it would not be reliable. > Regards > Hai - RGB -- Richard Guy Briggs <rgb@redhat.com> Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada IRC: rgb, SunRaycer Voice: +1.647.777.2635, Internal: (81) 32635 -- Linux-audit mailing list Linux-audit@redhat.com https://www.redhat.com/mailman/listinfo/linux-audit ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: "echo" not logged in auditd 2019-10-29 3:27 "echo" not logged in auditd 杨海 2019-10-29 12:29 ` Richard Guy Briggs @ 2019-10-30 1:04 ` Steve Grubb 1 sibling, 0 replies; 3+ messages in thread From: Steve Grubb @ 2019-10-30 1:04 UTC (permalink / raw) To: linux-audit Hello, On Monday, October 28, 2019 11:27:44 PM EDT 杨海 wrote: > We are experiencing the same issue below, that "echo" cannot be logged in > auditd. Would like to know some detailed explanation here, and understand > in general what would NOT be in the scope of auditd log. If the rule is on execve, then it only triggers on execve. If the shell handles it internally and never calls execve, then it cannot be audited by an execve rule. Note that strace will always call execve and thus search for /usr/bin/echo. Whereas bash will see it as an internal function and handle it all by itself. So, be aware strace can lie to you. There are a couple other commands like "kill" which bash will handle instead of using the app. -Steve -- Linux-audit mailing list Linux-audit@redhat.com https://www.redhat.com/mailman/listinfo/linux-audit ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2019-10-30 1:04 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2019-10-29 3:27 "echo" not logged in auditd 杨海 2019-10-29 12:29 ` Richard Guy Briggs 2019-10-30 1:04 ` Steve Grubb
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox