All of lore.kernel.org
 help / color / mirror / Atom feed
* Auditing only when auid and uid differ
@ 2013-10-09 16:28 Maupertuis Philippe
  2013-10-09 16:43 ` Steve Grubb
  0 siblings, 1 reply; 4+ messages in thread
From: Maupertuis Philippe @ 2013-10-09 16:28 UTC (permalink / raw)
  To: linux-audit


[-- Attachment #1.1: Type: text/plain, Size: 1721 bytes --]

I want to track what people are doing when then change their  userid.
Basically I would like to write :
-a exit,never -F arch=b32 -S all  -F auid=4294967295
-a exit,never -F arch=b64 -S all  -F auid=4294967295
-a exit,always -F arch=b32 -S all  -F auid>1000 -F uid!=auid -k userchange
-a exit,always -F arch=b64 -S all  -F auid>1000 -F uid!=auid -k userchange

However it seems that it's not a valid syntax.
Is there a way to achieve that.

Philippe


________________________________

Ce message et les pi?ces jointes sont confidentiels et r?serv?s ? l'usage exclusif de ses destinataires. Il peut ?galement ?tre prot?g? par le secret professionnel. Si vous recevez ce message par erreur, merci d'en avertir imm?diatement l'exp?diteur et de le d?truire. L'int?grit? du message ne pouvant ?tre assur?e sur Internet, la responsabilit? de Worldline ne pourra ?tre recherch?e quant au contenu de ce message. Bien que les meilleurs efforts soient faits pour maintenir cette transmission exempte de tout virus, l'exp?diteur ne donne aucune garantie ? cet ?gard et sa responsabilit? ne saurait ?tre recherch?e pour tout dommage r?sultant d'un virus transmis.

This e-mail and the documents attached are confidential and intended solely for the addressee; it may also be privileged. If you receive this e-mail in error, please notify the sender immediately and destroy it. As its integrity cannot be secured on the Internet, the Worldline liability cannot be triggered for the message content. Although the sender endeavours to maintain a computer virus-free network, the sender does not warrant that this transmission is virus-free and will not be liable for any damages resulting from any virus transmitted.

[-- Attachment #1.2: Type: text/html, Size: 4355 bytes --]

[-- Attachment #2: Type: text/plain, Size: 0 bytes --]



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Auditing only when auid and uid differ
  2013-10-09 16:28 Auditing only when auid and uid differ Maupertuis Philippe
@ 2013-10-09 16:43 ` Steve Grubb
  2013-10-10  7:12   ` Maupertuis Philippe
  2013-10-10  7:25   ` Maupertuis Philippe
  0 siblings, 2 replies; 4+ messages in thread
From: Steve Grubb @ 2013-10-09 16:43 UTC (permalink / raw)
  To: linux-audit; +Cc: Maupertuis Philippe

On Wednesday, October 09, 2013 06:28:49 PM Maupertuis Philippe wrote:
> I want to track what people are doing when then change their  userid.
> Basically I would like to write :
> -a exit,never -F arch=b32 -S all  -F auid=4294967295
> -a exit,never -F arch=b64 -S all  -F auid=4294967295
> -a exit,always -F arch=b32 -S all  -F auid>1000 -F uid!=auid -k userchange
> -a exit,always -F arch=b64 -S all  -F auid>1000 -F uid!=auid -k userchange
> 
> However it seems that it's not a valid syntax.
> Is there a way to achieve that.

Yes there is. It requires a newish kernel and user space. But the rules are like this:

-a always,exit  -F arch=b32 -S all -F auid!=4294967295 -C auid!=uid
-a exit,always -F arch=b32 -S all  -F auid>1000 -F auid!=4294967295 -C auid!=uid -k userchange

And the same for b64.

-Steve

^ permalink raw reply	[flat|nested] 4+ messages in thread

* RE: Auditing only when auid and uid differ
  2013-10-09 16:43 ` Steve Grubb
@ 2013-10-10  7:12   ` Maupertuis Philippe
  2013-10-10  7:25   ` Maupertuis Philippe
  1 sibling, 0 replies; 4+ messages in thread
From: Maupertuis Philippe @ 2013-10-10  7:12 UTC (permalink / raw)
  To: linux-audit

Thanks for the quick reply.
Unfortunately, I guess that a newish kernel means newer than those available on Redhat 5/6.
I tried on a 2.6.32-358.18.1 kernel and got "Multiple rule insert/delete operations are not allowed"

Philippe

-----Message d'origine-----
De : Steve Grubb [mailto:sgrubb@redhat.com]
Envoyé : mercredi 9 octobre 2013 18:43
À : linux-audit@redhat.com
Cc : Maupertuis Philippe
Objet : Re: Auditing only when auid and uid differ


On Wednesday, October 09, 2013 06:28:49 PM Maupertuis Philippe wrote:
> I want to track what people are doing when then change their  userid.
> Basically I would like to write :
> -a exit,never -F arch=b32 -S all  -F auid=4294967295 -a exit,never -F
> arch=b64 -S all  -F auid=4294967295 -a exit,always -F arch=b32 -S all
> -F auid>1000 -F uid!=auid -k userchange -a exit,always -F arch=b64 -S
> all  -F auid>1000 -F uid!=auid -k userchange
>
> However it seems that it's not a valid syntax.
> Is there a way to achieve that.

Yes there is. It requires a newish kernel and user space. But the rules are like this:

-a always,exit  -F arch=b32 -S all -F auid!=4294967295 -C auid!=uid -a exit,always -F arch=b32 -S all  -F auid>1000 -F auid!=4294967295 -C auid!=uid -k userchange

And the same for b64.

-Steve


Ce message et les pièces jointes sont confidentiels et réservés à l'usage exclusif de ses destinataires. Il peut également être protégé par le secret professionnel. Si vous recevez ce message par erreur, merci d'en avertir immédiatement l'expéditeur et de le détruire. L'intégrité du message ne pouvant être assurée sur Internet, la responsabilité de Worldline ne pourra être recherchée quant au contenu de ce message. Bien que les meilleurs efforts soient faits pour maintenir cette transmission exempte de tout virus, l'expéditeur ne donne aucune garantie à cet égard et sa responsabilité ne saurait être recherchée pour tout dommage résultant d'un virus transmis.

This e-mail and the documents attached are confidential and intended solely for the addressee; it may also be privileged. If you receive this e-mail in error, please notify the sender immediately and destroy it. As its integrity cannot be secured on the Internet, the Worldline liability cannot be triggered for the message content. Although the sender endeavours to maintain a computer virus-free network, the sender does not warrant that this transmission is virus-free and will not be liable for any damages resulting from any virus transmitted.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* RE: Auditing only when auid and uid differ
  2013-10-09 16:43 ` Steve Grubb
  2013-10-10  7:12   ` Maupertuis Philippe
@ 2013-10-10  7:25   ` Maupertuis Philippe
  1 sibling, 0 replies; 4+ messages in thread
From: Maupertuis Philippe @ 2013-10-10  7:25 UTC (permalink / raw)
  To: linux-audit

It does work on Redhat 6, it was my mistake.

Philippe

-----Message d'origine-----
De : Maupertuis Philippe
Envoyé : jeudi 10 octobre 2013 09:13
À : linux-audit@redhat.com
Objet : RE: Auditing only when auid and uid differ

Thanks for the quick reply.
Unfortunately, I guess that a newish kernel means newer than those available on Redhat 5/6.
I tried on a 2.6.32-358.18.1 kernel and got "Multiple rule insert/delete operations are not allowed"

Philippe

-----Message d'origine-----
De : Steve Grubb [mailto:sgrubb@redhat.com] Envoyé : mercredi 9 octobre 2013 18:43 À : linux-audit@redhat.com Cc : Maupertuis Philippe Objet : Re: Auditing only when auid and uid differ


On Wednesday, October 09, 2013 06:28:49 PM Maupertuis Philippe wrote:
> I want to track what people are doing when then change their  userid.
> Basically I would like to write :
> -a exit,never -F arch=b32 -S all  -F auid=4294967295 -a exit,never -F
> arch=b64 -S all  -F auid=4294967295 -a exit,always -F arch=b32 -S all
> -F auid>1000 -F uid!=auid -k userchange -a exit,always -F arch=b64 -S
> all  -F auid>1000 -F uid!=auid -k userchange
>
> However it seems that it's not a valid syntax.
> Is there a way to achieve that.

Yes there is. It requires a newish kernel and user space. But the rules are like this:

-a always,exit  -F arch=b32 -S all -F auid!=4294967295 -C auid!=uid -a exit,always -F arch=b32 -S all  -F auid>1000 -F auid!=4294967295 -C auid!=uid -k userchange

And the same for b64.

-Steve


Ce message et les pièces jointes sont confidentiels et réservés à l'usage exclusif de ses destinataires. Il peut également être protégé par le secret professionnel. Si vous recevez ce message par erreur, merci d'en avertir immédiatement l'expéditeur et de le détruire. L'intégrité du message ne pouvant être assurée sur Internet, la responsabilité de Worldline ne pourra être recherchée quant au contenu de ce message. Bien que les meilleurs efforts soient faits pour maintenir cette transmission exempte de tout virus, l'expéditeur ne donne aucune garantie à cet égard et sa responsabilité ne saurait être recherchée pour tout dommage résultant d'un virus transmis.

This e-mail and the documents attached are confidential and intended solely for the addressee; it may also be privileged. If you receive this e-mail in error, please notify the sender immediately and destroy it. As its integrity cannot be secured on the Internet, the Worldline liability cannot be triggered for the message content. Although the sender endeavours to maintain a computer virus-free network, the sender does not warrant that this transmission is virus-free and will not be liable for any damages resulting from any virus transmitted.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2013-10-10  7:25 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-10-09 16:28 Auditing only when auid and uid differ Maupertuis Philippe
2013-10-09 16:43 ` Steve Grubb
2013-10-10  7:12   ` Maupertuis Philippe
2013-10-10  7:25   ` Maupertuis Philippe

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.