From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.8 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 41B8DC433E0 for ; Thu, 4 Mar 2021 16:05:53 +0000 (UTC) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id CD0C564E60 for ; Thu, 4 Mar 2021 16:05:52 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org CD0C564E60 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=tempfail smtp.mailfrom=linux-audit-bounces@redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1614873951; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:list-id:list-help: list-unsubscribe:list-subscribe:list-post; bh=yPviHKPIJJP7MQV41LAZBF5/69Q1UHRpySpVraNSuRw=; b=RDc0Jz2YaAvVLXA6Jd5Z2XAzwYD8O5lD8790yPzYLp796j7W7HPhaoDz78+00vYzcp6v+i 5OZA6kN+KiHbcYYA7LBHPTo58QzNsby6f0do33hmNsqvfkio9MWqyB51i75cIX5jW/nqtE nslFP605M7e4UdnJkiMeAw8Xqc3uKkU= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-163-LaUDDaYeNIuZMkr4Lrfrwg-1; Thu, 04 Mar 2021 11:05:49 -0500 X-MC-Unique: LaUDDaYeNIuZMkr4Lrfrwg-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 1FEEF10866A6; Thu, 4 Mar 2021 16:05:45 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E748D19C48; Thu, 4 Mar 2021 16:05:44 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 9685A57DC2; Thu, 4 Mar 2021 16:05:44 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 124G5goB021999 for ; Thu, 4 Mar 2021 11:05:42 -0500 Received: by smtp.corp.redhat.com (Postfix) id D5B9B1055085; Thu, 4 Mar 2021 16:05:42 +0000 (UTC) Received: from x2.localnet (ovpn-116-219.rdu2.redhat.com [10.10.116.219]) by smtp.corp.redhat.com (Postfix) with ESMTP id 89DEF10550A2; Thu, 4 Mar 2021 16:05:36 +0000 (UTC) From: Steve Grubb To: "linux-audit@redhat.com" Subject: Re: auditd daemon is changing /tmp permissions Date: Thu, 04 Mar 2021 11:05:34 -0500 Message-ID: <2572156.mvXUDI8C0e@x2> Organization: Red Hat In-Reply-To: References: MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-loop: linux-audit@redhat.com Cc: Ivan Castell X-BeenThere: linux-audit@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Linux Audit Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=linux-audit-bounces@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Hello, On Thursday, March 4, 2021 10:45:03 AM EST Ivan Castell wrote: > Just testing different versions of audit, discovered that version 2.8.5 and > 3.0.1 are changing permissions of /tmp from 1777 to 700. This is a problem > as normal non-root users can't write in /tmp after starting autitd. > > The problem is related with the daemon, as commenting this call: > > start-stop-daemon -S -q -p ${PIDFILE} --exec ${DAEMON} > > fixes the issue. > > It works fine on version 2.8.2. > > We fixed temporaly setting proper /tmp permissions after starting the > daemon: > > # Run audit daemon executable > start-stop-daemon -S -q -p ${PIDFILE} --exec ${DAEMON} > > if [ $? = 0 ]; then > # Load the default rules > test -f /etc/audit/rules.d/audit.rules && /usr/sbin/auditctl -R > /etc/audit/rules.d/audit.rules >/dev/null # Bugfix audit 2.8.5 (reported > and waiting for a patch!) > chmod 1777 /tmp > echo "OK" > else > echo "FAIL" > fi > > Could you provide a temporal patch for the daemon? Hmm... [audit-3.0.2]$ grep -rl start-stop-daemon * [audit-3.0.2]$ grep -rl 'test -f /etc/audit/rules.d/audit.rules' * [audit-3.0.2]$ I don't see this in the audit source code. Which file is this in? -Steve -- Linux-audit mailing list Linux-audit@redhat.com https://listman.redhat.com/mailman/listinfo/linux-audit