Hey all,

Been asked from above to monitor and audit certain things on the system,
like logins, writes to say /etc/passwd, executing sudo.

It was relatively straight forward to set it up so ssh logins/logouts get a
audit syslog entry. (To be sent to another host for processing)

But when it comes to monitoring file-writes (as an example), I have set:

/etc/security/audit_control
flags:lo,ss,fw

/etc/security/audit_user
root:lo,fw:no
sysadm:fw:no
auditadm:fw:no
netadm:fw:no

Which does appear to work with: (using /tmp/test file instead of passwd for
testing).

$ echo hello >> /tmp/test

- write ok session 3799375861 by lundman as root:root obj /tmp/test

Fabulous - but I also get:

write ok session 3799375861 by lundman as root:root obj /.bash_history

open(2) - write,trunc ok session 3799375861 by lundman as root:root obj
/.bash_history

and that is an awfully large hammer.

Is there somewhere/how to reduce the audit down? No way to specify a list
of files to monitor? Or filter out what gets a syslog entry sent?

Is it only "all or nothing" in this case?

I can certainly run something like:

# auditreduce -o file=/tmp/test  |praudit

and only see entries for specific files. Is the answer to disable audit
log, and run carefully crafted "auditreduce" command from cron which will
produce audit syslog entries? That seems cumbersome and delayed.

Should I forget audit on the file access parts, and go with fswatcher to
send syslog entries?

Any insight? ideas?

Sincerely,

Lund

-- 
Jorgen Lundman       | <lund...@lundman.net>
Unix Administrator   | +81 (0)90-5578-8500
Shibuya-ku, Tokyo    | Japan


------------------------------------------
illumos: illumos-discuss
Permalink: 
https://illumos.topicbox.com/groups/discuss/T24246bde0d4cfedf-Mb5d7b23f0625f5cdd6b08b6d
Delivery options: https://illumos.topicbox.com/groups/discuss/subscription

Reply via email to