On Tuesday 23 September 2008 12:18:27 Fulda, Paul (Space Technology) wrote: > Can someone give me an example of how to audit the "date" command in the > audit.rules file.
The "watch" style commands will not work. The audit system works at the syscall level. So, under the hood, the audit system will place a rule on execve, or open on your behalf. Neither of these are the actual syscall that fails. > I would like for it to report only failures for a user using the command. > Root using the command would report nothing. I can get this working for file > watches but not for executables using strace is your friend. I ran a command that would fail and see something like this: write(3, "strace: exec: Permission denied\n"..., 32strace: exec: Permission denied ) = 32 close(3) = 0 munmap(0x7f17fc707000, 4096) = 0 exit_group(1) So, we should be able to place a rule on exit_group. -a exit,always -S exit_group -F a0=1 -F auid>=500 But I'm really not sure this will give you good, quality results. You can experiment and see. But the audit system is at the syscall level and not the application level and that should always be taken into account. -Steve -- Linux-audit mailing list [email protected] https://www.redhat.com/mailman/listinfo/linux-audit
