On Monday, May 20, 2013 11:04:30 AM John Barnes wrote: > I set up 4 simple audit rules using audictl: > > auditctl -w "/path/to/my/bin0" -p x > auditctl -w "/path/to/my/bin1" -p x > > The rules were applied and show in auditctl -l. I tested them and > they successfully log the execution of both binaries. > > However the rules were mysteriously flushed with only > the following available in ausearch -m CONFIG_CHANGE: > > time->Sat May 18 00:03:19 2013 > > type=CONFIG_CHANGE msg=audit(1368831799.081:466947): auid=4294967295 > ses=4294967295 op="remove rule" path="/path/to/my/bin0" key=(null) list=4 > res=1 > > time->Sat May 18 00:03:19 2013 > > type=CONFIG_CHANGE msg=audit(1368831799.081:466948): auid=4294967295 > ses=4294967295 op="remove rule" path="/path/to/my/bin1" key=(null) list=4 > res=1 > > The uid doesn't match any known user so I presume these are initiated by > the kernel.
Yes, these are -1, which is unset. This event is created by the kernel. > The system wasn't under any pressure at the time (mem/load > average fine), there was plenty of disk space available in all volumes, and > the auditd was not restarted and the logs were not rotated. > > Is there anything that can cause the rules to be flushed in this way? It's > a little concerning that they've just disappeared. I think if your file is deleted, then it removes the associated rule. -Steve -- Linux-audit mailing list [email protected] https://www.redhat.com/mailman/listinfo/linux-audit
