On Thu, Mar 2, 2023 at 12:24 PM Lenny Bruzenak <le...@magitekltd.com> wrote:
> On 3/1/23 22:13, Anurag Aggarwal wrote:
>>
>> Or if selinux is in force, create policy for the events you definitely want, 
>> then look for those types (either subject or object) in your rule. This is 
>> something I've seen before, where renames that are desired to be audited use 
>> the provided system tools, but for locally developed application code, they 
>> are made to run inside a certain type of a custom executable and then that 
>> type is excluded from the rename syscall rule. Ideally, the code which is 
>> written would self-audit a 1-liner like "I am going to rename every file 
>> under dir /opt/special/stuff/" using audit_log_user_message so you still 
>> have some idea what is happening (if you care).
>>
>> Then your "my-rename" program subject type of my_rename_t can be used as an 
>> exclude on the rule. Of course, the caller must then know to use this rather 
>> than the standard utilities.
>
>
> This sounds useful and might solve our problem, will it be possible to share 
> some examples on how this can be achieved?
>
> Replying off-list as it is not specifically audit-focused. See Paul, I CAN 
> learn. 😁

 ;)

-- 
paul-moore.com

--
Linux-audit mailing list
Linux-audit@redhat.com
https://listman.redhat.com/mailman/listinfo/linux-audit

Reply via email to