Audit firewall changes in RHEL 8

2020-12-04 Thread Smith, Gary R
Good afternoon, I have RHEL 7 systems set up to emit audit records when the firewall rules with iptables change. I do it with a single audit command: -a always,exit -F arch=b64 -S setsockopt -F a2=0x40 -F key=IPTablesChange And it works great. I get audit logs like this: type=PROCTITLE msg=aud

Number of TTY events vs Number of USER_TTY events

2019-08-07 Thread Smith, Gary R
Good afternoon, I have TTY auditing set up on a number of hosts using pam_tty_audit for the root account. I have this line in a PAM file to enable it: session required pam_tty_audit.so disable=* enable=root In looking at the reports from aureport and ausearch, the number of TTY events is alw

BSides Portland - The Linux Audit Framework

2015-10-22 Thread Smith, Gary R
Hello All, I was at the BSides Portland security conference last weekend and I gave a presentation called “The Linux Audit Framework” there. I have put up the slides from the presentation on slideshare. I have also put up a file that implements the Center for Internet Security RHEL 6 Benchmark

Re: Configuration file monitoring - reporting content changes

2015-07-20 Thread Smith, Gary R
Hello Burn, Have you considered iwatch (no, not the Apple wrist gadget). It monitors files and can alert on a large set file conditions. Check out this man page at: http://manpages.ubuntu.com/manpages/utopic/man1/iwatch.1.html Best regards, Gary Smith On 7/20/15 4:56 AM, Burn Alting wrote: > Al

Re: Audit class/lab

2015-07-16 Thread Smith, Gary R
Hi Steve, Any chance that your presentation would get recorded for later viewing by those of us who have no budget for travel at the end of the fiscal year? Best regards, Gary Smith On 07/15/2015 03:22 PM, Steve Grubb wrote: > Hello, > > I normally don't put the word out about speeches I give,

RE: how to use auditd to record all user command history

2013-10-09 Thread Smith, Gary R
Hi, What's the "best way to do it" is dependent on your system. That said, I can offer two non-audit suggestions. One I call the "Old Shell Game". Stick this bash code in in the appropriate system wide bash file: function log { typeset x x=$(history 1 | cut -f 5-) logger -p daemon.notice -

Re: explanation/translation of auditd exit codes

2013-05-01 Thread Smith, Gary R
Hi Chad, How are you looking at the syscall events? This is one case where grep is not your friend. Try using ausearch instead. Here's a syscall that failed and the log record was extracted with ausearch -a 1689093 where 1689093 is the audit id: type=SYSCALL msg=audit(1367438345.734:1689093): arc

RE: Problems with command args

2010-09-16 Thread Smith, Gary R
Hi Jure, Presuming you've captured the audit records you're interested in a file named snorf, you could do something like this: cat snorf | awk -F\= '{print $8 "0A"}' | xxd -r -p In the example you had in the email, arg4 turns out to be: strbegins(thread_id,"thread_id=2369892f") Best regards

Crashes with a page fault on audit_prune_tree

2010-06-21 Thread Smith, Gary R
Hi all, I've seen a several systems crash with what appears to a page fault on audit_prune_tree. The systems are 2.6.18-164.11.1.el5 and audit-1.7.17-3.el5. I've seen crashes with traces like this: crash> bt PID: 16570 TASK: 810108f447a0 CPU: 6 COMMAND: "audit_prune_tre" #0 [81012e

RE: Problem with auditd/SnareLinux on RHEL 5.3 - auditd glomming memory

2009-02-19 Thread Smith, Gary R
he excessive memory glomming I've seen. Best regards, Gary Smith -Original Message- From: Steve Grubb [mailto:sgr...@redhat.com] Sent: Thursday, February 05, 2009 8:33 AM To: linux-audit@redhat.com Cc: Lucas C. Villa Real; Smith, Gary R Subject: Re: Problem with auditd/SnareLinux on

Problem with auditd/SnareLinux on RHEL 5.3 - auditd glomming memory

2009-02-04 Thread Smith, Gary R
Hello All, I have some systems that have just been updated to from RHEL 5.2 to RHEL 5.3. The version of auditd is 1.7.7 and SnareLinux is 1.5.0. Some time after the update ran, I noticed that the amount of free memory on the systems had dramatically gone down. Running top, I saw that auditd had s