Novell LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009 Manual page 362

Hide thumbs Also See for LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009:
Table of Contents

Advertisement

This rule adds auditing to the access system call, but only but only if the second
argument of the system call (mode) is 4 (R_OK). entry,always tells audit to
add an audit context to this system call when entering it and write out a report as
soon as the call exits.
This rule adds an audit context to the IPC multiplexed system call. The specific
ipc system call is passed as the first syscall argument and can be selected using
-F a0=ipc_call_number.
This rule audits failed attempts to call open.
This rule is an example of a task rule (keyword: task). It is different from the
other rules above in that it applies to processes that are forked or cloned. To filter
these kind of events, you can only use fields that are known at fork time, such as
UID, GID, and AUID. This example rule filters for all tasks carrying an audit ID
of 0.
This last rule makes heavy use of filters. All filter options are combined with a
logical AND operator, meaning that this rule applies to all tasks that carry the
audit ID of 501, have changed to run as root, and have wheel as the group. A
process is given an audit ID on user login. This ID is then handed down to any
child process started by the initial process of the user. Even if the user changes
his identity, the audit ID stays the same and allows tracing actions to the original
user.
TIP: Filtering System Call Arguments
For more details on filtering system call arguments, refer to
tering System Call Arguments"
You can not only add rules to the audit system, but also remove them. Delete rules are
used to purge the rule queue of rules that might potentially clash with those you want
to add. There are different methods for deleting the entire rule set at once or for deleting
system call rules or file and directory watches:
Example 30.5 Deleting Audit Rules and Events
-D
-d entry,always -S mkdir
-W /etc
Clear the queue of audit rules and delete any preexisting rules. This rule is used
as the first rule in /etc/audit/audit.rules files to make sure that the
350
Security Guide
(page 390).
Section 32.6, "Fil-

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise desktop 11

Table of Contents