rules that are about to be added do not clash with any preexisting ones. The
auditctl -D
command is also used before doing an autrace to avoid having
the trace rules clash with any rules present in the
audit.rules
file.
❷
This rule deletes a system call rule. The
-d
option must precede any system call
rule that should be deleted from the rule queue and must match exactly.
❸
This rule tells audit to discard the rule with the directory watch on
/etc
from
the rules queue. This rule deletes any rule containing a directory watch on
/etc
regardless of any permission filtering or key options.
To get an overview of which rules are currently in use in your audit setup, run
auditctl -l
. This command displays all rules with one rule per line.
Example 30.6
Listing Rules with auditctl -l
LIST_RULES: exit,always watch=/etc perm=rx
LIST_RULES: exit,always watch=/etc/passwd perm=rwxa key=fk_passwd
LIST_RULES: exit,always watch=/etc/shadow perm=rwxa
LIST_RULES: entry,always syscall=mkdir
LIST_RULES: entry,always a1=4 (0x4) syscall=access
LIST_RULES: exit,always a0=2 (0x2) syscall=ipc
LIST_RULES: exit,always success!=0 syscall=open
NOTE: Creating Filter Rules
You can build very sophisticated audit rules by using the various filter options.
Refer to the
auditctl(8)
man page for more information about options
available for building audit filter rules and audit rules in general.
30.5 Understanding the Audit Logs
and Generating Reports
To understand what the aureport utility does, it is vital to know how the logs generated
by the audit daemon are structured and what exactly is recorded for an event. Only then
can you decide which report types are most appropriate for your needs.
Understanding Linux Audit
391
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......