On Thursday 01 February 2007 09:59, Stephen Smalley wrote:
 > Assuming current generation of audit code...
 >
 > auditctl -a exit,always -F perm=w -F obj_type=sbin_t -k executables
 Hmmm...on FC6, that yields an error from auditctl:
 	key option needs a watch or syscall given prior to it 
Ooops, that should be:
auditctl -a exit,always -F perm=w -F obj_type=bin_t -F key=executable
 Dropping the -k option avoids the error message, but overwriting a
bin_t
 file doesn't generate any audit message.  Similarly, adding a -S open
 avoids the error message while retaining the -k, but overwriting a bin_t
 file doesn't generate any audit message.  Not sure where the problem
 lies there. 
OK, we should look into this.
 Also, he mentioned RHEL 4 as his platform, so I would tend to think
that
 his kernel and auditctl wouldn't support this anyway.   
If so, it won't.
 So he may be limited to using auditallow statements in policy, which
is
 certainly legitimate use of them (although I understand your goal of
 centralizing audit configuration). 
Well, not just centralizing configuration, but that its actually fit for its 
purpose. :)
-Steve