On Thursday 28 December 2006 16:58, Todd, Charles wrote:
 NISPOM 8-602 requires that CLOSE operations on security-relevant
objects be
 logged.  Well, I've got logging for OPEN on security-relevant objects (with
 the watches) working VERY well (yeah!!!).  The default CAPP.rules file had
 nothing about close(2),  
CAPP says nothing about this syscall other than the ability to audit it. Which 
you can get with "auditctl -a entry,always -S close", which admittedly is 
overkill.
 so just to test it, I ran: 
   auditctl -a entry,possible -S close
 and then as a normal user typed: cat /etc/group (which is a
 security-relevant object that I have permission to open, and thus
 eventually close) 
I'd want to see the accompanying watch for that file.
 However, when I review the audit files, nothing is logged.   
Hmm.
 If I change the "entry,possible" to
"entry,always" then lots of stuff gets
 logged, but not my actual opening of the /etc/group file. 
This would log all close system calls - even socket closes.
   There is only one other thing that could be a configuration issue:
 "auditctl -l |grep /etc/group" reveals an additional "perm=wa" field
 that is set by the -p option in CAPP.rules, but even if root writes to
 one of the watched files, close(2) is still not logged. 
I think that open is called with either read and/or write flag set. This is 
how it picks up an event for open. However, close is neither read nor write.
 Do I have a configuration problem or is something deeper going on?
Probably something deeper. I'd say you should open a support request so that 
it gets fixed. 
I think we'd also want to verify this for the current upstream kernels to make 
sure 
kernel.org kernels havethis solved. FC6 is probably new enough to test 
for that purpose.
-Steve