On Tuesday 23 September 2008 12:18:27 Fulda, Paul (Space Technology) wrote:
Can someone give me an example of how to audit the "date"
command in the
audit.rules file.
The "watch" style commands will not work. The audit system works at the
syscall level. So, under the hood, the audit system will place a rule on
execve, or open on your behalf. Neither of these are the actual syscall that
fails.
I would like for it to report only failures for a user using the
command.
Root using the command would report nothing. I can get this working for file
watches but not for executables using
strace is your friend. I ran a command that would fail and see something like
this:
write(3, "strace: exec: Permission denied\n"..., 32strace: exec: Permission
denied
) = 32
close(3) = 0
munmap(0x7f17fc707000, 4096) = 0
exit_group(1)
So, we should be able to place a rule on exit_group.
-a exit,always -S exit_group -F a0=1 -F auid>=500
But I'm really not sure this will give you good, quality results. You can
experiment and see. But the audit system is at the syscall level and not the
application level and that should always be taken into account.
-Steve