On Tue, Oct 29, 2013 at 02:03:48PM +0530, Shinoj Gangadharan wrote:
Hi,
Has the log_passwd feature been backported to RHEL6.4 ?
No. It is part of RHEL6.5. My understanding is the kernel part should
work with RHEL6.4, but it will break the RHEL6.4 pam_tty_audit module of
pam (which needs to be updated anyways to get the new feature to work).
I can't speak to the ease of upgrading pam to the RHEL6.5 version while
still running essentially a RHEL6.4 system.
Regards,
Shinoj.
>> > >
>> > > The log_passwd feature has not been backported to RHEL5 because
>> > > the pam_tty_audit feature wasn't backported to RHEL5, so I would
>> > > have to say it is not supported in your system.
>> > >
>> > > An upgrade is necessary.
>> > >
>> > > > On Mon, Oct 7, 2013 at 8:13 PM, Richard Guy Briggs
>> > > > <rgb(a)redhat.com>
>> > >
>> > > wrote:
>> > > > > On Mon, Oct 07, 2013 at 10:30:24AM -0700, zhu xiuming
wrote:
>> > > > > > This is correct. The problem is, this records every
>> > > > > > keystrokes and even the password of the users. While I
>> > > > > > only care about the user command history, I surely do
not
>> > > > > > want to know their passwords.
>> > > > >
>> > > > > There is now support in the upstream kernel (3.10-rc1) and
>> > > > > in pam (1.1.8+) to not record passwords by default. If you
>> > > > > want the old behaviour, add the optional argument to
>> > > > > pam_tty_audit: "log_passwd"
>> > > > >
>> > > > > > On Sun, Oct 6, 2013 at 2:40 PM, Trevor Vaughan <
>> > >
>> > > tvaughan(a)onyxpoint.com
>> > >
>> > > > > >wrote:
>> > > > > > > Does pam_tty_audit with enable=* not do what you
want?
>> > > > > > >
>> > > > > > > Trevor
>> > > > > > >
>> > > > > > > On Sun, Oct 6, 2013 at 5:26 PM, zhu xiuming <
>> xiumingzhu(a)gmail.com>
>> > > > >
>> > > > > wrote:
>> > > > > > >> HI
>> > > > > > >> I know this seems an old topic. But
unfortunately, I
>> > > > > > >> can't find a solution for this. I have
googled long
>> > > > > > >> time. I tried following options:
>> > > > > > >> 1. audit execv syscall,
>> > > > > > >>
>> > > > > > >> this does record every command typed any
tty.
>> > > > > > >> However, it generates lots of noise.
Sometimes, the
>> > > > > > >> execv syscall is so frequently called that the
system
>> > > > > > >> can't afford to log every call of it and
it crashes
>> > > > > > >> !!!
>> > > > > > >>
>> > > > > > >> 2. use *pam_tty_audit.so
>> > > > > > >> *
>> > > > > > >> this makes it possible to record one or two
users, not
>> > > > > > >> all users.
>> > > > > > >> So, may I ask, is this problem solvable by
auditd or
>> > > > > > >> do I need other tools ?*
>> > > > > > >
>> > > > > > > Trevor Vaughan
>> > > > >
>> > > > > - RGB
>> > >
>> > > - RGB
- RGB
--
Richard Guy Briggs <rbriggs(a)redhat.com>
Senior Software Engineer
Kernel Security
AMER ENG Base Operating Systems
Remote, Ottawa, Canada
Voice: +1.647.777.2635
Internal: (81) 32635
Alt: +1.613.693.0684x3545