On Thursday 24 May 2007 11:32, Simmons Jr,Felix wrote:
>> AUDIT_WATCH_LIST: dev=104:2, path=/var/tmp/important_test,
>> filterkey=test-file, perms=wa, valid=0
>
>This seems slightly odd output. What kernel and audit package are you
> using?
audit-1.0.14-1.EL4 (I know it's a little old but its what we already
rolled out in our distro from redhat).
As far as kernel - 2.6.9-42.0.10.Elsmp (I'm on 64-bit architecture).
OK, I guess its been a while since I saw what came out of the RHEL4 rule
listing.
>Yes, I am working on a IDS/IPS system, too. But it doesn't
use the
logs, rather it uses the realtime interface so it can react in realtime.
I made a
>presentation about it at the Red Hat Summit a couple weeks ago and put
> my presentation here:
Thanks again, I'll give your recommendation a try.
Regarding RHEL4, the audit-1.0.15 package has the realtime interface. It does
not have an event dispatcher yet, but it will use the one we settle on for
RHEL5.1. In the meantime, there is a program, skeleton.c in the audit package
that you can use to write your own event collector.
Also, the rules I gave you to exclude audit events do not work on the RHEL4
kernel. So, writing a program to process only interesting events would be
your best option on RHEL4 and then disregard the logs altogether.
So I take it by reacting realtime as the event is processed by auditd
and
the event dispatcher it eliminates the potential for an event to be missed
due to buffering or some other reason for the event not making it to the
audit.log quick enough.
I suppose, but there is very little memory allocating done in the audit
daemon. What I consider the most important feature of the realtime interface
is that it allows you to write a program to get the events as they occur and
do something with them. You do not have to write a cron job which would be
slow to react or do something like tail which doesn't work when the logs get
rotated.
Interesting, that then almost makes it so the audit.log can be
rotated out a
lot quicker and the true important events stored in the ids system.
Sure. You can also tell the audit daemon not to log anything to disk if you
really trust the realtime path, too.
-Steve