Hi folks,

<n00b alert>

I have auditing for outbound connect requests working using the Connect (sys_connect) syscall on a server running Ubuntu precise 12.04 LTS.

The rule I'm using is:

-a exit,always -F arch=b64 -S connect -k network_outbound


I'm getting a substantial amount of saddr=0100.... logs, which I understand are not  connections to a remote host but rather a local AF_UNIX socket pointing to a file. Example log message is:
 


type=SYSCALL msg=audit(1423002916.796:24545371): arch=c000003e syscall=42 success=no exit=-2 a0=294 a1=7fff97f62680 a2=6e a3=7fff97f62860 items=0 ppid=20546 pid=21439 auid=4294967295 uid=33 gid=33 euid=33 suid=33 fsuid=33 egid=33 sgid=33 fsgid=33 tty=(none) ses=4294967295 comm="apache2" exe="/usr/lib/apache2/mpm-prefork/apache2" key="network_outbound" 
type=SOCKADDR msg=audit(1423002916.796:24545371): saddr=0100<truncated to remove the hex-encoded file path>

Is there an easy way to filter these out so that we only have saddr=0200... messages left? 

I'm exporting the log to an external syslog server and it would help considerably if I could eliminate this from all of our servers.

I see that auditctl has a filetype filter which can be set to filter socket or file types. Is that the right way to filter these messages?

-a exit,always -F arch=b64 -F filetype=socket -S connect -k network_outbound

The above rule filters out everything but the af_unix connect syscalls, which is the opposite of what I'm looking for.

Any help would be appreciated.

Thanks,
Farhan