similar to: Auditd fails to start : Connection refused

Displaying 20 results from an estimated 600 matches similar to: "Auditd fails to start : Connection refused"

2009 Jun 02
1
how to disable lots of auditd messages?
hello all. My system is centos 5.x and there is no module related auditd there is no process(daemon) related auditd and selinux definately disabled. But I can see lots of auditd messages like below. Oct 20 02:01:01 linux kernel: type=1106 audit(1224435661.064:65210): user pid=25860 uid=0 auid=0 msg='PAM: session close acct="root" : exe="/usr/sbin/crond" (hostname=?,
2010 Apr 02
0
Watching a file using auditd
Hi, I am using auditd to monitor files for changes (read and write actually). I found that when auditd is running, it will correctly report files that are read, but will not report changes to a file that is being monitored. But if I stop auditd and load audit rules using auditctl, it will work as expected. Here's the audit rule: -w /tmp/audit-test -p rw -k __monitored__ What am I missing
2009 Aug 25
1
logcheck vs auditd
Hello, I was just looking into parsing some various logs to get notified when my application is not behaving correctly. Logcheck seems like the right tool but then I also notice auditd which is another log monitoring/reporting tool. Can someone explain if these two tools serve similar purposes or do they each have a different purpose? I've done a bit of reading but figure someone here
2010 Jun 27
0
Stop auditd logging all commands
Hello everyone, I have this box where auditd is logging every command typed on the system onto: /var/log/audit/audit.log Every line looks like: type=USER_TTY msg=audit msg=audit(124433....<snip> msg="command here" ... The strange thing is that I have other similar boxes and I don't see this behavior. I don't see any option in /etc/audit/* or any PAM module triggering
2011 Jan 18
0
OT: Some examples about using auditd
Hi all, I need to do some tests about auditd funcionalities on two CentOS5.5 hosts. I need to audit when user executes sudo command, when system files are modified, when some process call to some system calls, when kernel semaphores are modified, etc. I see some examples on /usr/shae/doc/audit-x.x.x, but I will know if someone has more complet audit.rules. Can somebody share some
2020 Sep 14
0
Auditd NETFILTER_PKT record missing src port, dst port
Dear team The auditd log for NETFILTER_PKT event does not contain the src port , desination port , in and out interface . Has it been removed permanently ( https://patchwork.kernel.org/patch/9638183/) or can it be enabled by some configuration by auditctl ? centos version : CentOS Linux release 7.6.1810 (Core) out kernel version : Linux version 3.10.0-1127.8.2.el7.x86_64 (
2007 Dec 22
1
Debug symbols for CentOS server
is there a repository of build symbols for the various packages i have installed on my CentOS 5 server? here's a use case - i'm developing an apache/httpd plugin module - it's not loading properly - i want to run apache in single-process mode (httpd -X), attach gdb to it, set a break point just before my module is loaded, and step through the code to find out why my module is
2004 Dec 13
1
Status of Sun BSM/Auditd Support ?
Hey folks, About a year ago it was pointed out to me there was BSM support in CVS that would hopefully make it into a release soon. I had a look over it and it looks like it covers everything (it certainly covers more than the 3 or 4 things we do here at USC). So I'm wondering what the status of that is? Is it planned for a release soon? Are there issues with it? This is a really big feature
2005 Jun 02
0
auditd logs
I've noticed my disk space filling up rapidy on my mail server, I noticed that /var/log/audit.d is using 2.1 G. Is it safe to remove those log files?
2004 Jul 22
2
Potential Patch
Hey folks, Here at USC we have a few changes we make to the source code for various reasons -- and we have to make them for each new version. I always shrugged off sending a patch in because the changes felt very internal, but the more I think about it, the more I think perhaps they would be good for the main tree. Additionally, the more of this that gets into the main tree the easier upgrades
2006 Jun 05
0
Heads up: OpenBSM 1.0a6, per-auditpipe preselection imported to CVS (fwd)
FYI for those working with audit and intrusion detection on FreeBSD. Robert N M Watson ---------- Forwarded message ---------- Date: Mon, 5 Jun 2006 17:01:04 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: current@FreeBSD.org Cc: trustedbsd-audit@TrustedBSD.org Subject: Heads up: OpenBSM 1.0a6, per-auditpipe preselection imported to CVS This is a heads up to current@ users
2013 Apr 30
0
httpd writes much to /var? How to audit it properly?
Hi All. I currently use: Apache/2.2.21 on: 2.6.32-279.9.1.el6.centos.plus.x86_64 CentOS release 6.3 (Final) >From time to time (it happenes on different machines) I have a very high load up to 100, and I see that there are up to 300/s writes to /var at the same time. Apache restart solves the problem. I would like to know the reason so I decided to use auditd. I've used: auditctl -w /var
2015 Jul 23
0
rsyslog.conf
Jonathan Billings wrote: > On Thu, Jul 23, 2015 at 01:19:44PM -0400, m.roth at 5-cent.us wrote: >> I really am going crazy, trying to deal with the hourly logs from the >> loghost. We've got 170+ servers and workstations... but a *very* large >> percentage of what's showing up is from his bloody new fedora 22, with >> its >> idiot systemd logging of *ever*
2011 Jun 01
3
puppet and environments ... need help
I''m trying to use environments and seem to be failing. Right now I have 4 defined environments: production, cat, development, beta They are defined as follows on my puppetmaster: cat /etc/puppet/puppet.conf [main] pluginsync = true vardir = /var/lib/puppet manifest = /etc/puppet/environments/production/site.pp modulepath = /etc/puppet/environments/production/modules [master] reports =
2006 May 04
3
Please explain me this ruby code...
Hi all, This is small code from typo 2.6.0''s "articles_helper.rb" file ================================ def author_link(article) if config[''link_to_author''] and article.user and article.user.email.to_s.size>0 "<a href=\"mailto:#{article.user.email}\">#{article.user.name}</a>" elsif article.user and
2015 Jul 23
2
rsyslog.conf
On Thu, Jul 23, 2015 at 01:19:44PM -0400, m.roth at 5-cent.us wrote: > I really am going crazy, trying to deal with the hourly logs from the > loghost. We've got 170+ servers and workstations... but a *very* large > percentage of what's showing up is from his bloody new fedora 22, with its > idiot systemd logging of *ever* selinux message to /var/log/messages. systemctl enable
2011 May 30
0
logcheck rules submission
Hi, please add the following rule to the logcheck database: For package/daemon auditd: ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ auditd\[[[:digit:]]+\]: Audit daemon rotating log files$ Log line as system event: May 31 11:41:11 localhost auditd[2594]: Audit daemon rotating log files Regards Till
2015 Jan 24
0
find out who accessed a file
Hey guys, Unless you're using auditd (or a similar service) to watch the file, no. You could probably use the logs and `last` to see who was logged in at the time and make a guess. Also, you can look into shell history files (though that might be cleaned by users). Admin is allowed to do that when investigates incident. One more thing: if "access" constitutes execution of that
2008 Jan 06
1
Iptables and impersonating another O/S
i have a CentOS 5.1 server running sshd (exposed to the outside world). i'd like to use iptables to fool nmap into thinking i'm running another O/S. e.g.: iptables -t mangle -A PREROUTING -d 192.168.0.64 -j PERS \ --tweak dst --local --conf /etc/personalities/macos9.conf iptables -t mangle -A OUTPUT -d 192.168.0.64 -j PERS \ --tweak src --local --conf
2016 Feb 02
2
[Bug 93968] New: BUG in nouveau_fbcon_sync()
https://bugs.freedesktop.org/show_bug.cgi?id=93968 Bug ID: 93968 Summary: BUG in nouveau_fbcon_sync() Product: xorg Version: unspecified Hardware: x86-64 (AMD64) OS: Linux (All) Status: NEW Severity: normal Priority: medium Component: Driver/nouveau Assignee: nouveau at