Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-5194

RFE: Create mechanism for systemctl stop auditd to audit the identity of user who run that systemctl

    • Medium
    • rhel-sst-security-special-projects
    • ssg_security
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • If docs needed, set a value
    • None

      Description of problem:

      With RHEL7, "RefuseManualStop=yes" is defined in auditd service unit. This prevents admins to restart auditd to reload rules for example.

      But there is a trick, using "service auditd restart" just works fine, the protection is hence very weak.
      There are also other ways to achieve this: "pkill -TERM auditd" then "systemctl start auditd".

      I think this "protection" should be removed from the unit file, it just annoys sysadmins and is definitely useless.

      Version-Release number of selected component (if applicable):

      audit-2.8.5 and later

              scorreia@redhat.com Sergio Correia
              rhn-support-rmetrich Renaud Métrich
              Sergio Correia Sergio Correia
              SSG Security QE SSG Security QE
              Votes:
              0 Vote for this issue
              Watchers:
              8 Start watching this issue

                Created:
                Updated:
                Resolved: