Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Sun Mar 09, 2008 5:31 pm 
Offline
Senior Newbie

Joined: Tue Mar 04, 2008 10:50 pm
Posts: 5
It appears that the kernel Linode is using was compiled with CONFIG_AUDITSYSCALL disabled while CentOS requires it, causing hourly error messages in /var/log/secure:

crond[7824]: pam_loginuid(crond:session): set_loginuid failed opening loginuid

A good explanation of why can be found here:

http://etbe.coker.com.au/2008/01/16/differences-between-distribution-kernels/

The suggestion in the article above concludes that "The fact that Etch has no user-space support for the auditing features in question (auditing system calls or setting the loginuid) was never a good reason for not enabling this feature (IMHO)."

Therefore, can the next kernel build include CONFIG_AUDIT (basic audit infrastructure) and CONFIG_AUDITSYSCALL (system-call auditing support)?

If not, then in CentOS, people probably need to disable pam_loginuid from PAM for example, comment out all lines in all files in /etc/pam.d such as atd, crond, login, remote, sshd that refer to pam_loginuid.so:

Code:
#session required pam_loginuid.so


Note that running authconfig (or authconfig-tui or authconfig-gtk) overwrites these files and you'll have to comment the lines out again afterward.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group