Bug 1455598

Summary: Default port is wrong in audisp-remote.conf
Product: Red Hat Enterprise Linux 7 Reporter: David Jones <david.jones74>
Component: auditAssignee: Steve Grubb <sgrubb>
Status: CLOSED ERRATA QA Contact: Ondrej Moriš <omoris>
Severity: medium Docs Contact:
Priority: medium    
Version: 7.3CC: omoris
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: audit-2.8-1.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-04-10 12:18:47 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1476406    

Description David Jones 2017-05-25 14:47:46 UTC
Description of problem:
The default audisp-remote.conf file uses port 60 as the default. However, /etc/services has port 48 listed for auditd. It makes sense to use this port as the default.


Version-Release number of selected component (if applicable):
2.6.5

How reproducible:
always

Steps to Reproduce:
1. grep port /etc/audisp/audisp-remote.conf
2. grep auditd /etc/services
3.

Actual results:


Expected results:


Additional info:

Comment 2 Steve Grubb 2017-05-26 17:49:21 UTC
If you use 48, then you are supposed to adhere to the defined a protocol for that port. I have no idea what the traffic on port 48 looked like when digital was still alive. What we did was use port 60 which IANA lists as unassigned. This is in both client and server and in the selinux policy. Maybe at some point I'll apply for the port 60 assignment. I'm not really inclined to change the number without a whole lot more digging into it.

Comment 3 David Jones 2017-05-26 18:48:11 UTC
Ok. It was confusing because there was no default set for tcp_listen_port, and /etc/services had port 48. Also, there was nothing specified in the man-pages, that I could find. So it would be good if the documentation were updated to reflect this, and perhaps /etc/services updated as well.

Comment 4 Steve Grubb 2017-07-30 15:58:53 UTC
The fix would be to put a default port in auditd.conf and add a firewalld config file.

Comment 5 Steve Grubb 2017-09-21 22:01:01 UTC
This should be fixed by upstream commit dd0fdc9 which is scheduled for audit-2.8.

Comment 6 Ondrej Moriš 2017-10-04 11:26:40 UTC
(In reply to Steve Grubb from comment #4)
> The fix would be to put a default port in auditd.conf and add a firewalld
> config file.

Steve, could you explain more that firewalld config file? Is is tracked somewhere?    Is it actually needed? Anyone using firewalld and network communication should keep track of what ports needs to be opened himself.

Comment 7 Steve Grubb 2017-10-04 12:49:11 UTC
It needs an audit.xml file like this:

<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>Audit</short>
  <description>The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.</description>
  <port protocol="tcp" port="60"/>
</service>

Not sure if audit should own this is firewalld. This is not a major problem. It just makes things more clear what is intended.

Comment 8 Steve Grubb 2017-10-10 20:00:47 UTC
audit-2.8-1.el7 was built to resolve this issue.

Comment 10 Ondrej Moriš 2017-11-03 12:18:28 UTC
(In reply to Steve Grubb from comment #7)
> It needs an audit.xml file like this:
> 
> <?xml version="1.0" encoding="utf-8"?>
> <service>
>   <short>Audit</short>
>   <description>The Linux Audit subsystem is used to log security events.
> Enable this option, if you plan to aggregate audit events to/from a remote
> server/client.</description>
>   <port protocol="tcp" port="60"/>
> </service>
> 
> Not sure if audit should own this is firewalld. This is not a major problem.
> It just makes things more clear what is intended.

Ah, I see. AFAIK firewalld owns these files and hence I filed BZ#1509255.

Comment 14 errata-xmlrpc 2018-04-10 12:18:47 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:0760