When security.audit.enable = false
is used, audit still outputs messages to the journal and dmesg.
Journal:
Jun 29 09:04:34 myhost audit[1683]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 pid=1683 comm="chromium" exe="/nix/store/bc7wghsaam5synw1s74m8aqw2y9lb9j6-chromium-51.0.2704.63/libexec/chromium/chromium" sig=0 arch=
Jun 29 09:04:34 myhost audit[1685]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 pid=1685 comm="chromium" exe="/nix/store/bc7wghsaam5synw1s74m8aqw2y9lb9j6-chromium-51.0.2704.63/libexec/chromium/chromium" sig=0 arch=
Dmesg:
[ 732.472688] audit: type=1326 audit(1467184112.529:264): auid=1000 uid=1000 gid=1000 ses=1 pid=1736 comm="chromium" exe="/nix/store/bc7wghsaam5synw1s74m8aqw2y9lb9j6-chromium-51.0.2704.63/libexec/chromium/chromium" sig=0 arch=c000003e syscall=273 compat=0 ip=0x7f6d5bc87684 code=0x50000
[ 769.465493] audit: type=1326 audit(1467184149.523:265): auid=1000 uid=1000 gid=1000 ses=1 pid=1739 comm="chromium" exe="/nix/store/bc7wghsaam5synw1s74m8aqw2y9lb9j6-chromium-51.0.2704.63/libexec/chromium/chromium" sig=0 arch=c000003e syscall=273 compat=0 ip=0x7f6d5bc87684 code=0x50000
[ 769.465669] audit: type=1326 audit(1467184149.523:266): auid=1000 uid=1000 gid=1000 ses=1 pid=1740 comm="chromium" exe="/nix/store/bc7wghsaam5synw1s74m8aqw2y9lb9j6-chromium-51.0.2704.63/libexec/chromium/chromium" sig=0 arch=c000003e syscall=273 compat=0 ip=0x7f6d5bc87684 code=0x50000
Option is disabled:
$ nixos-option security.audit.enable
Value:
false
Daemon is not running:
$ sudo systemctl status auditd.service
โ auditd.service
Loaded: not-found (Reason: No such file or directory)
Active: inactive (dead)
No audit daemon process is running, only the kernel process:
$ ps aux | grep audit
root 503 0.0 0.0 0 0 ? S 08:56 0:00 [kauditd]
me 1767 0.0 0.0 117036 2220 pts/2 S+ 09:12 0:00 grep --color=always audit
I encountered #13710 and tried to disable audit so that I wouldn't get all the messages chromium outputs. That's how I found this problem.
It seems audit is being worked on right now in #11864.
security.audit.enable = false;
to your /etc/nixos/configuration.nix
sudo nixos-rebuild switch
That is probably journald enabling it: https://github.com/systemd/systemd/issues/959. I suppose we should add an audit=0
kernel boot parameter if security.audit.enable = false
is set.
BTW, it'd probably be useful to consider disabling audit by default, as I'm not sure if it does anything useful by default, except printing those stupid message. Also especially so if the performance impact as described in https://fedorahosted.org/fesco/ticket/1311 occurs in our default configuration...
Until this is fixed the following lines will completely disable auditing:
security.audit.enable = false;
boot.kernelParams = [ "audit=0" ];
Audit is now off by default https://github.com/NixOS/nixpkgs/pull/17916
Most helpful comment
Until this is fixed the following lines will completely disable auditing: