<html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><meta name="Generator" content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
p
        {mso-style-priority:99;
        mso-margin-top-alt:auto;
        margin-right:0cm;
        mso-margin-bottom-alt:auto;
        margin-left:0cm;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
        {mso-style-priority:34;
        margin-top:0cm;
        margin-right:0cm;
        margin-bottom:0cm;
        margin-left:36.0pt;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
span.EmailStyle19
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.EmailStyle20
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle23
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style></head><body lang="EN-IN" link="#0563C1" vlink="#954F72"><div class="WordSection1"><p class="MsoNormal"><span style="color:#1f497d">Hi Joshua,</span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span style="color:#1f497d">A few minor things for your consideration :</span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span lang="EN-US">10.2.3    Access to all audit trails</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">I’m not sure the best route to cover this one.  If I add a rule to watch /var/log/* for ‘wa’ actions, those logs are constantly being written to so that would be too noisy I believe. Does anyone know how I would form a rule that would fire when a file within /var/log is accessed directly by a user?  Also, if the user makes any manual changes, such as deleting a file or modifying its contents?</span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span style="color:#1f497d">Ensure that only root users have access to /var/log and you are already monitoring actions of users using pam_tty_audit etc. Additionally you are sending logs to remote servers which will ensure that logs are present on the remote server even if they are deleted locally. And since user actions are being monitored, you will also be able to know that logs were modified/deleted.</span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span lang="EN-US">10.2.7   </span><span style="color:#1f497d"></span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span style="color:#1f497d">In addition to what you have mentioned, I am sure you are already monitoring these using a FIM like OSSEC.</span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span style="color:#1f497d">Regards,</span></p><p class="MsoNormal"><span style="color:#1f497d">Shinoj.</span><span style="color:#1f497d"> </span></p><p class="MsoNormal"><span style="color:#1f497d"> </span></p><div><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm 0cm 0cm"><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span lang="EN-US" style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> <a href="mailto:linux-audit-bounces@redhat.com">linux-audit-bounces@redhat.com</a> [mailto:<a href="mailto:linux-audit-bounces@redhat.com">linux-audit-bounces@redhat.com</a>] <b>On Behalf Of </b>Joshua Ammons<br><b>Sent:</b> 15 January 2018 20:22<br><b>To:</b> <a href="mailto:linux-audit@redhat.com">linux-audit@redhat.com</a><br><b>Subject:</b> RE: auditd configuration for PCI DSS 10.2.x Compliance</span></p></div></div><p class="MsoNormal"> </p><p class="MsoNormal"><a name="_MailEndCompose"><span lang="EN-US">Hello All,</span></a><span lang="EN-US"></span></p><p class="MsoNormal"><span lang="EN-US"> </span></p><p class="MsoNormal"><span lang="EN-US">Just thought I’d give this one more shot to see if anyone had any comments on my prior message (see below)?  Any input you have would be greatly appreciated.  I won’t bother the group any more on this topic.</span></p><p class="MsoNormal"><span lang="EN-US"> </span></p><p class="MsoNormal"><span lang="EN-US">Thank you!</span></p><p class="MsoNormal"><span lang="EN-US"> </span></p><div><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#0071ce">Joshua Ammons</span></b><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:black"> </span></b><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Advanced SIEM Engineer, Cybersecurity </span></b></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Global Business Services</span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Office 479.204.4472 | Mobile 479.595.2291</span></p><p class="MsoNormal"><u><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#0071ce"><a href="mailto:Joshua.Ammons@walmart.com">Joshua.Ammons@walmart.com</a></span></u></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif""> </span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Walmart  </span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">805 Moberly Ln</span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Bentonville, AR  72716</span></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#0071ce">Save money. Live better.</span></b></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:black"> </span></b></p><p class="MsoNormal"><span lang="EN-US"><a href="https://walmart.facebook.com/groups/435932993428953/?fref=nf"><span style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#e7e6e6;text-decoration:none"><img border="0" width="156" height="37" id="_x0000_i1025" src="cid:image005.png@01D38ED4.3FFE2EB0"></span></a></span></p></div><p class="MsoNormal"><span lang="EN-US"> </span></p><div><div style="border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0cm 0cm 0cm"><p class="MsoNormal"><b><span lang="EN-US">From:</span></b><span lang="EN-US"> Joshua Ammons <br><b>Sent:</b> Thursday, January 11, 2018 4:33 PM<br><b>To:</b> '<a href="mailto:linux-audit@redhat.com">linux-audit@redhat.com</a>' <<a href="mailto:linux-audit@redhat.com">linux-audit@redhat.com</a>><br><b>Subject:</b> auditd configuration for PCI DSS 10.2.x Compliance</span></p></div></div><p class="MsoNormal"><span lang="EN-US"> </span></p><p class="MsoNormal"><span lang="EN-US">Hello,</span></p><p class="MsoNormal"><span lang="EN-US"> </span></p><p class="MsoNormal"><span lang="EN-US">I was wondering if anyone had any experience putting together an auditd configuration to meet PCI DSS 10.2.x requirements?  Below are the requirements and my thoughts for each one…if anyone has anything that they have done I’d love to hear it!</span></p><p class="MsoNormal"><span lang="EN-US"> </span></p><p class="MsoNormal"><span lang="EN-US">10.2.2    All actions taken by any individual with root or administrative privileges</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">Enable the pam_tty_audit.so shared library in /etc/pam.d/[su/sudo/sudo-i/su-l] files.</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">USER_TTY event type will contain all commands from privileged user.</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">Add following lines to /etc/audit/rules.d/audit.rules file:</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US"># Audit all actions by any individual with root or administrative privileges</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">-a exit,always -F arch=b64 -F euid=0 -S execve -k root-commands</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">-a exit,always -F arch=b32 -F euid=0 -S execve -k root-commands</span></p><p class="MsoListParagraph" style="margin-left:108.0pt"><span lang="EN-US" style="font-family:Wingdings">§</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">  </span><span lang="EN-US">EXECVE event type will contain all commands from user with elevated privileges.</span></p><p class="MsoListParagraph" style="margin-left:108.0pt"><span lang="EN-US" style="font-family:Wingdings">§</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">  </span><span lang="EN-US">Question: with the pam_tty_audit.so enabled, and those commands being logged to USER_TTY events…is this rule needed also?</span></p><p class="MsoNormal"><span lang="EN-US">10.2.3    Access to all audit trails</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">I’m not sure the best route to cover this one.  If I add a rule to watch /var/log/* for ‘wa’ actions, those logs are constantly being written to so that would be too noisy I believe. Does anyone know how I would form a rule that would fire when a file within /var/log is accessed directly by a user?  Also, if the user makes any manual changes, such as deleting a file or modifying its contents?</span></p><p class="MsoNormal"><span lang="EN-US">10.2.4    Invalid logical access attempts</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">Based on my understanding, this wouldn’t really be covered by auditd, but by the standard authpriv facility.  Anybody configure anything in auditd to cover this requirement?</span></p><p class="MsoNormal"><span lang="EN-US">10.2.5    Use of and changes to identification and authentication mechanisms—including but not limited to creation of new accounts and elevation of privileges—and all changes, additions, or deletions to accounts with root or administrative privileges</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">CRED_ACQ (sudo) and USER_AUTH (su) events should contain when a user sudo’s or su’s to privileged account.  My understanding is that these would not require any extra rules to be written.  However, I’m not quite sure how to handle the requirements to log creation of new accounts, and all changes, or deletions to accounts with root/admin privileges…any ideas? </span></p><p class="MsoNormal"><span lang="EN-US">10.2.6.   Initialization, stopping, or pausing of the audit logs</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">Auditd:</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">DAEMON_END events would indicate auditd was stopped.</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">DAEMON_START and SERVICE_START events would indicate when auditd initialized.</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">Anything else anybody would add here?</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">Rsyslog:</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">SERVICE_START event (unit=rsyslog) when rsyslog is initialized</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">SERVICE_STOP event (unit=rsyslog) when rsyslog is stopped</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">Anything else anybody would add here?</span></p><p class="MsoNormal"><span lang="EN-US">10.2.7    Creation and deletion of system- level objects</span></p><p class="MsoListParagraph" style="text-indent:-18.0pt"><span lang="EN-US" style="font-family:Symbol">·</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">         </span><span lang="EN-US">-w [DIRECTORY] –p wa rules for the directories below:</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/bin</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/sbin</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/usr/bin</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/usr/sbin</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/var/lib</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/usr/lib</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/usr/libexec</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/lib64</span></p><p class="MsoListParagraph" style="margin-left:72.0pt"><span lang="EN-US" style="font-family:"Courier New"">o</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">   </span><span lang="EN-US">/usr/lib64</span></p><p class="MsoListParagraph" style="margin-left:108.0pt"><span lang="EN-US" style="font-family:Wingdings">§</span><span lang="EN-US" style="font-size:7.0pt;font-family:"Times New Roman","serif"">  </span><span lang="EN-US">Would the above cover this requirement?  Any other suggestions here?</span></p><p class="MsoNormal"><span lang="EN-US"> </span></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#0071ce">Joshua Ammons</span></b><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:black"> </span></b><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Advanced SIEM Engineer, Cybersecurity </span></b></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Global Business Services</span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Office 479.204.4472 | Mobile 479.595.2291</span></p><p class="MsoNormal"><u><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#0071ce"><a href="mailto:Joshua.Ammons@walmart.com">Joshua.Ammons@walmart.com</a></span></u></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif""> </span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Walmart  </span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">805 Moberly Ln</span></p><p class="MsoNormal"><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif"">Bentonville, AR  72716</span></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#0071ce">Save money. Live better.</span></b></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Arial","sans-serif";color:black"> </span></b></p><p class="MsoNormal"><span lang="EN-US"><a href="https://walmart.facebook.com/groups/435932993428953/?fref=nf"><span style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#e7e6e6;text-decoration:none"><img border="0" width="156" height="37" id="Picture_x0020_2" src="cid:image006.png@01D38ED4.3FFE2EB0"></span></a></span></p><p class="MsoNormal"><span lang="EN-US"> </span></p></div></body></html>

<br>
<p style="margin:0px;color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;text-align:justify;background-color:rgb(255,255,255)"><b><u><span style="font-size:7.5pt;font-family:Verdana,sans-serif;color:black">DISCLAIMER</span></u></b><u><span style="color:black"> </span></u><u><span lang="EN-IN" style="color:black">: </span></u><u><span style="font-size:7.5pt;font-family:Verdana,sans-serif;color:black">The information and the attachments in this email may be confidential and legally privileged. Access to the contents of this message by anyone other than the intended recipient is unauthorized. If you are not the intended recipient, any disclosure , copying, or distribution of the message, or any action or omission taken by you in reliance on it, is prohibited and may be unlawful. If you have received this email message in error, please notify the sender immediately by email, facsimile, or telephone, and then delete/destroy the original message and all copies of it from your systems.</span></u><span lang="EN-IN" style="color:black"></span></p><p style="margin:0px;color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;text-align:justify;background-color:rgb(255,255,255)"><span style="font-size:7.5pt;font-family:Verdana,sans-serif;color:black"> </span><span lang="EN-IN" style="color:black"></span></p><p style="margin:0px;color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;text-align:justify;background-color:rgb(255,255,255)"><u><span style="font-size:7.5pt;font-family:Verdana,sans-serif;color:black">Wave Crest cannot guarantee this email communication and associated attachments to be free of malicious code and assumes no liability for any loss or injury resulting from the contents of the message. </span></u><u style="font-size:12.8px"><span style="font-size:7.5pt;font-family:Verdana,sans-serif;color:black">The views expressed may not necessarily be those of </span></u><span style="font-family:Verdana,sans-serif;font-size:10px;text-decoration:underline">Wave Crest</span><u style="font-size:12.8px"><span style="font-size:7.5pt;font-family:Verdana,sans-serif;color:black">, and unless otherwise noted in the text of the message, the message may not reflect official policy.</span></u></p>