home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!europa.asd.contel.com!darwin.sura.net!wupost!cs.utexas.edu!ut-emx!ibmchs!auschs!portal.austin.ibm.com!awdprime.austin.ibm.com!levell.austin.ibm.com!julie
- From: julie@levell.austin.ibm.com (Julie L. Craft)
- Newsgroups: comp.unix.aix
- Subject: Re: audit function with AIX
- Message-ID: <1992Aug25.223530.11576@awdprime.austin.ibm.com>
- Date: 25 Aug 92 22:35:30 GMT
- References: <9208241829.AA27176@lune.ccvr.fr>
- Sender: news@awdprime.austin.ibm.com (USENET News)
- Organization: IBM, Austin
- Lines: 58
-
- In article <9208241829.AA27176@lune.ccvr.fr> scos742@lune.ccvr.fr (lune MARTINEZ Philippe ) writes:
- >
- > I'm trying to set up auditing process. I have read the RED BOOK ELEMENTS OF
- >AIX SECURITY. Now, where can I find documentation on what parameters are available
- >and what they mean for the AIX auditing system event parameters.
- >
- > For example :
- > FILE_Mode = printf "mode: %d"
- >
- > This events is specified in the /etc/security/audit/events file for the
- >'chmod' command. When I look at the output from the 'auditpr' command, it reports
- >a number, but I don't know what that number represents (with a minimum of mind,
- >we can find the new acces mode !). But where can I find this information ? Are
- >there other parameters which can be specified for the 'chmod' event such as the
- >name of the file, the old permissions, the user which is doing the 'chmod', etc ?
-
- This is fixed with ix25928 (which is inside U406391 (The big one!!))
-
- You'll also need to add
-
- FILE_Mode = printf "mode: %d filename: %s"
-
- to your events file to get the filename to come out after you update.
-
- >
- > How can I get information on other event names for commands and events not listed
- >in the /etc/security/audit/events file ? It's certainly not difficult, for IBM, to
- >establish this list because the 'audit' command know all of these events. To check,
- >try to add to the events file your own event !
- >
-
- We're only going to audit what is already in the code. The auditing code
- has to be inside the command in order for the auditing subsystem to pick
- it up. If you want to make your own events for your own program, then you
- would have to put the code in your programs to call auditpr(), etc....
-
- > In term of security, the main thing is to know what we are doing. It's difficult
- >to learn this rule to users, when system's administrators don't do it ....
-
- It's hard to say what is the best thing to do in auditing. Getting too
- much information is sometimes worse than not getting enough, because you
- can go into "info overload" and not pay attention to what you get.
-
- >
- > If anybody have any experience with the auditing system, I should be glad to
- >have some feed-back.
-
- I only fix the stuff, I don't say that I like it :-) But, I think
- it will help on specific events.
-
- Later,
- Julie
-
- --
- *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
- Julie Levell Craft IBM AUSTIN,TX Internet: julie@aixwiz.austin.ibm.com
- IBMNET: JULIEL at AUSVM6 2F-007/903 (512) 838-2677 (Tie 678-2677)
- "I'm not getting defensive!"
-