home *** CD-ROM | disk | FTP | other *** search
/ IRIX Base Documentation 2001 May / SGI IRIX Base Documentation 2001 May.iso / usr / share / catman / a_man / cat1 / sat_echo.z / sat_echo
Encoding:
Text File  |  1998-10-20  |  5.4 KB  |  133 lines

  1.  
  2.  
  3.  
  4. ssssaaaatttt____eeeecccchhhhoooo((((1111MMMM))))                                                      ssssaaaatttt____eeeecccchhhhoooo((((1111MMMM))))
  5.  
  6.  
  7.  
  8. NNNNAAAAMMMMEEEE
  9.      sat_echo - echo standard input into the system audit trail
  10.  
  11. SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
  12.      ssssaaaatttt____eeeecccchhhhoooo { ----FFFF | ----SSSS } _s_a_t_e_v_e_n_t
  13.  
  14. DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
  15.      _s_a_t__e_c_h_o inserts the data from its standard input into the system audit
  16.      trail.  (Only the first 65535 bytes of standard input are used; the rest
  17.      are discarded.)  Use _s_a_t__e_c_h_o in shell scripts that enforce security
  18.      policy and must generate audit records.
  19.  
  20. OOOOPPPPTTTTIIIIOOOONNNNSSSS
  21.      Either ----FFFF or ----SSSS must be supplied, but not both at once.  _s_a_t_e_v_e_n_t is a
  22.      required argument.
  23.  
  24.      The options are:
  25.  
  26.      ----FFFF         The action described by this audit record _f_a_i_l_e_d.
  27.  
  28.      ----SSSS         The action described by this audit record _s_u_c_c_e_e_d_e_d.
  29.  
  30.      _s_a_t_e_v_e_n_t   The printed representation of an audit event type, as
  31.                 described in _s_a_t__s_t_r_t_o_e_v_e_n_t(3).  If you want to customize the
  32.                 audit trail with the addition of event types specific to your
  33.                 site, use the _s_a_t__a_e__c_u_s_t_o_m event type.  If you need to
  34.                 distinguish between different types of _s_a_t__a_e__c_u_s_t_o_m events,
  35.                 structure the event specific data so that it begins with a
  36.                 sub-event type.
  37.  
  38. EEEEXXXXAAAAMMMMPPPPLLLLEEEE
  39.      Suppose a site security officer (SSO) wanted to make sure that the
  40.      auditor was made aware of any changes to system databases in /_e_t_c.  After
  41.      the system was installed, the SSO would have created a master file
  42.      describing the /_e_t_c tree.
  43.  
  44.           _ffff_iiii_nnnn_dddd _////_eeee_tttt_cccc _----_pppp_rrrr_iiii_nnnn_tttt _|||| _xxxx_aaaa_rrrr_gggg_ssss _llll_ssss _----_dddd_llll_MMMM _>>>> _////_vvvv_aaaa_rrrr_////_aaaa_dddd_mmmm_////_eeee_tttt_cccc_----_mmmm_aaaa_ssss_tttt_eeee_rrrr
  45.  
  46.      A shell script is run nightly that compares the current state of the /_e_t_c
  47.      tree with the state when the master was made.  When discrepancies are
  48.      found, an audit record is generated.
  49.  
  50.           _ffff_iiii_nnnn_dddd _////_eeee_tttt_cccc _----_pppp_rrrr_iiii_nnnn_tttt _|||| _xxxx_aaaa_rrrr_gggg_ssss _llll_ssss _----_dddd_llll_MMMM _>>>> _////_tttt_mmmm_pppp_////_eeee_tttt_cccc_----_tttt_oooo_nnnn_iiii_gggg_hhhh_tttt
  51.           _dddd_iiii_ffff_ffff _////_vvvv_aaaa_rrrr_////_aaaa_dddd_mmmm_////_eeee_tttt_cccc_----_mmmm_aaaa_ssss_tttt_eeee_rrrr _////_tttt_mmmm_pppp_////_eeee_tttt_cccc_----_tttt_oooo_nnnn_iiii_gggg_hhhh_tttt _>>>> _////_tttt_mmmm_pppp_////_eeee_tttt_cccc_----_dddd_iiii_ffff_ffff
  52.           _iiii_ffff _[[[[ _----_ssss _////_tttt_mmmm_pppp_////_eeee_tttt_cccc_----_dddd_iiii_ffff_ffff _]]]]
  53.                _ssss_aaaa_tttt______eeee_cccc_hhhh_oooo _----_FFFF _ssss_aaaa_tttt______aaaa_eeee______cccc_uuuu_ssss_tttt_oooo_mmmm _<<<< _////_tttt_mmmm_pppp_////_eeee_tttt_cccc_----_dddd_iiii_ffff_ffff
  54.           _eeee_llll_ssss_eeee
  55.                _eeee_cccc_hhhh_oooo _""""_NNNN_iiii_gggg_hhhh_tttt_llll_yyyy _////_eeee_tttt_cccc _cccc_hhhh_eeee_cccc_kkkk _ssss_hhhh_oooo_wwww_ssss _nnnn_oooo _dddd_iiii_ssss_cccc_rrrr_eeee_pppp_aaaa_nnnn_cccc_iiii_eeee_ssss_...._"""" _|||| _\\\\
  56.                _ssss_aaaa_tttt______eeee_cccc_hhhh_oooo _----_SSSS _ssss_aaaa_tttt______aaaa_eeee______cccc_uuuu_ssss_tttt_oooo_mmmm
  57.           _ffff_iiii
  58.  
  59.  
  60.  
  61.  
  62.  
  63.                                                                         PPPPaaaaggggeeee 1111
  64.  
  65.  
  66.  
  67.  
  68.  
  69.  
  70. ssssaaaatttt____eeeecccchhhhoooo((((1111MMMM))))                                                      ssssaaaatttt____eeeecccchhhhoooo((((1111MMMM))))
  71.  
  72.  
  73.  
  74. SSSSEEEEEEEE AAAALLLLSSSSOOOO
  75.      satwrite(2), sat_strtoevent(3).
  76.  
  77.  
  78.  
  79.  
  80.  
  81.  
  82.  
  83.  
  84.  
  85.  
  86.  
  87.  
  88.  
  89.  
  90.  
  91.  
  92.  
  93.  
  94.  
  95.  
  96.  
  97.  
  98.  
  99.  
  100.  
  101.  
  102.  
  103.  
  104.  
  105.  
  106.  
  107.  
  108.  
  109.  
  110.  
  111.  
  112.  
  113.  
  114.  
  115.  
  116.  
  117.  
  118.  
  119.  
  120.  
  121.  
  122.  
  123.  
  124.  
  125.  
  126.  
  127.  
  128.  
  129.                                                                         PPPPaaaaggggeeee 2222
  130.  
  131.  
  132.  
  133.