18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Understanding audit messages<br />

Chapter 19: Auditing and Reporting<br />

Auditing on the <strong>Sidewinder</strong> <strong>G2</strong><br />

When viewing audit messages in the Admin Console, the form may vary<br />

depending on the purpose and content <strong>of</strong> the message. The form <strong>of</strong> the first<br />

two lines is the same for all audit messages, and provides general information<br />

about the process generating or causing the audit. The third line will vary, but<br />

usually includes Type Enforcement information and possibly some additional<br />

information. The other lines <strong>of</strong> an audit message will vary depending on the<br />

type <strong>of</strong> audit message.<br />

Important: To view audit message files, see “Viewing audit information” on page<br />

534.<br />

Sample audit message<br />

The message below is an example <strong>of</strong> a Type Enforcement audit message<br />

(using the te_filter filter). The numbers have been added to link the example<br />

line with the bullets below.<br />

(1)Jan 17 08:16:20 2006 CST f_kernel a_tepm t_ddtviolation p_major<br />

(2)pid: 19499 ruid: 100 euid: 100 pgid: 19499 fid: 0 logid: 100 cmd: 'grep'<br />

(3)domain: User edomain: User hostname: myg2.example.com<br />

(4)permwanted: 1 permgranted: 0 srcdmn: User filedom: Admn filetyp: file<br />

(5)file: rc.local OP: 0x2000042 perm wanted: 0x1 perm granted: 0x0<br />

• Line 1 — This line lists the date and time, the facility that audited the<br />

message (such as the Kernel, FTP or Telnet), the location (known as the<br />

area), in the facility that audited the message (such as general area or<br />

<strong>Sidewinder</strong> <strong>G2</strong> library), the type <strong>of</strong> audit message (such as Domain<br />

Definition Table Type Enforcement violation or access control list) and the<br />

priority <strong>of</strong> the message (such as major or minor).<br />

Note: Network probe attempts do not contain lines two or three.<br />

• Line 2 — This line lists the process ID, the real user ID, the effective user<br />

ID, the process group ID, the process family ID (<strong>Sidewinder</strong> <strong>G2</strong>-specific)<br />

and the command associated with the process ID.<br />

• Line 3 — This line lists the real domain the process is running in and the<br />

effective domain (the domain that the process for which permission is<br />

given). This also lists the system’s host name.<br />

• Lines 4 and 5 — These lines provide nine pieces <strong>of</strong> data. The fourth line<br />

contains the integer representation <strong>of</strong> the permissions requested by the<br />

process and granted to the process, the domain <strong>of</strong> the requesting process,<br />

and the type <strong>of</strong> file that the process is requesting access to. The fifth line<br />

contains the filen ame and the permissions wanted and granted for the file.<br />

In general, the data in an audit message is a tag name followed by a colon and<br />

the value <strong>of</strong> the tag. Table 35 contains examples and descriptions <strong>of</strong> some <strong>of</strong><br />

the tags used in audit messages that appear in the audit results window.<br />

547

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!