auditd(8) 맨 페이지 - 윈디하나의 솔라나라

개요

섹션
맨 페이지 이름
검색(S)

auditd(8)

System Administration Commands                                       auditd(8)



NAME
       auditd - audit service daemon

SYNOPSIS
       /usr/sbin/auditd

DESCRIPTION
       The  audit  service daemon, auditd, manages audit data generated either
       locally (see audit_binfile(7), audit_syslog(7) and audit_remote(7))  or
       remotely  (see  "Audit Remote Server" below). When auditing is enabled,
       auditd reads its configuration to do the following:

           o      Configure audit policy.


           o      Configure the audit queue control parameters.


           o      Configure the event-to-class mappings.


           o      Set the default audit masks.


           o      If local auditing is enabled (see "Local  Auditing"  below),
                  load one or more plugins.

                  Solaris  provides  three  plugins.  audit_binfile(7)  writes
                  binary audit data to a file.  audit_remote(7)  sends  binary
                  audit  data  to  an  authenticated  server  with privacy and
                  integrity protection. audit_syslog(7) sends  text  summaries
                  of audit records to the syslog daemon.


           o      Read  audit  data from the kernel and pass that data to each
                  of the active plugins.


           o      Execute the audit_warn(8) script to warn of  various  condi‐
                  tions.


           o      If remote auditing (ars(7)) is enabled, process requests and
                  store the remotely generated audit data.



       audit(8) is used to control the audit service. It can cause auditd to:

           o      Close a connection to a remote audit server thus causing  it
                  to close its respective audit file.


           o      Start  and  refresh the service based on the current proper‐
                  ties.


           o      Close the audit trail and disable local auditing and  remote
                  audit service.



       auditconfig(8) is used to configure the audit service. It can configure
       the active and permanent:

           o      audit policy


           o      audit queue control parameters


           o      default audit masks


           o      plugins to be loaded


           o      plugin attributes


           o      audit remote server state, attributes, and connection groups


   Local Auditing
       The collecting of audit records that are generated on the local system.
       The records can be generated in the global zone or in non-global zones,
       or both.

   Remote Auditing
       The Audit Remote Server, ARS, that receives and  stores  audit  records
       from  a  system  that is being audited and is configured with an active
       audit_remote plugin. To distinguish an audited system from an ARS,  the
       audited system can be termed the locally audited system.

   Auditing Conditions
       The  audit  service  daemon enables local auditing in case at least one
       audit daemon plugin is configured as active.


       The Audit Remote Server functionality is enabled, if the server is  not
       configured  as  inactive (see the -setremote server option in auditcon‐
       fig(8)) and at least one connection group is active. See "Audit  Remote
       Server" section for more information.


       Local  auditing  and the Audit Remote Server can be configured indepen‐
       dently.

   Audit Remote Server
       The Audit Remote Server, ARS, is an integral part of auditd. It makes a
       counterpart  to the audit_remote(7) plugin. Data sent by the plugin can
       be captured, processed, and stored by the server according to its  con‐
       figuration, as described in the ars(7) manual page.


       ARS is delivered as a disabled Solaris audit component. It is necessary
       to configure it before it can be used to process a remote audit  trail.
       ARS configuration is twofold: first, the underlying security mechanisms
       used for  secure  audit  data  transport  has  to  be  configured  (see
       audit_remote(7));  second,  the audit subsystem has to be properly con‐
       figured.


       To observe and configure the ARS, use  the  auditconfig(8)   -setremote
       and  -getremote options. The configuration is divided to the configura‐
       tion of server and group. The server configuration allows for  changing
       common  ARS parameters, while the group keyword allows configuration of
       connection groups, the sets of hosts sharing  the  same  local  storage
       parameters.

   Server Configuration Attributes
       listen_address

           Address  the  server  listens on. An empty listen_address attribute
           defaults to listen on all local addresses.


       listen_port

           The local listening port; 0 defaults to 16162. Port associated with
           the solaris-audit Internet service name. See services(5).


       login_grace_time

           The  server  disconnects after login grace time (in seconds) if the
           connection has not been successfully established. 0 defaults to  no
           limit.


       max_startups

           Number  of  concurrent unauthenticated connections to the server at
           which the server starts refusing new  connections.  Note  that  the
           value  might be specified in begin:rate:full format to allow random
           early drop mode, for example 10:30:60. That means  that  ARS  would
           refuse  connection  attempts with a probability of rate/100 (30% in
           our example) if there are currently 10 (from the start field) unau‐
           thenticated connections. The probability increases linearly and all
           connection attempts are refused if the  number  of  unauthenticated
           connections reaches full (60 in our example).


   Group Configuration Attributes
       binfile_dir, binfile_fsize, binfile_minfree

           Attributes   follow   the  respective  p_*  attributes  defined  in
           audit_binfile(7), in short:

           binfile_dir

               Directory for storing per host audit data.


           binfile_fsize

               The maximum size of each of the stored  audit  trail  files;  0
               defaults to no limit.


           binfile_minfree

               The  minimum  free space on file system with binfile_dir before
               the  audit_binfile(7)  lets  administrator  know  by  means  of
               audit_warn(8); 0 defaults to no limit.



       hosts

           Defines  the  hosts  in  the given connection group allowed to send
           audit data to server. Note that a comma is a delimiter in  case  of
           multiple  host entries. If hosts is empty, such connection group is
           called a wild card connection group. If a new connection cannot  be
           classified  to any other (non-wild card) connection group and there
           is an active wild card connection group configured, the new connec‐
           tion  is  classified to that connection group. Only one active wild
           card connection group can be configured.

           For a configuration example, see "Examples".



       For comprehensive  configuration  description  and  examples,  see  the
       appropriate  chapter  in  the  Managing Auditing in Oracle Solaris 11.4
       book.

   Audit Record Queue
       The maximum number of records to queue for audit data sent to the plug‐
       in  is  specified  by  the qsize parameter specified for the plugin. If
       omitted, the current hiwater mark is used. See the -getqctrl option  in
       auditconfig(8).  When this maximum is reached, auditd will either block
       processes or discard  data,  depending  on  the  cnt  audit  policy  as
       described in auditconfig(8).

   Auditing System Warnings
       The   audit   service  daemon  and  audit  plugins  invoke  the  script
       audit_warn(8) under certain  conditions.  See  audit_warn(8)  for  more
       information.

EXAMPLES
       Example 1 Audit Remote Server Configuration



       The  following example describes steps to configure audit remote server
       to listen on a specific address. One wild card and  one  non-wild  card
       connection  group  will  be created. The non-wild card connection group
       configuration will address remote audit  data  from  tic.cz.example.com
       and tac.us.example.com. The trail will be stored in /var/audit/remote.


         # Print the current audit remote server configuration.
         # Both server and connection groups (if any) is displayed.

         auditconfig -getremote

         # Set address the audit remote server will listen on.

         auditconfig -setremote server "listen_address=192.168.0.1"

         # Create two connection groups. Note that by default the
         # connection group is created with no hosts specified
         # (wild card connection group).

         auditconfig -setremote group create clockhouse
         auditconfig -setremote group create sink

         # Add hosts to the connection group (convert the wild card
         # connection group no non-wild card one). Set the storage
         # directory and activate the connection group.

         auditconfig -setremote group active clockhouse \
             "hosts=tic.cz.example.com,tac.us.example.com,\
             binfile_dir=/var/audit/remote"

         # Activate the wild card connection group.

         # auditconfig -setremote group active sink

         # Verify the audit remote server configuration.

         # auditconfig -getremote

         # Start or refresh the audit service.

         # audit -s


FILES
           o      etc/security/audit/audit_class


           o      etc/security/audit/audit_event


ATTRIBUTES
       See attributes(7) for descriptions of the following attributes:


       tab()  box; cw(2.75i) |cw(2.75i) lw(2.75i) |lw(2.75i) ATTRIBUTE TYPEAT‐
       TRIBUTE VALUE _ Availabilitysystem/core-os _ Interface StabilityCommit‐
       ted


SEE ALSO
       audit_event(5),  audit_class(5),  audit_class(5),  services(5), ars(7),
       attributes(7),   audit_binfile(7),   audit_flags(7),   audit_remote(7),
       audit_syslog(7), smf(7), audit(8), audit_warn(8), auditconfig(8), prau‐
       dit(8)


       Managing Auditing in Oracle Solaris 11.4

NOTES
       auditd is loaded in the  global  zone  at  boot  time  if  auditing  is
       enabled.


       If  the audit policy perzone is set, auditd runs in each zone, starting
       automatically when the local zone boots. If a zone is running when  the
       perzone  policy  is  set,  auditing  must  be started manually in local
       zones. It is not necessary to reboot the system or the  local  zone  to
       start  auditing  in  a local zone. auditd can be started with audit  -s
       and will start automatically with future boots of the zone.


       When auditd runs in a local zone, the configuration is taken  from  the
       local zone's smf(7) repository and the /etc/security directory's files:
       audit_class, user_attr, and audit_event.


       Configuration changes do not affect audit sessions that  are  currently
       running, as the changes do not modify a process's preselection mask. To
       change the preselection mask on a running process,  use  the  -setpmask
       option  of  the  auditconfig(8)  command. If the user logs out and logs
       back in, the new configuration changes will be reflected  in  the  next
       audit session.


       The audit service FMRI is svc:/system/auditd:default.

HISTORY
       The auditd daemon was added in Solaris 2.3.



Oracle Solaris 11.4               21 Jun 2021                        auditd(8)
맨 페이지 내용의 저작권은 맨 페이지 작성자에게 있습니다.
RSS ATOM XHTML 5 CSS3