Various fixes and cleanups. Adaption of the preface to mention

that audit is only a part of CURRENT at the moment.

The 'tf' audit class removed on rwatson's advice.
This commit is contained in:
Christian Brueffer 2006-02-03 20:23:54 +00:00
parent 77c302b9d9
commit ce2b9149f8
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=27022

View file

@ -11,7 +11,7 @@ reworded. The sections in question are marked with 'PROTOTYPE' labels in
commentary.
-->
<!-- Need more documenation on praudit, audtreduce, etc. Plus more info
<!-- Need more documentation on praudit, auditreduce, etc. Plus more info
on the triggers from the kernel (log rotation, out of space, etc).
And the /dev/audit special file if we choose to support that. Could use
some coverage of integrating MAC with Event auditing and perhaps discussion
@ -40,12 +40,20 @@ requirements. -->
<see>MAC</see>
</indexterm>
<para>The &os;&nbsp;6.0 operating system release has included
<para>The &os;&nbsp;7-CURRENT development branch includes
support for Event Auditing based on the &posix;.1e draft and
the &sun; <acronym>BSM</acronym> implementation. Event auditing
permits the selective logging of security-relevant system events
for the purposes of system analysis, system monitoring, and
security evaluation.</para>
security evaluation. After some settling time in &os;&nbsp;7-CURRENT,
this support will be merged to &os;&nbsp;6-STABLE and appear
in subsequent releases.</para>
<warning>
<para>The audit facility in FreeBSD is considered experimental, and
production deployment should occur only after careful consideration
of the risks of deploying experimental software.</para>
</warning>
<para>This chapter will focus mainly on the installation and
configuration of Event Auditing. Explanation of audit policies,
@ -325,11 +333,6 @@ requirements. -->
Audit process operations, such as &man.exec.3; and
&man.exit.3;.</para>
</listitem>
<listitem>
<para><option>tf</option> - <literal>tfm</literal> -
I HAVE NO CLUE!</para>
</listitem>
</itemizedlist>
<para>Following is a list of all supported audit prefixes:</para>
@ -391,7 +394,7 @@ requirements. -->
<sect3 id="audit-auditcontrol">
<title>The <filename>audit_control</filename> File</title>
<para>The <filename>audit_control</filename> contains some basic
<para>The <filename>audit_control</filename> file contains some basic
defaults that the administrator may wish to modify. Perhaps
even set some new ones. Viewing the contents of this file,
we see the following:</para>
@ -401,14 +404,14 @@ flags:lo,ad,-all,^-fa,^-fc,^-cl
minfree:20
naflags:lo</programlisting>
<para>The <option>dir</option> is used to set the default
<para>The <option>dir</option> option is used to set the default
directory where audit logs are stored.</para>
<para>The <option>flags</option> is used to set the system-wide
defaults. The current setting,
<para>The <option>flags</option> option is used to set the
system-wide defaults. The current setting,
<option>lo,ad,-all,^-fa,^-fc,^-cl</option> audits all system
&man.login.1; and &man.logout.1; actions, all administrator
actions, all failed events in the system, and finally disable
actions, all failed events in the system, and finally disables
auditing of failed attempts for <option>fa</option>,
<option>fc</option>, and <option>cl</option>. Even though
the <option>-all</option> turned on the auditing of all
@ -440,8 +443,8 @@ naflags:lo</programlisting>
<sect3 id="audit-audituser">
<title>The <filename>audit_user</filename> File</title>
<para>The <filename>audit_user</filename> permits the
administrator to map audit specific events to directly
<para>The <filename>audit_user</filename> file permits the
administrator to map audit specific events directly
to users. This adds a finer-grained control mechanism
for all system users.</para>
@ -459,7 +462,7 @@ audit:fc:no</programlisting>
other auditing for the <username>audit</username>
user. While event auditing does not require a special
user exist, some configurations, specifically environments
making use of <acronym>MAC</acronym> may require it.</para>
making use of <acronym>MAC</acronym>, may require it.</para>
</sect3>
</sect2>
</sect1>
@ -469,14 +472,14 @@ audit:fc:no</programlisting>
<para>Events from the <command>auditd</command> daemon cannot
be altered or read in plain text. Data is stored and accessed
in a method similar to that of &man.ktrace.1; and &man.kdump.1,
in a method similar to that of &man.ktrace.1; and &man.kdump.1;,
that is, they may only be viewed by dumping them using the
<command>praudit</command> or <command>auditreduce</command>
utilities.</para>
<para>There are two utilities because of different requirements.
For example, the <command>praudit</command> will dump the entire
contents of a specified audit log in plain text. To dump an
For example, the <command>praudit</command> utility will dump the
entire contents of a specified audit log in plain text. To dump an
audit log in its entirety, use:</para>
<screen>&prompt.root; <userinput>praudit /var/audit/AUDITFILE</userinput></screen>