Solaris - Basic Security Module, Default Setting
In Solaris, the default setting for the Basic Security Model (a.k.a C2 level auditing) is turned off. To turn it on, you need to run
/etc/security/bsmconv followed by a reboot. The default auditing is controlled by a few files, namely
/etc/security/audit_startupwhich set the policy#! /bin/sh # # Copyright 2004 Sun Microsystems, Inc. All rights reserved. # Use is subject to license terms. # # ident "@(#)audit_startup.txt 1.1 04/06/04 SMI" /usr/bin/echo "Starting BSM services." /usr/sbin/auditconfig -setpolicy +cnt /usr/sbin/auditconfig -conf /usr/sbin/auditconfig -aconf -aconf Set the non-attributable audit mask from the audit_control(4) file. -conf Configure kernel audit event to class mappings. Runtime class mappings are changed to match those in the audit event to class database file. -setpolicy cnt Do not suspend processes when audit resources are exhausted. Instead, drop audit records and keep a count of the number of records dropped. By default, process are suspended until audit resources become available./etc/security/audit_user- level of logging per use# # Copyright (c) 1988 by Sun Microsystems, Inc. # # ident "@(#)audit_user.txt 1.6 00/07/17 SMI" # # # User Level Audit User File # # File Format # # username:always:never # root:lo:no
/etc/security/audit_control# # Copyright (c) 1988 by Sun Microsystems, Inc. # # ident "@(#)audit_control.txt 1.4 00/07/17 SMI" # dir:/var/audit flags: minfree:20 naflags:lo
In the above, the default is to always audit the login/logout (lo) of root and never audit "invalid class" (no). Here is the tabulated audit class (/etc/security/audit_class)
| Class | Description | Default |
|---|---|---|
| no | invalid class | |
| fr | file read | |
| fw | file write | |
| fa | file attribute access | |
| fm | file attribute modify | |
| fc | file create | |
| fd | file delete | |
| cl | file close | |
| nt | network | |
| ip | ipc | |
| na | non-attribute | |
| lo | login or logout | root |
| ap | application | |
| ss | change system state | |
| as | system-wide administration | |
| ua | user administration | |
| am | administrative (meta-class) | |
| aa | audit utilization | |
| ad | old administrative (meta-class) | |
| ps | process start/stop | |
| pm | process modify | |
| pc | process (meta-class) | |
| xp | X - privileged/administrative operations | |
| xc | X - object create/destroy | |
| xs | X - operations that always silently fail, if bad | |
| xx | X - all X events (meta-class) | |
| io | ioctl | |
| ex | exec | |
| ot | other | |
| all | all classes (meta-class) |
In my previsous blog, I mentioned how I configured BSM to keep track of user commands (with arguments) executed in a login session.
For details of a specific class, you need to refer to the /etc/security/audit_event event. For example, the login/logout ("lo") class, it consists of the following events. Basically it covers all kinds of login and logout
#egrep ':lo$' /etc/security/audit_event 6152:AUE_login:login - local:lo 6153:AUE_logout:logout:lo 6154:AUE_telnet:login - telnet:lo 6155:AUE_rlogin:login - rlogin:lo 6158:AUE_rshd:rsh access:lo 6159:AUE_su:su:lo 6162:AUE_rexecd:rexecd:lo 6163:AUE_passwd:passwd:lo 6164:AUE_rexd:rexd:lo 6165:AUE_ftpd:ftp access:lo 6171:AUE_ftpd_logout:ftp logout:lo 6172:AUE_ssh:login - ssh:lo 6173:AUE_role_login:role login:lo 6212:AUE_newgrp_login:newgrp login:lo 6213:AUE_admin_authenticate:admin login:lo 6221:AUE_screenlock:screenlock - lock:lo 6222:AUE_screenunlock:screenlock - unlock:lo 6227:AUE_zlogin:login - zlogin:lo


0 Comments:
Post a Comment
<< Home