Sponsored Content
Full Discussion: logging
Special Forums Cybersecurity logging Post 26504 by iat00 on Tuesday 20th of August 2002 06:12:27 AM
Old 08-20-2002
Tools

if you want to build advanced logging and to analyze automatically whether there are attacks or similar, just try SNORT. This is an Open Source IDS (Intrusion Detection System). Please note that it is better to shutdown all unnecessary network services in your servers. It makes everything easier.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Logging

I have a SCO R5 Open Server Box running at a remote location, and from time to time it seems to "spontaneously" re-boot itself. Is there a specific log file that I can examine to see why the machine is doing this ? Any suggestions gratefully appreciated (1 Reply)
Discussion started by: pcs7088
1 Replies

2. Shell Programming and Scripting

Logging

G'day Just wondering if anyone out there knows how to log files, using the example I provided in the earlier message / question earlier today: :confused: If I was to backup a file, how could I setup a log file to record the filename, date (This one I've got figured), and that the file was... (4 Replies)
Discussion started by: Aussie_Bloke
4 Replies

3. UNIX for Dummies Questions & Answers

logging when someone changes to su

Is there a file that captures info whenever someone logs to su? i know it comes across as standard output on the server, but is it saved anywhere? Time and date info included?? thanks, kym (1 Reply)
Discussion started by: kymberm
1 Replies

4. UNIX for Dummies Questions & Answers

Asking about logging in

Hi, just wriiten a sh script and as my script will try to log into another server to delete some files but when i run , it keeps on saying that my files do not exist. It seems to refer to my local directory instead. Below is my script : FTP_HOST=ip_number FTP_USER="user password" ... (1 Reply)
Discussion started by: blueberry80
1 Replies

5. UNIX for Dummies Questions & Answers

need more logging

Hi all! On our current Solaris 8 machine we only have "standard" logging configured, and now i need to put on more. What i specificly need is time in the logfiles. Ex. When a user is logging in, when a user makes it self SU. etc. Regards... dOzY (3 Replies)
Discussion started by: dozy
3 Replies

6. Programming

Logging

Hi How to manage logging in an application. Actually I am developing a Client-Server application in c/c++ and want to manage an optional logging in my application, but since prior I have never done ths activity. Plz guide me. thanks. (2 Replies)
Discussion started by: sumsin
2 Replies

7. AIX

Logging off users

What is the best way to logoff users from my Unix system? I have done a search and found that you can do a w or who - find who is on, and ps-ef | grep <user> and kill their processes. But what if you have a bunch of users and you need them off the system quickly? Killing individual processes... (1 Reply)
Discussion started by: outtacontrol
1 Replies

8. Shell Programming and Scripting

logging into

Hi all Can anyone tell me how to login inot telnet,i heard that it is an interface between unix and windows,if i am wrong please correct me. Thanks in anticipation (1 Reply)
Discussion started by: vinayrao
1 Replies

9. Post Here to Contact Site Administrators and Moderators

Constant Logging In (After Logging Out)

Hi Everyone. First, I want to thank all of you for letting me participate in this great group. I am having a bit of a problem. After I get an email from a responder, I login to make my reply. In the mean time I get another response by email from another member, I go to reply to them and I... (6 Replies)
Discussion started by: Ccccc
6 Replies

10. Linux

Syslog not logging successful logging while unlocking server's console

When unlocking a Linux server's console there's no event indicating successful logging Is there a way I can fix this ? I have the following in my rsyslog.conf auth.info /var/log/secure authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
SHOREWALL6-BLRULES(5)						  [FIXME: manual]					     SHOREWALL6-BLRULES(5)

NAME
blrules - shorewall6 Blacklist file SYNOPSIS
/etc/shorewall6/blrules DESCRIPTION
This file is used to perform zone-specific blacklisting and whitelisting. Rules in this file are applied depending on the setting of BLACKLISTNEWONLY in shorewall6.conf[1](5). If BLACKLISTNEWONLY=No, then they are applied regardless of the connection tracking state of the packet. If BLACKLISTNEWONLY=Yes, they are applied to connections in the NEW and INVALID states. The format of rules in this file is the same as the format of rules in shorewall6-rules (5)[2]. The differece in the two files lies in the ACTION (first) column. ACTION- {ACCEPT|CONTINUE|DROP|A_DROP|REJECT|A_REJECT|WHITELIST|LOG|QUEUE|NFQUEUE[(queuenumber)]|COMMENT|action|macro[(target)]}[:{log-level|none}[!][:tag]] Specifies the action to be taken if the packet matches the rule. Must be one of the following. BLACKLIST Added in Shorewall 4.5.3. This is actually a macro that expands as follows: o If BLACKLIST_LOGLEVEL is specified in shorewall6.conf[3](5), then the macro expands to blacklog. o Otherwise it expands to the action specified for BLACKLIST_DISPOSITION in shorewall6.conf[3](5). blacklog May only be used if BLACKLIST_LOGLEVEL is specified in shorewall6.conf[3](5). Logs, audits (if specified) and applies the BLACKLIST_DISPOSITION specified in shorewall6.conf[3] (5). ACCEPT|CONTINUE|WHITELIST Exempt the packet from the remaining rules in this file. DROP Ignore the packet. A_DROP and A_DROP! Audited versions of DROP. Requires AUDIT_TARGET support in the kernel and ip6tables. REJECT disallow the packet and return an icmp-unreachable or an RST packet. A_REJECT Audited versions of REJECT. Require AUDIT_TARGET support in the kernel and ip6tables. LOG Simply log the packet and continue with the next rule. QUEUE Queue the packet to a user-space application such as ftwall (http://p2pwall.sf.net). The application may reinsert the packet for further processing. NFLOG[(nflog-parameters)] queues matching packets to a backend logging daemon via a netlink socket then continues to the next rule. See http://www.shorewall.net/shorewall_logging.html[4]. NFQUEUE Queues the packet to a user-space application using the nfnetlink_queue mechanism. If a queuenumber is not specified, queue zero (0) is assumed. COMMENT the rest of the line will be attached as a comment to the Netfilter rule(s) generated by the following entries. The comment will appear delimited by "/* ... */" in the output of "shorewall6 show <chain>". To stop the comment from being attached to further rules, simply include COMMENT on a line by itself. action The name of an action declared in shorewall6-actions[5](5) or in /usr/share/shorewall6/actions.std. macro The name of a macro defined in a file named macro.macro. If the macro accepts an action parameter (Look at the macro source to see if it has PARAM in the TARGET column) then the macro name is followed by the parenthesized target (ACCEPT, DROP, REJECT, ...) to be substituted for the parameter. Example: FTP(ACCEPT). The ACTION may optionally be followed by ":" and a syslog log level (e.g, REJECT:info or Web(ACCEPT):debug). This causes the packet to be logged at the specified level. If the ACTION names an action declared in shorewall6-actions[5](5) or in /usr/share/shorewall6/actions.std then: o If the log level is followed by "!' then all rules in the action are logged at the log level. o If the log level is not followed by "!" then only those rules in the action that do not specify logging are logged at the specified level. o The special log level none! suppresses logging by the action. You may also specify NFLOG (must be in upper case) as a log level.This will log to the NFLOG target for routing to a separate log through use of ulogd (http://www.netfilter.org/projects/ulogd/index.html). Actions specifying logging may be followed by a log tag (a string of alphanumeric characters) which is appended to the string generated by the LOGPREFIX (in shorewall6.conf[3](5)). For the remaining columns, see shorewall6-rules (5)[2]. EXAMPLE
Example 1: Drop Teredo packets from the net. DROP net:[2001::/32] all Example 2: Don't subject packets from 2001:DB8::/64 to the remaining rules in the file. WHITELIST net:[2001:DB8::/64] all FILES
/etc/shorewall6/blrules SEE ALSO
http://shorewall.net/blacklisting_support.htm http://shorewall.net/configuration_file_basics.htm#Pairs shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5), shorewall6-hosts(5), shorewall6-interfaces(5), shorewall6-maclist(5), shoewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5), shorewall6-providers(5), shorewall6-rtrules(5), shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5), shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5), shorewall6-tcrules(5), shorewall6-tos(5), shorewall6-tunnels(5), shorewall6-zones(5) NOTES
1. shorewall6.conf http://www.shorewall.net/manpages6/shorewall.conf.html 2. shorewall6-rules (5) http://www.shorewall.net/manpages6/shorewall6-rules.html 3. shorewall6.conf http://www.shorewall.net/manpages6/shorewall6.conf.html 4. http://www.shorewall.net/shorewall_logging.html http://www.shorewall.net/shorewall.logging.html 5. shorewall6-actions http://www.shorewall.net/manpages6/shorewall6-actions.html [FIXME: source] 06/28/2012 SHOREWALL6-BLRULES(5)
All times are GMT -4. The time now is 05:07 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy