02-24-2007
Audits on sol 9
Ok, thank you much. I didn't think there were, as I have been looking for a little while.
9 More Discussions You Might Find Interesting
1. Programming
I have a C program and want to write messages to a log. BSM is being used for O/S auditing. Can I write my messages to the BSM log? If so, how do I do that? I'm not finding any API's for that. Any URLs, samples, guidance would be appreciated. (0 Replies)
Discussion started by: JDO
0 Replies
2. UNIX for Dummies Questions & Answers
Hi Guys,
I am new to this forum so I am sorry if i posted this thread in the wrong place. I am currently trying to get BSM to work on solaris 10 by Logging few things for me. I need your help to complete this task please.
this is the config of the audit files:
audit_conto
# Copyright... (18 Replies)
Discussion started by: skywalker850i
18 Replies
3. Solaris
I got a lot of this message in my /var/audit log
how can I exclude this message?
header,127,2,invalid event number,fe,hostsol1.com.sg,2007-12-21 00:10:01.001 +08:00,argument,1,0x5,processor ID,argument
,2,0x3,flag,text,P_STATUS,subject,zhang1,root,root,root,root,18228,576129155,291 131094... (1 Reply)
Discussion started by: geoffry
1 Replies
4. Cybersecurity
Hi,
I keep encountering events in the BSM/C2 logs which shows that the audit-user who performed the event is the user (e.g. ongkk in the example below). However, the user is able to show me that he wasn't logged in at that time nor have the rights to perform the event (e.g. su in this example).... (5 Replies)
Discussion started by: BERNIELEE68
5 Replies
5. Solaris
Does anyone know of any other place to download Solaris 9 packages other than Oracle's website. I'm looking to setup Solaris 9 containers and needing package
SUNWs9brandk. I don't have a account with Oracle to allow me to download this package. I'm using a Solaris 10 server update 9. (1 Reply)
Discussion started by: soupbone38
1 Replies
6. Solaris
Hi ,
I don't want logs from a particular "library" to get recorded in the audit.log file. Is that possible with BSM? Please guide.
Thanks. (2 Replies)
Discussion started by: chinchao
2 Replies
7. Solaris
New to Solaris in general (coming from a RHEL background) I'm trying to enable auditing on the system with the following in /etc/security/audit_control:
But there are two areas where it seems to break with expected behavior (maybe it's poor expectations on my part):
1) it seems to be... (0 Replies)
Discussion started by: thmnetwork
0 Replies
8. Solaris
Solaris 9 system:
I'm trying to get BSM to record to the point where additional files being put into /etc/opt/csw/sudoers.d will be recorded but thus far all I'm able to get are when files are deleted (via unlink). I've even tried auditing based on the "all" audit flag temporarily (thinking I... (2 Replies)
Discussion started by: thmnetwork
2 Replies
9. Solaris
Hi all,
I'm trying to read Solaris BSM log in user friendly form. Found old tools including bsmparser java tool and php code. But none of them working. What are you using for parsing BSM log? (2 Replies)
Discussion started by: sembii
2 Replies
LEARN ABOUT CENTOS
keyctl_search
KEYCTL_SEARCH(3) Linux Key Management Calls KEYCTL_SEARCH(3)
NAME
keyctl_search - Search a keyring for a key
SYNOPSIS
#include <keyutils.h>
long keyctl_search(key_serial_t keyring, const char *type,
const char *description, key_serial_t destination);
DESCRIPTION
keyctl_search() recursively searches the keyring for a key of the specified type and description.
If found, the key will be attached to the destination keyring (if given), and its serial number will be returned.
The source keyring must grant search permission to the caller, and for a key to be found, it must also grant search permission to the call-
er. Child keyrings will be only be recursively searched if they grant search permission to the caller as well.
If the destination keyring is zero, no attempt will be made to forge a link to the key, and just the serial number will be returned.
If the destination keyring is given, then the link may only be formed if the found key grants the caller link permission and the destina-
tion keyring grants the caller write permission.
If the search is successful, and if the destination keyring already contains a link to a key that matches the specified type and descrip-
tion, then that link will be replaced by a link to the found key.
The source keyring and destination keyring serial numbers may be those of valid keyrings to which the caller has appropriate permission, or
they may be special keyring IDs:
KEY_SPEC_THREAD_KEYRING
This specifies the caller's thread-specific keyring.
KEY_SPEC_PROCESS_KEYRING
This specifies the caller's process-specific keyring.
KEY_SPEC_SESSION_KEYRING
This specifies the caller's session-specific keyring.
KEY_SPEC_USER_KEYRING
This specifies the caller's UID-specific keyring.
KEY_SPEC_USER_SESSION_KEYRING
This specifies the caller's UID-session keyring.
RETURN VALUE
On success keyctl_search() returns the serial number of the key it found. On error, the value -1 will be returned and errno will have been
set to an appropriate error.
ERRORS
ENOKEY One of the keyrings doesn't exist, no key was found by the search, or the only key found by the search was a negative key.
ENOTDIR
One of the keyrings is a valid key that isn't a keyring.
EKEYEXPIRED
One of the keyrings has expired, or the only key found was expired.
EKEYREVOKED
One of the keyrings has been revoked, or the only key found was revoked.
ENOMEM Insufficient memory to expand the destination keyring.
EDQUOT The key quota for this user would be exceeded by creating a link to the found key in the destination keyring.
EACCES The source keyring didn't grant search permission, the destination keyring didn't grant write permission or the found key didn't
grant link permission to the caller.
LINKING
Although this is a Linux system call, it is not present in libc but can be found rather in libkeyutils. When linking, -lkeyutils should be
specified to the linker.
SEE ALSO
keyctl(1),
add_key(2),
keyctl(2),
request_key(2),
keyctl(3),
request-key(8)
Linux 4 May 2006 KEYCTL_SEARCH(3)