Sponsored Content
Full Discussion: Solaris BSM audit log
Operating Systems Solaris Solaris BSM audit log Post 302152690 by geoffry on Thursday 20th of December 2007 10:09:01 PM
Old 12-20-2007
Solaris BSM audit log

I got a lot of this message in my /var/audit log

how can I exclude this message?

header,127,2,invalid event number,fe,hostsol1.com.sg,2007-12-21 00:10:01.001 +08:00,argument,1,0x5,processor ID,argument
,2,0x3,flag,text,P_STATUS,subject,zhang1,root,root,root,root,18228,576129155,291 131094 10.88.95.158,return,failure: Invalid
argument,-1
 

10 More Discussions You Might Find Interesting

1. Solaris

Solaris BSM log software

I'm looking for a software to capture my systems logs, and bsm (basic security module) logs to centralise the administration. Do you have a suggestions. Opensource or not. (6 Replies)
Discussion started by: simquest
6 Replies

2. Programming

how to write to Solaris BSM log

I have a C program and want to write messages to a log. BSM is being used for O/S auditing. Can I write my messages to the BSM log? If so, how do I do that? I'm not finding any API's for that. Any URLs, samples, guidance would be appreciated. (0 Replies)
Discussion started by: JDO
0 Replies

3. UNIX for Dummies Questions & Answers

solaris BSM and Auditing

Hi Guys, I am new to this forum so I am sorry if i posted this thread in the wrong place. I am currently trying to get BSM to work on solaris 10 by Logging few things for me. I need your help to complete this task please. this is the config of the audit files: audit_conto # Copyright... (18 Replies)
Discussion started by: skywalker850i
18 Replies

4. Solaris

audit in solaris

How do I know that audit is enabled in soalris. in AIX 'audit query' command gives me the info whether auditing is on or not. Raghav (1 Reply)
Discussion started by: raghavender_sri
1 Replies

5. Solaris

audit in solaris 10

can you please share what you use to audit what files are deleted, when files are deleted and who deleted them? thx (1 Reply)
Discussion started by: melanie_pfefer
1 Replies

6. Solaris

Audit in Solaris Servers.

Hi Friends I am a Solaries newbie and I am looking out for a software or command or config that can capture all commands run by all users on a server on a daily basis. I believe that this Audit is being done in almost all enterprises and would like to know how the same is done there. Any... (3 Replies)
Discussion started by: Hari_Ganesh
3 Replies

7. Solaris

BSM auditing issues, need to audit "permission denied"

Let me preface with I am semi-new to Solaris. I work with it in the labs at work and that's about my extent (although I run Linux at home). Well, a week ago security comes around with updated requirements, some of which are the need to audit all failures. For the life of me I cannot get a... (0 Replies)
Discussion started by: mph275
0 Replies

8. Cybersecurity

audit user in BSM/C2 Log

Hi, I keep encountering events in the BSM/C2 logs which shows that the audit-user who performed the event is the user (e.g. ongkk in the example below). However, the user is able to show me that he wasn't logged in at that time nor have the rights to perform the event (e.g. su in this example).... (5 Replies)
Discussion started by: BERNIELEE68
5 Replies

9. Solaris

Enabling Solaris Audit log: Solaris 9

Dear All, I have one of my Servers, running Solaris 9. I wanna enable the Audit log enabling, the way I did in Solaris 10 Servers. After running, the bsmconv script, giving the reboots, modifying all the audit files in /etc/security, the audit is enabled, but the audit file which shall be... (3 Replies)
Discussion started by: sumeet1806
3 Replies

10. Solaris

How can I read Solaris BSM log?

Hi all, I'm trying to read Solaris BSM log in user friendly form. Found old tools including bsmparser java tool and php code. But none of them working. What are you using for parsing BSM log? (2 Replies)
Discussion started by: sembii
2 Replies
pmvarrun(8)							     pam_mount							       pmvarrun(8)

Name
       pmvarrun - updates /var/run/pam_mount/user

Syntax
       pmvarrun -u user [options]

Description
       A  separate  program is needed so that /var/run/pam_mount/user may be created with a pam_mount-specific security context (otherwise SELinux
       policy will conflict with gdm, which also creates file in /var/run).

       pmvarrun is flexible and can run in a number of different security setups:

   root-root
       When pmvarrun is invoked as root, /var/run/pam_mount's permission settings can be as strict as needed; usually (0755,root,root) is  a  good
       pick  as  it  gives  users the debug control over their refcount. Refcount files are given their respective owners (chowned to the user who
       logs in).

   user-user
       When invoked as the user who logs in, /var/run/pam_mount needs appropriate permissions to create a file, which means the write bit must	be
       set. It is also highly suggested to set the sticky bit in this case, so other users do not tamper with your refcount.

   root-user
       Some  programs or login helpers incorrectly call the PAM stack in a way that the login phase is done as root and the logout phase as a nor-
       mal user.  Nevertheless, pmvarrun supports this, and the same permissions as in root-root can be used. While the user may not  be  able	to
       unlink his file from /var/run/pam_mount, it will be truncated to indicate the same state.

Options
       --help, -h
	      Display help.

       --user user, -u user
	      User to handle, must be a valid username.

       --operation number, -o number
	      Increase volume count by number.

       -d     Turn on debugging.

Files
       /var/run/pam_mount/user

Author
       This  manpage  was originally written by Bastian Kleineidam <calvin@debian.org> for the Debian distribution of libpam-mount but may be used
       by others.

       See /usr/share/doc/packages/pam_mount/AUTHORS for the list of original authors of pam_mount.

pam_mount							    2008-10-08							       pmvarrun(8)
All times are GMT -4. The time now is 04:04 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy