AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)
Check Out this Related Man Page
AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)
Hi all
When I run netstat, it just hangs there and after a while comes back. I cannot figure out why as the server is functioninng well.
Thx
J (5 Replies)
Hello,
One of our developers is asking for a command/script in Solaris similar to "netstat -anp" in Linux. He gave this output as an example:
root@xxx:~# netstat -anp | grep LISTEN
tcp 0 0 0.0.0.0:7937 0.0.0.0:* LISTEN 16082/nsrexecd
tcp 0 ... (7 Replies)
Hi, I have a problem..
1) I have a file that contains the lines as below :
VRF-TM_DummyLab/mse02.lab,mse02.lab,ge-2/0/7.222
VRF-EMS_HUAWEI_MSAN_208/mse01.lab,mse01.lab,xe-1/0/0.208
2) I need a method to read this file, line by line
from :... (5 Replies)
Hello,
My config:
SLES 10 sp1
Apache / drupal / mysql
I have a saturation of TCP ports on this hosts. Hosting about 60 websites. The event tonight was ~200 hits minutes.
With "netstat-n" I see ~5500 connections. Including approximately 3800 in FIN_WAIT1.
As a first step I would... (3 Replies)
Hi,
Does anyone know why I get a different output when using "netstat -a" or "netstat -an" ??
# netstat -a | grep ts15r135
tcp 0 0 nbsol152.62736 ts15r135.23211 ESTABLISHED
# netstat -an | grep 172.23.160.78
tcp 0 0 135.246.39.152.51954 ... (4 Replies)
Hey guys,
I need to kill the process that is currently connected to port 10540. I'm on HP-UX machine.
Below is the result of my netstat.
$ netstat -an |grep 10540
tcp 0 0 129.0.0.1.10540 *.* LISTEN
We don't have lsof command, but we have fuser.
... (3 Replies)
Hi,
I have a server which receive lots of events to it and when I do netstat -Ie1000g0, I'm seeing the errors as below.
Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs Collis Queue
e1000g0 1500 abc-1.com abc-1.com 3093708246 12757 92069412 0
0 0
If anyone could direct me to right... (3 Replies)
Experts,
I am finding the split up of the Servers which uses the netstat on a specific port.
netstat -a | grep -w 9071 |grep ESTABLISHED | awk '{print $5}' | cut -d'.' -f1 | sort -n | uniq -c
1 ser7b
1 ser7c
2 ser7d
2 ser7e
1 ser7f
1 ser7h
1 ser7i
1 ser8bI am... (5 Replies)
Hi All,
Need to run the netstat -i command on the list of hosts and check if "Ierrs" and "Oerrs" has value greaterthan 0.
for Ex: below output, driver bge1 and bge3 has Oerrs and Ierrs value > 0, So, script should report saying
"Netstat status for $host, driver bge1 has Oerrs = 20, Failed"... (5 Replies)
netstat | awk '/server/ {for(i=1;i<2;i++) {getline;print}'
Output:
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
TIME_WAIT
TIME_WAIT
From the above command I'm getting all the states. I want to count the states and write to a file, like
"Count of ESTABLISHED... (6 Replies)
Hi All,
We have this regex:\\*.*?(.600).*?.(LISTEN|ESTABLISHED)
OS = Solaris 10
The purpose of this regex is to match the ports in output of "netstat -an" and report if any ports between 6000-6009 are getting used. The only problem is if I have something like this (sample output as... (6 Replies)
Hello All,
I am using netstat on HP-UX to retrieve the established network connections on my host. Can anyone please confirm how can I retrieve the PID and program name as well for these connections? These are available from the netstat version on Windows but I don't see PID and program name to... (10 Replies)
Hi Team,
Below is the output of netstat -an | grep 1533
tcp 0 0 17.18.18.12:583 10.3.2.0:1533 ESTABLISHED
tcp 0 0 17.18.18.12:370 10.3.2.0:1533 ESTABLISHED
Below is the o/p of netstat -a | grep server_name
tcp 0 ... (4 Replies)
Hi All,
I am trying to collect the listen ports info from netstat command in centos 7
From that info i am trying to collect all the foreign address IP for those ports.
I am using below script to do the same.
netstat -an |grep -w "LISTEN" |grep -v "127.0.0.1" |awk '{print $4}' >... (3 Replies)