Alas, if Darren is looking for a general solution, C2 auditing is very 
definitely
not the norm in the customer base.

Jim
---
Gary Winiger wrote:
>> Before I start hacking on code, is there some other area of
>> Solaris's security that should be leveraged to do this?
>>     
>
>       Yes.
>
>   
>> For example, are there any C2 audit events that collect
>> information like this?
>>     
>
>       We like to call it Solaris Audit, C2 is very last centurary ;-)
>
>       Any how a slight revision to what Jan said.  If all you want
>       is failed login attempts, then all you need in audit_control(4)
>       is naflags:lo.  If you want both successful and failed,
>       then flags:lo is also needed.
>
>       To set things up, you still need to run bsmconv(1M) and reboot.
>       Configure audit_control as noted.  If this is all the audit
>       you're collecting, you could get away without running auditreduce.
>       The command Jan showed will get you just sshd logins.  If you care
>       about all logins/su/screenlocks/... just run praudit to convert
>       the binary to human (un)readable.  If you're looking for just the
>       IP address, praudit -r gets that untranslated.  For IP addresses
>       that can't be mapped to host names, praudit without the -r will
>       just put them out in dot (or colon) form.
>
> Gary..
> P.S.  Hope you had a good trip home.  Enjoy the holidays....
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org
>   


Reply via email to