There are a few differences, but should not matter with BSM.

One is a U40 AMD, the other is a U80 SPARC.
Both systems have a different (working) label_encodings file.
Once system (working) tracks arge in addition.
One system has a secondary audit dir on zfs, but is not currently  
being used.

/etc/security/audit_startup
/usr/sbin/auditconfig -setpolicy +cnt,zonename,arge,argv,seq
/usr/sbin/auditconfig -conf
/usr/sbin/auditconfig -acon

/etc/security/audit_control
dir:/var/audit
flags:lo,na,ad,ap
minfree:20
naflags:lo
plugin: name=audit_syslog.so;p_flags=lo,+ad

/etc/security/audit_user
root:lo:no
me:lo,ad,fd,fc,ex:no

You asked for auditconfig -lspolicy, but I assume you ment  
auditconfig -getpolicy.  Included both just in case.


Working System U40

[ifconfig -a]
# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu  
8232 index 1
         inet 127.0.0.1 netmask ff000000
lo0:1: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL>  
mtu 8232 index 1
         zone SLALPHA
         inet 127.0.0.1 netmask ff000000
lo0:2: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL>  
mtu 8232 index 1
         zone PUBLIC
         inet 127.0.0.1 netmask ff000000
lo0:3: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL>  
mtu 8232 index 1
         zone SL
         inet 127.0.0.1 netmask ff000000
lo0:4: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL>  
mtu 8232 index 1
         zone SLBRAVO
         inet 127.0.0.1 netmask ff000000
lo0:5: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL>  
mtu 8232 index 1
         zone SLCHARLEY
         inet 127.0.0.1 netmask ff000000
nge0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500  
index 2
         all-zones
         inet 192.168.15.99 netmask ffffff00 broadcast 192.168.15.255
         ether 0:14:4f:3b:8d:60
nge0:3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500  
index 2
         inet 192.168.15.98 netmask ffffff00 broadcast 192.168.15.255

[Loaded Policies]
auditconfig -getpolicy
audit policies = arge,argv,cnt,seq,zonename

[List Available Policies]
auditconfig -lspolicy
policy string    description:
ahlt             halt machine if it can not record an async event
all              all policies
arge             include exec environment args in audit recs
argv             include exec command line args in audit recs
cnt              when no more space, drop recs and keep a cnt
group            include supplementary groups in audit recs
none             no policies
path             allow multiple paths per event
perzone          use a separate queue and auditd per zone
public           audit public files
seq              include a sequence number in audit recs
trail            include trailer token in audit recs
windata_down     include downgraded window information in audit recs
windata_up       include upgraded window information in audit recs
zonename         generate zonename token

Broken System: U80

[ifconfig -a]
  ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu  
8232 index 1
         inet 127.0.0.1 netmask ff000000
lo0:1: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL>  
mtu 8232 index 1
         zone tsolmro1
         inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500  
index 2
         all-zones
         inet 172.26.20.14 netmask ffff0000 broadcast 172.26.255.255
         ether 8:0:20:f7:c6:59
hme0:1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500  
index 2
         zone tsolmro1
         inet 172.26.20.160 netmask ffff0000 broadcast 172.26.255.255

[List Loaded Policies]

auditconfig -getpolicy
audit policies = argv,cnt,seq,zonename

[List Available Policies]

auditconfig -lspolicy
policy string    description:
ahlt             halt machine if it can not record an async event
all              all policies
arge             include exec environment args in audit recs
argv             include exec command line args in audit recs
cnt              when no more space, drop recs and keep a cnt
group            include supplementary groups in audit recs
none             no policies
path             allow multiple paths per event
perzone          use a separate queue and auditd per zone
public           audit public files
seq              include a sequence number in audit recs
trail            include trailer token in audit recs
windata_down     include downgraded window information in audit recs
windata_up       include upgraded window information in audit recs
zonename         generate zonename token


On May 18, 2007, at 4:19 AM, Darren J Moffat wrote:

> Robert Bailey wrote:
>> I was wondering if anyone has run into this.  I have two TX  
>> systems, each with the same BSM configuration, that has zonename  
>> enabled.
>> On one TX system I have my local zones configured to run without  
>> IP addreses.  In the global, there is one IP for all-zones, one  
>> without the all-zones tag.  This system can report via BSM, on all  
>> transactions within a local zone.
>> The second system,  has the same BSM configuration, but for the  
>> local zone configuration there is an IP on the local zone, the  
>> global has one with an all-zones.  This system does not report any  
>> audit trail for the local zone except for one entry for zoneadmd.
>
> Can you send the output of `auditconfig -lspolicy` for both machines.
> Also ifconfig -a from the global zone for both machines.
>
> If I understand correctly you have: `auditconfig -setpolicy  
> +zonename` for both but have only a global zone audit log configured ?
>
>
>
> -- 
> Darren J Moffat

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/security-discuss/attachments/20070518/e8d36954/attachment.html>

Reply via email to