![Novell LINUX ENTERPRISE DESKTOP 11 Скачать руководство пользователя страница 408](http://html1.mh-extra.com/html/novell/linux-enterprise-desktop-11/linux-enterprise-desktop-11_manual_1711827408.webp)
auid
The audit ID. A process is given an audit ID on user login. This ID is then handed
down to any child process started by the initial process of the user. Even if the user
changes his identity (for example, becomes
root
), the audit ID stays the same.
Thus you can always trace actions to the original user who logged in.
uid
The user ID of the user who started the process. In this case,
0
for
root
.
gid
The group ID of the user who started the process. In this case,
0
for
root
.
euid
,
suid
,
fsuid
Effective user ID, set user ID, and file system user ID of the user that started the
process.
egid
,
sgid
,
fsgid
Effective group ID, set group ID, and file system group ID of the user that started
the process.
tty
The terminal from which the application is started. In this case, a pseudoterminal
used in an SSH session.
ses
The login session ID. This process attribute is set when a user logs in and can tie
any process to a particular user login.
comm
The application name under which it appears in the task list.
exe
The resolved pathname to the binary program.
subj
auditd records whether the process is subject to any security context, such as
AppArmor.
unconstrained
, as in this case, means that the process is not con-
fined with AppArmor. If the process had been confined, the binary pathname plus
the AppArmor profile mode would have been logged.
394
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......