32.5 Monitoring Miscellaneous
System Calls
As well as auditing file system related system calls, as described in
Section 32.3,
“Monitoring File System Objects”
(page 426), you can also track various other system
calls. Tracking task creation helps you understand your applications' behavior. Auditing
the umask system call lets you track how processes modify permissions. Tracking any
attempts to change the system time helps you identify anyone or any process trying to
manipulate the system time.
❶
-a entry,always -S clone -S fork -S vfork
## For ia64 architecture, disable fork and vfork rules above, and
## enable the following:
#-a entry,always -S clone2
❷
-a entry,always -S umask
❸
-a entry,always -S adjtimex -S settimeofday
❶
Track task creation. To enable task tracking on the ia64 architecture, comment
the first rule and enable the second one.
❷
Add an audit context to the umask system call.
❸
Track attempts to change the system time.
adjtimex
can be used to skew the
time.
settimeofday
sets the absolute time.
32.6 Filtering System Call Arguments
In addition to the system call auditing introduced in
Section 32.3, “Monitoring File
System Objects”
(page 426) and
Section 32.5, “Monitoring Miscellaneous System Calls”
(page 430), you can track application behavior to an even higher degree. Applying filters
helps you focus audit on areas of primary interest to you. This section introduces filtering
system call arguments for nonmultiplexed system calls like access and for multiplexed
ones like socketcall or ipc. Whether system calls are multiplexed depends on the hard-
ware architecture used. Both socketcall and ipc are not multiplexed on 64-bit architec-
tures, such as x86_64 and ia64.
430
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......