User's Manual

Solaris 9 Security CX-310-301 32
Interpreting the Results
Continuing the example scenario, you now want to inspect the audit file(s) to see if any files have been
deleted by the root user. Use the auditreduce command to select only the records of interest and then pipe
the result to praudit to present the data in readable form. The following command achieves this:
# auditreduce –a 20040412 –u root –c fd | praudit
header,127,2,unlink(2),,Tue Apr 13 10:27:34 BST 2004, + 917 msec
path,/etc/inet/hosts attribute,100444,root,other,32,2619,0
subject,root,root,other,root,other,521,390,0 0 ultra
return,success,0
The above command searches the audit data files (in /var/audit) for the date 20040412, the user root and
the class fd (file deletions). It returns the item of interest showing that user root deleted the file
/etc/inet/hosts and that the deletion was successful.
There are other search criteria for use with auditreduce. Consult the man pages for detailed options.
The audit command
This command sends instructions to the auditd daemon process. It has three options:
¾ -n – Close the current log file and open a new one
¾ -s - Re-read the configuration files
¾ -t – Close the current log file and terminate
Audit Log Files
The default location for audit log files is /var/audit. This is specified in the configuration file
/etc/security/audit_control. Each log file has the following format:
<startdatetime>.<enddatetime>.<hostname>
So, for a file that started at 0813 on 9 Apr 2004 and ended at 0906 on the same day for hostname “ultra”,
the file would be:
20040409081343.20040409090640.ultra
If the file is still being written to, i.e. the current log file, then it’s name would take the form:
<startdatetime>.not_terminated.<hostname>
If the filename above was still the active file, then it’s name would have been:
20040409081343.not_terminated.ultra