Date: Mon, 27 Feb 2006 13:44:20 +0000 (GMT) From: Robert Watson <rwatson@FreeBSD.org> To: "Christian S.J. Peron" <csjp@FreeBSD.org> Cc: Perforce Change Reviews <perforce@freebsd.org> Subject: Re: PERFORCE change 92365 for review Message-ID: <20060227133628.W52695@fledge.watson.org> In-Reply-To: <43FFF528.7070100@FreeBSD.org> References: <200602250012.k1P0CgNJ041723@repoman.freebsd.org> <43FFF528.7070100@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 25 Feb 2006, Christian S.J. Peron wrote: >> @@ -795,7 +795,11 @@ >> } >> } >> >> +#ifdef LOG_SECURITY >> openlog("auditd", LOG_CONS | LOG_PID, LOG_SECURITY); >> +#else >> + openlog("auditd", LOG_CONS | LOG_PID, LOG_AUTH); >> +#endif >> syslog(LOG_INFO, "starting...\n"); >> >> if (debug == 0 && daemon(0, 0) == -1) { > > In userspace, we are using LOG_AUTH | LOG_ERR to report audit failures, at > least for login(1) and su(1). Might be a good idea to be consistent, anyway. My general feeling has been that audit-related log material shouldn't go into publically readable logs. LOG_SECURITY works well for this on FreeBSD; however, LOG_AUTHPRIV is probably the better place for the log messages to go so that they don't enter a world-readable log file on other systems? This looks like it will work on Linux and Darwin. On Solaris, there's a LOG_AUDIT, which has the same underlying numeric value as LOG_SECURITY on FreeBSD. Robert N M Watson
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060227133628.W52695>