summaryrefslogtreecommitdiff
path: root/static/freebsd/man4/audit.4 3.html
diff options
context:
space:
mode:
Diffstat (limited to 'static/freebsd/man4/audit.4 3.html')
-rw-r--r--static/freebsd/man4/audit.4 3.html122
1 files changed, 122 insertions, 0 deletions
diff --git a/static/freebsd/man4/audit.4 3.html b/static/freebsd/man4/audit.4 3.html
new file mode 100644
index 00000000..7ef98101
--- /dev/null
+++ b/static/freebsd/man4/audit.4 3.html
@@ -0,0 +1,122 @@
+<table class="head">
+ <tr>
+ <td class="head-ltitle">AUDIT(4)</td>
+ <td class="head-vol">Device Drivers Manual</td>
+ <td class="head-rtitle">AUDIT(4)</td>
+ </tr>
+</table>
+<div class="manual-text">
+<section class="Sh">
+<h1 class="Sh" id="NAME"><a class="permalink" href="#NAME">NAME</a></h1>
+<p class="Pp"><code class="Nm">audit</code> &#x2014; <span class="Nd">Security
+ Event Audit</span></p>
+</section>
+<section class="Sh">
+<h1 class="Sh" id="SYNOPSIS"><a class="permalink" href="#SYNOPSIS">SYNOPSIS</a></h1>
+<p class="Pp"><code class="Cd">options AUDIT</code></p>
+</section>
+<section class="Sh">
+<h1 class="Sh" id="DESCRIPTION"><a class="permalink" href="#DESCRIPTION">DESCRIPTION</a></h1>
+<p class="Pp">Security Event Audit is a facility to provide fine-grained,
+ configurable logging of security-relevant events, and is intended to meet
+ the requirements of the Common Criteria (CC) Common Access Protection
+ Profile (CAPP) evaluation. The <span class="Ux">FreeBSD</span>
+ <code class="Nm">audit</code> facility implements the de facto industry
+ standard BSM API, file formats, and command line interface, first found in
+ the Solaris operating system. Information on the user space implementation
+ can be found in <a class="Xr">libbsm(3)</a>.</p>
+<p class="Pp">Audit support is enabled at boot, if present in the kernel, using
+ an <a class="Xr">rc.conf(5)</a> flag. The audit daemon,
+ <a class="Xr">auditd(8)</a>, is responsible for configuring the kernel to
+ perform <code class="Nm">audit</code>, pushing configuration data from the
+ various audit configuration files into the kernel.</p>
+<section class="Ss">
+<h2 class="Ss" id="Audit_Special_Device"><a class="permalink" href="#Audit_Special_Device">Audit
+ Special Device</a></h2>
+<p class="Pp">The kernel <code class="Nm">audit</code> facility provides a
+ special device, <span class="Pa">/dev/audit</span>, which is used by
+ <a class="Xr">auditd(8)</a> to monitor for <code class="Nm">audit</code>
+ events, such as requests to cycle the log, low disk space conditions, and
+ requests to terminate auditing. This device is not intended for use by
+ applications.</p>
+</section>
+<section class="Ss">
+<h2 class="Ss" id="Audit_Pipe_Special_Devices"><a class="permalink" href="#Audit_Pipe_Special_Devices">Audit
+ Pipe Special Devices</a></h2>
+<p class="Pp">Audit pipe special devices, discussed in
+ <a class="Xr">auditpipe(4)</a>, provide a configurable live tracking
+ mechanism to allow applications to tee the audit trail, as well as to
+ configure custom preselection parameters to track users and events in a
+ fine-grained manner.</p>
+</section>
+<section class="Ss">
+<h2 class="Ss" id="DTrace_Audit_Provider"><a class="permalink" href="#DTrace_Audit_Provider">DTrace
+ Audit Provider</a></h2>
+<p class="Pp">The DTrace Audit Provider, <a class="Xr">dtaudit(4)</a>, allows D
+ scripts to enable capture of in-kernel audit records for kernel audit event
+ types, and then process their contents during audit commit or BSM
+ generation.</p>
+</section>
+</section>
+<section class="Sh">
+<h1 class="Sh" id="SEE_ALSO"><a class="permalink" href="#SEE_ALSO">SEE
+ ALSO</a></h1>
+<p class="Pp"><a class="Xr">auditreduce(1)</a>, <a class="Xr">praudit(1)</a>,
+ <a class="Xr">audit(2)</a>, <a class="Xr">auditctl(2)</a>,
+ <a class="Xr">auditon(2)</a>, <a class="Xr">getaudit(2)</a>,
+ <a class="Xr">getauid(2)</a>, <a class="Xr">poll(2)</a>,
+ <a class="Xr">select(2)</a>, <a class="Xr">setaudit(2)</a>,
+ <a class="Xr">setauid(2)</a>, <a class="Xr">libbsm(3)</a>,
+ <a class="Xr">auditpipe(4)</a>, <a class="Xr">dtaudit(4)</a>,
+ <a class="Xr">audit.log(5)</a>, <a class="Xr">audit_class(5)</a>,
+ <a class="Xr">audit_control(5)</a>, <a class="Xr">audit_event(5)</a>,
+ <a class="Xr">audit_user(5)</a>, <a class="Xr">audit_warn(5)</a>,
+ <a class="Xr">rc.conf(5)</a>, <a class="Xr">audit(8)</a>,
+ <a class="Xr">auditd(8)</a>, <a class="Xr">auditdistd(8)</a></p>
+</section>
+<section class="Sh">
+<h1 class="Sh" id="HISTORY"><a class="permalink" href="#HISTORY">HISTORY</a></h1>
+<p class="Pp">The OpenBSM implementation was created by McAfee Research, the
+ security division of McAfee Inc., under contract to Apple Computer Inc. in
+ 2004. It was subsequently adopted by the TrustedBSD Project as the
+ foundation for the OpenBSM distribution.</p>
+<p class="Pp">Support for kernel <code class="Nm">audit</code> first appeared in
+ <span class="Ux">FreeBSD 6.2</span>.</p>
+</section>
+<section class="Sh">
+<h1 class="Sh" id="AUTHORS"><a class="permalink" href="#AUTHORS">AUTHORS</a></h1>
+<p class="Pp">This software was created by McAfee Research, the security
+ research division of McAfee, Inc., under contract to Apple Computer Inc.
+ Additional authors include <span class="An">Wayne Salamon</span>,
+ <span class="An">Robert Watson</span>, and SPARTA Inc.</p>
+<p class="Pp">The Basic Security Module (BSM) interface to audit records and
+ audit event stream format were defined by Sun Microsystems.</p>
+<p class="Pp">This manual page was written by <span class="An">Robert
+ Watson</span>
+ &lt;<a class="Mt" href="mailto:rwatson@FreeBSD.org">rwatson@FreeBSD.org</a>&gt;.</p>
+</section>
+<section class="Sh">
+<h1 class="Sh" id="BUGS"><a class="permalink" href="#BUGS">BUGS</a></h1>
+<p class="Pp">The <span class="Ux">FreeBSD</span> kernel does not fully validate
+ that audit records submitted by user applications are syntactically valid
+ BSM; as submission of records is limited to privileged processes, this is
+ not a critical bug.</p>
+<p class="Pp">Instrumentation of auditable events in the kernel is not complete,
+ as some system calls do not generate audit records, or generate audit
+ records with incomplete argument information.</p>
+<p class="Pp">Mandatory Access Control (MAC) labels, as provided by the
+ <a class="Xr">mac(4)</a> facility, are not audited as part of records
+ involving MAC decisions.</p>
+<p class="Pp">Currently the <code class="Nm">audit</code> syscalls are not
+ supported for jailed processes. However, if a process has
+ <code class="Nm">audit</code> session state associated with it, audit
+ records will still be produced and a zonename token containing the jail's ID
+ or name will be present in the audit records.</p>
+</section>
+</div>
+<table class="foot">
+ <tr>
+ <td class="foot-date">April 28, 2019</td>
+ <td class="foot-os">FreeBSD 15.0</td>
+ </tr>
+</table>