PERFORCE change 92365 for review

Robert Watson rwatson at FreeBSD.org
Mon Feb 27 05:40:57 PST 2006


On Sat, 25 Feb 2006, Christian S.J. Peron wrote:

>> @@ -795,7 +795,11 @@
>> 		}
>> 	}
>> 
>> +#ifdef LOG_SECURITY
>> 	openlog("auditd", LOG_CONS | LOG_PID, LOG_SECURITY);
>> +#else
>> +	openlog("auditd", LOG_CONS | LOG_PID, LOG_AUTH);
>> +#endif
>> 	syslog(LOG_INFO, "starting...\n");
>> 
>> 	if (debug == 0 && daemon(0, 0) == -1) {
>
> In userspace, we are using LOG_AUTH | LOG_ERR to report audit failures, at 
> least for login(1) and su(1). Might be a good idea to be consistent, anyway.

My general feeling has been that audit-related log material shouldn't go into 
publically readable logs.  LOG_SECURITY works well for this on FreeBSD; 
however, LOG_AUTHPRIV is probably the better place for the log messages to go 
so that they don't enter a world-readable log file on other systems?  This 
looks like it will work on Linux and Darwin.  On Solaris, there's a LOG_AUDIT, 
which has the same underlying numeric value as LOG_SECURITY on FreeBSD.

Robert N M Watson


More information about the trustedbsd-cvs mailing list