<?Pub UDT _bookmark _target?><chapter id="audtask-1"><?Pub Tag atict:info tracking="off" ref="10"?><?Pub Tag atict:user user="sharonr" fullname="Sharon Veach"?><title>Trusted Extensions Auditing
(Overview)</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>reference</secondary>
</indexterm><highlights><itemizedlist remap="jumplist"><para>This chapter describes the additions to auditing that Solaris Trusted Extensions provides.</para><listitem><para><olink targetptr="audtask-14" remap="internal">Trusted Extensions and Auditing</olink></para>
</listitem><listitem><para><olink targetptr="audtask-3" remap="internal">Audit Management by Role in Trusted
Extensions</olink></para>
</listitem><listitem><para><olink targetptr="audtask-25" remap="internal">Trusted Extensions Audit Reference</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="audtask-14"><title>Trusted Extensions and Auditing</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>differences from Solaris auditing</secondary>
</indexterm><indexterm><primary>differences</primary><secondary>between Trusted Extensions and Solaris auditing</secondary>
</indexterm><indexterm><primary>Trusted Extensions</primary><secondary>differences from Solaris auditing</secondary>
</indexterm><indexterm><primary>Solaris OS</primary><secondary>differences from Trusted Extensions auditing</secondary>
</indexterm><indexterm><primary>similarities</primary><secondary>between Trusted Extensions and Solaris auditing</secondary>
</indexterm><indexterm><primary>Trusted Extensions</primary><secondary>similarities with Solaris auditing</secondary>
</indexterm><indexterm><primary>Solaris OS</primary><secondary>similarities with Trusted Extensions auditing</secondary>
</indexterm><itemizedlist><para>On a system that is configured with Trusted Extensions software, auditing
is configured and is administered similarly to auditing on a Solaris system.
However, the following are some differences.</para><listitem><para>Trusted Extensions software adds audit classes, audit events,
audit tokens, and audit policy options to the system.</para>
</listitem><listitem><para>By default, auditing is enabled in Trusted Extensions software.</para>
</listitem><listitem><para>Solaris per-zone auditing is not supported. In Trusted Extensions,
all zones are audited identically.</para>
</listitem><listitem><para>Trusted Extensions provides administrative tools to administer
the users' audit characteristics and to edit audit files.</para>
</listitem><listitem><para>Two roles, System Administrator and Security Administrator,
are used to configure and administer auditing in Trusted Extensions.</para><para>The
security administrator plans what to audit and any site-specific, event-to-class
mappings. As in the Solaris OS, the system administrator plans disk space requirements
for the audit files, creates an audit administration server, and installs
audit configuration files.</para>
</listitem>
</itemizedlist>
</sect1><sect1 id="audtask-3"><title>Audit Management by Role in Trusted Extensions</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>roles for administering</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>auditing in Trusted Extensions</secondary>
</indexterm><para>Auditing in Trusted Extensions requires the same planning as in the Solaris OS.
For details about planning, see <olink targetdoc="group-sa" targetptr="auditplan-1" remap="external">Chapter 29, <citetitle remap="chapter">Planning for Solaris Auditing,</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>.</para><sect2 id="audtask-56"><title>Role Setup for Audit Administration</title><indexterm><primary>roles</primary><secondary>administering auditing</secondary>
</indexterm><para>In Trusted Extensions, auditing is the responsibility of two roles. The
System Administrator role sets up the disks and the network of audit storage.
The Security Administrator role decides what is to be audited, and specifies
the information in the audit configuration files. As in the Solaris OS, you create
the roles in software. The rights profiles for these two roles are provided.
The initial setup team created the Security Administrator role during initial
configuration. For details, see <olink targetptr="txconf-23" remap="internal">Create the
Security Administrator Role in Trusted Extensions</olink>.</para><note><para>A system only records the security-relevant events that the audit
configuration files configure the system to record (that is, by preselection).
Therefore, any subsequent audit review can only consider the events that have
been recorded. As a result of misconfiguration, attempts to breach the security
of the system can go undetected, or the administrator is unable to detect
the user who is responsible for an attempted breach of security. Administrators
must regularly analyze audit trails to check for breaches of security.</para>
</note>
</sect2><sect2 id="audtask-58"><title>Audit Tasks in Trusted Extensions</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>tasks</secondary>
</indexterm><itemizedlist><para>The procedures to configure and manage auditing in Trusted Extensions differ
slightly from Solaris procedures:</para><listitem><para>Audit configuration is performed in the global zone by one
of two administrative roles. Then, the system administrator copies specific
customized audit files from the global zone to every labeled zone. By following
this procedure, user actions are audited identically in the global zone and
in labeled zones.</para><para>For details, see <olink targetptr="audtask-30" remap="internal">Audit
Tasks of the Security Administrator</olink> and <olink targetptr="audtask-28" remap="internal">Audit
Tasks of the System Administrator</olink></para>
</listitem><listitem><para>Trusted Extensions administrators use a trusted editor to edit
audit configuration files. In Trusted CDE, Trusted Extensions administrators use CDE
actions to invoke the trusted editor. For the list of actions, see <olink targetptr="txtool-3" remap="internal">Trusted CDE Actions</olink>.</para>
</listitem><listitem><para>Trusted Extensions administrators use the Solaris Management Console to configure specific
users. User-specific audit characteristics can be specified in this tool.
Specifying user characteristics is only required when the user's audit characteristics
differ from the audit characteristics of the systems on which the user works.
For an introduction to the tool, see <olink targetptr="txtool-8" remap="internal">Solaris Management
Console Tools</olink>.</para>
</listitem>
</itemizedlist>
</sect2><sect2 id="audtask-30"><title>Audit Tasks of the Security Administrator</title><indexterm><primary>tasks and task maps</primary><secondary>Audit Tasks of the Security Administrator</secondary>
</indexterm><indexterm><primary>configuring</primary><secondary>auditing</secondary>
</indexterm><indexterm><primary>auditing in Trusted Extensions</primary><secondary>security administrator tasks</secondary>
</indexterm><indexterm><primary>Security Administrator role</primary><secondary>audit tasks</secondary>
</indexterm><para>The following tasks are security-relevant, and are therefore the responsibility
of the security administrator. Follow the Solaris instructions, but
use the Trusted Extensions administrative tools.</para><informaltable frame="all" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><colspec colname="colspec0" colwidth="97.28*"/><colspec colname="col2" colwidth="163.03*"/><colspec colname="colspec1" colwidth="135.70*"/><thead><row><entry><para>Task</para>
</entry><entry><para>For Solaris Instructions</para>
</entry><entry><para>Trusted Extensions Instructions</para>
</entry>
</row>
</thead><tbody><row><entry><para>Configure audit files.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-15" remap="external"><citetitle remap="section">Configuring Audit Files (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Use the trusted editor. For details, see <olink targetptr="roles-10" remap="internal">How
to Edit Administrative Files in Trusted Extensions</olink>.</para>
</entry>
</row><row><entry><para>(Optional) Change default audit policy.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-18" remap="external"><citetitle remap="section">How to Configure Audit Policy</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Use the trusted editor.</para>
</entry>
</row><row><entry><para>Disable and re-enable auditing.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-31" remap="external"><citetitle remap="section">How to Disable the Auditing Service</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Auditing is enabled by default.</para>
</entry>
</row><row><entry><para>Manage auditing.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-3" remap="external"><citetitle remap="section">Solaris Auditing (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Use the trusted editor.</para><para>Ignore per-zone audit tasks.</para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect2><sect2 id="audtask-28"><title>Audit Tasks of the System Administrator</title><indexterm><primary>Audit Tasks of the System Administrator</primary>
</indexterm><indexterm><primary>tasks and task maps</primary><secondary>Audit Tasks of the System Administrator</secondary>
</indexterm><indexterm><primary>auditing in Trusted Extensions</primary><secondary>system administrator tasks</secondary>
</indexterm><indexterm><primary>System Administrator role</primary><secondary>audit tasks</secondary>
</indexterm><para>The following tasks are the responsibility of the system administrator.
Follow the Solaris instructions, but use the Trusted Extensions administrative
tools.</para><informaltable frame="all" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><colspec colname="colspec0" colwidth="128.03*"/><colspec colname="col2" colwidth="138.09*"/><colspec colname="colspec1" colwidth="129.88*"/><thead><row><entry><para>Task</para>
</entry><entry><para>For Solaris Instructions</para>
</entry><entry><para>Trusted Extensions Instructions</para>
</entry>
</row>
</thead><tbody><row><entry><para>Create audit partitions and an audit administration server, export audit
partitions, and mount audit partitions.</para><para>Create an <literal>audit_warn</literal> alias.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-28" remap="external"><citetitle remap="section">Configuring and Enabling the Auditing Service (Tasks)</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Perform all administration in the global zone.</para><para>Use the trusted editor.</para>
</entry>
</row><row><entry><para>Copy or loopback mount customized audit files to labeled zones.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-26" remap="external"><citetitle remap="section">Configuring the Auditing Service in Zones (Tasks)</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Copy the files to the first labeled zone, then copy the zone.</para><para>Or, loopback mount or copy the files to every labeled zone after the
zones are created.</para>
</entry>
</row><row><entry><para>(Optional) Distribute audit configuration files.</para>
</entry><entry><para>No instructions</para>
</entry><entry><para>See <olink targetptr="basic-25" remap="internal">How to Copy
Files From Portable Media in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Manage auditing.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-3" remap="external"><citetitle remap="section">Solaris Auditing (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>Ignore per-zone audit tasks.</para>
</entry>
</row><row><entry><para><indexterm><primary>System Administrator role</primary><secondary>reviewing audit records</secondary></indexterm><indexterm><primary>Audit Review profile</primary><secondary>reviewing audit records</secondary></indexterm><indexterm><primary>selecting</primary><secondary>audit records by label</secondary></indexterm><indexterm><primary>accessing</primary><secondary>audit records by label</secondary></indexterm>Select audit records by label.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-24" remap="external"><citetitle remap="section">How to Select Audit Events From the Audit Trail</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry><entry><para>To select records by label, use the <command>auditreduce</command> command
with the <option>l</option> option.</para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect2>
</sect1><sect1 id="audtask-25"><title>Trusted Extensions Audit Reference</title><para>Trusted Extensions software adds audit classes, audit events, audit tokens,
and audit policy options to the Solaris OS. Several auditing commands are extended
to handle labels. Trusted Extensions audit records include a label, as shown in
the following figure.</para><figure id="audtask-fig-1"><title>Typical Audit Record on a Labeled System</title><mediaobject><imageobject><imagedata entityref="tokens.epsi"/>
</imageobject><textobject><simpara>Illustration shows four tokens in order - header, subject,
label, and return - that comprise a typical audit record.</simpara>
</textobject>
</mediaobject>
</figure><sect2 id="audtask-50"><title>Trusted Extensions Audit Classes</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>X audit classes</secondary>
</indexterm><indexterm><primary>X audit classes</primary>
</indexterm><indexterm><primary>audit classes for Trusted Extensions</primary><secondary>list of new X audit classes</secondary>
</indexterm><para>The audit classes that Trusted Extensions software adds to the Solaris OS are
listed alphabetically in the following table. The classes are listed in the <filename>/etc/security/audit_class</filename> file. For more information about audit
classes, see the <olink targetdoc="group-refman" targetptr="audit-class-4" remap="external"><citerefentry><refentrytitle>audit_class</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man page.</para><table frame="topbot" id="audtask-45"><title>X Server Audit Classes</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colname="column1" colwidth="68.53*"/><colspec colname="column2" colwidth="210.46*"/><colspec colname="column3" colwidth="90.91*"/><thead><row rowsep="1"><entry align="left" valign="bottom"><para>Short Name</para>
</entry><entry align="left" valign="bottom"><para>Long Name</para>
</entry><entry align="left" valign="bottom"><para>Audit Mask</para>
</entry>
</row>
</thead><tbody><row><entry align="left" valign="top"><para>xc</para>
</entry><entry align="left" valign="top"><para>X - Object create/destroy</para>
</entry><entry align="left" valign="top"><para><indexterm><primary><literal>xc</literal> audit class</primary></indexterm>0x00800000</para>
</entry>
</row><row><entry align="left" valign="top"><para>xp</para>
</entry><entry align="left" valign="top"><para>X - Privileged/administrative operations</para>
</entry><entry align="left" valign="top"><para><indexterm><primary><literal>xp</literal> audit class</primary></indexterm>0x00400000</para>
</entry>
</row><row><entry align="left" valign="top"><para>xs</para>
</entry><entry align="left" valign="top"><para>X - Operations that always silently fail, if bad</para>
</entry><entry align="left" valign="top"><para><indexterm><primary><literal>xs</literal> audit class</primary></indexterm>0x02000000</para>
</entry>
</row><row><entry align="left" valign="top"><para>xx</para>
</entry><entry align="left" valign="top"><para>X - All X events in the xl, xc, xp, and xs classes (meta-class)</para>
</entry><entry align="left" valign="top"><para><indexterm><primary><literal>xx</literal> audit class</primary></indexterm>0x03e00000</para>
</entry>
</row>
</tbody>
</tgroup>
</table><itemizedlist><para>The X server audit events are mapped to these classes according to the
following criteria:</para><listitem><para><emphasis role="strong">xc &ndash;</emphasis> This class audits
server objects for creation or for destruction. For example, this class audits <function>CreateWindow</function>.</para>
</listitem><listitem><para><emphasis role="strong">xp &ndash;</emphasis> This class audits
for use of privilege. Privilege use can be successful or unsuccessful.  For
example, <function>ChangeWindowAttributes</function> is audited when a client
attempts to change the attributes of another client's window. This class also
includes administrative routines such as <function>SetAccessControl</function>.</para>
</listitem><listitem><para><emphasis role="strong">xs &ndash;</emphasis> This class audits
routines that do not return X error messages to clients on failure when security
attributes cause the failure.  For example, <function>GetImage</function> does
not return a <literal>BadWindow</literal> error if it cannot read from a window
for lack of privilege.</para><para>These events should be selected for audit
on success only. When xs events are selected for failure, the audit trail
fills with irrelevant records.</para>
</listitem><listitem><para><emphasis role="strong">xx &ndash;</emphasis> This class includes
all of the X audit classes.</para>
</listitem>
</itemizedlist>
</sect2><sect2 id="audtask-16"><title>Trusted Extensions Audit Events</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>additional audit events</secondary>
</indexterm><indexterm><primary>audit events for Trusted Extensions</primary><secondary>list of</secondary>
</indexterm><para>Trusted Extensions software adds audit events to the system. The new audit
events and the audit classes to which the events belong are listed in the <filename>/etc/security/audit_event</filename> file. The audit event numbers for Trusted Extensions are
between 9000 and 10000. For more information about audit events, see the <olink targetdoc="group-refman" targetptr="audit-event-4" remap="external"><citerefentry><refentrytitle>audit_event</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man page.</para>
</sect2><sect2 id="audtask-52"><title>Trusted Extensions Audit Tokens</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>additional audit tokens</secondary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary>list of</secondary>
</indexterm><para>The audit tokens that Trusted Extensions software adds to the Solaris OS are
listed alphabetically in the following table. The tokens are also listed in
the <olink targetdoc="group-refman" targetptr="audit.log-4" remap="external"><citerefentry><refentrytitle>audit.log</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man
page.</para><table frame="topbot" id="audtask-tbl-2"><title>Trusted Extensions Audit Tokens</title><tgroup cols="2" colsep="0" rowsep="0"><colspec colname="column1" colwidth="256*"/><colspec colname="column2" colwidth="238*"/><thead><row rowsep="1"><entry align="left" valign="bottom"><para>Token Name</para>
</entry><entry align="left" valign="bottom"><para>Description</para>
</entry>
</row>
</thead><tbody><row><entry align="left" valign="top"><para><olink targetptr="audtask-55" remap="internal">label Token</olink></para>
</entry><entry align="left" valign="top"><para>Sensitivity label</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-66" remap="internal">xatom Token</olink></para>
</entry><entry align="left" valign="top"><para>X window atom identification</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-68" remap="internal">xclient Token</olink></para>
</entry><entry align="left" valign="top"><para>X client identification</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-70" remap="internal">xcolormap Token</olink></para>
</entry><entry align="left" valign="top"><para>X window color information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-72" remap="internal">xcursor Token</olink></para>
</entry><entry align="left" valign="top"><para>X window cursor information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-73" remap="internal">xfont Token</olink></para>
</entry><entry align="left" valign="top"><para>X window font information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-74" remap="internal">xgc Token</olink></para>
</entry><entry align="left" valign="top"><para>X window graphical context information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-75" remap="internal">xpixmap Token</olink></para>
</entry><entry align="left" valign="top"><para>Xwindow pixel mapping information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-76" remap="internal">xproperty Token</olink></para>
</entry><entry align="left" valign="top"><para>X window property information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-78" remap="internal">xselect Token</olink></para>
</entry><entry align="left" valign="top"><para>X window data information</para>
</entry>
</row><row><entry align="left" valign="top"><para><olink targetptr="audtask-80" remap="internal">xwindow Token</olink></para>
</entry><entry align="left" valign="top"><para>X window window information</para>
</entry>
</row>
</tbody>
</tgroup>
</table><sect3 id="audtask-55"><title><literal>label</literal> Token</title><indexterm><primary><literal>label</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>label</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>label</literal> token contains a sensitivity label. This
token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>A sensitivity label</para>
</listitem>
</itemizedlist><para>The following figure shows the token format.</para><figure id="audtask-fig-56"><title><literal>label</literal> Token Format</title><mediaobject><imageobject><imagedata entityref="fig415.epsi"/>
</imageobject><textobject><simpara>The context describes the graphic.</simpara>
</textobject>
</mediaobject>
</figure><para>A <literal>label</literal> token is displayed by the <command>praudit</command> command
as follows:</para><screen>sensitivity label,ADMIN_LOW</screen>
</sect3><sect3 id="audtask-66"><title><literal>xatom</literal> Token</title><indexterm><primary><literal>xatom</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xatom</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xatom</literal> token contains information concerning an
X atom. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The string length</para>
</listitem><listitem><para>A text string that identifies the atom</para>
</listitem>
</itemizedlist><para>An <literal>xatom</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X atom,_DT_SAVE_MODE</screen>
</sect3><sect3 id="audtask-68"><title><literal>xclient</literal> Token</title><indexterm><primary><literal>xclient</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xclient</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xclient</literal> token contains information concerning
the X client. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The client ID</para>
</listitem>
</itemizedlist><para>An <literal>xclient</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X client,15</screen>
</sect3><sect3 id="audtask-70"><title><literal>xcolormap</literal> Token</title><indexterm><primary><literal>xcolormap</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xcolormap</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xcolormap</literal> token contains information about the
colormaps. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem>
</itemizedlist><para>The following figure shows the token format.</para><figure id="audtask-fig-71"><title>Format for <literal>xcolormap</literal>, <literal>xcursor</literal>, <literal>xfont</literal>, <literal>xgc</literal>, <literal>xpixmap</literal>, and <literal>xwindow</literal> Tokens</title><mediaobject><imageobject><imagedata entityref="fig417.epsi"/>
</imageobject><textobject><simpara>The context describes the graphic.</simpara>
</textobject>
</mediaobject>
</figure><para>An <literal>xcolormap</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X color map,0x08c00005,srv</screen>
</sect3><sect3 id="audtask-72"><title><literal>xcursor</literal> Token</title><indexterm><primary><literal>xcursor</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xcursor</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xcursor</literal> token contains information about the
cursors. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem>
</itemizedlist><para><olink targetptr="audtask-fig-71" remap="internal">Figure&nbsp;24&ndash;3</olink> shows
the token format.</para><para>An <literal>xcursor</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X cursor,0x0f400006,srv</screen>
</sect3><sect3 id="audtask-73"><title><literal>xfont</literal> Token</title><indexterm><primary><literal>xfont</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xfont</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xfont</literal> token contains information about the fonts.
This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem>
</itemizedlist><para><olink targetptr="audtask-fig-71" remap="internal">Figure&nbsp;24&ndash;3</olink> shows
the token format.</para><para>An <literal>xfont</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X font,0x08c00001,srv</screen>
</sect3><sect3 id="audtask-74"><title><literal>xgc</literal> Token</title><indexterm><primary><literal>xgc</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xgc</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xgc</literal> token contains information about the xgc.
This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem>
</itemizedlist><para><olink targetptr="audtask-fig-71" remap="internal">Figure&nbsp;24&ndash;3</olink> shows
the token format.</para><para>An <literal>xgc</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>Xgraphic context,0x002f2ca0,srv</screen>
</sect3><sect3 id="audtask-75"><title><literal>xpixmap</literal> Token</title><indexterm><primary><literal>xpixmap</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xpixmap</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xpixmap</literal> token contains information about the
pixel mappings. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem>
</itemizedlist><para><olink targetptr="audtask-fig-71" remap="internal">Figure&nbsp;24&ndash;3</olink> shows
the token format.</para><para>An <literal>xpixmap</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X pixmap,0x08c00005,srv</screen>
</sect3><sect3 id="audtask-76"><title><literal>xproperty</literal> Token</title><indexterm><primary><literal>xproperty</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xproperty</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xproperty</literal> token contains information about various
properties of a window. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem><listitem><para>A string length</para>
</listitem><listitem><para>A text string that identifies the atom</para>
</listitem>
</itemizedlist><para>The following figure shows an <literal>xproperty</literal> token format.</para><figure id="audtask-fig-77"><title><literal>xproperty</literal> Token Format</title><mediaobject><imageobject><imagedata entityref="fig418.epsi"/>
</imageobject><textobject><simpara>The context describes the graphic.</simpara>
</textobject>
</mediaobject>
</figure><para>An <literal>xproperty</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X property,0x000075d5,root,_MOTIF_DEFAULT_BINDINGS</screen>
</sect3><sect3 id="audtask-78"><title><literal>xselect</literal> Token</title><indexterm><primary><literal>xselect</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xselect</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xselect</literal> token contains the data that is moved
between windows. This data is a byte stream with no assumed internal structure
and a property string. This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The length of the property string</para>
</listitem><listitem><para>The property string</para>
</listitem><listitem><para>The length of the property type</para>
</listitem><listitem><para>The property type string</para>
</listitem><listitem><para>A length field that gives the number of bytes of data</para>
</listitem><listitem><para>A byte string that contains the data</para>
</listitem>
</itemizedlist><para>The following figure shows the token format.</para><figure id="audtask-fig-79"><title><literal>xselect</literal> Token Format</title><mediaobject><imageobject><imagedata entityref="fig419.epsi" width="100"/>
</imageobject><textobject><simpara>The context describes the graphic.</simpara>
</textobject>
</mediaobject>
</figure><para>An <literal>xselect</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X selection,entryfield,halogen</screen>
</sect3><sect3 id="audtask-80"><title><literal>xwindow</literal> Token</title><indexterm><primary><literal>xwindow</literal> audit token</primary>
</indexterm><indexterm><primary>audit tokens for Trusted Extensions</primary><secondary><literal>xwindow</literal> token</secondary>
</indexterm><itemizedlist><para>The <literal>xwindow</literal> token contains information about a window.
This token contains the following fields:</para><listitem><para>A token ID</para>
</listitem><listitem><para>The X server identifier</para>
</listitem><listitem><para>The creator's user ID</para>
</listitem>
</itemizedlist><para><olink targetptr="audtask-fig-71" remap="internal">Figure&nbsp;24&ndash;3</olink> shows
the token format.</para><para>An <literal>xwindow</literal> token is displayed by <command>praudit</command> as
follows:</para><screen>X window,0x07400001,srv</screen>
</sect3>
</sect2><sect2 id="audtask-18"><title>Trusted Extensions Audit Policy Options</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>additional audit policies</secondary>
</indexterm><indexterm><primary>security policy</primary><secondary>auditing</secondary>
</indexterm><indexterm><primary>audit records in Trusted Extensions</primary><secondary>policy</secondary>
</indexterm><indexterm><primary>audit policy in Trusted Extensions</primary>
</indexterm><para>Trusted Extensions adds two audit policy options to existing Solaris auditing
policy options. List the policies to see the additions:</para><screen>$ <userinput>auditconfig -lspolicy</userinput>
...
windata_down Include downgraded window information in audit records

windata_up   Include upgraded window information in audit records</screen>
</sect2><sect2 id="audtask-27"><title>Extensions to Auditing Commands in Trusted Extensions</title><indexterm><primary>auditing in Trusted Extensions</primary><secondary>additions to existing auditing commands</secondary>
</indexterm><itemizedlist><para>The <command>auditconfig</command>, <command>auditreduce</command>,
and <command>bsmrecord</command> commands are extended to handle Trusted Extensions information:</para><listitem><para>The <command>auditconfig</command> command includes the Trusted Extensions audit
policies. For details, see the <olink targetdoc="group-refman" targetptr="auditconfig-1m" remap="external"><citerefentry><refentrytitle>auditconfig</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink> man page.</para>
</listitem><listitem><para>The <command>auditreduce</command> command adds the <option>l</option> option
for filtering records according to the label. For details, see the <olink targetdoc="group-refman" targetptr="auditreduce-1m" remap="external"><citerefentry><refentrytitle>auditreduce</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink> man page.</para>
</listitem><listitem><para>The <command>bsmrecord</command> command includes the Trusted Extensions audit
events. For details, see the <olink targetdoc="group-refman" targetptr="bsmrecord-1m" remap="external"><citerefentry><refentrytitle>bsmrecord</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink> man
page.</para>
</listitem>
</itemizedlist>
</sect2>
</sect1>
</chapter><?Pub *0000036086 0?>