View previous topic :: View next topic |
Author |
Message |
dendenners n00b


Joined: 17 Oct 2003 Posts: 28 Location: Inside a shirt
|
Posted: Thu Feb 16, 2006 12:06 pm Post subject: How to audit file access in hardened gentoo |
|
|
Hi,
I've a fairly urgent requirement here to audit access to certain files containing sensitive information (basically just log the user and time/date of access to a file). I've been looking at the grsecurity module included in the hardened-gentoo sources, but nothing jumps out at me in the patchy documentation on how to accomplish this. Has anyone implemented something like this before?
Thanks
Denis |
|
Back to top |
|
 |
dendenners n00b


Joined: 17 Oct 2003 Posts: 28 Location: Inside a shirt
|
Posted: Fri Feb 17, 2006 10:02 am Post subject: |
|
|
FYI, I got this requirement working using audit (ACCEPT_KEYWORDS=~x86 emerge audit) and recompiling my kernel with the General Setup->Auditing Support option checked. Handy.
Denis |
|
Back to top |
|
 |
|