- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Logfail monitoring
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-27-2005 08:48 AM
09-27-2005 08:48 AM
Logfail monitoring
I have a job that does the following;
1) Produces a report of all of the login failures since the previous day.
Anal/Audit/even=(logfail,breakin)/noint sys$manager:security.old
(Where a new security auditing file is created everyday and yesterdays is now security.old.)
2) Scans the authorize record for any users with Login Fails greater than 2.
What I'm seeing is that part 2 above seems to find user records with Login Fails greater than 2, but there aren't 2 or more login failures being reported by part 1 above.
How does a user get login failures which are recorded in the SYSUAF, but don't get reported in the AUDIT file? I did some testing and each of my login failures was counted in the SYSUAF and came up when I checked the security audit file. So I'm confused.
Thanks for any and all helpful hints.
Regards,
Trace Trembath
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-27-2005 09:11 AM
09-27-2005 09:11 AM
Re: Logfail monitoring
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-27-2005 09:13 AM
09-27-2005 09:13 AM
Re: Logfail monitoring
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-27-2005 11:42 AM
09-27-2005 11:42 AM
Re: Logfail monitoring
only an INTERACTIVE login of the user resets by default the value of the login failure count in the SYSUAF although the counter raises also with any other e.g. network login failure.
(an own written program would be an alternative to zeroes the login failure count of other accounts)
So your analysis job must run immediatley after the creation of the new security journal file, the user must have made a successful interactive login the day before and you must encounter the mismatch you've described: only in this case it's a real mismatch and a further analysis of your AUDIT settings has to be done.
Cheers,
EW
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-28-2005 02:11 AM
09-28-2005 02:11 AM
Re: Logfail monitoring
your scan of SYSUAF login fails should register all nonzero loginfail counts, and todays run should subtract yesterdays counts for each account with nonzero fails.
But even then you have to somehow deal with accounts that HAD a nonzero count, cleared it by a corrent interactive login, and then accumulated other login fails. THOSE however should show as more fails in AUDIT than in SYSUAF.
hth.
Proost.
Have one on me.
jpe
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-28-2005 05:31 AM
09-28-2005 05:31 AM
Re: Logfail monitoring
One thing about the sysuaf job I failed to mention is that it sets the password of the account as "pre-expired" when it encounters a "Log Fails" setting geater than 2. The next day it skips any accounts with passwords that are pre-expired.
Therefore, I'm pretty sure that;
1) The logfail count in authorize is from the previous day.
2) The audit job is reporting all login failures since yesterday.
3) I think the audit process is set to call all login failures. Here's the setting of the audit server.
System security audits currently enabled for:
ACL
Authorization
Breakin: dialup,local,remote,network,detached
Logfailure: batch,dialup,local,remote,network,subprocess,detached
I'm still consfused. Thanks for all help.
Regards,
Trace Trembath
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-28-2005 05:58 AM
09-28-2005 05:58 AM
Re: Logfail monitoring
- REPLY/ENABLE=SECURITY
- SSH localhost
enter an incorrect password
From the OPCOM messages regarding security, I found that the user TCPIP$SSH increased the number of login failures; indicated as a "System UAF record modification". Followed by a "Network login failure" for the username TCPIP$SSH. With enough failed attempts, a "Network breaking detection" event for my username occured.
HP TCP/IP 5.4 ECO 4.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-28-2005 07:01 AM
09-28-2005 07:01 AM
Re: Logfail monitoring
One thing about the sysuaf job I failed to mention is that it sets the password of the account as "pre-expired" when it encounters a "Log Fails" setting geater than 2. The next day it skips any accounts with passwords that are pre-expired
Unless you also forgot to mention some special processing for 1 or 2 login fails :-)
If yesterday there was 2 login fails - no action.
Tpday 1 login fail: totals to 3, but AUDIT correctly only noticed one.
Can this explain it, or is this not enough slack for your observations?
hth
Proost.
Have one on me.
jpe