This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
Please refer to case: TS017997103 for additional information
Our intent was to audit the usage of the "su" command, and subsequent access granted once a user has switched user. Primarily we want to audit the "su" to ROOT userid. Thinking we could audit the usage of the BPX.SUPERUSER but found that currently, with AUDIT ALL set, only successes are logged in the SMF records. No where in the SMF security records could we find failures being recorded.
I understand that this functionality might be exploited to create a Denial of Service (DOS) attack. However not logging also has risk, as a hack or attack might go undetected. Perhaps something could be developed that so many failures be logged and the logging stopped until the attack is over. I'm not entirely sure what this should look like but the current functionality leaves much to be desired, and we need to have some way to AUDIT this possible exposure.
BTW, we did explore other log files to accomplish our objective. For one SYSLOGD log files were explored but found they also did not contain failures.
Idea priority | Medium |
By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.