506764c6f6
- Use AU_TO_WRITE and AU_NO_TO_WRITE for the 'keep' argument to au_close(); previously we used hard-coded 0 and 1 values. - Add man page for au_open(), au_write(), au_close(), and au_close_buffer(). - Support a more complete range of data types for the arbitrary data token: add AUR_CHAR (alias to AUR_BYTE), remove AUR_LONG, add AUR_INT32 (alias to AUR_INT), add AUR_INT64. - Add au_close_token(), which allows writing a single token_t to a memory buffer. Not likely to be used much by applications, but useful for writing test tools. - Modify au_to_file() so that it accepts a timeval in user space, not just kernel -- this is not a Solaris BSM API so can be modified without causing compatibility issues. - Define a new API, au_to_header32_tm(), which adds a struct timeval argument to the ordinary au_to_header32(), which is now implemented by wrapping au_to_header32_tm() and calling gettimeofday(). #ifndef KERNEL the APIs that invoke gettimeofday(), rather than having a variable definition. Don't try to retrieve time zone information using gettimeofday(), as it's not needed, and introduces possible failure modes. - Don't perform byte order transformations on the addr/machine fields of the terminal ID that appears in the process32/subject32 tokens. These are assumed to be IP addresses, and as such, to be in network byte order. - Universally, APIs now assume that IP addresses and ports are provided in network byte order. APIs now generally provide these types in network byte order when decoding. - Beginnings of an OpenBSM test framework can now be found in openbsm/test. This code is not built or installed by default. - auditd now assigns more appropriate syslog levels to its debugging and error information. - Support for audit filters introduced: audit filters are dynamically loaded shared objects that run in the context of a new daemon, auditfilterd. The daemon reads from an audit pipe and feeds both BSM and parsed versions of records to shared objects using a module API. This will provide a framework for the writing of intrusion detection services. - New utility API, audit_submit(), added to capture common elements of audit record submission for many applications. Obtained from: TrustedBSD Project
317 lines
7.9 KiB
C
317 lines
7.9 KiB
C
/*
|
|
* Copyright (c) 2005 Apple Computer, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* @APPLE_BSD_LICENSE_HEADER_START@
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
|
|
* its contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY
|
|
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
* @APPLE_BSD_LICENSE_HEADER_END@
|
|
*
|
|
* $P4: //depot/projects/trustedbsd/openbsm/bsm/audit.h#16 $
|
|
*/
|
|
|
|
#ifndef _BSM_AUDIT_H
|
|
#define _BSM_AUDIT_H
|
|
|
|
#define AUDIT_RECORD_MAGIC 0x828a0f1b
|
|
#define MAX_AUDIT_RECORDS 20
|
|
#define MAX_AUDIT_RECORD_SIZE 4096
|
|
#define MIN_AUDIT_FILE_SIZE (512 * 1024)
|
|
|
|
/*
|
|
* Triggers for the audit daemon
|
|
*/
|
|
#define AUDIT_TRIGGER_MIN 1
|
|
#define AUDIT_TRIGGER_LOW_SPACE 1
|
|
#define AUDIT_TRIGGER_OPEN_NEW 2
|
|
#define AUDIT_TRIGGER_READ_FILE 3
|
|
#define AUDIT_TRIGGER_CLOSE_AND_DIE 4
|
|
#define AUDIT_TRIGGER_NO_SPACE 5
|
|
#define AUDIT_TRIGGER_MAX 5
|
|
|
|
/*
|
|
* File that will be read for trigger events from the kernel
|
|
*/
|
|
#define AUDIT_TRIGGER_FILE "/dev/audit"
|
|
|
|
/*
|
|
* Pre-defined audit IDs
|
|
*/
|
|
#define AU_DEFAUDITID -1
|
|
|
|
/*
|
|
* Define the masks for the classes of audit events.
|
|
*/
|
|
#define AU_NULL 0x00000000
|
|
#define AU_FREAD 0x00000001
|
|
#define AU_FWRITE 0x00000002
|
|
#define AU_FACCESS 0x00000004
|
|
#define AU_FMODIFY 0x00000008
|
|
#define AU_FCREATE 0x00000010
|
|
#define AU_FDELETE 0x00000020
|
|
#define AU_CLOSE 0x00000040
|
|
#define AU_PROCESS 0x00000080
|
|
#define AU_NET 0x00000100
|
|
#define AU_IPC 0x00000200
|
|
#define AU_NONAT 0x00000400
|
|
#define AU_ADMIN 0x00000800
|
|
#define AU_LOGIN 0x00001000
|
|
#define AU_TFM 0x00002000
|
|
#define AU_APPL 0x00004000
|
|
#define AU_SETL 0x00008000
|
|
#define AU_IFLOAT 0x00010000
|
|
#define AU_PRIV 0x00020000
|
|
#define AU_MAC_RW 0x00040000
|
|
#define AU_XCONN 0x00080000
|
|
#define AU_XCREATE 0x00100000
|
|
#define AU_XDELETE 0x00200000
|
|
#define AU_XIFLOAT 0x00400000
|
|
#define AU_XPRIVS 0x00800000
|
|
#define AU_XPRIVF 0x01000000
|
|
#define AU_XMOVE 0x02000000
|
|
#define AU_XDACF 0x04000000
|
|
#define AU_XMACF 0x08000000
|
|
#define AU_XSECATTR 0x10000000
|
|
#define AU_IOCTL 0x20000000
|
|
#define AU_EXEC 0x40000000
|
|
#define AU_OTHER 0x80000000
|
|
#define AU_ALL 0xffffffff
|
|
|
|
/*
|
|
* IPC types
|
|
*/
|
|
#define AT_IPC_MSG ((u_char)1) /* Message IPC id. */
|
|
#define AT_IPC_SEM ((u_char)2) /* Semaphore IPC id. */
|
|
#define AT_IPC_SHM ((u_char)3) /* Shared mem IPC id. */
|
|
|
|
/*
|
|
* Audit conditions.
|
|
*/
|
|
#define AUC_UNSET 0
|
|
#define AUC_AUDITING 1
|
|
#define AUC_NOAUDIT 2
|
|
#define AUC_DISABLED -1
|
|
|
|
/*
|
|
* auditon(2) commands.
|
|
*/
|
|
#define A_GETPOLICY 2
|
|
#define A_SETPOLICY 3
|
|
#define A_GETKMASK 4
|
|
#define A_SETKMASK 5
|
|
#define A_GETQCTRL 6
|
|
#define A_SETQCTRL 7
|
|
#define A_GETCWD 8
|
|
#define A_GETCAR 9
|
|
#define A_GETSTAT 12
|
|
#define A_SETSTAT 13
|
|
#define A_SETUMASK 14
|
|
#define A_SETSMASK 15
|
|
#define A_GETCOND 20
|
|
#define A_SETCOND 21
|
|
#define A_GETCLASS 22
|
|
#define A_SETCLASS 23
|
|
#define A_GETPINFO 24
|
|
#define A_SETPMASK 25
|
|
#define A_SETFSIZE 26
|
|
#define A_GETFSIZE 27
|
|
#define A_GETPINFO_ADDR 28
|
|
#define A_GETKAUDIT 29
|
|
#define A_SETKAUDIT 30
|
|
#define A_SENDTRIGGER 31
|
|
|
|
/*
|
|
* Audit policy controls.
|
|
*/
|
|
#define AUDIT_CNT 0x0001
|
|
#define AUDIT_AHLT 0x0002
|
|
#define AUDIT_ARGV 0x0004
|
|
#define AUDIT_ARGE 0x0008
|
|
#define AUDIT_PASSWD 0x0010
|
|
#define AUDIT_SEQ 0x0020
|
|
#define AUDIT_WINDATA 0x0040
|
|
#define AUDIT_USER 0x0080
|
|
#define AUDIT_GROUP 0x0100
|
|
#define AUDIT_TRAIL 0x0200
|
|
#define AUDIT_PATH 0x0400
|
|
|
|
/*
|
|
* Audit queue control parameters
|
|
*/
|
|
#define AQ_HIWATER 100
|
|
#define AQ_MAXHIGH 10000
|
|
#define AQ_LOWATER 10
|
|
#define AQ_BUFSZ 1024
|
|
#define AQ_MAXBUFSZ 1048576
|
|
|
|
/*
|
|
* Default minimum percentage free space on file system.
|
|
*/
|
|
#define AU_FS_MINFREE 20
|
|
|
|
/*
|
|
* Type definitions used indicating the length of variable length addresses
|
|
* in tokens containing addresses, such as header fields.
|
|
*/
|
|
#define AU_IPv4 4
|
|
#define AU_IPv6 16
|
|
|
|
__BEGIN_DECLS
|
|
|
|
typedef uid_t au_id_t;
|
|
typedef pid_t au_asid_t;
|
|
typedef u_int16_t au_event_t;
|
|
typedef u_int16_t au_emod_t;
|
|
typedef u_int32_t au_class_t;
|
|
|
|
struct au_tid {
|
|
dev_t port;
|
|
u_int32_t machine;
|
|
};
|
|
typedef struct au_tid au_tid_t;
|
|
|
|
struct au_tid_addr {
|
|
dev_t at_port;
|
|
u_int32_t at_type;
|
|
u_int32_t at_addr[4];
|
|
};
|
|
typedef struct au_tid_addr au_tid_addr_t;
|
|
|
|
struct au_mask {
|
|
unsigned int am_success; /* Success bits. */
|
|
unsigned int am_failure; /* Failure bits. */
|
|
};
|
|
typedef struct au_mask au_mask_t;
|
|
|
|
struct auditinfo {
|
|
au_id_t ai_auid; /* Audit user ID. */
|
|
au_mask_t ai_mask; /* Audit masks. */
|
|
au_tid_t ai_termid; /* Terminal ID. */
|
|
au_asid_t ai_asid; /* Audit session ID. */
|
|
};
|
|
typedef struct auditinfo auditinfo_t;
|
|
|
|
struct auditinfo_addr {
|
|
au_id_t ai_auid; /* Audit user ID. */
|
|
au_mask_t ai_mask; /* Audit masks. */
|
|
au_tid_addr_t ai_termid; /* Terminal ID. */
|
|
au_asid_t ai_asid; /* Audit session ID. */
|
|
};
|
|
typedef struct auditinfo_addr auditinfo_addr_t;
|
|
|
|
struct auditpinfo {
|
|
pid_t ap_pid; /* ID of target process. */
|
|
au_id_t ap_auid; /* Audit user ID. */
|
|
au_mask_t ap_mask; /* Audit masks. */
|
|
au_tid_t ap_termid; /* Terminal ID. */
|
|
au_asid_t ap_asid; /* Audit session ID. */
|
|
};
|
|
typedef struct auditpinfo auditpinfo_t;
|
|
|
|
struct auditpinfo_addr {
|
|
pid_t ap_pid; /* ID of target process. */
|
|
au_id_t ap_auid; /* Audit user ID. */
|
|
au_mask_t ap_mask; /* Audit masks. */
|
|
au_tid_addr_t ap_termid; /* Terminal ID. */
|
|
au_asid_t ap_asid; /* Audit session ID. */
|
|
};
|
|
typedef struct auditpinfo_addr auditpinfo_addr_t;
|
|
|
|
/*
|
|
* Contents of token_t are opaque outside of libbsm.
|
|
*/
|
|
typedef struct au_token token_t;
|
|
|
|
/*
|
|
* Kernel audit queue control parameters.
|
|
*/
|
|
struct au_qctrl {
|
|
size_t aq_hiwater;
|
|
size_t aq_lowater;
|
|
size_t aq_bufsz;
|
|
clock_t aq_delay;
|
|
int aq_minfree; /* Minimum filesystem percent free space. */
|
|
};
|
|
typedef struct au_qctrl au_qctrl_t;
|
|
|
|
/*
|
|
* Structure for the audit statistics.
|
|
*/
|
|
struct audit_stat {
|
|
unsigned int as_version;
|
|
unsigned int as_numevent;
|
|
int as_generated;
|
|
int as_nonattrib;
|
|
int as_kernel;
|
|
int as_audit;
|
|
int as_auditctl;
|
|
int as_enqueue;
|
|
int as_written;
|
|
int as_wblocked;
|
|
int as_rblocked;
|
|
int as_dropped;
|
|
int as_totalsize;
|
|
unsigned int as_memused;
|
|
};
|
|
typedef struct audit_stat au_stat_t;
|
|
|
|
/*
|
|
* Structure for the audit file statistics.
|
|
*/
|
|
struct audit_fstat {
|
|
u_quad_t af_filesz;
|
|
u_quad_t af_currsz;
|
|
};
|
|
typedef struct audit_fstat au_fstat_t;
|
|
|
|
/*
|
|
* Audit to event class mapping.
|
|
*/
|
|
struct au_evclass_map {
|
|
au_event_t ec_number;
|
|
au_class_t ec_class;
|
|
};
|
|
typedef struct au_evclass_map au_evclass_map_t;
|
|
|
|
/*
|
|
* Audit system calls.
|
|
*/
|
|
#if !defined(_KERNEL) && !defined(KERNEL)
|
|
int audit(const void *, int);
|
|
int auditon(int, void *, int);
|
|
int auditctl(const char *);
|
|
int getauid(au_id_t *);
|
|
int setauid(const au_id_t *);
|
|
int getaudit(struct auditinfo *);
|
|
int setaudit(const struct auditinfo *);
|
|
int getaudit_addr(struct auditinfo_addr *, int);
|
|
int setaudit_addr(const struct auditinfo_addr *, int);
|
|
#endif /* defined(_KERNEL) || defined(KERNEL) */
|
|
|
|
__END_DECLS
|
|
|
|
#endif /* !_BSM_AUDIT_H */
|