From f7669e641742373606ef85a4855b7028f5b564a5 Mon Sep 17 00:00:00 2001 From: rwatson Date: Mon, 5 Jun 2006 10:52:12 +0000 Subject: Vendor branch import of TrustedBSD OpenBSM 1.0 alpha 6: - Use AU_TO_WRITE and AU_NO_TO_WRITE for the 'keep' argument to au_close(); previously we used hard-coded 0 and 1 values. - Add man page for au_open(), au_write(), au_close(), and au_close_buffer(). - Support a more complete range of data types for the arbitrary data token: add AUR_CHAR (alias to AUR_BYTE), remove AUR_LONG, add AUR_INT32 (alias to AUR_INT), add AUR_INT64. - Add au_close_token(), which allows writing a single token_t to a memory buffer. Not likely to be used much by applications, but useful for writing test tools. - Modify au_to_file() so that it accepts a timeval in user space, not just kernel -- this is not a Solaris BSM API so can be modified without causing compatibility issues. - Define a new API, au_to_header32_tm(), which adds a struct timeval argument to the ordinary au_to_header32(), which is now implemented by wrapping au_to_header32_tm() and calling gettimeofday(). #ifndef KERNEL the APIs that invoke gettimeofday(), rather than having a variable definition. Don't try to retrieve time zone information using gettimeofday(), as it's not needed, and introduces possible failure modes. - Don't perform byte order transformations on the addr/machine fields of the terminal ID that appears in the process32/subject32 tokens. These are assumed to be IP addresses, and as such, to be in network byte order. - Universally, APIs now assume that IP addresses and ports are provided in network byte order. APIs now generally provide these types in network byte order when decoding. - Beginnings of an OpenBSM test framework can now be found in openbsm/test. This code is not built or installed by default. - auditd now assigns more appropriate syslog levels to its debugging and error information. - Support for audit filters introduced: audit filters are dynamically loaded shared objects that run in the context of a new daemon, auditfilterd. The daemon reads from an audit pipe and feeds both BSM and parsed versions of records to shared objects using a module API. This will provide a framework for the writing of intrusion detection services. - New utility API, audit_submit(), added to capture common elements of audit record submission for many applications. Obtained from: TrustedBSD Project --- contrib/openbsm/bsm/audit_filter.h | 77 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 77 insertions(+) create mode 100644 contrib/openbsm/bsm/audit_filter.h (limited to 'contrib/openbsm/bsm/audit_filter.h') diff --git a/contrib/openbsm/bsm/audit_filter.h b/contrib/openbsm/bsm/audit_filter.h new file mode 100644 index 0000000..5b7dd4f --- /dev/null +++ b/contrib/openbsm/bsm/audit_filter.h @@ -0,0 +1,77 @@ +/*- + * Copyright (c) 2006 Robert N. M. Watson + * All rights reserved. + * + * This software was developed by Robert Watson for the TrustedBSD Project. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * $P4: //depot/projects/trustedbsd/openbsm/bsm/audit_filter.h#2 $ + */ + +#ifndef _BSM_AUDIT_FILTER_H_ +#define _BSM_AUDIT_FILTER_H_ + +/* + * Module interface for audit filter modules. + * + * audit_filter_attach_t - filter module is being attached with arguments + * audit_filter_reinit_t - arguments to module have changed + * audit_filter_record_t - present parsed record to filter module, with + * receipt time + * audit_filter_bsmrecord_t - present bsm format record to filter module, + * with receipt time + * audit_filter_destach_t - filter module is being detached + * + * There may be many instances of the same filter, identified by the instance + * void pointer maintained by the filter instance. + */ +typedef int (*audit_filter_attach_t)(void **instance, int argc, char *argv[]); +typedef int (*audit_filter_reinit_t)(void *instance, int argc, char *argv[]); +typedef void (*audit_filter_record_t)(void *instance, struct timespec *ts, + int token_count, const tokenstr_t tok[]); +typedef void (*audit_filter_bsmrecord_t)(void *instance, struct timespec *ts, + void *data, u_int len); +typedef void (*audit_filter_detach_t)(void *instance); + +/* + * Values to be returned by audit_filter_init_t. + */ +#define AUDIT_FILTER_SUCCESS (0) +#define AUDIT_FILTER_FAILURE (-1) + +/* + * Standard name for filter module initialization functions, which will be + * found using dlsym(). + */ +#define AUDIT_FILTER_ATTACH audit_filter_attach +#define AUDIT_FILTER_REINIT audit_filter_reinit +#define AUDIT_FILTER_RECORD audit_filter_record +#define AUDIT_FILTER_BSMRECORD audit_filter_bsmrecord +#define AUDIT_FILTER_DETACH audit_filter_detach +#define AUDIT_FILTER_ATTACH_STRING "audit_filter_attach" +#define AUDIT_FILTER_REINIT_STRING "audit_filter_reinit" +#define AUDIT_FILTER_RECORD_STRING "audit_filter_record" +#define AUDIT_FILTER_BSMRECORD_STRING "audit_filter_bsmrecord" +#define AUDIT_FILTER_DETACH_STRING "audit_filter_detach" + +#endif /* !_BSM_AUDIT_FILTER_H_ */ -- cgit v1.1