152267f74SRobert Watson.\" Copyright (c) 2004 Apple Inc. 24bd0c025SRobert Watson.\" Copyright (c) 2006 Robert N. M. Watson 3ca0716f5SRobert Watson.\" All rights reserved. 4ca0716f5SRobert Watson.\" 5ca0716f5SRobert Watson.\" Redistribution and use in source and binary forms, with or without 6ca0716f5SRobert Watson.\" modification, are permitted provided that the following conditions 7ca0716f5SRobert Watson.\" are met: 8ca0716f5SRobert Watson.\" 1. Redistributions of source code must retain the above copyright 9ca0716f5SRobert Watson.\" notice, this list of conditions and the following disclaimer. 10ca0716f5SRobert Watson.\" 2. Redistributions in binary form must reproduce the above copyright 11ca0716f5SRobert Watson.\" notice, this list of conditions and the following disclaimer in the 12ca0716f5SRobert Watson.\" documentation and/or other materials provided with the distribution. 1352267f74SRobert Watson.\" 3. Neither the name of Apple Inc. ("Apple") nor the names of 14ca0716f5SRobert Watson.\" its contributors may be used to endorse or promote products derived 15ca0716f5SRobert Watson.\" from this software without specific prior written permission. 16ca0716f5SRobert Watson.\" 17ca0716f5SRobert Watson.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND 18ca0716f5SRobert Watson.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19ca0716f5SRobert Watson.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20ca0716f5SRobert Watson.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR 21ca0716f5SRobert Watson.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22ca0716f5SRobert Watson.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23ca0716f5SRobert Watson.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24ca0716f5SRobert Watson.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 25ca0716f5SRobert Watson.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 26ca0716f5SRobert Watson.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27ca0716f5SRobert Watson.\" POSSIBILITY OF SUCH DAMAGE. 28ca0716f5SRobert Watson.\" 2952267f74SRobert Watson.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_control.5#20 $ 30ca0716f5SRobert Watson.\" 3123bf6e20SRobert Watson.Dd January 4, 2006 32ca0716f5SRobert Watson.Dt AUDIT_CONTROL 5 33ca0716f5SRobert Watson.Os 34ca0716f5SRobert Watson.Sh NAME 35ca0716f5SRobert Watson.Nm audit_control 36bc168a6cSRobert Watson.Nd "audit system parameters" 37ca0716f5SRobert Watson.Sh DESCRIPTION 38ca0716f5SRobert WatsonThe 39ca0716f5SRobert Watson.Nm 40ca0716f5SRobert Watsonfile contains several audit system parameters. 41ca0716f5SRobert WatsonEach line of this file is of the form: 4223bf6e20SRobert Watson.Pp 43bc168a6cSRobert Watson.D1 Ar parameter Ns : Ns Ar value 4423bf6e20SRobert Watson.Pp 45ca0716f5SRobert WatsonThe parameters are: 46bc168a6cSRobert Watson.Bl -tag -width indent 47bc168a6cSRobert Watson.It Va dir 48ca0716f5SRobert WatsonThe directory where audit log files are stored. 49ca0716f5SRobert WatsonThere may be more than one of these entries. 50ca0716f5SRobert WatsonChanges to this entry can only be enacted by restarting the 51ca0716f5SRobert Watsonaudit system. 52ca0716f5SRobert WatsonSee 53bc168a6cSRobert Watson.Xr audit 8 54ca0716f5SRobert Watsonfor a description of how to restart the audit system. 55ca0716f5SRobert Watson.It Va flags 56ca0716f5SRobert WatsonSpecifies which audit event classes are audited for all users. 57ca0716f5SRobert Watson.Xr audit_user 5 58ca0716f5SRobert Watsondescribes how to audit events for individual users. 59ca0716f5SRobert WatsonSee the information below for the format of the audit flags. 6052267f74SRobert Watson.It Va host 6152267f74SRobert WatsonSpecify the hostname or IP address to be used when setting the local 6252267f74SRobert Watsonsystems's audit host information. 6352267f74SRobert WatsonThis hostname will be converted into an IP or IPv6 address and will 6452267f74SRobert Watsonbe included in the header of each audit record. 6552267f74SRobert WatsonDue to the possibility of transient errors coupled with the 6652267f74SRobert Watsonsecurity issues in the DNS protocol itself, the use of DNS 6752267f74SRobert Watsonshould be avoided. 6852267f74SRobert WatsonInstead, it is strongly recommended that the hostname be 6952267f74SRobert Watsonspecified in the /etc/hosts file. 7052267f74SRobert WatsonFor more information see 7152267f74SRobert Watson.Xr hosts 5 . 72ca0716f5SRobert Watson.It Va naflags 73ca0716f5SRobert WatsonContains the audit flags that define what classes of events are audited when 74ca0716f5SRobert Watsonan action cannot be attributed to a specific user. 75ca0716f5SRobert Watson.It Va minfree 76ca0716f5SRobert WatsonThe minimum free space required on the file system audit logs are being written to. 77ca0716f5SRobert WatsonWhen the free space falls below this limit a warning will be issued. 7852267f74SRobert WatsonIf no value for the minimum free space is set, the default of 20 percent is 7952267f74SRobert Watsonapplied by the kernel. 80bb97b418SRobert Watson.It Va policy 81bb97b418SRobert WatsonA list of global audit policy flags specifying various behaviors, such as 82bb97b418SRobert Watsonfail stop, auditing of paths and arguments, etc. 834bd0c025SRobert Watson.It Va filesz 844bd0c025SRobert WatsonMaximum trail size in bytes; if set to a non-0 value, the audit daemon will 854bd0c025SRobert Watsonrotate the audit trail file at around this size. 864bd0c025SRobert WatsonSizes less than the minimum trail size (default of 512K) will be rejected as 874bd0c025SRobert Watsoninvalid. 884bd0c025SRobert WatsonIf 0, trail files will not be automatically rotated based on file size. 89ca0716f5SRobert Watson.El 90ca0716f5SRobert Watson.Sh AUDIT FLAGS 9123bf6e20SRobert WatsonAudit flags are a comma-delimited list of audit classes as defined in the 92ca0716f5SRobert Watson.Xr audit_class 5 93bc168a6cSRobert Watsonfile. 94ca0716f5SRobert WatsonEvent classes may be preceded by a prefix which changes their interpretation. 95ca0716f5SRobert WatsonThe following prefixes may be used for each class: 9623bf6e20SRobert Watson.Pp 97bc168a6cSRobert Watson.Bl -tag -width indent -compact -offset indent 984bd0c025SRobert Watson.It (none) 99bc168a6cSRobert WatsonRecord both successful and failed events. 100bc168a6cSRobert Watson.It Li + 101bc168a6cSRobert WatsonRecord successful events. 102bc168a6cSRobert Watson.It Li - 103bc168a6cSRobert WatsonRecord failed events. 104bc168a6cSRobert Watson.It Li ^ 105bc168a6cSRobert WatsonRecord neither successful nor failed events. 106bc168a6cSRobert Watson.It Li ^+ 107bc168a6cSRobert WatsonDo not record successful events. 108bc168a6cSRobert Watson.It Li ^- 109bc168a6cSRobert WatsonDo not record failed events. 110ca0716f5SRobert Watson.El 111bb97b418SRobert Watson.Sh AUDIT POLICY FLAGS 112bb97b418SRobert WatsonThe policy flags field is a comma-delimited list of policy flags from the 113bb97b418SRobert Watsonfollowing list: 114bb97b418SRobert Watson.Pp 115bc168a6cSRobert Watson.Bl -tag -width ".Cm zonename" -compact -offset indent 116bc168a6cSRobert Watson.It Cm cnt 117bb97b418SRobert WatsonAllow processes to continue running even though events are not being audited. 118bb97b418SRobert WatsonIf not set, processes will be suspended when the audit store space is 119bb97b418SRobert Watsonexhausted. 120bb97b418SRobert WatsonCurrently, this is not a recoverable state. 121bc168a6cSRobert Watson.It Cm ahlt 122bc168a6cSRobert WatsonFail stop the system if unable to audit an event\[em]this consists of first 123bb97b418SRobert Watsondraining pending records to disk, and then halting the operating system. 124bc168a6cSRobert Watson.It Cm argv 125bb97b418SRobert WatsonAudit command line arguments to 126bb97b418SRobert Watson.Xr execve 2 . 127bc168a6cSRobert Watson.It Cm arge 128bb97b418SRobert WatsonAudit environmental variable arguments to 129bb97b418SRobert Watson.Xr execve 2 . 130bc168a6cSRobert Watson.It Cm seq 131bb97b418SRobert WatsonInclude a unique audit sequence number token in generated audit records (not 132bc168a6cSRobert Watsonimplemented on 133bc168a6cSRobert Watson.Fx 134bc168a6cSRobert Watsonor Darwin). 135bc168a6cSRobert Watson.It Cm group 136bb97b418SRobert WatsonInclude supplementary groups list in generated audit records (not implemented 137bc168a6cSRobert Watsonon 138bc168a6cSRobert Watson.Fx 139bc168a6cSRobert Watsonor Darwin; supplementary groups are never included in records on 140bb97b418SRobert Watsonthese systems). 141bc168a6cSRobert Watson.It Cm trail 142bc168a6cSRobert WatsonAppend a trailer token to each audit record (not implemented on 143bc168a6cSRobert Watson.Fx 144bc168a6cSRobert Watsonor 145bb97b418SRobert WatsonDarwin; trailers are always included in records on these systems). 146bc168a6cSRobert Watson.It Cm path 147bc168a6cSRobert WatsonInclude secondary file paths in audit records (not implemented on 148bc168a6cSRobert Watson.Fx 149bc168a6cSRobert Watsonor 150bb97b418SRobert WatsonDarwin; secondary paths are never included in records on these systems). 151bc168a6cSRobert Watson.It Cm zonename 152bc168a6cSRobert WatsonInclude a zone ID token with each audit record (not implemented on 153bc168a6cSRobert Watson.Fx 154bc168a6cSRobert Watsonor 155bc168a6cSRobert WatsonDarwin; 156bc168a6cSRobert Watson.Fx 157bc168a6cSRobert Watsonaudit records do not currently include the jail ID or name). 158bc168a6cSRobert Watson.It Cm perzone 159bc168a6cSRobert WatsonEnable auditing for each local zone (not implemented on 160bc168a6cSRobert Watson.Fx 161bc168a6cSRobert Watsonor Darwin; on 162bc168a6cSRobert Watson.Fx , 163bc168a6cSRobert Watsonaudit records are collected from all jails and placed in a single 164bc168a6cSRobert Watsonglobal trail, and only limited audit controls are permitted within a jail). 165bb97b418SRobert Watson.El 166bb97b418SRobert Watson.Pp 167bb97b418SRobert WatsonIt is recommended that installations set the 168bc168a6cSRobert Watson.Cm cnt 169bb97b418SRobert Watsonflag but not 170bc168a6cSRobert Watson.Cm ahlt 171bb97b418SRobert Watsonflag unless it is intended that audit logs exceeding available disk space 172bb97b418SRobert Watsonhalt the system. 173ca0716f5SRobert Watson.Sh DEFAULT 174ca0716f5SRobert WatsonThe following settings appear in the default 175ca0716f5SRobert Watson.Nm 176ca0716f5SRobert Watsonfile: 177ca0716f5SRobert Watson.Bd -literal -offset indent 178ca0716f5SRobert Watsondir:/var/audit 17923bf6e20SRobert Watsonflags:lo 180ca0716f5SRobert Watsonminfree:20 181ca0716f5SRobert Watsonnaflags:lo 182bb97b418SRobert Watsonpolicy:cnt 1834bd0c025SRobert Watsonfilesz:0 184ca0716f5SRobert Watson.Ed 185ca0716f5SRobert Watson.Pp 186ca0716f5SRobert WatsonThe 187ca0716f5SRobert Watson.Va flags 188ca0716f5SRobert Watsonparameter above specifies the system-wide mask corresponding to login/logout 18923bf6e20SRobert Watsonevents. 190bb97b418SRobert WatsonThe 191bb97b418SRobert Watson.Va policy 192bb97b418SRobert Watsonparameter specifies that the system should neither fail stop nor suspend 193bb97b418SRobert Watsonprocesses when the audit store fills. 1944bd0c025SRobert WatsonThe trail file will not be automatically rotated by the audit daemon based on 1954bd0c025SRobert Watsonfile size. 196ca0716f5SRobert Watson.Sh FILES 197bc168a6cSRobert Watson.Bl -tag -width ".Pa /etc/security/audit_control" -compact 198ca0716f5SRobert Watson.It Pa /etc/security/audit_control 199ca0716f5SRobert Watson.El 200ca0716f5SRobert Watson.Sh SEE ALSO 20152267f74SRobert Watson.Xr auditon 2 , 202bc168a6cSRobert Watson.Xr audit 4 , 203ca0716f5SRobert Watson.Xr audit_class 5 , 204bc168a6cSRobert Watson.Xr audit_event 5 , 20523bf6e20SRobert Watson.Xr audit_user 5 , 20623bf6e20SRobert Watson.Xr audit 8 , 20723bf6e20SRobert Watson.Xr auditd 8 208bc168a6cSRobert Watson.Sh HISTORY 209bc168a6cSRobert WatsonThe OpenBSM implementation was created by McAfee Research, the security 210bc168a6cSRobert Watsondivision of McAfee Inc., under contract to Apple Computer Inc.\& in 2004. 211bc168a6cSRobert WatsonIt was subsequently adopted by the TrustedBSD Project as the foundation for 212bc168a6cSRobert Watsonthe OpenBSM distribution. 213ca0716f5SRobert Watson.Sh AUTHORS 214bc168a6cSRobert Watson.An -nosplit 215ca0716f5SRobert WatsonThis software was created by McAfee Research, the security research division 216ca0716f5SRobert Watsonof McAfee, Inc., under contract to Apple Computer Inc. 217bc168a6cSRobert WatsonAdditional authors include 218bc168a6cSRobert Watson.An Wayne Salamon , 219bc168a6cSRobert Watson.An Robert Watson , 220bc168a6cSRobert Watsonand SPARTA Inc. 221ca0716f5SRobert Watson.Pp 222ca0716f5SRobert WatsonThe Basic Security Module (BSM) interface to audit records and audit event 223ca0716f5SRobert Watsonstream format were defined by Sun Microsystems. 224