106edd2f1SRobert Watson.\" Copyright (c) 2004-2009 Apple Inc. 24bd0c025SRobert Watson.\" Copyright (c) 2006 Robert N. M. Watson 3ca0716f5SRobert Watson.\" All rights reserved. 4ca0716f5SRobert Watson.\" 5ca0716f5SRobert Watson.\" Redistribution and use in source and binary forms, with or without 6ca0716f5SRobert Watson.\" modification, are permitted provided that the following conditions 7ca0716f5SRobert Watson.\" are met: 8ca0716f5SRobert Watson.\" 1. Redistributions of source code must retain the above copyright 9ca0716f5SRobert Watson.\" notice, this list of conditions and the following disclaimer. 10ca0716f5SRobert Watson.\" 2. Redistributions in binary form must reproduce the above copyright 11ca0716f5SRobert Watson.\" notice, this list of conditions and the following disclaimer in the 12ca0716f5SRobert Watson.\" documentation and/or other materials provided with the distribution. 1352267f74SRobert Watson.\" 3. Neither the name of Apple Inc. ("Apple") nor the names of 14ca0716f5SRobert Watson.\" its contributors may be used to endorse or promote products derived 15ca0716f5SRobert Watson.\" from this software without specific prior written permission. 16ca0716f5SRobert Watson.\" 17ca0716f5SRobert Watson.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND 18ca0716f5SRobert Watson.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19ca0716f5SRobert Watson.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20ca0716f5SRobert Watson.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR 21ca0716f5SRobert Watson.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22ca0716f5SRobert Watson.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23ca0716f5SRobert Watson.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24ca0716f5SRobert Watson.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 25ca0716f5SRobert Watson.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 26ca0716f5SRobert Watson.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27ca0716f5SRobert Watson.\" POSSIBILITY OF SUCH DAMAGE. 28ca0716f5SRobert Watson.\" 29*aa772005SRobert Watson.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_control.5#26 $ 30ca0716f5SRobert Watson.\" 31597df30eSRobert Watson.Dd May 14, 2009 32ca0716f5SRobert Watson.Dt AUDIT_CONTROL 5 33ca0716f5SRobert Watson.Os 34ca0716f5SRobert Watson.Sh NAME 35ca0716f5SRobert Watson.Nm audit_control 36bc168a6cSRobert Watson.Nd "audit system parameters" 37ca0716f5SRobert Watson.Sh DESCRIPTION 38ca0716f5SRobert WatsonThe 39ca0716f5SRobert Watson.Nm 40ca0716f5SRobert Watsonfile contains several audit system parameters. 41ca0716f5SRobert WatsonEach line of this file is of the form: 4223bf6e20SRobert Watson.Pp 43bc168a6cSRobert Watson.D1 Ar parameter Ns : Ns Ar value 4423bf6e20SRobert Watson.Pp 45ca0716f5SRobert WatsonThe parameters are: 46bc168a6cSRobert Watson.Bl -tag -width indent 47bc168a6cSRobert Watson.It Va dir 48ca0716f5SRobert WatsonThe directory where audit log files are stored. 49ca0716f5SRobert WatsonThere may be more than one of these entries. 50ca0716f5SRobert WatsonChanges to this entry can only be enacted by restarting the 51ca0716f5SRobert Watsonaudit system. 52ca0716f5SRobert WatsonSee 53bc168a6cSRobert Watson.Xr audit 8 54ca0716f5SRobert Watsonfor a description of how to restart the audit system. 55*aa772005SRobert Watson.It Va dist 56*aa772005SRobert WatsonWhen set to 57*aa772005SRobert Watson.Va on 58*aa772005SRobert Watsonor 59*aa772005SRobert Watson.Va yes , 60*aa772005SRobert Watson.Xr auditd 8 61*aa772005SRobert Watsonwill be creating hardlinks to all trail files in 62*aa772005SRobert Watson.Pa /var/audit/dist 63*aa772005SRobert Watsondirectory. 64*aa772005SRobert WatsonThose hardlinks will be consumed by the 65*aa772005SRobert Watson.Xr auditdistd 8 66*aa772005SRobert Watsondaemon. 67ca0716f5SRobert Watson.It Va flags 68ca0716f5SRobert WatsonSpecifies which audit event classes are audited for all users. 69ca0716f5SRobert Watson.Xr audit_user 5 70ca0716f5SRobert Watsondescribes how to audit events for individual users. 71ca0716f5SRobert WatsonSee the information below for the format of the audit flags. 7252267f74SRobert Watson.It Va host 7352267f74SRobert WatsonSpecify the hostname or IP address to be used when setting the local 7452267f74SRobert Watsonsystems's audit host information. 7552267f74SRobert WatsonThis hostname will be converted into an IP or IPv6 address and will 7652267f74SRobert Watsonbe included in the header of each audit record. 7752267f74SRobert WatsonDue to the possibility of transient errors coupled with the 7852267f74SRobert Watsonsecurity issues in the DNS protocol itself, the use of DNS 7952267f74SRobert Watsonshould be avoided. 8052267f74SRobert WatsonInstead, it is strongly recommended that the hostname be 8152267f74SRobert Watsonspecified in the /etc/hosts file. 8252267f74SRobert WatsonFor more information see 8352267f74SRobert Watson.Xr hosts 5 . 84ca0716f5SRobert Watson.It Va naflags 85ca0716f5SRobert WatsonContains the audit flags that define what classes of events are audited when 86ca0716f5SRobert Watsonan action cannot be attributed to a specific user. 87ca0716f5SRobert Watson.It Va minfree 88ca0716f5SRobert WatsonThe minimum free space required on the file system audit logs are being written to. 89ca0716f5SRobert WatsonWhen the free space falls below this limit a warning will be issued. 9052267f74SRobert WatsonIf no value for the minimum free space is set, the default of 20 percent is 9152267f74SRobert Watsonapplied by the kernel. 92bb97b418SRobert Watson.It Va policy 93bb97b418SRobert WatsonA list of global audit policy flags specifying various behaviors, such as 94bb97b418SRobert Watsonfail stop, auditing of paths and arguments, etc. 954bd0c025SRobert Watson.It Va filesz 964bd0c025SRobert WatsonMaximum trail size in bytes; if set to a non-0 value, the audit daemon will 974bd0c025SRobert Watsonrotate the audit trail file at around this size. 984bd0c025SRobert WatsonSizes less than the minimum trail size (default of 512K) will be rejected as 994bd0c025SRobert Watsoninvalid. 1004bd0c025SRobert WatsonIf 0, trail files will not be automatically rotated based on file size. 10106edd2f1SRobert WatsonFor convenience, the trail size may be expressed with suffix letters: 10206edd2f1SRobert WatsonB (Bytes), K (Kilobytes), M (Megabytes), or G (Gigabytes). 10306edd2f1SRobert WatsonFor example, 2M is the same as 2097152. 10406edd2f1SRobert Watson.It Va expire-after 10506edd2f1SRobert WatsonSpecifies when audit log files will expire and be removed. 10606edd2f1SRobert WatsonThis may be after a time period has passed since the file was last 10706edd2f1SRobert Watsonwritten to or when the aggregate of all the trail files have reached a 10806edd2f1SRobert Watsonspecified size or a combination of both. 109597df30eSRobert WatsonIf no expire-after parameter is given then audit log files will not 11006edd2f1SRobert Watsonexpire and be removed by the audit control system. 11106edd2f1SRobert WatsonSee the information below for the format of the expiration 11206edd2f1SRobert Watsonspecification. 113ca0716f5SRobert Watson.El 114ca0716f5SRobert Watson.Sh AUDIT FLAGS 11523bf6e20SRobert WatsonAudit flags are a comma-delimited list of audit classes as defined in the 116ca0716f5SRobert Watson.Xr audit_class 5 117bc168a6cSRobert Watsonfile. 118ca0716f5SRobert WatsonEvent classes may be preceded by a prefix which changes their interpretation. 119ca0716f5SRobert WatsonThe following prefixes may be used for each class: 12023bf6e20SRobert Watson.Pp 121bc168a6cSRobert Watson.Bl -tag -width indent -compact -offset indent 1224bd0c025SRobert Watson.It (none) 123bc168a6cSRobert WatsonRecord both successful and failed events. 124bc168a6cSRobert Watson.It Li + 125bc168a6cSRobert WatsonRecord successful events. 126bc168a6cSRobert Watson.It Li - 127bc168a6cSRobert WatsonRecord failed events. 128bc168a6cSRobert Watson.It Li ^ 129bc168a6cSRobert WatsonRecord neither successful nor failed events. 130bc168a6cSRobert Watson.It Li ^+ 131bc168a6cSRobert WatsonDo not record successful events. 132bc168a6cSRobert Watson.It Li ^- 133bc168a6cSRobert WatsonDo not record failed events. 134ca0716f5SRobert Watson.El 135bb97b418SRobert Watson.Sh AUDIT POLICY FLAGS 136bb97b418SRobert WatsonThe policy flags field is a comma-delimited list of policy flags from the 137bb97b418SRobert Watsonfollowing list: 138bb97b418SRobert Watson.Pp 139bc168a6cSRobert Watson.Bl -tag -width ".Cm zonename" -compact -offset indent 140bc168a6cSRobert Watson.It Cm cnt 141bb97b418SRobert WatsonAllow processes to continue running even though events are not being audited. 142bb97b418SRobert WatsonIf not set, processes will be suspended when the audit store space is 143bb97b418SRobert Watsonexhausted. 144bb97b418SRobert WatsonCurrently, this is not a recoverable state. 145bc168a6cSRobert Watson.It Cm ahlt 146bc168a6cSRobert WatsonFail stop the system if unable to audit an event\[em]this consists of first 147bb97b418SRobert Watsondraining pending records to disk, and then halting the operating system. 148bc168a6cSRobert Watson.It Cm argv 149bb97b418SRobert WatsonAudit command line arguments to 150bb97b418SRobert Watson.Xr execve 2 . 151bc168a6cSRobert Watson.It Cm arge 152bb97b418SRobert WatsonAudit environmental variable arguments to 153bb97b418SRobert Watson.Xr execve 2 . 154bc168a6cSRobert Watson.It Cm seq 155bb97b418SRobert WatsonInclude a unique audit sequence number token in generated audit records (not 156bc168a6cSRobert Watsonimplemented on 157bc168a6cSRobert Watson.Fx 158bc168a6cSRobert Watsonor Darwin). 159bc168a6cSRobert Watson.It Cm group 160bb97b418SRobert WatsonInclude supplementary groups list in generated audit records (not implemented 161bc168a6cSRobert Watsonon 162bc168a6cSRobert Watson.Fx 163bc168a6cSRobert Watsonor Darwin; supplementary groups are never included in records on 164bb97b418SRobert Watsonthese systems). 165bc168a6cSRobert Watson.It Cm trail 166bc168a6cSRobert WatsonAppend a trailer token to each audit record (not implemented on 167bc168a6cSRobert Watson.Fx 168bc168a6cSRobert Watsonor 169bb97b418SRobert WatsonDarwin; trailers are always included in records on these systems). 170bc168a6cSRobert Watson.It Cm path 171bc168a6cSRobert WatsonInclude secondary file paths in audit records (not implemented on 172bc168a6cSRobert Watson.Fx 173bc168a6cSRobert Watsonor 174bb97b418SRobert WatsonDarwin; secondary paths are never included in records on these systems). 175bc168a6cSRobert Watson.It Cm zonename 176bc168a6cSRobert WatsonInclude a zone ID token with each audit record (not implemented on 177bc168a6cSRobert Watson.Fx 178bc168a6cSRobert Watsonor 179bc168a6cSRobert WatsonDarwin; 180bc168a6cSRobert Watson.Fx 181bc168a6cSRobert Watsonaudit records do not currently include the jail ID or name). 182bc168a6cSRobert Watson.It Cm perzone 183bc168a6cSRobert WatsonEnable auditing for each local zone (not implemented on 184bc168a6cSRobert Watson.Fx 185bc168a6cSRobert Watsonor Darwin; on 186bc168a6cSRobert Watson.Fx , 187bc168a6cSRobert Watsonaudit records are collected from all jails and placed in a single 188bc168a6cSRobert Watsonglobal trail, and only limited audit controls are permitted within a jail). 189bb97b418SRobert Watson.El 190bb97b418SRobert Watson.Pp 191bb97b418SRobert WatsonIt is recommended that installations set the 192bc168a6cSRobert Watson.Cm cnt 193bb97b418SRobert Watsonflag but not 194bc168a6cSRobert Watson.Cm ahlt 195bb97b418SRobert Watsonflag unless it is intended that audit logs exceeding available disk space 196bb97b418SRobert Watsonhalt the system. 19706edd2f1SRobert Watson.Sh AUDIT LOG EXPIRATION SPECIFICATION 19806edd2f1SRobert WatsonThe expiration specification can be one value or two values with the 19906edd2f1SRobert Watsonlogical conjunction of AND/OR between them. 20006edd2f1SRobert WatsonValues for the audit log file age are numbers with the following 20106edd2f1SRobert Watsonsuffixes: 20206edd2f1SRobert Watson.Pp 20306edd2f1SRobert Watson.Bl -tag -width "(space) or" -compact -offset indent 20406edd2f1SRobert Watson.It Li s 20506edd2f1SRobert WatsonLog file age in seconds. 20606edd2f1SRobert Watson.It Li h 20706edd2f1SRobert WatsonLog file age in hours. 20806edd2f1SRobert Watson.It Li d 20906edd2f1SRobert WatsonLog file age in days. 21006edd2f1SRobert Watson.It Li y 21106edd2f1SRobert WatsonLog file age in years. 21206edd2f1SRobert Watson.El 21306edd2f1SRobert Watson.Pp 21406edd2f1SRobert WatsonValues for the disk space used are numbers with the following suffixes: 21506edd2f1SRobert Watson.Pp 21606edd2f1SRobert Watson.Bl -tag -width "(space) or" -compact -offset indent 21706edd2f1SRobert Watson.It (space) or 21806edd2f1SRobert Watson.It Li B 21906edd2f1SRobert WatsonDisk space used in Bytes. 22006edd2f1SRobert Watson.It Li K 22106edd2f1SRobert WatsonDisk space used in Kilobytes. 22206edd2f1SRobert Watson.It Li M 22306edd2f1SRobert WatsonDisk space used in Megabytes. 22406edd2f1SRobert Watson.It Li G 22506edd2f1SRobert WatsonDisk space used in Gigabytes. 22606edd2f1SRobert Watson.El 22706edd2f1SRobert Watson.Pp 22806edd2f1SRobert WatsonThe suffixes on the values are case sensitive. 229*aa772005SRobert WatsonIf both an age and disk space value are used they are separated by 23006edd2f1SRobert WatsonAND or OR and both values are used to determine when audit 23106edd2f1SRobert Watsonlog files expire. 232597df30eSRobert WatsonIn the case of AND, both the age and disk space conditions must be met 23306edd2f1SRobert Watsonbefore the log file is removed. 23406edd2f1SRobert WatsonIn the case of OR, either condition may expire the log file. 23506edd2f1SRobert WatsonFor example: 23606edd2f1SRobert Watson.Bd -literal -offset indent 23706edd2f1SRobert Watsonexpire-after: 60d AND 1G 23806edd2f1SRobert Watson.Ed 23906edd2f1SRobert Watson.Pp 24006edd2f1SRobert Watsonwill expire files that are older than 60 days but only if 1 24106edd2f1SRobert Watsongigabyte of disk space total is being used by the audit logs. 242ca0716f5SRobert Watson.Sh DEFAULT 243ca0716f5SRobert WatsonThe following settings appear in the default 244ca0716f5SRobert Watson.Nm 245ca0716f5SRobert Watsonfile: 246ca0716f5SRobert Watson.Bd -literal -offset indent 247ca0716f5SRobert Watsondir:/var/audit 248597df30eSRobert Watsonflags:lo,aa 24906edd2f1SRobert Watsonminfree:5 250597df30eSRobert Watsonnaflags:lo,aa 25106edd2f1SRobert Watsonpolicy:cnt,argv 252597df30eSRobert Watsonfilesz:2M 253597df30eSRobert Watsonexpire-after:10M 254ca0716f5SRobert Watson.Ed 255ca0716f5SRobert Watson.Pp 256ca0716f5SRobert WatsonThe 257ca0716f5SRobert Watson.Va flags 258ca0716f5SRobert Watsonparameter above specifies the system-wide mask corresponding to login/logout 259597df30eSRobert Watsonas well as authentication and authorization events. 260bb97b418SRobert WatsonThe 261bb97b418SRobert Watson.Va policy 262bb97b418SRobert Watsonparameter specifies that the system should neither fail stop nor suspend 26306edd2f1SRobert Watsonprocesses when the audit store fills and that command line arguments should 26406edd2f1SRobert Watsonbe audited for 26506edd2f1SRobert Watson.Dv AUE_EXECVE 26606edd2f1SRobert Watsonevents. 26706edd2f1SRobert WatsonThe trail file will be automatically rotated by the audit daemon when the 26806edd2f1SRobert Watsonfile size reaches approximately 2MB. 269597df30eSRobert WatsonTrail files will expire when their aggregate size exceeds 10MB. 270ca0716f5SRobert Watson.Sh FILES 271bc168a6cSRobert Watson.Bl -tag -width ".Pa /etc/security/audit_control" -compact 272ca0716f5SRobert Watson.It Pa /etc/security/audit_control 273ca0716f5SRobert Watson.El 274ca0716f5SRobert Watson.Sh SEE ALSO 27552267f74SRobert Watson.Xr auditon 2 , 276bc168a6cSRobert Watson.Xr audit 4 , 277ca0716f5SRobert Watson.Xr audit_class 5 , 278bc168a6cSRobert Watson.Xr audit_event 5 , 27923bf6e20SRobert Watson.Xr audit_user 5 , 28023bf6e20SRobert Watson.Xr audit 8 , 28123bf6e20SRobert Watson.Xr auditd 8 282bc168a6cSRobert Watson.Sh HISTORY 283bc168a6cSRobert WatsonThe OpenBSM implementation was created by McAfee Research, the security 284bc168a6cSRobert Watsondivision of McAfee Inc., under contract to Apple Computer Inc.\& in 2004. 285bc168a6cSRobert WatsonIt was subsequently adopted by the TrustedBSD Project as the foundation for 286bc168a6cSRobert Watsonthe OpenBSM distribution. 287ca0716f5SRobert Watson.Sh AUTHORS 288bc168a6cSRobert Watson.An -nosplit 289ca0716f5SRobert WatsonThis software was created by McAfee Research, the security research division 290ca0716f5SRobert Watsonof McAfee, Inc., under contract to Apple Computer Inc. 291bc168a6cSRobert WatsonAdditional authors include 292bc168a6cSRobert Watson.An Wayne Salamon , 293bc168a6cSRobert Watson.An Robert Watson , 294bc168a6cSRobert Watsonand SPARTA Inc. 295ca0716f5SRobert Watson.Pp 296ca0716f5SRobert WatsonThe Basic Security Module (BSM) interface to audit records and audit event 297ca0716f5SRobert Watsonstream format were defined by Sun Microsystems. 298