xref: /freebsd/contrib/openbsm/man/audit_control.5 (revision aa77200569e397d6ff1fdb4d255d0fa254d0a128)
106edd2f1SRobert Watson.\" Copyright (c) 2004-2009 Apple Inc.
24bd0c025SRobert Watson.\" Copyright (c) 2006 Robert N. M. Watson
3ca0716f5SRobert Watson.\" All rights reserved.
4ca0716f5SRobert Watson.\"
5ca0716f5SRobert Watson.\" Redistribution and use in source and binary forms, with or without
6ca0716f5SRobert Watson.\" modification, are permitted provided that the following conditions
7ca0716f5SRobert Watson.\" are met:
8ca0716f5SRobert Watson.\" 1.  Redistributions of source code must retain the above copyright
9ca0716f5SRobert Watson.\"     notice, this list of conditions and the following disclaimer.
10ca0716f5SRobert Watson.\" 2.  Redistributions in binary form must reproduce the above copyright
11ca0716f5SRobert Watson.\"     notice, this list of conditions and the following disclaimer in the
12ca0716f5SRobert Watson.\"     documentation and/or other materials provided with the distribution.
1352267f74SRobert Watson.\" 3.  Neither the name of Apple Inc. ("Apple") nor the names of
14ca0716f5SRobert Watson.\"     its contributors may be used to endorse or promote products derived
15ca0716f5SRobert Watson.\"     from this software without specific prior written permission.
16ca0716f5SRobert Watson.\"
17ca0716f5SRobert Watson.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
18ca0716f5SRobert Watson.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19ca0716f5SRobert Watson.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20ca0716f5SRobert Watson.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
21ca0716f5SRobert Watson.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22ca0716f5SRobert Watson.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23ca0716f5SRobert Watson.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24ca0716f5SRobert Watson.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
25ca0716f5SRobert Watson.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
26ca0716f5SRobert Watson.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27ca0716f5SRobert Watson.\" POSSIBILITY OF SUCH DAMAGE.
28ca0716f5SRobert Watson.\"
29*aa772005SRobert Watson.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_control.5#26 $
30ca0716f5SRobert Watson.\"
31597df30eSRobert Watson.Dd May 14, 2009
32ca0716f5SRobert Watson.Dt AUDIT_CONTROL 5
33ca0716f5SRobert Watson.Os
34ca0716f5SRobert Watson.Sh NAME
35ca0716f5SRobert Watson.Nm audit_control
36bc168a6cSRobert Watson.Nd "audit system parameters"
37ca0716f5SRobert Watson.Sh DESCRIPTION
38ca0716f5SRobert WatsonThe
39ca0716f5SRobert Watson.Nm
40ca0716f5SRobert Watsonfile contains several audit system parameters.
41ca0716f5SRobert WatsonEach line of this file is of the form:
4223bf6e20SRobert Watson.Pp
43bc168a6cSRobert Watson.D1 Ar parameter Ns : Ns Ar value
4423bf6e20SRobert Watson.Pp
45ca0716f5SRobert WatsonThe parameters are:
46bc168a6cSRobert Watson.Bl -tag -width indent
47bc168a6cSRobert Watson.It Va dir
48ca0716f5SRobert WatsonThe directory where audit log files are stored.
49ca0716f5SRobert WatsonThere may be more than one of these entries.
50ca0716f5SRobert WatsonChanges to this entry can only be enacted by restarting the
51ca0716f5SRobert Watsonaudit system.
52ca0716f5SRobert WatsonSee
53bc168a6cSRobert Watson.Xr audit 8
54ca0716f5SRobert Watsonfor a description of how to restart the audit system.
55*aa772005SRobert Watson.It Va dist
56*aa772005SRobert WatsonWhen set to
57*aa772005SRobert Watson.Va on
58*aa772005SRobert Watsonor
59*aa772005SRobert Watson.Va yes ,
60*aa772005SRobert Watson.Xr auditd 8
61*aa772005SRobert Watsonwill be creating hardlinks to all trail files in
62*aa772005SRobert Watson.Pa /var/audit/dist
63*aa772005SRobert Watsondirectory.
64*aa772005SRobert WatsonThose hardlinks will be consumed by the
65*aa772005SRobert Watson.Xr auditdistd 8
66*aa772005SRobert Watsondaemon.
67ca0716f5SRobert Watson.It Va flags
68ca0716f5SRobert WatsonSpecifies which audit event classes are audited for all users.
69ca0716f5SRobert Watson.Xr audit_user 5
70ca0716f5SRobert Watsondescribes how to audit events for individual users.
71ca0716f5SRobert WatsonSee the information below for the format of the audit flags.
7252267f74SRobert Watson.It Va host
7352267f74SRobert WatsonSpecify the hostname or IP address to be used when setting the local
7452267f74SRobert Watsonsystems's audit host information.
7552267f74SRobert WatsonThis hostname will be converted into an IP or IPv6 address and will
7652267f74SRobert Watsonbe included in the header of each audit record.
7752267f74SRobert WatsonDue to the possibility of transient errors coupled with the
7852267f74SRobert Watsonsecurity issues in the DNS protocol itself, the use of DNS
7952267f74SRobert Watsonshould be avoided.
8052267f74SRobert WatsonInstead, it is strongly recommended that the hostname be
8152267f74SRobert Watsonspecified in the /etc/hosts file.
8252267f74SRobert WatsonFor more information see
8352267f74SRobert Watson.Xr hosts 5 .
84ca0716f5SRobert Watson.It Va naflags
85ca0716f5SRobert WatsonContains the audit flags that define what classes of events are audited when
86ca0716f5SRobert Watsonan action cannot be attributed to a specific user.
87ca0716f5SRobert Watson.It Va minfree
88ca0716f5SRobert WatsonThe minimum free space required on the file system audit logs are being written to.
89ca0716f5SRobert WatsonWhen the free space falls below this limit a warning will be issued.
9052267f74SRobert WatsonIf no value for the minimum free space is set, the default of 20 percent is
9152267f74SRobert Watsonapplied by the kernel.
92bb97b418SRobert Watson.It Va policy
93bb97b418SRobert WatsonA list of global audit policy flags specifying various behaviors, such as
94bb97b418SRobert Watsonfail stop, auditing of paths and arguments, etc.
954bd0c025SRobert Watson.It Va filesz
964bd0c025SRobert WatsonMaximum trail size in bytes; if set to a non-0 value, the audit daemon will
974bd0c025SRobert Watsonrotate the audit trail file at around this size.
984bd0c025SRobert WatsonSizes less than the minimum trail size (default of 512K) will be rejected as
994bd0c025SRobert Watsoninvalid.
1004bd0c025SRobert WatsonIf 0, trail files will not be automatically rotated based on file size.
10106edd2f1SRobert WatsonFor convenience, the trail size may be expressed with suffix letters:
10206edd2f1SRobert WatsonB (Bytes), K (Kilobytes), M (Megabytes), or G (Gigabytes).
10306edd2f1SRobert WatsonFor example, 2M is the same as 2097152.
10406edd2f1SRobert Watson.It Va expire-after
10506edd2f1SRobert WatsonSpecifies when audit log files will expire and be removed.
10606edd2f1SRobert WatsonThis may be after a time period has passed since the file was last
10706edd2f1SRobert Watsonwritten to or when the aggregate of all the trail files have reached a
10806edd2f1SRobert Watsonspecified size or a combination of both.
109597df30eSRobert WatsonIf no expire-after parameter is given then audit log files will not
11006edd2f1SRobert Watsonexpire and be removed by the audit control system.
11106edd2f1SRobert WatsonSee the information below for the format of the expiration
11206edd2f1SRobert Watsonspecification.
113ca0716f5SRobert Watson.El
114ca0716f5SRobert Watson.Sh AUDIT FLAGS
11523bf6e20SRobert WatsonAudit flags are a comma-delimited list of audit classes as defined in the
116ca0716f5SRobert Watson.Xr audit_class 5
117bc168a6cSRobert Watsonfile.
118ca0716f5SRobert WatsonEvent classes may be preceded by a prefix which changes their interpretation.
119ca0716f5SRobert WatsonThe following prefixes may be used for each class:
12023bf6e20SRobert Watson.Pp
121bc168a6cSRobert Watson.Bl -tag -width indent -compact -offset indent
1224bd0c025SRobert Watson.It (none)
123bc168a6cSRobert WatsonRecord both successful and failed events.
124bc168a6cSRobert Watson.It Li +
125bc168a6cSRobert WatsonRecord successful events.
126bc168a6cSRobert Watson.It Li -
127bc168a6cSRobert WatsonRecord failed events.
128bc168a6cSRobert Watson.It Li ^
129bc168a6cSRobert WatsonRecord neither successful nor failed events.
130bc168a6cSRobert Watson.It Li ^+
131bc168a6cSRobert WatsonDo not record successful events.
132bc168a6cSRobert Watson.It Li ^-
133bc168a6cSRobert WatsonDo not record failed events.
134ca0716f5SRobert Watson.El
135bb97b418SRobert Watson.Sh AUDIT POLICY FLAGS
136bb97b418SRobert WatsonThe policy flags field is a comma-delimited list of policy flags from the
137bb97b418SRobert Watsonfollowing list:
138bb97b418SRobert Watson.Pp
139bc168a6cSRobert Watson.Bl -tag -width ".Cm zonename" -compact -offset indent
140bc168a6cSRobert Watson.It Cm cnt
141bb97b418SRobert WatsonAllow processes to continue running even though events are not being audited.
142bb97b418SRobert WatsonIf not set, processes will be suspended when the audit store space is
143bb97b418SRobert Watsonexhausted.
144bb97b418SRobert WatsonCurrently, this is not a recoverable state.
145bc168a6cSRobert Watson.It Cm ahlt
146bc168a6cSRobert WatsonFail stop the system if unable to audit an event\[em]this consists of first
147bb97b418SRobert Watsondraining pending records to disk, and then halting the operating system.
148bc168a6cSRobert Watson.It Cm argv
149bb97b418SRobert WatsonAudit command line arguments to
150bb97b418SRobert Watson.Xr execve 2 .
151bc168a6cSRobert Watson.It Cm arge
152bb97b418SRobert WatsonAudit environmental variable arguments to
153bb97b418SRobert Watson.Xr execve 2 .
154bc168a6cSRobert Watson.It Cm seq
155bb97b418SRobert WatsonInclude a unique audit sequence number token in generated audit records (not
156bc168a6cSRobert Watsonimplemented on
157bc168a6cSRobert Watson.Fx
158bc168a6cSRobert Watsonor Darwin).
159bc168a6cSRobert Watson.It Cm group
160bb97b418SRobert WatsonInclude supplementary groups list in generated audit records (not implemented
161bc168a6cSRobert Watsonon
162bc168a6cSRobert Watson.Fx
163bc168a6cSRobert Watsonor Darwin; supplementary groups are never included in records on
164bb97b418SRobert Watsonthese systems).
165bc168a6cSRobert Watson.It Cm trail
166bc168a6cSRobert WatsonAppend a trailer token to each audit record (not implemented on
167bc168a6cSRobert Watson.Fx
168bc168a6cSRobert Watsonor
169bb97b418SRobert WatsonDarwin; trailers are always included in records on these systems).
170bc168a6cSRobert Watson.It Cm path
171bc168a6cSRobert WatsonInclude secondary file paths in audit records (not implemented on
172bc168a6cSRobert Watson.Fx
173bc168a6cSRobert Watsonor
174bb97b418SRobert WatsonDarwin; secondary paths are never included in records on these systems).
175bc168a6cSRobert Watson.It Cm zonename
176bc168a6cSRobert WatsonInclude a zone ID token with each audit record (not implemented on
177bc168a6cSRobert Watson.Fx
178bc168a6cSRobert Watsonor
179bc168a6cSRobert WatsonDarwin;
180bc168a6cSRobert Watson.Fx
181bc168a6cSRobert Watsonaudit records do not currently include the jail ID or name).
182bc168a6cSRobert Watson.It Cm perzone
183bc168a6cSRobert WatsonEnable auditing for each local zone (not implemented on
184bc168a6cSRobert Watson.Fx
185bc168a6cSRobert Watsonor Darwin; on
186bc168a6cSRobert Watson.Fx ,
187bc168a6cSRobert Watsonaudit records are collected from all jails and placed in a single
188bc168a6cSRobert Watsonglobal trail, and only limited audit controls are permitted within a jail).
189bb97b418SRobert Watson.El
190bb97b418SRobert Watson.Pp
191bb97b418SRobert WatsonIt is recommended that installations set the
192bc168a6cSRobert Watson.Cm cnt
193bb97b418SRobert Watsonflag but not
194bc168a6cSRobert Watson.Cm ahlt
195bb97b418SRobert Watsonflag unless it is intended that audit logs exceeding available disk space
196bb97b418SRobert Watsonhalt the system.
19706edd2f1SRobert Watson.Sh AUDIT LOG EXPIRATION SPECIFICATION
19806edd2f1SRobert WatsonThe expiration specification can be one value or two values with the
19906edd2f1SRobert Watsonlogical conjunction of AND/OR between them.
20006edd2f1SRobert WatsonValues for the audit log file age are numbers with the following
20106edd2f1SRobert Watsonsuffixes:
20206edd2f1SRobert Watson.Pp
20306edd2f1SRobert Watson.Bl -tag -width "(space) or" -compact -offset indent
20406edd2f1SRobert Watson.It Li s
20506edd2f1SRobert WatsonLog file age in seconds.
20606edd2f1SRobert Watson.It Li h
20706edd2f1SRobert WatsonLog file age in hours.
20806edd2f1SRobert Watson.It Li d
20906edd2f1SRobert WatsonLog file age in days.
21006edd2f1SRobert Watson.It Li y
21106edd2f1SRobert WatsonLog file age in years.
21206edd2f1SRobert Watson.El
21306edd2f1SRobert Watson.Pp
21406edd2f1SRobert WatsonValues for the disk space used are numbers with the following suffixes:
21506edd2f1SRobert Watson.Pp
21606edd2f1SRobert Watson.Bl -tag -width "(space) or" -compact -offset indent
21706edd2f1SRobert Watson.It (space) or
21806edd2f1SRobert Watson.It Li B
21906edd2f1SRobert WatsonDisk space used in Bytes.
22006edd2f1SRobert Watson.It Li K
22106edd2f1SRobert WatsonDisk space used in Kilobytes.
22206edd2f1SRobert Watson.It Li M
22306edd2f1SRobert WatsonDisk space used in Megabytes.
22406edd2f1SRobert Watson.It Li G
22506edd2f1SRobert WatsonDisk space used in Gigabytes.
22606edd2f1SRobert Watson.El
22706edd2f1SRobert Watson.Pp
22806edd2f1SRobert WatsonThe suffixes on the values are case sensitive.
229*aa772005SRobert WatsonIf both an age and disk space value are used they are separated by
23006edd2f1SRobert WatsonAND or OR and both values are used to determine when audit
23106edd2f1SRobert Watsonlog files expire.
232597df30eSRobert WatsonIn the case of AND, both the age and disk space conditions must be met
23306edd2f1SRobert Watsonbefore the log file is removed.
23406edd2f1SRobert WatsonIn the case of OR, either condition may expire the log file.
23506edd2f1SRobert WatsonFor example:
23606edd2f1SRobert Watson.Bd -literal -offset indent
23706edd2f1SRobert Watsonexpire-after: 60d AND 1G
23806edd2f1SRobert Watson.Ed
23906edd2f1SRobert Watson.Pp
24006edd2f1SRobert Watsonwill expire files that are older than 60 days but only if 1
24106edd2f1SRobert Watsongigabyte of disk space total is being used by the audit logs.
242ca0716f5SRobert Watson.Sh DEFAULT
243ca0716f5SRobert WatsonThe following settings appear in the default
244ca0716f5SRobert Watson.Nm
245ca0716f5SRobert Watsonfile:
246ca0716f5SRobert Watson.Bd -literal -offset indent
247ca0716f5SRobert Watsondir:/var/audit
248597df30eSRobert Watsonflags:lo,aa
24906edd2f1SRobert Watsonminfree:5
250597df30eSRobert Watsonnaflags:lo,aa
25106edd2f1SRobert Watsonpolicy:cnt,argv
252597df30eSRobert Watsonfilesz:2M
253597df30eSRobert Watsonexpire-after:10M
254ca0716f5SRobert Watson.Ed
255ca0716f5SRobert Watson.Pp
256ca0716f5SRobert WatsonThe
257ca0716f5SRobert Watson.Va flags
258ca0716f5SRobert Watsonparameter above specifies the system-wide mask corresponding to login/logout
259597df30eSRobert Watsonas well as authentication and authorization events.
260bb97b418SRobert WatsonThe
261bb97b418SRobert Watson.Va policy
262bb97b418SRobert Watsonparameter specifies that the system should neither fail stop nor suspend
26306edd2f1SRobert Watsonprocesses when the audit store fills and that command line arguments should
26406edd2f1SRobert Watsonbe audited for
26506edd2f1SRobert Watson.Dv AUE_EXECVE
26606edd2f1SRobert Watsonevents.
26706edd2f1SRobert WatsonThe trail file will be automatically rotated by the audit daemon when the
26806edd2f1SRobert Watsonfile size reaches approximately 2MB.
269597df30eSRobert WatsonTrail files will expire when their aggregate size exceeds 10MB.
270ca0716f5SRobert Watson.Sh FILES
271bc168a6cSRobert Watson.Bl -tag -width ".Pa /etc/security/audit_control" -compact
272ca0716f5SRobert Watson.It Pa /etc/security/audit_control
273ca0716f5SRobert Watson.El
274ca0716f5SRobert Watson.Sh SEE ALSO
27552267f74SRobert Watson.Xr auditon 2 ,
276bc168a6cSRobert Watson.Xr audit 4 ,
277ca0716f5SRobert Watson.Xr audit_class 5 ,
278bc168a6cSRobert Watson.Xr audit_event 5 ,
27923bf6e20SRobert Watson.Xr audit_user 5 ,
28023bf6e20SRobert Watson.Xr audit 8 ,
28123bf6e20SRobert Watson.Xr auditd 8
282bc168a6cSRobert Watson.Sh HISTORY
283bc168a6cSRobert WatsonThe OpenBSM implementation was created by McAfee Research, the security
284bc168a6cSRobert Watsondivision of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
285bc168a6cSRobert WatsonIt was subsequently adopted by the TrustedBSD Project as the foundation for
286bc168a6cSRobert Watsonthe OpenBSM distribution.
287ca0716f5SRobert Watson.Sh AUTHORS
288bc168a6cSRobert Watson.An -nosplit
289ca0716f5SRobert WatsonThis software was created by McAfee Research, the security research division
290ca0716f5SRobert Watsonof McAfee, Inc., under contract to Apple Computer Inc.
291bc168a6cSRobert WatsonAdditional authors include
292bc168a6cSRobert Watson.An Wayne Salamon ,
293bc168a6cSRobert Watson.An Robert Watson ,
294bc168a6cSRobert Watsonand SPARTA Inc.
295ca0716f5SRobert Watson.Pp
296ca0716f5SRobert WatsonThe Basic Security Module (BSM) interface to audit records and audit event
297ca0716f5SRobert Watsonstream format were defined by Sun Microsystems.
298