aboutsummaryrefslogtreecommitdiff
path: root/usr.sbin/setaudit
diff options
context:
space:
mode:
Diffstat (limited to 'usr.sbin/setaudit')
-rw-r--r--usr.sbin/setaudit/.gitignore2
-rw-r--r--usr.sbin/setaudit/Makefile6
-rw-r--r--usr.sbin/setaudit/setaudit.888
-rw-r--r--usr.sbin/setaudit/setaudit.c158
4 files changed, 254 insertions, 0 deletions
diff --git a/usr.sbin/setaudit/.gitignore b/usr.sbin/setaudit/.gitignore
new file mode 100644
index 000000000000..459fdebd0a30
--- /dev/null
+++ b/usr.sbin/setaudit/.gitignore
@@ -0,0 +1,2 @@
+setaudit
+setaudit.o
diff --git a/usr.sbin/setaudit/Makefile b/usr.sbin/setaudit/Makefile
new file mode 100644
index 000000000000..548780f4cd03
--- /dev/null
+++ b/usr.sbin/setaudit/Makefile
@@ -0,0 +1,6 @@
+PROG= setaudit
+MAN= setaudit.8
+
+LIBADD+= bsm
+
+.include <bsd.prog.mk>
diff --git a/usr.sbin/setaudit/setaudit.8 b/usr.sbin/setaudit/setaudit.8
new file mode 100644
index 000000000000..7dd66225979c
--- /dev/null
+++ b/usr.sbin/setaudit/setaudit.8
@@ -0,0 +1,88 @@
+.\" Copyright (c) 2018-2022 Mateusz Piotrowski <0mp@FreeBSD.org>
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.Dd March 21, 2018
+.Dt SETAUDIT 8
+.Os
+.Sh NAME
+.Nm setaudit
+.Nd "specify audit configurations on a process"
+.Sh SYNOPSIS
+.Nm
+.Op Fl 46U
+.Op Fl a Ar auid
+.Op Fl m Ar mask
+.Op Fl s Ar source
+.Op Fl p Ar port
+.Ar command ...
+.Sh DESCRIPTION
+.Nm
+is a tool to specify audit configurations on a process.
+.Pp
+The following options are available:
+.Bl -tag -width ".Fl d Ar argument"
+.It Fl 4
+Use IPv4.
+.It Fl 6
+Use IPv6.
+.It Fl U
+Update audit session state rather than overwriting it.
+By default,
+.Nm
+will overwrite the entire audit session state using the specified
+parameters.
+If
+.Fl U
+is specified, only the parameters given on the command line will be
+updated, leaving the rest unchanged.
+.It Fl a Ar auid
+Audit user ID or user name.
+.It Fl m Ar mask
+String representation of an audit mask.
+.It Fl s Ar source
+IPv4 or IPv6 address of a Terminal ID.
+.It Fl p Ar port
+Port of a Terminal ID.
+.Xr
+.El
+.Sh EXAMPLES
+Enable all exe related audit events performed by
+.Ar command
+and its child processes:
+.Pp
+.Dl # setaudit -m ex command
+.Sh SEE ALSO
+.Xr getaudit 2 ,
+.Xr setaudit 2 ,
+.Xr au_mask 3 ,
+.Xr libbsm 3 ,
+.Xr audit_user 5 ,
+.Xr audit 8
+.Sh HISTORY
+The
+.Nm
+utility was written by
+.An Christian S.J. Peron Aq Mt csjp@FreeBSD.org .
+.Sh AUTHORS
+This
+manual page was written by
+.An Mateusz Piotrowski Aq Mt 0mp@FreeBSD.org .
diff --git a/usr.sbin/setaudit/setaudit.c b/usr.sbin/setaudit/setaudit.c
new file mode 100644
index 000000000000..af8f481afcb3
--- /dev/null
+++ b/usr.sbin/setaudit/setaudit.c
@@ -0,0 +1,158 @@
+/*-
+ * Copyright (c) 2018 Christian S.J. Peron
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#include <sys/types.h>
+#include <sys/socket.h>
+
+#include <bsm/audit.h>
+#include <bsm/libbsm.h>
+
+#include <netinet/in.h>
+
+#include <err.h>
+#include <netdb.h>
+#include <pwd.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+static void
+usage(char *prog)
+{
+ (void)fprintf(stderr,
+ "usage: %s [-46U] [-a auid] [-m mask] [-p port] [-s source] command ...\n",
+ prog);
+ exit(1);
+}
+
+int
+main(int argc, char *argv [])
+{
+ struct sockaddr_in6 *sin6;
+ struct sockaddr_in *sin;
+ struct addrinfo hints;
+ auditinfo_addr_t aia;
+ char *aflag, *mflag, *sflag, *prog;
+ dev_t term_port;
+ uint32_t term_type;
+ int ch, error;
+ bool Uflag;
+
+ aflag = mflag = sflag = NULL;
+ Uflag = false;
+
+ prog = argv[0];
+ bzero(&aia, sizeof(aia));
+ bzero(&hints, sizeof(hints));
+ term_type = AU_IPv4;
+ hints.ai_family = PF_UNSPEC;
+ while ((ch = getopt(argc, argv, "46a:m:p:s:U")) != -1)
+ switch (ch) {
+ case '4':
+ hints.ai_family = PF_INET;
+ break;
+ case '6':
+ hints.ai_family = PF_INET6;
+ break;
+ case 'a':
+ aflag = optarg;
+ break;
+ case 'm':
+ mflag = optarg;
+ break;
+ case 'p':
+ term_port = htons(atoi(optarg));
+ break;
+ case 's':
+ sflag = optarg;
+ break;
+ case 'U':
+ Uflag = true;
+ break;
+ default:
+ usage(prog);
+ /* NOT REACHED */
+ }
+ argc -= optind;
+ argv += optind;
+ if (argc == 0)
+ usage(prog);
+
+ if (Uflag) {
+ if (getaudit_addr(&aia, sizeof(aia)) < 0)
+ err(1, "getaudit_addr");
+ }
+ if (aflag) {
+ struct passwd *pwd;
+
+ pwd = getpwnam(aflag);
+ if (pwd == NULL) {
+ char *r;
+
+ aia.ai_auid = strtoul(aflag, &r, 10);
+ if (*r != '\0')
+ errx(1, "%s: invalid user", aflag);
+ } else
+ aia.ai_auid = pwd->pw_uid;
+ }
+ if (mflag) {
+ if (getauditflagsbin(mflag, &aia.ai_mask) < 0)
+ err(1, "getauditflagsbin");
+ }
+ if (sflag) {
+ struct addrinfo *res;
+
+ error = getaddrinfo(sflag, NULL, &hints, &res);
+ if (error)
+ errx(1, "%s", gai_strerror(error));
+ switch (res->ai_family) {
+ case PF_INET6:
+ sin6 = (struct sockaddr_in6 *)(void *)res->ai_addr;
+ bcopy(&sin6->sin6_addr.s6_addr,
+ &aia.ai_termid.at_addr[0],
+ sizeof(struct in6_addr));
+ term_type = AU_IPv6;
+ break;
+ case PF_INET:
+ sin = (struct sockaddr_in *)(void *)res->ai_addr;
+ bcopy(&sin->sin_addr.s_addr,
+ &aia.ai_termid.at_addr[0],
+ sizeof(struct in_addr));
+ term_type = AU_IPv4;
+ break;
+ }
+ }
+ if (!Uflag || sflag) {
+ aia.ai_termid.at_port = term_port;
+ aia.ai_termid.at_type = term_type;
+ }
+ if (setaudit_addr(&aia, sizeof(aia)) < 0)
+ err(1, "setaudit_addr");
+ (void)execvp(*argv, argv);
+ err(1, "%s", *argv);
+}