Annotation of embedaddon/sudo/plugins/sudoers/bsm_audit.c, revision 1.1
1.1 ! misho 1: /*
! 2: * Copyright (c) 2009-2011 Todd C. Miller <Todd.Miller@courtesan.com>
! 3: * Copyright (c) 2009 Christian S.J. Peron
! 4: *
! 5: * Permission to use, copy, modify, and distribute this software for any
! 6: * purpose with or without fee is hereby granted, provided that the above
! 7: * copyright notice and this permission notice appear in all copies.
! 8: *
! 9: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
! 10: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
! 11: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
! 12: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
! 13: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
! 14: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
! 15: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
! 16: */
! 17:
! 18: #include <config.h>
! 19:
! 20: #include <sys/types.h>
! 21:
! 22: #include <bsm/audit.h>
! 23: #include <bsm/libbsm.h>
! 24: #include <bsm/audit_uevents.h>
! 25:
! 26: #include <stdio.h>
! 27: #include <string.h>
! 28: #include <stdarg.h>
! 29: #include <pwd.h>
! 30: #include <errno.h>
! 31: #include <unistd.h>
! 32:
! 33: #include "bsm_audit.h"
! 34:
! 35: /*
! 36: * Solaris auditon() returns EINVAL if BSM audit not configured.
! 37: * OpenBSM returns ENOSYS for unimplemented options.
! 38: */
! 39: #ifdef __sun
! 40: # define AUDIT_NOT_CONFIGURED EINVAL
! 41: #else
! 42: # define AUDIT_NOT_CONFIGURED ENOSYS
! 43: #endif
! 44:
! 45: void log_error(int flags, const char *fmt, ...) __attribute__((__noreturn__));
! 46:
! 47: static int
! 48: audit_sudo_selected(int sf)
! 49: {
! 50: auditinfo_addr_t ainfo_addr;
! 51: struct au_mask *mask;
! 52: auditinfo_t ainfo;
! 53: int rc, sorf;
! 54:
! 55: if (getaudit_addr(&ainfo_addr, sizeof(ainfo_addr)) < 0) {
! 56: if (errno == ENOSYS) {
! 57: if (getaudit(&ainfo) < 0)
! 58: log_error(0, _("getaudit: failed"));
! 59: mask = &ainfo.ai_mask;
! 60: } else
! 61: log_error(0, _("getaudit: failed"));
! 62: } else
! 63: mask = &ainfo_addr.ai_mask;
! 64: sorf = (sf == 0) ? AU_PRS_SUCCESS : AU_PRS_FAILURE;
! 65: rc = au_preselect(AUE_sudo, mask, sorf, AU_PRS_REREAD);
! 66: return rc;
! 67: }
! 68:
! 69: void
! 70: bsm_audit_success(char **exec_args)
! 71: {
! 72: auditinfo_addr_t ainfo_addr;
! 73: auditinfo_t ainfo;
! 74: token_t *tok;
! 75: au_id_t auid;
! 76: long au_cond;
! 77: int aufd;
! 78: pid_t pid;
! 79:
! 80: pid = getpid();
! 81: /*
! 82: * If we are not auditing, don't cut an audit record; just return.
! 83: */
! 84: if (auditon(A_GETCOND, (caddr_t)&au_cond, sizeof(long)) < 0) {
! 85: if (errno == AUDIT_NOT_CONFIGURED)
! 86: return;
! 87: log_error(0, _("Could not determine audit condition"));
! 88: }
! 89: if (au_cond == AUC_NOAUDIT)
! 90: return;
! 91: /*
! 92: * Check to see if the preselection masks are interested in seeing
! 93: * this event.
! 94: */
! 95: if (!audit_sudo_selected(0))
! 96: return;
! 97: if (getauid(&auid) < 0)
! 98: log_error(0, _("getauid failed"));
! 99: if ((aufd = au_open()) == -1)
! 100: log_error(0, _("au_open: failed"));
! 101: if (getaudit_addr(&ainfo_addr, sizeof(ainfo_addr)) == 0) {
! 102: tok = au_to_subject_ex(auid, geteuid(), getegid(), getuid(),
! 103: getuid(), pid, pid, &ainfo_addr.ai_termid);
! 104: } else if (errno == ENOSYS) {
! 105: /*
! 106: * NB: We should probably watch out for ERANGE here.
! 107: */
! 108: if (getaudit(&ainfo) < 0)
! 109: log_error(0, _("getaudit: failed"));
! 110: tok = au_to_subject(auid, geteuid(), getegid(), getuid(),
! 111: getuid(), pid, pid, &ainfo.ai_termid);
! 112: } else
! 113: log_error(0, _("getaudit: failed"));
! 114: if (tok == NULL)
! 115: log_error(0, _("au_to_subject: failed"));
! 116: au_write(aufd, tok);
! 117: tok = au_to_exec_args(exec_args);
! 118: if (tok == NULL)
! 119: log_error(0, _("au_to_exec_args: failed"));
! 120: au_write(aufd, tok);
! 121: tok = au_to_return32(0, 0);
! 122: if (tok == NULL)
! 123: log_error(0, _("au_to_return32: failed"));
! 124: au_write(aufd, tok);
! 125: if (au_close(aufd, 1, AUE_sudo) == -1)
! 126: log_error(0, _("unable to commit audit record"));
! 127: }
! 128:
! 129: void
! 130: bsm_audit_failure(char **exec_args, char const *const fmt, va_list ap)
! 131: {
! 132: auditinfo_addr_t ainfo_addr;
! 133: auditinfo_t ainfo;
! 134: char text[256];
! 135: token_t *tok;
! 136: long au_cond;
! 137: au_id_t auid;
! 138: pid_t pid;
! 139: int aufd;
! 140:
! 141: pid = getpid();
! 142: /*
! 143: * If we are not auditing, don't cut an audit record; just return.
! 144: */
! 145: if (auditon(A_GETCOND, &au_cond, sizeof(long)) < 0) {
! 146: if (errno == AUDIT_NOT_CONFIGURED)
! 147: return;
! 148: log_error(0, _("Could not determine audit condition"));
! 149: }
! 150: if (au_cond == AUC_NOAUDIT)
! 151: return;
! 152: if (!audit_sudo_selected(1))
! 153: return;
! 154: if (getauid(&auid) < 0)
! 155: log_error(0, _("getauid: failed"));
! 156: if ((aufd = au_open()) == -1)
! 157: log_error(0, _("au_open: failed"));
! 158: if (getaudit_addr(&ainfo_addr, sizeof(ainfo_addr)) == 0) {
! 159: tok = au_to_subject_ex(auid, geteuid(), getegid(), getuid(),
! 160: getuid(), pid, pid, &ainfo_addr.ai_termid);
! 161: } else if (errno == ENOSYS) {
! 162: if (getaudit(&ainfo) < 0)
! 163: log_error(0, _("getaudit: failed"));
! 164: tok = au_to_subject(auid, geteuid(), getegid(), getuid(),
! 165: getuid(), pid, pid, &ainfo.ai_termid);
! 166: } else
! 167: log_error(0, _("getaudit: failed"));
! 168: if (tok == NULL)
! 169: log_error(0, _("au_to_subject: failed"));
! 170: au_write(aufd, tok);
! 171: tok = au_to_exec_args(exec_args);
! 172: if (tok == NULL)
! 173: log_error(0, _("au_to_exec_args: failed"));
! 174: au_write(aufd, tok);
! 175: (void) vsnprintf(text, sizeof(text), fmt, ap);
! 176: tok = au_to_text(text);
! 177: if (tok == NULL)
! 178: log_error(0, _("au_to_text: failed"));
! 179: au_write(aufd, tok);
! 180: tok = au_to_return32(EPERM, 1);
! 181: if (tok == NULL)
! 182: log_error(0, _("au_to_return32: failed"));
! 183: au_write(aufd, tok);
! 184: if (au_close(aufd, 1, AUE_sudo) == -1)
! 185: log_error(0, _("unable to commit audit record"));
! 186: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>