Sync from SUSE:ALP:Source:Standard:1.0 audit revision b45ec063c4e7856d1bf1ea7fa6a46c44
This commit is contained in:
commit
b8686be827
23
.gitattributes
vendored
Normal file
23
.gitattributes
vendored
Normal file
@ -0,0 +1,23 @@
|
||||
## Default LFS
|
||||
*.7z filter=lfs diff=lfs merge=lfs -text
|
||||
*.bsp filter=lfs diff=lfs merge=lfs -text
|
||||
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.gem filter=lfs diff=lfs merge=lfs -text
|
||||
*.gz filter=lfs diff=lfs merge=lfs -text
|
||||
*.jar filter=lfs diff=lfs merge=lfs -text
|
||||
*.lz filter=lfs diff=lfs merge=lfs -text
|
||||
*.lzma filter=lfs diff=lfs merge=lfs -text
|
||||
*.obscpio filter=lfs diff=lfs merge=lfs -text
|
||||
*.oxt filter=lfs diff=lfs merge=lfs -text
|
||||
*.pdf filter=lfs diff=lfs merge=lfs -text
|
||||
*.png filter=lfs diff=lfs merge=lfs -text
|
||||
*.rpm filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.tgz filter=lfs diff=lfs merge=lfs -text
|
||||
*.ttf filter=lfs diff=lfs merge=lfs -text
|
||||
*.txz filter=lfs diff=lfs merge=lfs -text
|
||||
*.whl filter=lfs diff=lfs merge=lfs -text
|
||||
*.xz filter=lfs diff=lfs merge=lfs -text
|
||||
*.zip filter=lfs diff=lfs merge=lfs -text
|
||||
*.zst filter=lfs diff=lfs merge=lfs -text
|
16
README-BEFORE-ADDING-PATCHES
Normal file
16
README-BEFORE-ADDING-PATCHES
Normal file
@ -0,0 +1,16 @@
|
||||
All patches need to have a kernel-style patch description header.
|
||||
|
||||
PATCHES LACKING THIS OR NOT CORRECTLY FOLLOWING DESCRIPTION BELOW WILL BE
|
||||
REJECTED OR REVERTED
|
||||
|
||||
From: Joe Smoe <joe@smoe.com>
|
||||
Subject: Summary of fix
|
||||
Date: Date of fix
|
||||
References: Bugzilla reference [bsc#xxxx]
|
||||
References: URL of relevant discussion thread, opensuse or upstream ML etc
|
||||
Git-commit: Full SHA of upstream commit [if applicable]
|
||||
Git-repo: [if different from https://github.com/linux-audit/audit-userspace.git]
|
||||
Patch-mainline: revision of audit package or explanation if not [i.e v2.8.1 or "queued with maintainer" or "never; because ...." ]
|
||||
Signed-Off-by: Joe Smoe <joe@smoe.com>
|
||||
|
||||
Short paragraph describing problem/fix.
|
BIN
audit-3.0.9.tar.gz
(Stored with Git LFS)
Normal file
BIN
audit-3.0.9.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
25
audit-allow-manual-stop.patch
Normal file
25
audit-allow-manual-stop.patch
Normal file
@ -0,0 +1,25 @@
|
||||
From: Tony Jones <tonyj@suse.de>
|
||||
Subject: allow service stop
|
||||
References: https://lists.fedoraproject.org/pipermail/devel/2012-June/169411.html
|
||||
References: https://www.redhat.com/archives/linux-audit/2013-July/msg00048.html
|
||||
---
|
||||
|
||||
legacy-actions is Fedora specific, so blocking manual stop won't work for
|
||||
SUSE since we lack the ability to use a custom stop/restart
|
||||
|
||||
|
||||
init.d/auditd.service | 1 -
|
||||
1 file changed, 1 deletion(-)
|
||||
|
||||
Index: audit-3.0.9/init.d/auditd.service
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/auditd.service
|
||||
+++ audit-3.0.9/init.d/auditd.service
|
||||
@@ -11,7 +11,6 @@ After=local-fs.target systemd-tmpfiles-s
|
||||
Before=sysinit.target shutdown.target
|
||||
##Before=shutdown.target
|
||||
Conflicts=shutdown.target
|
||||
-RefuseManualStop=yes
|
||||
ConditionKernelCommandLine=!audit=0
|
||||
ConditionKernelCommandLine=!audit=off
|
||||
|
41
audit-ausearch-do-not-require-tclass.patch
Normal file
41
audit-ausearch-do-not-require-tclass.patch
Normal file
@ -0,0 +1,41 @@
|
||||
From: William Preston <wpreston@suse.com>
|
||||
Subject: ausearch is looking for the "tclass" field in the entries, which doesn't make sense for apparmor.
|
||||
References: bnc#878687
|
||||
References: https://www.redhat.com/archives/linux-audit/2014-May/msg00094.html https://www.redhat.com/archives/linux-audit/2014-June/msg00001.html
|
||||
Upstream: never
|
||||
Signed-off-by: Tony Jones <tonyj@suse.de>
|
||||
|
||||
---
|
||||
src/ausearch-parse.c | 18 ++++++++----------
|
||||
1 file changed, 8 insertions(+), 10 deletions(-)
|
||||
|
||||
Index: audit-3.0.9/src/ausearch-parse.c
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/src/ausearch-parse.c
|
||||
+++ audit-3.0.9/src/ausearch-parse.c
|
||||
@@ -2062,17 +2062,15 @@ other_avc:
|
||||
|
||||
// Now get the class...its at the end, so we do things different
|
||||
str = strstr(term, "tclass=");
|
||||
- if (str == NULL) {
|
||||
- rc = 9;
|
||||
- goto err;
|
||||
+ if (str) {
|
||||
+ str += 7;
|
||||
+ term = strchr(str, ' ');
|
||||
+ if (term)
|
||||
+ *term = 0;
|
||||
+ an.avc_class = strdup(str);
|
||||
+ if (term)
|
||||
+ *term = ' ';
|
||||
}
|
||||
- str += 7;
|
||||
- term = strchr(str, ' ');
|
||||
- if (term)
|
||||
- *term = 0;
|
||||
- an.avc_class = strdup(str);
|
||||
- if (term)
|
||||
- *term = ' ';
|
||||
|
||||
if (audit_avc_init(s) == 0) {
|
||||
alist_append(s->avc, &an);
|
24
audit-no-gss.patch
Normal file
24
audit-no-gss.patch
Normal file
@ -0,0 +1,24 @@
|
||||
From: Tony Jones <tonyj@suse.de>
|
||||
Subject: Disable GSS options from config file
|
||||
Upsteam: never
|
||||
|
||||
Disable GSS/Kerberos options from config file. They are disabled from configure
|
||||
but need manual removal here.
|
||||
|
||||
---
|
||||
init.d/auditd.conf | 3 ---
|
||||
1 file changed, 3 deletions(-)
|
||||
|
||||
Index: audit-3.0.9/init.d/auditd.conf
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/auditd.conf
|
||||
+++ audit-3.0.9/init.d/auditd.conf
|
||||
@@ -30,8 +30,6 @@ tcp_max_per_addr = 1
|
||||
##tcp_client_ports = 1024-65535
|
||||
tcp_client_max_idle = 0
|
||||
transport = TCP
|
||||
-krb5_principal = auditd
|
||||
-##krb5_key_file = /etc/audit/audit.key
|
||||
distribute_network = no
|
||||
q_depth = 2000
|
||||
overflow_action = SYSLOG
|
29
audit-plugins-path.patch
Normal file
29
audit-plugins-path.patch
Normal file
@ -0,0 +1,29 @@
|
||||
From: Tony Jones <tonyj@suse.de>
|
||||
Subject: Adjust location of plugins built by audit-secondary
|
||||
Upsteam: never
|
||||
|
||||
Adjust location of plugins built by audit-secondary. These should never have
|
||||
been in /sbin plus some (for SUSE) require lib dependancies on /usr/lib
|
||||
|
||||
--- a/audisp/plugins/remote/au-remote.conf
|
||||
+++ b/audisp/plugins/remote/au-remote.conf
|
||||
@@ -5,7 +5,7 @@
|
||||
|
||||
active = no
|
||||
direction = out
|
||||
-path = /sbin/audisp-remote
|
||||
+path = /usr/sbin/audisp-remote
|
||||
type = always
|
||||
#args =
|
||||
format = string
|
||||
--- a/audisp/plugins/zos-remote/audispd-zos-remote.conf
|
||||
+++ b/audisp/plugins/zos-remote/audispd-zos-remote.conf
|
||||
@@ -8,7 +8,7 @@
|
||||
|
||||
active = no
|
||||
direction = out
|
||||
-path = /sbin/audispd-zos-remote
|
||||
+path = /usr/sbin/audispd-zos-remote
|
||||
type = always
|
||||
args = /etc/audit/zos-remote.conf
|
||||
format = string
|
737
audit-secondary.changes
Normal file
737
audit-secondary.changes
Normal file
@ -0,0 +1,737 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Dec 27 10:21:56 UTC 2022 - Ludwig Nussel <lnussel@suse.com>
|
||||
|
||||
- Replace transitional %usrmerged macro with regular version check (boo#1206798)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Dec 15 19:17:35 UTC 2022 - Enzo Matsumiya <ematsumiya@suse.de>
|
||||
|
||||
- Enable build for ARM (32-bit)
|
||||
- Update to version 3.0.9:
|
||||
* In auditd, release the async flush lock on stop
|
||||
* Don't allow auditd to log directly into /var/log when log_group is non-zero
|
||||
* Cleanup krb5 memory leaks on error paths
|
||||
* Update auditd.cron to use auditctl --signal
|
||||
* In auparse, if too many fields, realloc array bigger (Paul Wolneykien)
|
||||
* In auparse, special case kernel module name interpretation
|
||||
* If overflow_action is ignore, don't treat as an error
|
||||
(3.0.8)
|
||||
* Add gcc function attributes for access and allocation
|
||||
* Add some more man pages (MIZUTA Takeshi)
|
||||
* In auditd, change the reinitializing of the plugin queue
|
||||
* Fix path normalization in auparse (Sergio Correia)
|
||||
* In libaudit, handle ECONNREFUSED for network uid/gid lookups (Enzo Matsumiya)
|
||||
* In audisp-remote, fix hang with disk_low_action=suspend (Enzo Matsumiya)
|
||||
* Drop ProtectHome from auditd.service as it interferes with rules
|
||||
(3.0.7)
|
||||
* Add support for the OPENAT2 record type (Richard Guy Briggs)
|
||||
* In auditd, close the logging file descriptor when logging is suspended
|
||||
* Update the capabilities lookup table to match 5.16 kernel
|
||||
* Improve interpretation of renamat & faccessat family of syscalls
|
||||
* Update syscall table for the 5.16 kernel
|
||||
* Reduce dependency from initscripts to initscripts-service
|
||||
- Refresh patches (context adjusment):
|
||||
* audit-allow-manual-stop.patch
|
||||
* audit-ausearch-do-not-require-tclass.patch
|
||||
* audit-no-gss.patch
|
||||
* enable-stop-rules.patch
|
||||
* fix-hardened-service.patch
|
||||
* harden_auditd.service.patch
|
||||
- Remove patches (fixed by version update):
|
||||
* libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
|
||||
* audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 11 20:44:34 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||||
|
||||
- Drop buildrequire on C++ compiler.
|
||||
- Modernize specfile constructs.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Mar 26 11:14:19 UTC 2022 - Stephan Kulow <coolo@suse.com>
|
||||
|
||||
- Fix buildrequire for openldap2-devel - audit doesn't require the
|
||||
(outdated) C++ binding, but the C headers that happen to be pulled
|
||||
in by buildrequiring the C++ devel package
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 25 04:56:19 UTC 2022 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Fix unhandled ECONNREFUSED with LDAP environments (bsc#1196645)
|
||||
* add libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
|
||||
- Fix hang in audisp-remote with disk_low_action=suspend (bsc#1196517)
|
||||
* add audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 23 16:37:06 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
||||
|
||||
- add audit-userspace-517-compat.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Nov 29 13:13:56 UTC 2021 - Fabian Vogt <fvogt@suse.com>
|
||||
|
||||
- Use %autosetup
|
||||
- Don't include sample rules as %doc, they're already installed
|
||||
as normal files
|
||||
- Fix create-augenrules-service.patch:
|
||||
* auditd.service needs to require augenrules.service,
|
||||
not the other way around
|
||||
- Fix documentation for enable-stop-rules.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Nov 7 13:34:20 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
|
||||
|
||||
- Update to version 3.0.6:
|
||||
* fixes a segfault on some SELINUX_ERR records
|
||||
* makes IPX packet interpretation dependent on the ipx header
|
||||
file existing
|
||||
* adds b32/b64 support to ausyscall
|
||||
* adds support for armv8l
|
||||
* fixes auditctl list of syscalls on PPC
|
||||
* auditd.service now restarts auditd under some conditions
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 15 11:13:26 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
|
||||
|
||||
- Add CONFIG parameter to %sysusers_generate_pre
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Oct 13 19:12:06 UTC 2021 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Create separate service for augenrules (bsc#1191614, bsc#1181400)
|
||||
* add create-augenrules-service.patch
|
||||
Remove ReadWritePaths=/etc/audit from auditd.service, also removes
|
||||
augenrules call from ExecStartPost.
|
||||
Create augenrules.service with the ReadWritePaths directive above.
|
||||
This makes /etc/audit only accessible by augenrules.service and
|
||||
let auditd.service (and daemon) to be sandboxed again.
|
||||
|
||||
- Update audit-secondary.spec to accomodate the new service file.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 20 02:06:44 UTC 2021 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Fix hardened auditd.service (bsc#1181400)
|
||||
* add fix-hardened-service.patch
|
||||
Make /etc/audit read-write from the service.
|
||||
Remove PrivateDevices=true to expose /dev/* to auditd.service.
|
||||
|
||||
- Enable stop rules for audit.service (cf. bsc#1190227)
|
||||
* add enable-stop-rules.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Sep 16 03:46:19 UTC 2021 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Change default log_format from ENRICHED to RAW (bsc#1190500):
|
||||
* add change-default-log_format.patch (SUSE-specific patch)
|
||||
|
||||
- Update to version 3.0.5:
|
||||
* In auditd, flush uid/gid caches when user/group added/deleted/modified
|
||||
* Fixed various issues when dealing with corrupted logs
|
||||
* In auditd, check if log_file is valid before closing handle
|
||||
|
||||
- Include fixed from 3.0.4:
|
||||
* Apply performance speedups to auparse library
|
||||
* Optimize rule loading in auditctl
|
||||
* Fix an auparse memory leak caused by glibc-2.33 by replacing realpath
|
||||
* Update syscall table to the 5.14 kernel
|
||||
* Fixed various issues when dealing with corrupted logs
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Aug 16 13:29:21 UTC 2021 - Marcus Meissner <meissner@suse.com>
|
||||
|
||||
- harden_auditd.service.patch: automatic hardening applied to systemd
|
||||
services
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Jul 30 18:14:14 CEST 2021 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Update to version 3.0.3:
|
||||
* Dont interpret audit netlink groups unless AUDIT_NLGRP_MAX is defined
|
||||
* Add support for AUDIT_RESP_ORIGIN_UNBLOCK_TIMED to ids
|
||||
* Change auparse_feed_has_data in auparse to include incomplete events
|
||||
* Auditd, stop linking against -lrt
|
||||
* Add ProtectHome and RestrictRealtime to auditd.service
|
||||
* In auditd, read up to 3 netlink packets in a row
|
||||
* In auditd, do not validate path to plugin unless active
|
||||
* In auparse, only emit config errors when AUPARSE_DEBUG env variable exists
|
||||
- use https source urls
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jun 14 20:54:49 CEST 2021 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Adjust audit.spec and audit-secondary.spec to support new version
|
||||
- Include fix for libev
|
||||
* add libev-werror.patch
|
||||
|
||||
- Update to version 3.0.2
|
||||
- In audispd-statsd pluging, use struct sockaddr_storage (Ville Heikkinen)
|
||||
- Optionally interpret auid in auditctl -l
|
||||
- Update some syscall argument interpretations
|
||||
- In auditd, do not allow spaces in the hostname name format
|
||||
- Big documentation cleanup (MIZUTA Takeshi)
|
||||
- Update syscall table to the 5.12 kernel
|
||||
- Update the auparse normalizer for new event types
|
||||
- Fix compiler warnings in ids subsystem
|
||||
- Block a couple signals from flush & reconfigure threads
|
||||
- In auditd, don't wait on flush thread when exiting
|
||||
- Output error message if the path of input files are too long ausearch/report
|
||||
|
||||
Included fixes from 3.0.1
|
||||
- Update syscall table to the 5.11 kernel
|
||||
- Add new --eoe-timeout option to ausearch and aureport (Burn Alting)
|
||||
- Only enable periodic timers when listening on the network
|
||||
- Upgrade libev to 4.33
|
||||
- Add auparse_new_buffer function to auparse library
|
||||
- Use the select libev backend unless aggregating events
|
||||
- Add sudoers to some base audit rules
|
||||
- Update the auparse normalizer for some new syscalls and event types
|
||||
|
||||
Included fixes from 3.0
|
||||
- Generate checkpoint file even when no results are returned (Burn Alting)
|
||||
- Fix log file creation when file logging is disabled entirely (Vlad Glagolev)
|
||||
- Convert auparse_test to run with python3 (Tomáš Chvátal)
|
||||
- Drop support for prelude
|
||||
- Adjust backlog_wait_time in rules to the kernel default (#1482848)
|
||||
- Remove ids key syntax checking of rules in auditctl
|
||||
- Use SIGCONT to dump auditd internal state (#1504251)
|
||||
- Fix parsing of virtual timestamp fields in ausearch_expression (#1515903)
|
||||
- Fix parsing of uid & success for ausearch
|
||||
- Add support for not equal operator in audit by executable (Ondrej Mosnacek)
|
||||
- Hide lru symbols in auparse
|
||||
- Add systemd process protections
|
||||
- Fix aureport summary time range reporting
|
||||
- Allow unlimited retries on startup for remote logging
|
||||
- Add queue_depth to remote logging stats and increase default queue_depth size
|
||||
- Fix segfault on shutdown
|
||||
- Merge auditd and audispd code
|
||||
- Close on execute init_pipe fd (#1587995)
|
||||
- Breakout audisp syslog plugin to be standalone program
|
||||
- Create a common internal library to reduce code
|
||||
- Move all audispd config files under /etc/audit/
|
||||
- Move audispd.conf settings into auditd.conf
|
||||
- Add queue depth statistics to internal state dump report
|
||||
- Add network statistics to internal state dump report
|
||||
- SIGUSR now also restarts queue processing if its suspended
|
||||
- Update lookup tables for the 4.18 kernel
|
||||
- Add auparse_normalizer support for SOFTWARE_UPDATE event
|
||||
- Add 30-ospp-v42.rules to meet new Common Criteria requirements
|
||||
- Deprecate enable_krb and replace with transport config opt for remote logging
|
||||
- Mark netlabel events as simple events so that get processed quicker
|
||||
- When auditd is reconfiguring, only SIGHUP plugins with valid pid (#1614833)
|
||||
- In aureport, fix segfault in file report
|
||||
- Add auparse_normalizer support for labeled networking events
|
||||
- Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194)
|
||||
- In ausearch/auparse, event aging is off by a second
|
||||
- In ausearch/auparse, correct event ordering to process oldest first
|
||||
- Migrate auparse python test to python3
|
||||
- auparse_reset was not clearing everything it should
|
||||
- Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events
|
||||
- In ausearch/report, lightly parse selinux portion of USER_AVC events
|
||||
- Add bpf syscall command argument interpretation to auparse
|
||||
- In ausearch/report, limit record size when malformed
|
||||
- Port af_unix plugin to libev
|
||||
- In auditd, fix extract_type function for network originating events
|
||||
- In auditd, calculate right size and location for network originating events
|
||||
- Make legacy script wait for auditd to terminate (#1643567)
|
||||
- Treat all network originating events as VER2 so dispatcher doesn't format it
|
||||
- If an event has a node name make it VER2 so dispatcher doesnt format it
|
||||
- In audisp-remote do an initial connection attempt (#1625156)
|
||||
- In auditd, allow expression of space left as a percentage (#1650670)
|
||||
- On PPC64LE systems, only allow 64 bit rules (#1462178)
|
||||
- Make some parts of auditd state report optional based on config
|
||||
- Update to libev-4.25
|
||||
- Fix ausearch when checkpointing a single file (Burn Alting)
|
||||
- Fix scripting in 31-privileged.rules wrt filecap (#1662516)
|
||||
- In ausearch, do not checkpt if stdin is input source
|
||||
- In libev, remove __cold__ attribute for functions to allow proper hardening
|
||||
- Add tests to configure.ac for openldap support
|
||||
- Make systemd support files use /run rather than /var/run (Christian Hesse)
|
||||
- Fix minor memory leak in auditd kerberos credentials code
|
||||
- Allow exclude and user filter by executable name (Ondrej Mosnacek)
|
||||
- Fix auditd regression where keep_logs is limited by rotate_logs 2 file test
|
||||
- In ausearch/report fix --end to use midnight time instead of now (#1671338)
|
||||
- Add substitue functions for strndupa & rawmemchr
|
||||
- Fix memleak in auparse caused by corrected event ordering
|
||||
- Fix legacy reload script to reload audit rules when daemon is reloaded
|
||||
- Support for unescaping in trusted messages (Dmitry Voronin)
|
||||
- In auditd, use standard template for DEAMON events (Richard Guy Briggs)
|
||||
- In aureport, fix segfault for malformed USER_CMD events
|
||||
- Add exe field to audit_log_user_command in libaudit
|
||||
- In auditctl support filter on socket address families (Richard Guy Briggs)
|
||||
- Deprecate support for Alpha & IA64 processors
|
||||
- If space_left_action is rotate, allow it every time (#1718444)
|
||||
- In auparse, drop standalone EOE events
|
||||
- Add milliseconds column for ausearch extra time csv format
|
||||
- Fix aureport first event reporting when no start given
|
||||
- In audisp-remote, add new config item for startup connection errors
|
||||
- Remove dependency on chkconfig
|
||||
- Install rules to /usr/share/audit/sample-rules/
|
||||
- Split up ospp rules to make SCAP scanning easier (#1746018)
|
||||
- In audisp-syslog, support interpreting records (#1497279)
|
||||
- Audit USER events now sends msg as name value pair
|
||||
- Add support for AUDIT_BPF event
|
||||
- Auditd should not process AUDIT_REPLACE events
|
||||
- Update syscall tables to the 5.5 kernel
|
||||
- Improve personality interpretation by using PERS_MASK
|
||||
- Speedup ausearch/report parsing RAW logging format by caching uid/name lookup
|
||||
- Change auparse python bindings to shared object (Issue #121)
|
||||
- Add error messages for watch permissions
|
||||
- If audit rules file doesn't exist log error message instead of info message
|
||||
- Revise error message for unmatched options in auditctl
|
||||
- In audisp-remote, fixup remote endpoint disappearin in ascii format
|
||||
- Add backlog_wait_time_actual reporting / resetting to auditctl (Max Englander)
|
||||
- In auditctl, add support for sending a signal to auditd
|
||||
|
||||
- Removes audit-fno-common.patch: fixed in upstream
|
||||
- Removes audit-python3.patch: fixed in upstream
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 1 18:13:18 UTC 2021 - Dominique Leuenberger <dimstar@opensuse.org>
|
||||
|
||||
- Do not explicitly provide group(audit) in system-users-audit:
|
||||
this is automatically handled by rpm/providers.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 28 17:59:43 UTC 2021 - Enzo Matsumiya <ematsumiya@suse.com>
|
||||
|
||||
- Create new "audit" group for read access to logs (bsc#1178154)
|
||||
* add change-default-log_group.patch
|
||||
* update audit-secondary.spec
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Dec 2 11:49:28 UTC 2020 - Alexander Bergmann <abergmann@suse.com>
|
||||
|
||||
- Enable Aarch64 processor support. (bsc#1179515 bsc#1179806)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 16 09:40:34 UTC 2020 - Ludwig Nussel <lnussel@suse.de>
|
||||
|
||||
- prepare usrmerge (boo#1029961)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jan 13 17:39:03 UTC 2020 - Tony Jones <tonyj@suse.com>
|
||||
|
||||
- Update to version 2.8.5:
|
||||
* Fix segfault on shutdown
|
||||
* Fix hang on startup (#1587995)
|
||||
* Add sleep to script to dump state so file is ready when needed
|
||||
* Add auparse_normalizer support for SOFTWARE_UPDATE event
|
||||
* Mark netlabel events as simple events so that get processed quicker
|
||||
* When audispd is reconfiguring, only SIGHUP plugins with valid pid (#1614833)
|
||||
* Add 30-ospp-v42.rules to meet new Common Criteria requirements
|
||||
* Update lookup tables for the 4.18 kernel
|
||||
* In aureport, fix segfault in file report
|
||||
* Add auparse_normalizer support for labeled networking events
|
||||
* Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194)
|
||||
* Event aging is off by a second
|
||||
* In ausearch/auparse, correct event ordering to process oldest first
|
||||
* auparse_reset was not clearing everything it should
|
||||
* Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events
|
||||
* In ausearch/report, lightly parse selinux portion of USER_AVC events
|
||||
* In ausearch/report, limit record size when malformed
|
||||
* In auditd, fix extract_type function for network originating events
|
||||
* In auditd, calculate right size and location for network originating events
|
||||
* Treat all network originating events as VER2 so dispatcher doesn't format it
|
||||
* In audisp-remote do an initial connection attempt (#1625156)
|
||||
* In auditd, allow expression of space left as a percentage (#1650670)
|
||||
* On PPC64LE systems, only allow 64 bit rules (#1462178)
|
||||
* Make some parts of auditd state report optional based on config
|
||||
* Fix ausearch when checkpointing a single file (Burn Alting)
|
||||
* Fix scripting in 31-privileged.rules wrt filecap (#1662516)
|
||||
* In ausearch, do not checkpt if stdin is input source
|
||||
* In libev, remove __cold__ attribute for functions to allow proper hardening
|
||||
* Add tests to configure.ac for openldap support
|
||||
* Make systemd support files use /run rather than /var/run (Christian Hesse)
|
||||
* Fix minor memory leak in auditd kerberos credentials code
|
||||
* Fix auditd regression where keep_logs is limited by rotate_logs 2 file test
|
||||
* In ausearch/report fix --end to use midnight time instead of now (#1671338)
|
||||
|
||||
- Fix build errors when using gcc-10 no-common default (bsc#1160384)
|
||||
New patch: audit-fno-common.patch
|
||||
|
||||
- Refresh audit-allow-manual-stop.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Mar 21 10:32:43 UTC 2019 - Jan Engelhardt <jengelh@inai.de>
|
||||
|
||||
- Reduce scriptlets' hard dependency on systemd.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Jun 23 08:16:07 UTC 2018 - antoine.belvire@opensuse.org
|
||||
|
||||
- Update to version 2.8.4:
|
||||
* Generate checkpoint file even when not results are returned
|
||||
(Burn Alting).
|
||||
* Fix log file creation when file logging is disabled entirely
|
||||
(Vlad Glagolev).
|
||||
* Use SIGCONT to dump auditd internal state (rh#1504251).
|
||||
* Fix parsing of virtual timestamp fields in ausearch_expression
|
||||
(rh#1515903).
|
||||
* Fix parsing of uid & success for ausearch.
|
||||
* Hide lru symbols in auparse.
|
||||
* Fix aureport summary time range reporting.
|
||||
* Allow unlimited retries on startup for remote logging.
|
||||
* Add queue_depth to remote logging stats and increase default
|
||||
queue_depth size.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Jun 17 10:48:40 UTC 2018 - antoine.belvire@opensuse.org
|
||||
|
||||
- Update to version 2.8.3:
|
||||
* Correct msg function name in lru debug code.
|
||||
* Fix a segfault in auditd when dns resolution isn't available.
|
||||
* Make a reload legacy service for auditd.
|
||||
* In auparse python bindings, expose some new types that were
|
||||
missing.
|
||||
* In normalizer, pickup subject kind for user_login events.
|
||||
* Fix interpretation of unknown ioctcmds (rh#1540507).
|
||||
* Add ANOM_LOGIN_SERVICE, RESP_ORIGIN_BLOCK, &
|
||||
RESP_ORIGIN_BLOCK_TIMED events.
|
||||
* In auparse_normalize for USER_LOGIN events, map acct for
|
||||
subj_kind.
|
||||
* Fix logging of IPv6 addresses in DAEMON_ACCEPT events
|
||||
(rh#1534748).
|
||||
* Do not rotate auditd logs when num_logs < 2 (brozs).
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 3 13:33:34 CEST 2018 - kukuk@suse.de
|
||||
|
||||
- Use %license instead of %doc [bsc#1082318]
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 16 19:44:45 UTC 2018 - tonyj@suse.com
|
||||
|
||||
- Change openldap dependency to client only (bsc#1085003)
|
||||
- Resolve issue with previous change if both Python2 and Python3 are
|
||||
present, tests were failing as python2 bindings are preferred in this
|
||||
case.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 22 11:00:16 UTC 2018 - meissner@suse.com
|
||||
|
||||
- reverted -j1 force ppc specific only
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 7 09:26:35 UTC 2018 - tchvatal@suse.com
|
||||
|
||||
- Add patch to fix test run without python2 interpreter:
|
||||
* audit-python3.patch
|
||||
- Update to 2.8.2 release:
|
||||
* Update tables for 4.14 kernel
|
||||
* Fixup ipv6 server side binding
|
||||
* AVC report from aureport was missing result column header (#1511606)
|
||||
* Add SOFTWARE_UPDATE event
|
||||
* In ausearch/report pickup any path and new-disk fields as a file
|
||||
* Fix value returned by auditctl --reset-lost (Richard Guy Briggs)
|
||||
* In auparse, fix expr_create_timestamp_comparison_ex to be numeric field
|
||||
* Fix building on old systems without linux/fanotify.h
|
||||
* Fix shell portability issues reported by shellcheck
|
||||
* Auditd validate_email should not use gethostbyname
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 6 13:24:43 UTC 2018 - normand@linux.vnet.ibm.com
|
||||
|
||||
- force -j1 for PowerPC make check to avoid build failure
|
||||
(lookup_test.o: file not recognized: File truncated)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 17 15:25:55 UTC 2018 - tchvatal@suse.com
|
||||
|
||||
- Add conditions around python plugins to allow us to conditionalize
|
||||
them in enviroment without python2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Nov 9 16:21:23 UTC 2017 - mpluskal@suse.com
|
||||
|
||||
- Rename python binding packages to match current python packaging
|
||||
standards
|
||||
- Update python build dependencies to resolve future split of
|
||||
python2/3
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Nov 4 21:11:35 UTC 2017 - aavindraa@gmail.com
|
||||
|
||||
- Update to version 2.8.1. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
- Remove audit-implicit-writev.patch (fixed upstream across 2
|
||||
commits)
|
||||
* 3b30db20ad983274989ce9a522120c3c225436b3
|
||||
* 07132c22314e9abbe64d1031fd8734243285bb3f
|
||||
- Cleanup with spec-cleaner
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Aug 18 08:50:02 UTC 2017 - dimstar@opensuse.org
|
||||
|
||||
- Add audit-implicit-writev.patch: include sys/uio.h to ensure
|
||||
readv and writev are declared.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jul 24 13:59:06 UTC 2017 - jengelh@inai.de
|
||||
|
||||
- Rectify RPM groups, diversify descriptions.
|
||||
- Remove mentions of static libraries because they are not built.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 18 18:33:40 UTC 2017 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.7.7. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
Since commit 6cf57d27 (2.7.4) audit is now started as an non-forking
|
||||
service (bsc#1042781).
|
||||
Add config: audit-stop.rules
|
||||
Refresh patch: audit-allow-manual-stop.patch
|
||||
Refresh patch: audit-no-gss.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Apr 1 14:59:05 UTC 2016 - tchvatal@suse.com
|
||||
|
||||
- Version update to 2.5. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
- Cleanup with spec-cleaner
|
||||
- Sort out bit /sbin /usr/sbin/ installation
|
||||
- Install the rules as documentation
|
||||
- Remove needless %py_requires from python subpkgs
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Aug 21 19:00:36 UTC 2015 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.4.4. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
- Add python3 bindings for libaudit and libauparse
|
||||
- Remove patch 'audit-no_m4_dir.patch'
|
||||
(added Fri Apr 26 11:14:39 UTC 2013 by mmeister@suse.com)
|
||||
No idea what earlier 'automake' build error this was trying to fix but
|
||||
it broke the handling of "--without-libcap-ng". Anyways, no build error
|
||||
occurs now and m4 path is also needed in v2.4.4 to find ax_prog_cc_for_build
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 2 17:35:12 UTC 2014 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.4. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
Drop patch: auditd-donot-start-if-kernel-cmdline-disabled.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Aug 15 14:24:33 UTC 2014 - crrodriguez@opensuse.org
|
||||
|
||||
- If the system has been booted with audit=0 in the kernel cmdline
|
||||
auditd.service must refrain from starting as the relevant kernel
|
||||
subsystem will be permanently disabled.
|
||||
add patch: auditd-donot-start-if-kernel-cmdline-disabled.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jul 10 06:21:55 UTC 2014 - tonyj@suse.com
|
||||
|
||||
- Do not require tclass field to be present when searching for AVC
|
||||
records (bnc#878687)
|
||||
add patch: audit-ausearch-do-not-require-tclass.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 15 00:52:16 UTC 2014 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.3.6. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 26 18:41:33 UTC 2014 - crrodriguez@opensuse.org
|
||||
|
||||
- fix systemd warning:
|
||||
"Configuration file /usr/lib/systemd/system/auditd.service
|
||||
is marked world-inaccessible.
|
||||
This has no effect as configuration data is accessible
|
||||
via APIs without restrictions"
|
||||
* indeed restricting access to unit files using filesystem
|
||||
permissions is non-sense.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 27 16:28:31 UTC 2014 - tonyj@suse.com
|
||||
|
||||
- Add systemd requires (bnc#865849)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 4 00:06:30 UTC 2014 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.3.3. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 26 18:28:58 UTC 2013 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.3.2. See audit.spec (libaudit1) for upstream
|
||||
changelog
|
||||
- Drop patch 'audit-fix-implicit-defn.patch' (upstream)
|
||||
- Add patch 'audit-allow-manual-stop.patch' to reinstate service
|
||||
stop/restart.
|
||||
- /etc/sysconfig/audit still existed but was no longer referenced
|
||||
by systemd, so remove
|
||||
- Delete audit-no_plugins.patch, it was stale (no longer referenced
|
||||
by specfiles) but had not been removed.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Oct 2 12:48:50 UTC 2013 - opensuse@cboltz.de
|
||||
|
||||
- (re-)add rcauditd as symlink to /usr/sbin/service
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jun 27 15:17:16 UTC 2013 - tonyj@suse.com
|
||||
|
||||
- Eliminate build cycles. audit.spec now builds only libs/devel.
|
||||
Remainder (including daemon) built from audit-secondary.spec
|
||||
- Add patch 'audit-fix-implicit-defn.patch' to fix implicit definition
|
||||
warning.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Mar 25 17:27:47 UTC 2013 - crrodriguez@opensuse.org
|
||||
|
||||
- Buildrequires cap-ng library
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jan 22 12:34:00 UTC 2013 - jengelh@inai.de
|
||||
|
||||
- Executing autoreconf requires autoconf
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 12 13:00:30 UTC 2012 - coolo@suse.com
|
||||
|
||||
- Update to version 2.2.1, see audit's changes
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 28 21:58:24 UTC 2012 - tonyj@suse.com
|
||||
|
||||
- Update to version 2.1.3. See audit.spec upstream changelog
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Sep 17 13:38:42 UTC 2011 - jengelh@medozas.de
|
||||
|
||||
- Remove redundant tags/sections from specfile
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri May 20 16:54:38 UTC 2011 - tonyj@novell.com
|
||||
|
||||
- Adjust license of audit-libs-python to be LGPLv2.1 or later.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Apr 27 00:05:50 UTC 2011 - tonyj@novell.com
|
||||
|
||||
- Upgrade to version 2.1.1 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 29 00:22:38 UTC 2010 - tonyj@novell.com
|
||||
|
||||
- Upgrade to version 2.0.5 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jun 28 06:38:35 UTC 2010 - jengelh@medozas.de
|
||||
|
||||
- use %_smp_mflags
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 4 10:51:33 CEST 2010 - tonyj@suse.de
|
||||
|
||||
- Upgrade to version 2.0.4 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Jun 20 12:33:00 CEST 2009 - cmorve69@yahoo.es
|
||||
|
||||
- fixed build with --as-needed
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon May 11 17:19:50 CEST 2009 - tonyj@suse.de
|
||||
|
||||
- Update from 1.7.7 to 1.7.13 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 26 23:27:36 CEST 2008 - tonyj@suse.de
|
||||
|
||||
- Update from 1.7.4 to 1.7.7 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Aug 1 17:12:46 CEST 2008 - ro@suse.de
|
||||
|
||||
- disable debuginfo for secondary specfile
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jun 25 01:50:54 CEST 2008 - tonyj@suse.de
|
||||
|
||||
- Update from 1.7.2 to 1.7.4 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
- Update from 1.6.8 to 1.7.2 (see audit.changes for upstream change
|
||||
history)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 3 21:49:41 CEST 2008 - coolo@suse.de
|
||||
|
||||
- avoid packaging a directory with different permissions (creating
|
||||
rpm -V output)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Apr 16 12:09:26 CEST 2008 - aj@suse.de
|
||||
|
||||
- Use %py_requires for proper requires.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 26 21:29:38 CET 2008 - tonyj@suse.de
|
||||
|
||||
- Update to version 1.6.8.
|
||||
- Rename to audit-secondary and build audisp-plugins from here
|
||||
to minimise bootstrap dependancies.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Mar 18 14:43:11 CET 2008 - schwab@suse.de
|
||||
|
||||
- Use autoreconf.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Oct 10 23:19:29 CEST 2007 - tonyj@suse.de
|
||||
|
||||
- Upgrade to 1.6.2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jul 25 01:13:09 CEST 2007 - tonyj@suse.de
|
||||
|
||||
- Upgrade to 1.5.5
|
||||
Drop audit-swig-attribute.patch (upstreamed)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Jul 13 01:58:29 CEST 2007 - tonyj@suse.de
|
||||
|
||||
- Fix build errors on ppc
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jul 12 01:38:36 CEST 2007 - tonyj@suse.de
|
||||
|
||||
- Upgrade to 1.5.4
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed May 2 19:08:53 CEST 2007 - tonyj@suse.de
|
||||
|
||||
- Upgrade to 1.5.3.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Nov 29 02:47:22 CET 2006 - tonyj@suse.de
|
||||
|
||||
- Upgrade to 1.2.9 (drop several patches which are now upstream)
|
||||
- /usr/sbin/audispd now packaged by audit-libs-python
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Nov 5 00:45:21 CET 2006 - ro@suse.de
|
||||
|
||||
- fix requires
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 31 22:57:52 CEST 2006 - tonyj@suse.de
|
||||
|
||||
- Upgrade to 1.2.6-1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Aug 16 16:19:20 CEST 2006 - cthiel@suse.de
|
||||
|
||||
- split off package
|
||||
|
329
audit-secondary.spec
Normal file
329
audit-secondary.spec
Normal file
@ -0,0 +1,329 @@
|
||||
#
|
||||
# spec file for package audit-secondary
|
||||
#
|
||||
# Copyright (c) 2023 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
# upon. The license for this file, and modifications and additions to the
|
||||
# file, is the same license as for the pristine package itself (unless the
|
||||
# license for the pristine package is not an Open Source License, in which
|
||||
# case the license is the MIT License). An "Open Source License" is a
|
||||
# license that conforms to the Open Source Definition (Version 1.9)
|
||||
# published by the Open Source Initiative.
|
||||
|
||||
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
|
||||
%bcond_without python2
|
||||
%bcond_without python3
|
||||
# This package contains all audit functionality except for audit-libs.
|
||||
# The seperation is required to minimize unnecessary build cycles.
|
||||
%define _name audit
|
||||
Name: audit-secondary
|
||||
Version: 3.0.9
|
||||
Release: 0
|
||||
Summary: Linux kernel audit subsystem utilities
|
||||
License: GPL-2.0-or-later
|
||||
Group: System/Monitoring
|
||||
URL: https://people.redhat.com/sgrubb/audit/
|
||||
Source0: https://people.redhat.com/sgrubb/audit/%{_name}-%{version}.tar.gz
|
||||
Source1: system-group-audit.conf
|
||||
Patch1: audit-plugins-path.patch
|
||||
Patch2: audit-no-gss.patch
|
||||
Patch3: audit-allow-manual-stop.patch
|
||||
Patch4: audit-ausearch-do-not-require-tclass.patch
|
||||
Patch5: change-default-log_group.patch
|
||||
Patch6: libev-werror.patch
|
||||
Patch7: harden_auditd.service.patch
|
||||
Patch8: change-default-log_format.patch
|
||||
Patch9: fix-hardened-service.patch
|
||||
Patch10: enable-stop-rules.patch
|
||||
Patch11: create-augenrules-service.patch
|
||||
Patch12: audit-userspace-517-compat.patch
|
||||
BuildRequires: audit-devel = %{version}
|
||||
BuildRequires: autoconf >= 2.12
|
||||
BuildRequires: kernel-headers >= 2.6.30
|
||||
BuildRequires: libtool
|
||||
BuildRequires: openldap2-devel
|
||||
BuildRequires: pkgconfig
|
||||
%if %{with python2}
|
||||
BuildRequires: python2-devel
|
||||
%endif
|
||||
%if %{with python3}
|
||||
BuildRequires: python3-devel
|
||||
%endif
|
||||
BuildRequires: swig
|
||||
BuildRequires: systemd-rpm-macros
|
||||
BuildRequires: sysuser-tools
|
||||
BuildRequires: tcpd-devel
|
||||
BuildRequires: pkgconfig(libcap-ng)
|
||||
Provides: bundled(libev) = 4.33
|
||||
|
||||
%description
|
||||
The audit package contains the user space utilities for storing and
|
||||
processing the records generated by the audit subsystem in the
|
||||
Linux kernel.
|
||||
|
||||
%package -n audit
|
||||
Summary: User Space Tools for Kernel Auditing
|
||||
License: LGPL-2.1-or-later
|
||||
Group: System/Monitoring
|
||||
Requires: %{_name}-libs = %{version}
|
||||
Requires: coreutils
|
||||
Requires: group(audit)
|
||||
%{?systemd_ordering}
|
||||
|
||||
%description -n audit
|
||||
The audit package contains the user space utilities for storing and
|
||||
processing the audit records generated by the audit subsystem in the
|
||||
Linux kernel.
|
||||
|
||||
%package -n system-group-audit
|
||||
Summary: System group 'audit'
|
||||
License: LGPL-2.1-or-later
|
||||
Group: System/Fhs
|
||||
%sysusers_requires
|
||||
|
||||
%description -n system-group-audit
|
||||
This package contains the system group 'audit' for read access to logs.
|
||||
|
||||
%package -n python2-audit
|
||||
Summary: Python Bindings for libaudit
|
||||
License: LGPL-2.1-or-later
|
||||
Group: Development/Languages/Python
|
||||
Provides: audit-libs-python = %{version}
|
||||
Obsoletes: audit-libs-python < %{version}
|
||||
|
||||
%description -n python2-audit
|
||||
The audit-libs-python package contains the bindings for using libaudit
|
||||
by python.
|
||||
|
||||
%package -n python3-audit
|
||||
Summary: Python3 Bindings for libaudit
|
||||
License: LGPL-2.1-or-later
|
||||
Group: Development/Languages/Python
|
||||
Provides: audit-libs-python3 = %{version}
|
||||
Obsoletes: audit-libs-python3 < %{version}
|
||||
|
||||
%description -n python3-audit
|
||||
The audit-libs-python3 package contains the bindings for using libaudit
|
||||
by python3.
|
||||
|
||||
%package -n audit-audispd-plugins
|
||||
Summary: Default plugins for the audit dispatcher
|
||||
License: GPL-2.0-or-later
|
||||
Group: System/Monitoring
|
||||
|
||||
%description -n audit-audispd-plugins
|
||||
The audit-audispd-plugins package contains plugin components for the
|
||||
audit dispatcher (audispd).
|
||||
|
||||
%prep
|
||||
# remove selinux policy
|
||||
rm -rf audisp/plugins/zos-remote/policy
|
||||
# we don't build prelude
|
||||
rm -rf audisp/plugins/prelude
|
||||
%autosetup -p1 -n %{_name}-%{version}
|
||||
|
||||
%if %{without python2} && %{with python3}
|
||||
# Fix python env call in tests if we only have Python3.
|
||||
# If both versions are present, python2 bindings are preferred by the tests and
|
||||
# unconditionally using /usr/bin/python3 breaks the tests
|
||||
# Probably the correct solution is to run the tests twice if both are present.
|
||||
perl -i -lpe 's{#!/usr/bin/env python\S+}{#!/usr/bin/python3}' auparse/test/auparse_test.py
|
||||
%endif
|
||||
|
||||
%build
|
||||
autoreconf -fi
|
||||
export CFLAGS="%{optflags} -fno-strict-aliasing"
|
||||
export CXXFLAGS="$CFLAGS"
|
||||
export LDFLAGS="-Wl,-z,relro,-z,now"
|
||||
# no krb support (omit --enable-gssapi-krb5=yes), see audit-no-gss.patch
|
||||
%configure \
|
||||
%ifarch aarch64
|
||||
--with-aarch64 \
|
||||
%endif
|
||||
%ifarch arm
|
||||
--with-arm \
|
||||
%endif
|
||||
--enable-systemd \
|
||||
--libexecdir=%{_libexecdir}/%{_name} \
|
||||
--with-apparmor \
|
||||
--with-libwrap \
|
||||
--with-libcap-ng=yes \
|
||||
--disable-static \
|
||||
%{?_with_python3} \
|
||||
%{?_without_python}
|
||||
|
||||
%make_build
|
||||
|
||||
%sysusers_generate_pre %{SOURCE1} audit system-group-audit.conf
|
||||
|
||||
%install
|
||||
%make_install
|
||||
|
||||
mkdir -p %{buildroot}%{_localstatedir}/log/audit/
|
||||
touch %{buildroot}%{_localstatedir}/log/audit/audit.log
|
||||
mkdir -p %{buildroot}%{_localstatedir}/spool/audit/
|
||||
mkdir -p %{buildroot}%{_sysusersdir}
|
||||
install -m 0644 %{SOURCE1} %{buildroot}%{_sysusersdir}/
|
||||
# For ghost below, so that old location files will still be there when
|
||||
# post copy runs
|
||||
mkdir -p %{buildroot}%{_sysconfdir}/%{_name}/
|
||||
mkdir -p %{buildroot}%{_sysconfdir}/%{_name}/rules.d/
|
||||
touch %{buildroot}%{_sysconfdir}/{auditd.conf,audit.rules} %{buildroot}%{_sysconfdir}/audit/auditd.conf
|
||||
# On platforms with 32 & 64 bit libs, we need to coordinate the timestamp
|
||||
touch -r ./audit.spec %{buildroot}%{_sysconfdir}/libaudit.conf
|
||||
# Starting with audit 2.5 no config is installed so start with no rules
|
||||
install -m 0644 rules/10-no-audit.rules %{buildroot}%{_sysconfdir}/%{_name}/rules.d/audit.rules
|
||||
# delete redhat scripts, use ours
|
||||
rm -rf %{buildroot}%{_sysconfdir}/sysconfig/auditd
|
||||
rm -rf %{buildroot}%{_initddir}/auditd
|
||||
rm -rf %{buildroot}%{_sysconfdir}/rc.d/init.d
|
||||
# delete redhat systemd legacy scripts, our systemd doesn't support the feature
|
||||
# https://lists.fedoraproject.org/pipermail/devel/2012-June/169411.html
|
||||
rm -rf %{buildroot}%{_libexecdir}/audit
|
||||
# Clean up some unneeded library files
|
||||
rm -f %{buildroot}/%{_libdir}/python*/site-packages/{_audit,_auparse,auparse}.{a,la}
|
||||
rm -rf %{buildroot}/%{_libdir}/python*/site-packages/__pycache__
|
||||
# cleanup makefiles for the rules (installed by %%docs command)
|
||||
rm -f %{buildroot}/%{_libdir}/pkgconfig/{audit,auparse}.pc
|
||||
# cleanup files handled by audit.spec
|
||||
rm -rf %{buildroot}/%{_datadir}/aclocal/
|
||||
rm -rf %{buildroot}/%{_includedir}
|
||||
rm -f %{buildroot}/%{_libdir}/lib{audit,auparse}.*
|
||||
rm -f %{buildroot}%{_sysconfdir}/libaudit.conf
|
||||
rm -f %{buildroot}/%{_mandir}/man5/libaudit.conf.5
|
||||
rm -rf %{buildroot}/%{_mandir}/man3
|
||||
# Cleanup plugins
|
||||
#USR-MERGE
|
||||
%if 0%{?suse_version} < 1550
|
||||
mkdir %{buildroot}/sbin/
|
||||
for prog in auditctl auditd ausearch autrace aureport augenrules; do
|
||||
ln -s %{_sbindir}/$prog %{buildroot}/sbin/$prog
|
||||
done
|
||||
%endif
|
||||
#END-USR-MERGE
|
||||
# rcauditd symlink
|
||||
ln -s service %{buildroot}%{_sbindir}/rcauditd
|
||||
chmod 0644 %{buildroot}%{_unitdir}/auditd.service
|
||||
chmod 0644 %{buildroot}%{_unitdir}/augenrules.service
|
||||
|
||||
%check
|
||||
%make_build check
|
||||
|
||||
%post -n audit
|
||||
# Save existing audit files if any (from old locations)
|
||||
if [ -f %{_sysconfdir}/auditd.conf ]; then
|
||||
mv %{_sysconfdir}/audit/auditd.conf %{_sysconfdir}/audit/auditd.conf.new
|
||||
mv %{_sysconfdir}/auditd.conf %{_sysconfdir}/audit/auditd.conf
|
||||
fi
|
||||
if [ -f %{_sysconfdir}/audit.rules ]; then
|
||||
mv %{_sysconfdir}/audit.rules %{_sysconfdir}/audit/audit.rules
|
||||
elif [ ! -f %{_sysconfdir}/audit/audit.rules ]; then
|
||||
cp %{_sysconfdir}/audit/rules.d/audit.rules %{_sysconfdir}/audit/audit.rules
|
||||
fi
|
||||
%service_add_post auditd.service
|
||||
%service_add_post augenrules.service
|
||||
|
||||
%pre -n audit
|
||||
%service_add_pre auditd.service
|
||||
%service_add_pre augenrules.service
|
||||
|
||||
%pre -n system-group-audit -f audit.pre
|
||||
|
||||
%preun -n audit
|
||||
%service_del_preun auditd.service
|
||||
%service_del_preun augenrules.service
|
||||
|
||||
%postun -n audit
|
||||
%service_del_postun auditd.service
|
||||
%service_del_postun augenrules.service
|
||||
|
||||
%files -n audit
|
||||
%license COPYING
|
||||
%doc README ChangeLog init.d/auditd.cron
|
||||
%attr(644,root,root) %{_mandir}/man8/auditctl.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/auditd.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/aureport.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/ausearch.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/autrace.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/aulast.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/aulastlog.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/ausyscall.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man7/audit.rules.7.gz
|
||||
%attr(644,root,root) %{_mandir}/man5/auditd.conf.5.gz
|
||||
%attr(644,root,root) %{_mandir}/man5/ausearch-expression.5.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/auvirt.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/augenrules.8.gz
|
||||
%if 0%{?suse_version} < 1550
|
||||
/sbin/auditctl
|
||||
/sbin/auditd
|
||||
/sbin/ausearch
|
||||
/sbin/autrace
|
||||
/sbin/augenrules
|
||||
/sbin/aureport
|
||||
%endif
|
||||
%attr(750,root,root) %{_sbindir}/auditctl
|
||||
%attr(750,root,root) %{_sbindir}/auditd
|
||||
%attr(755,root,root) %{_sbindir}/ausearch
|
||||
%attr(750,root,root) %{_sbindir}/autrace
|
||||
%attr(750,root,root) %{_sbindir}/augenrules
|
||||
%attr(750,root,root) %{_sbindir}/audisp-syslog
|
||||
%attr(755,root,root) %{_bindir}/aulast
|
||||
%attr(755,root,root) %{_bindir}/aulastlog
|
||||
%attr(755,root,root) %{_bindir}/ausyscall
|
||||
%attr(755,root,root) %{_sbindir}/aureport
|
||||
%attr(755,root,root) %{_bindir}/auvirt
|
||||
%dir %attr(750,root,root) %{_sysconfdir}/audit
|
||||
%attr(750,root,root) %dir %{_sysconfdir}/audit/plugins.d
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/plugins.d/af_unix.conf
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/plugins.d/syslog.conf
|
||||
%ghost %{_sysconfdir}/auditd.conf
|
||||
%ghost %{_sysconfdir}/audit.rules
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/auditd.conf
|
||||
%dir %attr(750,root,root) %{_sysconfdir}/audit/rules.d
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/rules.d/audit.rules
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/audit-stop.rules
|
||||
%dir %attr(750,root,audit) %{_localstatedir}/log/audit
|
||||
%ghost %config(noreplace) %attr(640,root,audit) %{_localstatedir}/log/audit/audit.log
|
||||
%dir %attr(700,root,root) %{_localstatedir}/spool/audit
|
||||
%{_unitdir}/auditd.service
|
||||
%{_unitdir}/augenrules.service
|
||||
%{_sbindir}/rcauditd
|
||||
%{_datadir}/audit/
|
||||
|
||||
%files -n system-group-audit
|
||||
%{_sysusersdir}/system-group-audit.conf
|
||||
|
||||
%if %{with python2}
|
||||
%files -n python2-audit
|
||||
%attr(755,root,root) %{python2_sitearch}/_audit.so
|
||||
%attr(755,root,root) %{python2_sitearch}/auparse.so
|
||||
%{python2_sitearch}/audit.py*
|
||||
%endif
|
||||
|
||||
%if %{with python3}
|
||||
%files -n python3-audit
|
||||
%attr(755,root,root) %{python3_sitearch}/*
|
||||
%endif
|
||||
|
||||
%files -n audit-audispd-plugins
|
||||
%attr(644,root,root) %{_mandir}/man8/audispd-zos-remote.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man5/zos-remote.conf.5.gz
|
||||
%attr(644,root,root) %{_mandir}/man5/audisp-remote.conf.5.gz
|
||||
%attr(644,root,root) %{_mandir}/man5/auditd-plugins.5.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/audisp-remote.8.gz
|
||||
%attr(644,root,root) %{_mandir}/man8/audisp-syslog.8.gz
|
||||
%attr(750,root,root) %dir %{_sysconfdir}/audit
|
||||
%attr(750,root,root) %dir %{_sysconfdir}/audit/plugins.d
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/plugins.d/audispd-zos-remote.conf
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/zos-remote.conf
|
||||
%attr(750,root,root) %{_sbindir}/audisp-remote
|
||||
%attr(750,root,root) %{_sbindir}/audispd-zos-remote
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/audisp-remote.conf
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/audit/plugins.d/au-remote.conf
|
||||
|
||||
%changelog
|
38
audit-userspace-517-compat.patch
Normal file
38
audit-userspace-517-compat.patch
Normal file
@ -0,0 +1,38 @@
|
||||
From: Sergei Trofimovich <slyich@gmail.com>
|
||||
Date: Wed, 23 Mar 2022 07:27:05 +0000
|
||||
Subject: [PATCH] auditswig.i: avoid setter generation for audit_rule_data::buf
|
||||
References: https://github.com/linux-audit/audit-userspace/issues/252
|
||||
Git-commit: https://github.com/linux-audit/audit-userspace/pull/253/commits/beed138222421a2eb4212d83cb889404bd7efc49
|
||||
Git-repo: [if different from https://github.com/linux-audit/audit-userspace.git]
|
||||
Patch-mainline: submitted for review upstream
|
||||
|
||||
As it's a flexible array generated code was never safe to use.
|
||||
With kernel's https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ed98ea2128b6fd83bce13716edf8f5fe6c47f574
|
||||
change it's a build failure now:
|
||||
|
||||
audit> audit_wrap.c:5010:15: error: invalid use of flexible array member
|
||||
audit> 5010 | arg1->buf = (char [])(char *)memcpy(malloc((size)*sizeof(char)), (const char *)(arg2), sizeof(char)*(size));
|
||||
audit> | ^
|
||||
|
||||
Let's avoid setter generation entirely.
|
||||
|
||||
Closes: https://github.com/linux-audit/audit-userspace/issues/252
|
||||
---
|
||||
bindings/swig/src/auditswig.i | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/bindings/swig/src/auditswig.i b/bindings/swig/src/auditswig.i
|
||||
index 21aafca31..9a2c5661d 100644
|
||||
--- a/bindings/swig/src/auditswig.i
|
||||
+++ b/bindings/swig/src/auditswig.i
|
||||
@@ -39,6 +39,10 @@ signed
|
||||
#define __attribute(X) /*nothing*/
|
||||
typedef unsigned __u32;
|
||||
typedef unsigned uid_t;
|
||||
+/* Sidestep SWIG's limitation of handling c99 Flexible arrays by not:
|
||||
+ * generating setters against them: https://github.com/swig/swig/issues/1699
|
||||
+ */
|
||||
+%ignore audit_rule_data::buf;
|
||||
%include "/usr/include/linux/audit.h"
|
||||
#define __extension__ /*nothing*/
|
||||
%include <stdint.i>
|
1525
audit.changes
Normal file
1525
audit.changes
Normal file
File diff suppressed because it is too large
Load Diff
152
audit.spec
Normal file
152
audit.spec
Normal file
@ -0,0 +1,152 @@
|
||||
#
|
||||
# spec file for package audit
|
||||
#
|
||||
# Copyright (c) 2023 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
# upon. The license for this file, and modifications and additions to the
|
||||
# file, is the same license as for the pristine package itself (unless the
|
||||
# license for the pristine package is not an Open Source License, in which
|
||||
# case the license is the MIT License). An "Open Source License" is a
|
||||
# license that conforms to the Open Source Definition (Version 1.9)
|
||||
# published by the Open Source Initiative.
|
||||
|
||||
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
|
||||
Name: audit
|
||||
Version: 3.0.9
|
||||
Release: 0
|
||||
Summary: Linux kernel audit subsystem utilities
|
||||
License: GPL-2.0-or-later
|
||||
Group: System/Monitoring
|
||||
URL: https://people.redhat.com/sgrubb/audit/
|
||||
Source0: https://people.redhat.com/sgrubb/audit/%{name}-%{version}.tar.gz
|
||||
Source1: baselibs.conf
|
||||
Source2: README-BEFORE-ADDING-PATCHES
|
||||
Patch0: change-default-log_group.patch
|
||||
BuildRequires: autoconf >= 2.12
|
||||
BuildRequires: kernel-headers >= 2.6.30
|
||||
BuildRequires: libtool
|
||||
BuildRequires: pkgconfig
|
||||
BuildRequires: tcpd-devel
|
||||
Requires: libaudit1 = %{version}
|
||||
Requires: libauparse0 = %{version}
|
||||
Provides: bundled(libev) = 4.33
|
||||
|
||||
%description
|
||||
The audit package contains the user space utilities for storing and
|
||||
processing the records generated by the audit subsystem in the
|
||||
Linux kernel.
|
||||
|
||||
%package -n libaudit1
|
||||
Summary: Library for interfacing with the kernel audit subsystem
|
||||
License: LGPL-2.1-or-later
|
||||
Group: System/Libraries
|
||||
Obsoletes: %{name}-libs < 2.0.4
|
||||
Provides: %{name}-libs = %{version}
|
||||
|
||||
%description -n libaudit1
|
||||
The libaudit package contains the shared libraries needed for
|
||||
applications to use the audit framework.
|
||||
|
||||
%package -n libauparse0
|
||||
Summary: Library for parsing and interpreting audit events
|
||||
License: LGPL-2.1-or-later
|
||||
Group: System/Libraries
|
||||
|
||||
%description -n libauparse0
|
||||
The libauparse package contains the shared libraries needed to
|
||||
parse audit records.
|
||||
|
||||
%package -n audit-devel
|
||||
Summary: Header files for libaudit
|
||||
License: LGPL-2.1-or-later
|
||||
Group: Development/Libraries/C and C++
|
||||
Requires: libaudit1 = %{version}
|
||||
Requires: libauparse0 = %{version}
|
||||
|
||||
%description -n audit-devel
|
||||
The audit-devel package contains the header files
|
||||
needed for developing applications that need to use the audit framework
|
||||
libraries.
|
||||
|
||||
%prep
|
||||
%autosetup -p1
|
||||
|
||||
%build
|
||||
autoreconf -fi
|
||||
export CFLAGS="%{optflags} -fno-strict-aliasing"
|
||||
export CXXFLAGS="$CFLAGS"
|
||||
export LDFLAGS="-Wl,-z,relro,-z,now"
|
||||
# no krb support (omit --enable-gssapi-krb5=yes), see audit-no-gss.patch
|
||||
%configure \
|
||||
%ifarch aarch64
|
||||
--with-aarch64 \
|
||||
%endif
|
||||
%ifarch arm
|
||||
--with-arm \
|
||||
%endif
|
||||
--enable-systemd \
|
||||
--libexecdir=%{_libexecdir}/%{name} \
|
||||
--with-apparmor \
|
||||
--with-libcap-ng=no \
|
||||
--disable-static \
|
||||
--with-python=no \
|
||||
--disable-zos-remote
|
||||
|
||||
%make_build -C common
|
||||
%make_build -C lib
|
||||
%make_build -C auparse
|
||||
%make_build -C docs
|
||||
|
||||
%install
|
||||
%make_install -C common
|
||||
%make_install -C lib
|
||||
%make_install -C auparse
|
||||
%make_install -C docs
|
||||
rm -rf %{buildroot}/%{_mandir}/man[578]
|
||||
mkdir -p %{buildroot}%{_sysconfdir}
|
||||
mkdir -p %{buildroot}/%{_includedir}
|
||||
mkdir -p %{buildroot}/%{_mandir}/man5
|
||||
# We manually install this since Makefile doesn't
|
||||
install -m 0644 lib/libaudit.h %{buildroot}/%{_includedir}
|
||||
install -D -m 0644 ./m4/audit.m4 %{buildroot}%{_datadir}/aclocal/audit.m4
|
||||
# Install libaudit.conf files by hand
|
||||
install -m 0644 docs/libaudit.conf.5 %{buildroot}/%{_mandir}/man5
|
||||
install -m 0644 init.d/libaudit.conf %{buildroot}%{_sysconfdir}
|
||||
|
||||
find %{buildroot} -type f -name "*.la" -delete -print
|
||||
|
||||
%check
|
||||
%make_build -C lib check
|
||||
%make_build -C auparse check
|
||||
|
||||
%post -n libaudit1 -p /sbin/ldconfig
|
||||
%post -n libauparse0 -p /sbin/ldconfig
|
||||
%postun -n libaudit1 -p /sbin/ldconfig
|
||||
%postun -n libauparse0 -p /sbin/ldconfig
|
||||
|
||||
%files -n libaudit1
|
||||
%{_libdir}/libaudit.so.*
|
||||
%config(noreplace) %attr(640,root,root) %{_sysconfdir}/libaudit.conf
|
||||
%{_mandir}/man5/libaudit.conf.5%{ext_man}
|
||||
|
||||
%files -n libauparse0
|
||||
%{_libdir}/libauparse.so.*
|
||||
|
||||
%files -n audit-devel
|
||||
%doc contrib/plugin
|
||||
%{_libdir}/libaudit.so
|
||||
%{_libdir}/libauparse.so
|
||||
%{_includedir}/libaudit.h
|
||||
%{_includedir}/auparse.h
|
||||
%{_includedir}/auparse-defs.h
|
||||
%{_mandir}/man3/*
|
||||
%{_datadir}/aclocal/audit.m4
|
||||
%{_libdir}/pkgconfig/audit.pc
|
||||
%{_libdir}/pkgconfig/auparse.pc
|
||||
|
||||
%changelog
|
7
baselibs.conf
Normal file
7
baselibs.conf
Normal file
@ -0,0 +1,7 @@
|
||||
libaudit1
|
||||
obsoletes "audit-libs-<targettype> < 2.0.4"
|
||||
libauparse0
|
||||
audit-devel
|
||||
requires -audit-<targettype>
|
||||
requires "libaudit1-<targettype> = <version>"
|
||||
requires "libauparse0-<targettype> = <version>"
|
28
change-default-log_format.patch
Normal file
28
change-default-log_format.patch
Normal file
@ -0,0 +1,28 @@
|
||||
From: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
Subject: auditd.conf: change default log_format
|
||||
References: bsc#1190500
|
||||
|
||||
Upstream commit bf1270cfe ("change default logging format and update roadmap")
|
||||
changed the default log_format from RAW to ENRICHED.
|
||||
|
||||
This causes non-audit tools to not interpret the GS character (group separator,
|
||||
0x1d) that splits the raw data from the enriched data, causing it to be visually
|
||||
concatenated.
|
||||
|
||||
Since a candidate patch to change this was rejected by upstream, we change
|
||||
the default log_format back to RAW instead, to avoid confusion on customers'
|
||||
environments.
|
||||
|
||||
Signed-off-by: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
|
||||
--- a/init.d/auditd.conf
|
||||
+++ b/init.d/auditd.conf
|
||||
@@ -6,7 +6,7 @@ local_events = yes
|
||||
write_logs = yes
|
||||
log_file = /var/log/audit/audit.log
|
||||
log_group = audit
|
||||
-log_format = ENRICHED
|
||||
+log_format = RAW
|
||||
flush = INCREMENTAL_ASYNC
|
||||
freq = 50
|
||||
max_log_file = 8
|
21
change-default-log_group.patch
Normal file
21
change-default-log_group.patch
Normal file
@ -0,0 +1,21 @@
|
||||
From: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
Date: Thu Jan 28 18:11:39 UTC 2021
|
||||
References: bsc#1178154
|
||||
Patch-mainline: Not yet, under review
|
||||
Subject: change default log_group to "audit"
|
||||
|
||||
Change the default log_group to newly added "audit" group.
|
||||
|
||||
Signed-Off-by: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
|
||||
--- a/init.d/auditd.conf
|
||||
+++ b/init.d/auditd.conf
|
||||
@@ -5,7 +5,7 @@
|
||||
local_events = yes
|
||||
write_logs = yes
|
||||
log_file = /var/log/audit/audit.log
|
||||
-log_group = root
|
||||
+log_group = audit
|
||||
log_format = ENRICHED
|
||||
flush = INCREMENTAL_ASYNC
|
||||
freq = 50
|
97
create-augenrules-service.patch
Normal file
97
create-augenrules-service.patch
Normal file
@ -0,0 +1,97 @@
|
||||
Index: audit-3.0.9/init.d/augenrules.service
|
||||
===================================================================
|
||||
--- /dev/null
|
||||
+++ audit-3.0.9/init.d/augenrules.service
|
||||
@@ -0,0 +1,29 @@
|
||||
+[Unit]
|
||||
+Description=auditd rules generation
|
||||
+After=auditd.service
|
||||
+Documentation=man:augenrules(8)
|
||||
+
|
||||
+[Service]
|
||||
+Type=oneshot
|
||||
+## NOTE: augenrules expect any rules to be added to /etc/audit/rules.d/
|
||||
+ExecStart=/sbin/augenrules --load
|
||||
+# We need RemainAfterExit=true so augenrules is called again
|
||||
+# in case auditd.service is restarted.
|
||||
+RemainAfterExit=true
|
||||
+
|
||||
+### Security Settings ###
|
||||
+MemoryDenyWriteExecute=true
|
||||
+LockPersonality=true
|
||||
+ProtectControlGroups=true
|
||||
+ProtectKernelModules=true
|
||||
+ProtectHome=true
|
||||
+RestrictRealtime=true
|
||||
+# for details please see
|
||||
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
+ProtectSystem=full
|
||||
+PrivateDevices=true
|
||||
+ProtectHostname=true
|
||||
+ProtectClock=true
|
||||
+ProtectKernelTunables=true
|
||||
+ProtectKernelLogs=true
|
||||
+ReadWritePaths=/etc/audit
|
||||
Index: audit-3.0.9/init.d/auditd.service
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/auditd.service
|
||||
+++ audit-3.0.9/init.d/auditd.service
|
||||
@@ -15,15 +15,16 @@ ConditionKernelCommandLine=!audit=0
|
||||
ConditionKernelCommandLine=!audit=off
|
||||
|
||||
Documentation=man:auditd(8) https://github.com/linux-audit/audit-documentation
|
||||
+Requires=augenrules.service
|
||||
+# This unit clears rules on stop, so make sure that augenrules runs again
|
||||
+PropagatesStopTo=augenrules.service
|
||||
|
||||
[Service]
|
||||
Type=forking
|
||||
PIDFile=/run/auditd.pid
|
||||
ExecStart=/sbin/auditd
|
||||
-## To not use augenrules, copy this file to /etc/systemd/system/auditd.service
|
||||
-## and comment/delete the next line and uncomment the auditctl line.
|
||||
-## NOTE: augenrules expect any rules to be added to /etc/audit/rules.d/
|
||||
-ExecStartPost=-/sbin/augenrules --load
|
||||
+## To not use augenrules: copy this file to /etc/systemd/system/auditd.service,
|
||||
+## uncomment the next line, and comment the Requires=augenrules.service above.
|
||||
#ExecStartPost=-/sbin/auditctl -R /etc/audit/audit.rules
|
||||
# By default we clear the rules on exit. To disable this, comment
|
||||
# the next line after copying the file to /etc/systemd/system/auditd.service
|
||||
@@ -46,7 +47,6 @@ ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelLogs=true
|
||||
# end of automatic additions
|
||||
-ReadWritePaths=/etc/audit
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
Index: audit-3.0.9/init.d/Makefile.am
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/Makefile.am
|
||||
+++ audit-3.0.9/init.d/Makefile.am
|
||||
@@ -26,7 +26,8 @@ EXTRA_DIST = auditd.init auditd.service
|
||||
auditd.cron libaudit.conf auditd.condrestart \
|
||||
auditd.reload auditd.restart auditd.resume \
|
||||
auditd.rotate auditd.state auditd.stop \
|
||||
- audit-stop.rules augenrules audit-functions
|
||||
+ audit-stop.rules augenrules audit-functions \
|
||||
+ augenrules.service
|
||||
libconfig = libaudit.conf
|
||||
if ENABLE_SYSTEMD
|
||||
initdir = /usr/lib/systemd/system
|
||||
@@ -54,6 +55,7 @@ if ENABLE_SYSTEMD
|
||||
mkdir -p ${DESTDIR}${legacydir}
|
||||
mkdir -p ${DESTDIR}${libexecdir}
|
||||
$(INSTALL_SCRIPT) -D -m 644 ${srcdir}/auditd.service ${DESTDIR}${initdir}
|
||||
+ $(INSTALL_SCRIPT) -D -m 644 ${srcdir}/augenrules.service ${DESTDIR}${initdir}
|
||||
$(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.rotate ${DESTDIR}${legacydir}/rotate
|
||||
$(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.resume ${DESTDIR}${legacydir}/resume
|
||||
$(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.reload ${DESTDIR}${legacydir}/reload
|
||||
@@ -72,6 +74,7 @@ uninstall-hook:
|
||||
rm ${DESTDIR}${sysconfdir}/${libconfig}
|
||||
if ENABLE_SYSTEMD
|
||||
rm ${DESTDIR}${initdir}/auditd.service
|
||||
+ rm ${DESTDIR}${initdir}/augenrules.service
|
||||
rm ${DESTDIR}${legacydir}/rotate
|
||||
rm ${DESTDIR}${legacydir}/resume
|
||||
rm ${DESTDIR}${legacydir}/reload
|
29
enable-stop-rules.patch
Normal file
29
enable-stop-rules.patch
Normal file
@ -0,0 +1,29 @@
|
||||
From: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
Subject: init.d/auditd.service: enable ExecStopPost directive in auditd.service
|
||||
References: bsc#1190227
|
||||
|
||||
This has caused confusion for customers when relating stopping auditd service
|
||||
is the same as stopping system auditing. This is completely understandable, but
|
||||
it's by design, so kauditd can keep filling its queues for any other userspace
|
||||
daemon to consume.
|
||||
|
||||
Disable audit when auditd.service stops, so kauditd stops logging/running.
|
||||
|
||||
Signed-off-by: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
|
||||
Index: audit-3.0.9/init.d/auditd.service
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/auditd.service
|
||||
+++ audit-3.0.9/init.d/auditd.service
|
||||
@@ -25,9 +25,9 @@ ExecStart=/sbin/auditd
|
||||
## NOTE: augenrules expect any rules to be added to /etc/audit/rules.d/
|
||||
ExecStartPost=-/sbin/augenrules --load
|
||||
#ExecStartPost=-/sbin/auditctl -R /etc/audit/audit.rules
|
||||
-# By default we don't clear the rules on exit. To enable this, uncomment
|
||||
+# By default we clear the rules on exit. To disable this, comment
|
||||
# the next line after copying the file to /etc/systemd/system/auditd.service
|
||||
-#ExecStopPost=/sbin/auditctl -R /etc/audit/audit-stop.rules
|
||||
+ExecStopPost=/sbin/auditctl -R /etc/audit/audit-stop.rules
|
||||
Restart=on-failure
|
||||
# Do not restart for intentional exits. See EXIT CODES section in auditd(8).
|
||||
RestartPreventExitStatus=2 4 6
|
32
fix-hardened-service.patch
Normal file
32
fix-hardened-service.patch
Normal file
@ -0,0 +1,32 @@
|
||||
From: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
Subject: init.d/auditd.service: make /etc/audit writable
|
||||
References: bsc#1181400
|
||||
|
||||
systemd hardening effort (bsc#1181400) broke auditd.service when starting/
|
||||
restarting it. This was because auditd couldn't save/create audit.rules from
|
||||
/etc/audit/rules.d/* files.
|
||||
|
||||
Make /etc/audit writable for the service.
|
||||
|
||||
Also remove PrivateDevices=true so /dev/* are exposed to auditd.
|
||||
|
||||
Signed-off-by: Enzo Matsumiya <ematsumiya@suse.de>
|
||||
|
||||
Index: audit-3.0.9/init.d/auditd.service
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/auditd.service
|
||||
+++ audit-3.0.9/init.d/auditd.service
|
||||
@@ -41,12 +41,12 @@ RestrictRealtime=true
|
||||
# added automatically, for details please see
|
||||
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
ProtectSystem=full
|
||||
-PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelLogs=true
|
||||
# end of automatic additions
|
||||
+ReadWritePaths=/etc/audit
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
20
harden_auditd.service.patch
Normal file
20
harden_auditd.service.patch
Normal file
@ -0,0 +1,20 @@
|
||||
Index: audit-3.0.9/init.d/auditd.service
|
||||
===================================================================
|
||||
--- audit-3.0.9.orig/init.d/auditd.service
|
||||
+++ audit-3.0.9/init.d/auditd.service
|
||||
@@ -38,6 +38,15 @@ LockPersonality=true
|
||||
ProtectControlGroups=true
|
||||
ProtectKernelModules=true
|
||||
RestrictRealtime=true
|
||||
+# added automatically, for details please see
|
||||
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
+ProtectSystem=full
|
||||
+PrivateDevices=true
|
||||
+ProtectHostname=true
|
||||
+ProtectClock=true
|
||||
+ProtectKernelTunables=true
|
||||
+ProtectKernelLogs=true
|
||||
+# end of automatic additions
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
26
libev-werror.patch
Normal file
26
libev-werror.patch
Normal file
@ -0,0 +1,26 @@
|
||||
From: Jan Engelhardt <jengelh@inai.de>
|
||||
Date: 2021-06-02 16:18:03.256597842 +0200
|
||||
|
||||
Cherry-pick http://cvs.schmorp.de/libev/ev_iouring.c?view=log&r1=1.25
|
||||
to fix some terrible code.
|
||||
|
||||
[ 50s] ev_iouring.c: In function 'iouring_sqe_submit':
|
||||
[ 50s] ev_iouring.c:300:1: error: no return statement in function returning non-void [-Werror=return-type]
|
||||
|
||||
---
|
||||
src/libev/ev_iouring.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
Index: audit-3.0.1/src/libev/ev_iouring.c
|
||||
===================================================================
|
||||
--- audit-3.0.1.orig/src/libev/ev_iouring.c
|
||||
+++ audit-3.0.1/src/libev/ev_iouring.c
|
||||
@@ -287,7 +287,7 @@ iouring_sqe_get (EV_P)
|
||||
}
|
||||
|
||||
inline_size
|
||||
-struct io_uring_sqe *
|
||||
+void
|
||||
iouring_sqe_submit (EV_P_ struct io_uring_sqe *sqe)
|
||||
{
|
||||
unsigned idx = sqe - EV_SQES;
|
2
system-group-audit.conf
Normal file
2
system-group-audit.conf
Normal file
@ -0,0 +1,2 @@
|
||||
# Type Name ID GECOS [HOME]
|
||||
g audit -
|
Loading…
Reference in New Issue
Block a user