forked from pool/audit
1b5f7ae8b7
- Create separate service for augenrules (bsc#1191614, bsc#1181400) * add create-augenrules-service.patch Remove ReadWritePaths=/etc/audit from auditd.service, also removes augenrules call from ExecStartPost. Create augenrules.service with the ReadWritePaths directive above. This makes /etc/audit only accessible by augenrules.service and let auditd.service (and daemon) to be sandboxed again. - Update audit-secondary.spec to accomodate the new service file. OBS-URL: https://build.opensuse.org/request/show/925195 OBS-URL: https://build.opensuse.org/package/show/security/audit?expand=0&rev=131
87 lines
3.1 KiB
Diff
87 lines
3.1 KiB
Diff
--- /dev/null
|
|
+++ b/init.d/augenrules.service
|
|
@@ -0,0 +1,33 @@
|
|
+[Unit]
|
|
+Description=auditd rules generation
|
|
+After=auditd.service
|
|
+PartOf=auditd.service
|
|
+Documentation=man:augenrules(8)
|
|
+
|
|
+[Service]
|
|
+Type=oneshot
|
|
+## NOTE: augenrules expect any rules to be added to /etc/audit/rules.d/
|
|
+ExecStart=/sbin/augenrules --load
|
|
+# We need RemainAfterExit=true so augenrules is called again
|
|
+# in case auditd.service is restarted.
|
|
+RemainAfterExit=true
|
|
+
|
|
+### Security Settings ###
|
|
+MemoryDenyWriteExecute=true
|
|
+LockPersonality=true
|
|
+ProtectControlGroups=true
|
|
+ProtectKernelModules=true
|
|
+ProtectHome=true
|
|
+RestrictRealtime=true
|
|
+# for details please see
|
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
|
+ProtectSystem=full
|
|
+PrivateDevices=true
|
|
+ProtectHostname=true
|
|
+ProtectClock=true
|
|
+ProtectKernelTunables=true
|
|
+ProtectKernelLogs=true
|
|
+ReadWritePaths=/etc/audit
|
|
+
|
|
+[Install]
|
|
+WantedBy=multi-user.target
|
|
--- a/init.d/auditd.service
|
|
+++ b/init.d/auditd.service
|
|
@@ -18,10 +18,8 @@ Documentation=man:auditd(8) https://gith
|
|
Type=forking
|
|
PIDFile=/run/auditd.pid
|
|
ExecStart=/sbin/auditd
|
|
-## To not use augenrules, copy this file to /etc/systemd/system/auditd.service
|
|
-## and comment/delete the next line and uncomment the auditctl line.
|
|
-## NOTE: augenrules expect any rules to be added to /etc/audit/rules.d/
|
|
-ExecStartPost=-/sbin/augenrules --load
|
|
+## To not use augenrules: copy this file to /etc/systemd/system/auditd.service,
|
|
+## uncomment the next line, and run "systemctl disable --now augenrules.service".
|
|
#ExecStartPost=-/sbin/auditctl -R /etc/audit/audit.rules
|
|
# By default we don't clear the rules on exit. To enable this, uncomment
|
|
# the next line after copying the file to /etc/systemd/system/auditd.service
|
|
@@ -42,7 +40,6 @@ ProtectClock=true
|
|
ProtectKernelTunables=true
|
|
ProtectKernelLogs=true
|
|
# end of automatic additions
|
|
-ReadWritePaths=/etc/audit
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|
|
--- a/init.d/Makefile.am
|
|
+++ b/init.d/Makefile.am
|
|
@@ -26,7 +26,7 @@ EXTRA_DIST = auditd.init auditd.service
|
|
auditd.cron libaudit.conf auditd.condrestart \
|
|
auditd.reload auditd.restart auditd.resume \
|
|
auditd.rotate auditd.state auditd.stop \
|
|
- audit-stop.rules augenrules
|
|
+ audit-stop.rules augenrules augenrules.service
|
|
libconfig = libaudit.conf
|
|
if ENABLE_SYSTEMD
|
|
initdir = /usr/lib/systemd/system
|
|
@@ -53,6 +53,7 @@ if ENABLE_SYSTEMD
|
|
mkdir -p ${DESTDIR}${initdir}
|
|
mkdir -p ${DESTDIR}${legacydir}
|
|
$(INSTALL_SCRIPT) -D -m 644 ${srcdir}/auditd.service ${DESTDIR}${initdir}
|
|
+ $(INSTALL_SCRIPT) -D -m 644 ${srcdir}/augenrules.service ${DESTDIR}${initdir}
|
|
$(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.rotate ${DESTDIR}${legacydir}/rotate
|
|
$(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.resume ${DESTDIR}${legacydir}/resume
|
|
$(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.reload ${DESTDIR}${legacydir}/reload
|
|
@@ -70,6 +71,7 @@ uninstall-hook:
|
|
rm ${DESTDIR}${sysconfdir}/${libconfig}
|
|
if ENABLE_SYSTEMD
|
|
rm ${DESTDIR}${initdir}/auditd.service
|
|
+ rm ${DESTDIR}${initdir}/augenrules.service
|
|
rm ${DESTDIR}${legacydir}/rotate
|
|
rm ${DESTDIR}${legacydir}/resume
|
|
rm ${DESTDIR}${legacydir}/reload
|