inspec/lib/resources/auditd_rules.rb

179 lines
4.5 KiB
Ruby
Raw Normal View History

2015-07-26 20:44:01 +00:00
# encoding: utf-8
# copyright: 2015, Vulcano Security GmbH
2015-10-06 16:55:44 +00:00
# author: Christoph Hartmann
# author: Dominik Richter
2015-07-26 20:44:01 +00:00
# license: All rights reserved
require 'forwardable'
require 'utils/filter_array'
2015-07-26 20:44:01 +00:00
class AuditdRulesLegacy
def initialize(content)
@content = content
2015-07-26 20:44:01 +00:00
@opts = {
assignment_re: /^\s*([^:]*?)\s*:\s*(.*?)\s*$/,
multiple_values: true,
2015-07-26 20:44:01 +00:00
}
end
def params
@params ||= SimpleConfig.new(@content, @opts).params
2015-07-26 20:44:01 +00:00
end
2015-09-03 18:43:58 +00:00
def method_missing(name)
params[name.to_s]
2015-07-26 20:44:01 +00:00
end
2015-09-03 18:43:58 +00:00
def status(name)
2015-07-26 20:44:01 +00:00
@status_opts = {
assignment_re: /^\s*([^:]*?)\s*:\s*(.*?)\s*$/,
multiple_values: false,
2015-07-26 20:44:01 +00:00
}
2015-10-26 03:04:18 +00:00
@status_content ||= inspec.command('/sbin/auditctl -s').stdout.chomp
2015-07-26 20:44:01 +00:00
@status_params = SimpleConfig.new(@status_content, @status_opts).params
2015-09-03 18:35:23 +00:00
status = @status_params['AUDIT_STATUS']
return nil if status.nil?
2015-07-26 20:44:01 +00:00
items = Hash[status.scan(/([^=]+)=(\w*)\s*/)]
2015-09-03 18:45:37 +00:00
items[name]
2015-07-26 20:44:01 +00:00
end
def to_s
'Audit Daemon Rules (legacy format)'
end
end
class AuditDaemonRules < Inspec.resource(1)
extend Forwardable
2016-01-28 16:08:41 +00:00
attr_accessor :rules, :lines
name 'auditd_rules'
desc 'Use the auditd_rules InSpec audit resource to test the rules for logging that exist on the system. The audit.rules file is typically located under /etc/audit/ and contains the list of rules that define what is captured in log files.'
example "
# legacy syntax for auditd <= 2.2
describe auditd_rules do
its('LIST_RULES') {should contain_match(/^exit,always arch=.* key=time-change syscall=adjtimex,settimeofday/) }
its('LIST_RULES') {should contain_match(/^exit,always arch=.* key=time-change syscall=stime,settimeofday,adjtimex/) }
its('LIST_RULES') {should contain_match(/^exit,always arch=.* key=time-change syscall=clock_settime/)}
its('LIST_RULES') {should contain_match(/^exit,always watch=\/etc\/localtime perm=wa key=time-change/)}
end
2016-01-28 16:08:41 +00:00
# TODO(sr) new interface
"
def initialize
@content = inspec.command('/sbin/auditctl -l').stdout.chomp
if @content.match /^LIST_RULES:/
warn '[LEGACY] this version of auditd is outdated. Updating it allows for using more precise matchers.'
@legacy = AuditdRulesLegacy.new(@content)
else
parse_content
end
end
# non-legacy instances are not asked for `its('LIST_RULES')`
2016-01-28 16:08:41 +00:00
def LIST_RULES
return @legacy.LIST_RULES if @legacy
fail 'Using legacy auditd_rules LIST_RULES interface with non-legacy audit package. Please use the new syntax.'
end
def status(name = nil)
return @legacy.status(name) if @legacy
@status_content ||= inspec.command('/sbin/auditctl -s').stdout.chomp
@status_params ||= Hash[@status_content.scan /^([^ ]+) (.*)$/]
return @status_params[name] if name
@status_params
end
def parse_content
2016-01-28 16:08:41 +00:00
@rules = {
syscalls: [],
files: []
}
@lines = @content.lines.map(&:chomp)
lines.each do |line|
if is_syscall?(line)
syscalls = get_syscalls line
action, list = get_action_list line
key = get_key line
opts = get_opts line
# create a 'flatter' structure because sanity
syscalls.each do |s|
@rules[:syscalls] << { syscall: s, list: list, action: action, key: key, opts: opts }
end
elsif is_file?(line)
file = get_file line
perms = get_permissions line
key = get_key line
@rules[:files] << { file: file, key: key, permissions: perms }
end
end
end
2016-01-28 16:08:41 +00:00
def syscall(name)
select_name(:syscall, name)
end
def file(name)
select_name(:file, name)
end
2015-07-26 20:44:01 +00:00
def to_s
'Audit Daemon Rules'
2015-07-26 20:44:01 +00:00
end
2016-01-28 16:08:41 +00:00
private
def select_name(key, name)
plural = "#{key}s".to_sym
res = rules[plural].find_all { |rule| rule[key] == name }
FilterArray.new(res)
end
def is_syscall?(line)
line.match /\ -S /
end
def is_file?(line)
line.match /-w /
end
def get_syscalls(line)
line.scan(/-S ([^ ]+)/).flatten
end
def get_action_list(line)
line.scan(/-a ([^,]+),([^ ]+)/).flatten
end
def get_key(line)
line.match(/-k ([^ ]+)/)[1]
end
# NOTE there are NO precautions wrt. filenames containing spaces in auditctl
# `auditctl -w /foo\ bar` gives the following line: `-w /foo bar -p rwxa`
def get_file(line)
line.match(/-w (.+) -p/)[1]
end
def get_permissions(line)
line.match(/-p ([^ ]+)/)[1]
end
def get_opts(line)
opts = {}
line.scan(/-F ([^= ]+)=([^ ]+)/).each do |key, val|
opts[key.to_s] = val
end
opts
end
2015-07-26 20:44:01 +00:00
end