OpenBSM 1.0 alpha 5 tarball now on the web site.
Robert Watson
rwatson at FreeBSD.org
Sat Mar 4 17:30:39 UTC 2006
I've now put the OpenBSM 1.0 alpha 5 tarball up on the www.TrustedBSD.org web
site:
http://www.TrustedBSD.org/openbsm.html
I've attached a list of changes present in alpha 5 at the end of this message.
The primary change is that we've moved from using BSD make to GNU
autoconf/automake for the build and portability infrastructure. Many thanks
to Martin Fong for working with me to get the Tiger build up and running,
which it now appears to be.
The source code base also now builds out of the box on my Fedora Core release
3 box, although it has not seen much testing on Linux. As Linux doesn't
support the various audit system calls, we only build the audit trail printing
and reduction tools, and the library omits API calls that submit audit records
to the kernel.
As of today, I've also imported OpenBSM 1.0 alpha 5 into the FreeBSD 7.x
source tree. It continues to use the integrated BSD make build infrastructure
in FreeBSD, and the plan is to continue to do so.
Robert N M Watson
OpenBSM 1.0 alpha 5
- Update install notes to indicate /etc files are to be installed manually.
- On systems without LOG_SECURITY, use LOG_AUTH.
- Convert to autoconf/automake in order to move to a more portable (not
BSD-specific) build infrastructure, and more easy conditional building of
components. Currently, the primary feature loss is that automake does
not have native support for manual symlinks. This will be addressed in a
future OpenBSM release.
- Add compat/queue.h, to be used on systems dated BSD queue macro libraries
(as found on Linux).
- Rename CHANGELOG to HISTORY, as our change log doesn't follow some of the
existing conventions for a CHANGELOG.
- Some private data structures moved from audit.h to audit_internal.h to
prevent inappropriate use by applications and name space pollution.
- Improved detection and use of endian macros using autoconf.
- Avoid non-portable use of struct in6_addr, which is largely opaque.
- Avoid leaking BSD kernel socket related token code to user space in
bsm_token.c.
- Teach System V IPC calls to look for Linux naming variations for certain
struct ipc_perm fields.
- Test for audit system calls, and if not present, don't build
bsm_wrappers.c, bsm_notify.c, audit(8), and auditd(8), which rely on
those system calls.
- au_close() is not implemented on systems that don't have audit system
calls, but au_close_buffer() is.
- Work around missing BSDisms in bsm_wrapper.c.
- Fix nested includes so including libbsm.h in an application on Linux
picks up the necessary definitions.
More information about the trustedbsd-audit
mailing list