cmd/audit/audit.go (104 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. //go:build linux // +build linux // audit is an example that receives audit messages from the kernel and outputs // them to stdout. The output can be piped to the auparse example to format // and interpret the output. package main import ( "errors" "flag" "fmt" "io" "log" "os" "github.com/elastic/go-libaudit/v2" "github.com/elastic/go-libaudit/v2/auparse" ) var ( fs = flag.NewFlagSet("audit", flag.ExitOnError) diag = fs.String("diag", "", "dump raw information from kernel to file") rate = fs.Uint("rate", 0, "rate limit in kernel (default 0, no rate limit)") backlog = fs.Uint("backlog", 8192, "backlog limit") immutable = fs.Bool("immutable", false, "make kernel audit settings immutable (requires reboot to undo)") receiveOnly = fs.Bool("ro", false, "receive only using multicast, requires kernel 3.16+") ) func main() { if err := fs.Parse(os.Args[1:]); err != nil { log.Fatal(err) } if err := read(); err != nil { log.Fatalf("error: %v", err) } } func read() error { if os.Geteuid() != 0 { return errors.New("you must be root to receive audit data") } // Write netlink response to a file for further analysis or for writing // tests cases. var diagWriter io.Writer if *diag != "" { f, err := os.OpenFile(*diag, os.O_CREATE|os.O_RDWR|os.O_TRUNC, 0o600) if err != nil { return err } defer f.Close() diagWriter = f } log.Println("starting netlink client") var err error var client *libaudit.AuditClient if *receiveOnly { client, err = libaudit.NewMulticastAuditClient(diagWriter) if err != nil { return fmt.Errorf("failed to create receive-only audit client: %w", err) } defer client.Close() } else { client, err = libaudit.NewAuditClient(diagWriter) if err != nil { return fmt.Errorf("failed to create audit client: %w", err) } defer client.Close() status, err := client.GetStatus() if err != nil { return fmt.Errorf("failed to get audit status: %w", err) } log.Printf("received audit status=%+v", status) if status.Enabled == 0 { log.Println("enabling auditing in the kernel") if err = client.SetEnabled(true, libaudit.WaitForReply); err != nil { return fmt.Errorf("failed to set enabled=true: %w", err) } } if status.RateLimit != uint32(*rate) { log.Printf("setting rate limit in kernel to %v", *rate) if err = client.SetRateLimit(uint32(*rate), libaudit.NoWait); err != nil { return fmt.Errorf("failed to set rate limit to unlimited: %w", err) } } if status.BacklogLimit != uint32(*backlog) { log.Printf("setting backlog limit in kernel to %v", *backlog) if err = client.SetBacklogLimit(uint32(*backlog), libaudit.NoWait); err != nil { return fmt.Errorf("failed to set backlog limit: %w", err) } } if status.Enabled != 2 && *immutable { log.Printf("setting kernel settings as immutable") if err = client.SetImmutable(libaudit.NoWait); err != nil { return fmt.Errorf("failed to set kernel as immutable: %w", err) } } log.Printf("sending message to kernel registering our PID (%v) as the audit daemon", os.Getpid()) if err = client.SetPID(libaudit.NoWait); err != nil { return fmt.Errorf("failed to set audit PID: %w", err) } } return receive(client) } func receive(r *libaudit.AuditClient) error { for { rawEvent, err := r.Receive(false) if err != nil { return fmt.Errorf("receive failed: %w", err) } // Messages from 1100-2999 are valid audit messages. if rawEvent.Type < auparse.AUDIT_USER_AUTH || rawEvent.Type > auparse.AUDIT_LAST_USER_MSG2 { continue } fmt.Printf("type=%v msg=%s\n", rawEvent.Type, rawEvent.Data) } }