| 1 | /*
 | 
|---|
| 2 |    Unix SMB/CIFS implementation.
 | 
|---|
| 3 |    Auditing helper functions.
 | 
|---|
| 4 |    Copyright (C) Guenther Deschner 2006
 | 
|---|
| 5 | 
 | 
|---|
| 6 |    This program is free software; you can redistribute it and/or modify
 | 
|---|
| 7 |    it under the terms of the GNU General Public License as published by
 | 
|---|
| 8 |    the Free Software Foundation; either version 3 of the License, or
 | 
|---|
| 9 |    (at your option) any later version.
 | 
|---|
| 10 | 
 | 
|---|
| 11 |    This program is distributed in the hope that it will be useful,
 | 
|---|
| 12 |    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 13 |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
| 14 |    GNU General Public License for more details.
 | 
|---|
| 15 | 
 | 
|---|
| 16 |    You should have received a copy of the GNU General Public License
 | 
|---|
| 17 |    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
|---|
| 18 | */
 | 
|---|
| 19 | 
 | 
|---|
| 20 | #include "includes.h"
 | 
|---|
| 21 | 
 | 
|---|
| 22 | static const struct audit_category_tab {
 | 
|---|
| 23 |         uint32 category;
 | 
|---|
| 24 |         const char *category_str;
 | 
|---|
| 25 |         const char *param_str;
 | 
|---|
| 26 |         const char *description;
 | 
|---|
| 27 | } audit_category_tab [] = {
 | 
|---|
| 28 |         { LSA_AUDIT_CATEGORY_LOGON, 
 | 
|---|
| 29 |          "LSA_AUDIT_CATEGORY_LOGON", 
 | 
|---|
| 30 |          "LOGON", "Logon events" },
 | 
|---|
| 31 |         { LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS, 
 | 
|---|
| 32 |          "LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS", 
 | 
|---|
| 33 |          "PRIVILEGE", "Privilege Use" },
 | 
|---|
| 34 |         { LSA_AUDIT_CATEGORY_SYSTEM, 
 | 
|---|
| 35 |          "LSA_AUDIT_CATEGORY_SYSTEM", 
 | 
|---|
| 36 |          "SYSTEM", "System Events" },
 | 
|---|
| 37 |         { LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES, 
 | 
|---|
| 38 |          "LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES", 
 | 
|---|
| 39 |          "POLICY", "Policy Change" },
 | 
|---|
| 40 |         { LSA_AUDIT_CATEGORY_PROCCESS_TRACKING, 
 | 
|---|
| 41 |          "LSA_AUDIT_CATEGORY_PROCCESS_TRACKING", 
 | 
|---|
| 42 |          "PROCESS", "Process Tracking" },
 | 
|---|
| 43 |         { LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS, 
 | 
|---|
| 44 |          "LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS", 
 | 
|---|
| 45 |          "OBJECT", "Object Access" },
 | 
|---|
| 46 |         { LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT, 
 | 
|---|
| 47 |          "LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT", 
 | 
|---|
| 48 |          "SAM", "Account Management" },
 | 
|---|
| 49 |         { LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS, 
 | 
|---|
| 50 |          "LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS", 
 | 
|---|
| 51 |          "DIRECTORY", "Directory service access" },
 | 
|---|
| 52 |         { LSA_AUDIT_CATEGORY_ACCOUNT_LOGON, 
 | 
|---|
| 53 |          "LSA_AUDIT_CATEGORY_ACCOUNT_LOGON", 
 | 
|---|
| 54 |          "ACCOUNT", "Account logon events" },
 | 
|---|
| 55 |         { 0, NULL, NULL }
 | 
|---|
| 56 | };
 | 
|---|
| 57 | 
 | 
|---|
| 58 | const char *audit_category_str(uint32 category)
 | 
|---|
| 59 | {
 | 
|---|
| 60 |         int i;
 | 
|---|
| 61 |         for (i=0; audit_category_tab[i].category_str; i++) {
 | 
|---|
| 62 |                 if (category == audit_category_tab[i].category) {
 | 
|---|
| 63 |                         return audit_category_tab[i].category_str;
 | 
|---|
| 64 |                 }
 | 
|---|
| 65 |         }
 | 
|---|
| 66 |         return NULL;
 | 
|---|
| 67 | }
 | 
|---|
| 68 | 
 | 
|---|
| 69 | const char *audit_param_str(uint32 category)
 | 
|---|
| 70 | {
 | 
|---|
| 71 |         int i;
 | 
|---|
| 72 |         for (i=0; audit_category_tab[i].param_str; i++) {
 | 
|---|
| 73 |                 if (category == audit_category_tab[i].category) {
 | 
|---|
| 74 |                         return audit_category_tab[i].param_str;
 | 
|---|
| 75 |                 }
 | 
|---|
| 76 |         }
 | 
|---|
| 77 |         return NULL;
 | 
|---|
| 78 | }
 | 
|---|
| 79 | 
 | 
|---|
| 80 | const char *audit_description_str(uint32 category)
 | 
|---|
| 81 | {
 | 
|---|
| 82 |         int i;
 | 
|---|
| 83 |         for (i=0; audit_category_tab[i].description; i++) {
 | 
|---|
| 84 |                 if (category == audit_category_tab[i].category) {
 | 
|---|
| 85 |                         return audit_category_tab[i].description;
 | 
|---|
| 86 |                 }
 | 
|---|
| 87 |         }
 | 
|---|
| 88 |         return NULL;
 | 
|---|
| 89 | }
 | 
|---|
| 90 | 
 | 
|---|
| 91 | bool get_audit_category_from_param(const char *param, uint32 *audit_category)
 | 
|---|
| 92 | {
 | 
|---|
| 93 |         *audit_category = Undefined;
 | 
|---|
| 94 | 
 | 
|---|
| 95 |         if (strequal(param, "SYSTEM")) {
 | 
|---|
| 96 |                 *audit_category = LSA_AUDIT_CATEGORY_SYSTEM;
 | 
|---|
| 97 |         } else if (strequal(param, "LOGON")) {
 | 
|---|
| 98 |                 *audit_category = LSA_AUDIT_CATEGORY_LOGON;
 | 
|---|
| 99 |         } else if (strequal(param, "OBJECT")) {
 | 
|---|
| 100 |                 *audit_category = LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS;
 | 
|---|
| 101 |         } else if (strequal(param, "PRIVILEGE")) {
 | 
|---|
| 102 |                 *audit_category = LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS;
 | 
|---|
| 103 |         } else if (strequal(param, "PROCESS")) {
 | 
|---|
| 104 |                 *audit_category = LSA_AUDIT_CATEGORY_PROCCESS_TRACKING;
 | 
|---|
| 105 |         } else if (strequal(param, "POLICY")) {
 | 
|---|
| 106 |                 *audit_category = LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES;
 | 
|---|
| 107 |         } else if (strequal(param, "SAM")) {
 | 
|---|
| 108 |                 *audit_category = LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT;
 | 
|---|
| 109 |         } else if (strequal(param, "DIRECTORY")) {
 | 
|---|
| 110 |                 *audit_category = LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS;
 | 
|---|
| 111 |         } else if (strequal(param, "ACCOUNT")) {
 | 
|---|
| 112 |                 *audit_category = LSA_AUDIT_CATEGORY_ACCOUNT_LOGON;
 | 
|---|
| 113 |         } else {
 | 
|---|
| 114 |                 DEBUG(0,("unknown parameter: %s\n", param));
 | 
|---|
| 115 |                 return False;
 | 
|---|
| 116 |         }
 | 
|---|
| 117 | 
 | 
|---|
| 118 |         return True;
 | 
|---|
| 119 | }
 | 
|---|
| 120 | 
 | 
|---|
| 121 | const char *audit_policy_str(TALLOC_CTX *mem_ctx, uint32 policy)
 | 
|---|
| 122 | {
 | 
|---|
| 123 |         const char *ret = NULL;
 | 
|---|
| 124 | 
 | 
|---|
| 125 |         if (policy == LSA_AUDIT_POLICY_NONE) {
 | 
|---|
| 126 |                 return talloc_strdup(mem_ctx, "None");
 | 
|---|
| 127 |         }
 | 
|---|
| 128 | 
 | 
|---|
| 129 |         if (policy & LSA_AUDIT_POLICY_SUCCESS) {
 | 
|---|
| 130 |                 ret = talloc_strdup(mem_ctx, "Success");
 | 
|---|
| 131 |                 if (ret == NULL) {
 | 
|---|
| 132 |                         return NULL;
 | 
|---|
| 133 |                 }
 | 
|---|
| 134 |         }
 | 
|---|
| 135 | 
 | 
|---|
| 136 |         if (policy & LSA_AUDIT_POLICY_FAILURE) {
 | 
|---|
| 137 |                 if (ret) {
 | 
|---|
| 138 |                         ret = talloc_asprintf(mem_ctx, "%s, %s", ret, "Failure");
 | 
|---|
| 139 |                         if (ret == NULL) {
 | 
|---|
| 140 |                                 return NULL;
 | 
|---|
| 141 |                         }
 | 
|---|
| 142 |                 } else {
 | 
|---|
| 143 |                         return talloc_strdup(mem_ctx, "Failure");
 | 
|---|
| 144 |                 }
 | 
|---|
| 145 |         }
 | 
|---|
| 146 | 
 | 
|---|
| 147 |         return ret;
 | 
|---|
| 148 | }
 | 
|---|