Your IP : 216.73.216.220


Current Path : /opt/microsoft/omsconfig/Scripts/
Upload File :
Current File : //opt/microsoft/omsconfig/Scripts/OMSAuditdPlugin.sh

#!/bin/bash

PATH=/usr/sbin:/sbin:/usr/bin:/bin

AUDISP_DIR=/etc/audisp/plugins.d

AUDISP_CONF=$AUDISP_DIR/auoms.conf

AUOMS_BIN=/opt/microsoft/auoms/bin/auoms
AUOMSCTL_BIN=/opt/microsoft/auoms/bin/auomsctl
AUOMS_CONF_FILE=/etc/opt/microsoft/auoms/auoms.conf
AUOMSCOLLECT_CONF_FILE=/etc/opt/microsoft/auoms/auomscollect.conf
AUOMS_OUTCONF_DIR=/etc/opt/microsoft/auoms/outconf.d
AUOMS_RULES_DIR=/etc/opt/microsoft/auoms/rules.d
AUOMS_AUDIT_RULES_PATH=/etc/opt/microsoft/auoms/rules.d/oms-security-audit.rules

AUDIT_RULES_FILE=/etc/audit/audit.rules
OMS_AUDIT_RULES_PATH=/etc/audit/rules.d/oms-security-audit.rules

TMP_STATE_FILE=auoms.state
TMP_RULES_FILE=auditd_plugin.rules
TMP_LOADED_RULES_FILE=auditd_loaded.rules
TMP_AUDIT_STATE_FILE=audit.state

umask 027

get_plugin_state () {
    if [ ! -e $AUDISP_CONF ]; then
        echo disabled
    fi
    STATE=$(grep '^ *active *= *' $AUDISP_CONF | tr -d ' ' | cut -d'=' -f2)
    if [ $STATE = "yes" ]; then
        echo enabled
    else
        echo disabled
    fi
}

set_plugin_state () {
    # Edit the conf file
    STATE=no
    if [ "$1" = "running" -o "$1" = "enabled" ]; then
        STATE=yes
    fi
    if [ -e $AUDISP_CONF ]; then
        sed -i "s/^\( *active *= *\)[enosy]*/\1$STATE/" $AUDISP_CONF
    else
        cat <<EOF > $AUDISP_CONF
# Created by OMSAuditdPlugin.sh
active = $STATE
direction = out
path = $AUOMS_BIN
type = always
format = string
EOF
    fi

    if [ $? -ne 0 ]; then
        return 1
    fi

    # While a reload would be better, it can be unreliable on some systems
    # so we always do a restart
    service auditd restart
    if [ $? -ne 0 ]; then
        return 1
    fi

    # Give auditd a chance to start or stop
    sleep 3

    # On CentOS/RHEL 7 the restart may fail to start auditd
    # So, double check and start the service if restart failed
    pgrep -x auditd >/dev/null 2>&1
    if [ $? -ne 0 ]; then
        service auditd start
    fi

    # Give auoms collector a chance to start or stop
    sleep 5

    if [ "$1" = "running" -o $1 = "enabled" ]; then
        # Make sure auoms collector started
        pgrep -x -U 0 auoms 2>&1 >/dev/null
        if [ $? -ne 0 ]; then
            return 2
        fi
    else
        # make sure auoms collector stopped
        pgrep -x -U 0 auoms 2>&1 >/dev/null
        if [ $? -eq 0 ]; then
            pkill -KILL -x -U 0 auoms
            pgrep -x -U 0 auoms 2>&1 >/dev/null
            if [ $? -eq 0 ]; then
                return 2
            fi
        fi
    fi
}

get_auoms_state () {
    $AUOMSCTL_BIN state 2>/dev/null
    if [ $? -eq 5 ]; then
        return 1
    fi
    return 0
}

set_auoms_state () {
    if [ "$1" = "running" -o $1 = "enabled" ]; then
        $AUOMSCTL_BIN enable
    else
        $AUOMSCTL_BIN disable
    fi
}

get_audit_state () {
    if [ -e $AUOMSCTL_BIN ]; then
        $AUOMSCTL_BIN -s
    else
        /sbin/auditctl -s
        RET=$?
        if [ $RET -eq 139 ]; then
            # On Debian 8, this command succeeds in outputing the results, but segfaults and returns 139
            return 0
        else
            return $RET
        fi
    fi
}

use_augenrules () {
    if [ -e /sbin/augenrules -a -d /etc/audit/rules.d ]; then
        count=$(grep '## This file is automatically generated from' $AUDIT_RULES_FILE | wc -l)
        if [ $count -gt 0 ]; then
            return 0
        fi
    fi
    return 1
}

get_actual_rules () {
    if [ -e $AUOMSCTL_BIN ]; then
        if [ -e $AUOMS_AUDIT_RULES_PATH ]; then
            cat $AUOMS_AUDIT_RULES_PATH
            return $?
        fi
        return 0
    elif use_augenrules; then
        if [ -e $OMS_AUDIT_RULES_PATH ]; then
            cat $OMS_AUDIT_RULES_PATH
            return $?
        fi
        return 0
    else
        cat $AUDIT_RULES_FILE | awk '\
        BEGIN {
            emit = 0;
            start_found = 0;
            end_found = 0;
        }
        {
            if ($0 == "#### START OF OMS AUDIT RULES ####") { emit = 1; start_found = 1; next; }
            if ($0 == "#### END OF OMS AUDIT RULES ####") { emit = 0; end_found = 1; next; }
            if (emit == 1) { print; next; }
        }
        END {
            if (start_found != end_found) { exit 1; }
        }'
        return $?
    fi
}

remove_rules () {
    if [ -e $AUOMSCTL_BIN ]; then
        if [ -e $AUOMS_AUDIT_RULES_PATH ]; then
            rm -f $AUOMS_AUDIT_RULES_PATH
            if [ $? -ne 0 ]; then
                echo "Failed to remove $AUOMS_AUDIT_RULES_PATH" >&2
                return 1
            fi
        fi
    elif use_augenrules; then
        if [ -e $OMS_AUDIT_RULES_PATH ]; then
            rm -f $OMS_AUDIT_RULES_PATH
            if [ $? -ne 0 ]; then
                echo "Failed to remove $OMS_AUDIT_RULES_PATH" >&2
                return 1
            fi
            /sbin/augenrules
            if [ $? -ne 0 ]; then
                echo "Failed to re-generate $AUDIT_RULES_FILE" >&2
                return 1
            fi
        fi
    else
        TmpFile=$(mktemp /tmp/OMSAuditdPlugin.XXXXXXXX)
        cat $AUDIT_RULES_FILE | awk '\
        BEGIN {
            emit = 1;
            start_found = 0;
            end_found = 0;
        }
        {
            if ($0 == "#### START OF OMS AUDIT RULES ####") { emit = 0; start_found = 1; next; }
            if ($0 == "#### END OF OMS AUDIT RULES ####") { emit = 1; end_found = 1; next; }
            if (emit == 1) { print; next; }
        }
        END {
            if (start_found != 1 || end_found != 1) { exit 1; }
        }' > $TmpFile
        if [ $? -ne 0 ]; then
            echo "Failed to remove OMS audit rules from $AUDIT_RULES_FILE" >&2
            rm -f $TmpFile
            return 1
        fi
        cp $TmpFile $AUDIT_RULES_FILE
        if [ $? -ne 0 ]; then
            echo "Failed to edit $AUDIT_RULES_FILE" >&2
            rm -f $TmpFile
            return 1
        fi
        rm -f $TmpFile
    fi
}

set_rules () {
    if [ -e $AUOMSCTL_BIN ]; then
        cp $1 $AUOMS_AUDIT_RULES_PATH
        if [ $? -ne 0 ]; then
            echo "Failed to create $AUOMS_AUDIT_RULES_PATH" >&2
            return 1
        fi
        chown root.root $AUOMS_AUDIT_RULES_PATH
        if [ $? -ne 0 ]; then
            echo "Failed to set ownership of $AUOMS_AUDIT_RULES_PATH" >&2
            rm -f $AUOMS_AUDIT_RULES_PATH
            return 1
        fi
        chmod 644 $AUOMS_AUDIT_RULES_PATH
        if [ $? -ne 0 ]; then
            echo "Failed to set permissions for $AUOMS_AUDIT_RULES_PATH" >&2
            rm -f $AUOMS_AUDIT_RULES_PATH
            return 1
        fi
    elif use_augenrules; then
        cp $1 $OMS_AUDIT_RULES_PATH
        if [ $? -ne 0 ]; then
            echo "Failed to create $OMS_AUDIT_RULES_PATH" >&2
            return 1
        fi
        chown root.root $OMS_AUDIT_RULES_PATH
        if [ $? -ne 0 ]; then
            echo "Failed to set ownership of $OMS_AUDIT_RULES_PATH" >&2
            rm -f $OMS_AUDIT_RULES_PATH
            return 1
        fi
        chmod 640 $OMS_AUDIT_RULES_PATH
        if [ $? -ne 0 ]; then
            echo "Failed to set permissions for $OMS_AUDIT_RULES_PATH" >&2
            rm -f $OMS_AUDIT_RULES_PATH
            return 1
        fi
        /sbin/augenrules
        if [ $? -ne 0 ]; then
            echo "Failed to re-generate $AUDIT_RULES_FILE" >&2
            rm -f $OMS_AUDIT_RULES_PATH
            return 1
        fi
    else
        TmpOutFile=$(mktemp /tmp/OMSAuditdPlugin.XXXXXXXX)
        cat $AUDIT_RULES_FILE | awk -v DSC_AUDIT_RULES_FILE=$1 '\
        BEGIN {
            emit = 1;
            start_found = 0;
            end_found = 0;
            count = 0;
            idx = 0;
        }
        {
            if (match($0, "^\\s*-e")) { if (idx == 0) {idx = count } next; }
            if ($0 == "#### START OF OMS AUDIT RULES ####") { emit = 0; start_found = 1; if (idx == 0) { idx = count;} next; }
            if ($0 == "#### END OF OMS AUDIT RULES ####") { emit = 1; end_found = 1; next; }
            if (emit == 1) { lines[count++] = $0; next; }
        }
        END {
            if (start_found != end_found) { exit 1; }
            if (idx == 0) { idx = count; }
            for (i = 0; i < idx; i++) { printf "%s\n", lines[i]; }
            print "#### START OF OMS AUDIT RULES ####"
            while(getline line<DSC_AUDIT_RULES_FILE){print line}
            print "#### END OF OMS AUDIT RULES ####"
            for (i = idx; i < count; i++) { printf "%s\n", lines[i]; }
        }' > $TmpOutFile
        if [ $? -ne 0 ]; then
            echo "Failed to add/replace OMS audit rules to $AUDIT_RULES_FILE" >&2
            rm -f $TmpOutFile
            return 1
        fi
        cp $TmpOutFile $AUDIT_RULES_FILE
        if [ $? -ne 0 ]; then
            echo "Failed to edit $AUDIT_RULES_FILE" >&2
            rm -f $TmpOutFile
            return 1
        fi
        rm -f $TmpOutFile
    fi
}

case $1 in
    get)
        AUDIT_VERSION=0
        if [ -e /sbin/auditctl ]; then
            AUDIT_VERSION=$(/sbin/auditctl -v | sed 's/^[^0-9]*\([0-9]\.[0-9]\).*$/\1/')
            if [ $? -ne 0 ]; then
                echo "Failed to determine auditctl version"
                exit 2
            fi
        fi

        # $2 tmp dir
        if [ -e /sbin/auditctl ]; then
            get_plugin_state > $2/$TMP_STATE_FILE
            if [ $? -ne 0 ]; then
                rm $2/$TMP_STATE_FILE
                exit 3
            else
                chown omsagent.omiusers $2/$TMP_STATE_FILE 2>&1 >/dev/null
            fi
        fi

        if [ -e $AUOMSCTL_BIN ]; then
            get_auoms_state > $2/$TMP_STATE_FILE
            if [ $? -ne 0 ]; then
                rm $2/$TMP_STATE_FILE
                exit 3
            else
                chown omsagent.omiusers $2/$TMP_STATE_FILE 2>&1 >/dev/null
            fi
        else
            get_plugin_state > $2/$TMP_STATE_FILE
            if [ $? -ne 0 ]; then
                rm $2/$TMP_STATE_FILE
                exit 3
            else
                chown omsagent.omiusers $2/$TMP_STATE_FILE 2>&1 >/dev/null
            fi
        fi

        get_actual_rules > $2/$TMP_RULES_FILE
        if [ $? -ne 0 ]; then
            rm $2/$TMP_RULES_FILE
            exit 4
        else
            chown omsagent.omiusers $2/$TMP_RULES_FILE 2>&1 >/dev/null
        fi

        get_audit_state > $2/$TMP_AUDIT_STATE_FILE
        if [ $? -ne 0 ]; then
            rm $2/$TMP_AUDIT_STATE_FILE
            exit 6
        else
            chown omsagent.omiusers $2/$TMP_AUDIT_STATE_FILE 2>&1 >/dev/null
        fi

        if [ ! -e $AUOMSCTL_BIN ]; then
            /sbin/auditctl -l > $2/$TMP_LOADED_RULES_FILE 2>/dev/null
            if [ $? -ne 0 ]; then
                rm $2/$TMP_LOADED_RULES_FILE
                exit 5
            else
                chown omsagent.omiusers $2/$TMP_LOADED_RULES_FILE 2>&1 >/dev/null
            fi
        fi

        echo $AUDIT_VERSION
        ;;
    set)
        # $2 workspace id or ""
        # $3 auoms state (or "" if it doesn't need to change)
        # $4 rules file path ("" if no change, "remove" to remove rules)
        # $5 dest auoms outconf file name
        # $6 source auoms outconf file ("" if no change, or "remove" to remove file)
        # $7 rules to pass to auditctl -R
        # $8 source auoms conf file ("" if no change)
        # $9 source auomscollect conf file ("" if no change)
        if [ -n "$2" ]; then
            /opt/microsoft/omsagent/bin/service_control restart $2
            if [ $? -ne 0 ]; then
                exit 2
            fi
        fi

        if [ -n "$4" ]; then
            if [ "$4" == "remove" ]; then
                remove_rules
            else
                set_rules $4
            fi
            if [ $? -ne 0 ]; then
                exit 4
            fi
        fi

        AUDITD_RELOAD=0
        AUOMS_RESTART=0
        if [ -n "$8" ]; then
            cp $8 ${AUOMS_CONF_FILE}
            if [ $? -ne 0 ]; then
                exit 9
            fi
            chmod 644 ${AUOMS_CONF_FILE}
            if [ $? -ne 0 ]; then
                exit 9
            fi
            if [ -e $AUOMSCTL_BIN ]; then
                AUOMS_RESTART=1
            else
                AUDITD_RELOAD=1
            fi
        fi
        if [ -n "$9" ]; then
            cp $9 ${AUOMSCOLLECT_CONF_FILE}
            if [ $? -ne 0 ]; then
                exit 10
            fi
            chmod 644 ${AUOMSCOLLECT_CONF_FILE}
            if [ $? -ne 0 ]; then
                exit 10
            fi
            if [ -e /sbin/auditctl ]; then
                AUDITD_RELOAD=1
            else
                AUOMS_RESTART=1
            fi
        fi
        if [ -n "$6" ]; then
            if [ "$6" == "remove" ]; then
                rm ${AUOMS_OUTCONF_DIR}/$5
                if [ $? -ne 0 ]; then
                    exit 5
                fi
            else
                cp $6 ${AUOMS_OUTCONF_DIR}/$5
                if [ $? -ne 0 ]; then
                    exit 5
                fi
                chmod 644 ${AUOMS_OUTCONF_DIR}/$5
                if [ $? -ne 0 ]; then
                    exit 5
                fi
            fi
            if [ -e $AUOMSCTL_BIN ]; then
                AUOMS_RESTART=1
            else
                AUDITD_RELOAD=1
            fi
        fi

        if [ -e $AUOMSCTL_BIN ]; then
            if [ -n "$3" ]; then
                set_auoms_state $3
                RET=$?
                if [ $RET -ne 0 ]; then
                    case $RET in
                        1)
                            exit 13
                            ;;
                        2)
                            exit 13
                            ;;
                        3)
                            exit 8
                            ;;
                        4)
                            exit 6
                            ;;
                        *)
                            exit 13
                            ;;
                    esac
                fi
            else
                if [ $AUOMS_RESTART -eq 1 ]; then
                    service auoms restart
                    if [ $? -ne 0 ]; then
                        exit 11
                    fi
                fi
                if [ $AUDITD_RELOAD -eq 1 ]; then
                    # Notify auditd of changes
                    service auditd reload
                    if [ $? -ne 0 ]; then
                        exit 8
                    fi
                fi
            fi
        else
            if [ -n "$3" ]; then
                set_plugin_state $3
                RET=$?
                if [ $RET -ne 0 ]; then
                    if [ $RET -eq 2 ]; then
                        exit 6
                    else
                        exit 3
                    fi
                fi
            elif [ $AUDITD_RELOAD -eq 1 ]; then
                # Notify auditd of changes
                service auditd reload
                if [ $? -ne 0 ]; then
                    exit 8
                fi
            fi
        fi

        # Only attempt to load rules if auditctl is present and auoms 2.0 is not installed
        if [ -e /sbin/auditctl ]; then
            if [ -n "$7" ]; then
                TmpFile=$(mktemp /tmp/OMSAuditdPlugin.XXXXXXXX)
                cp $7 $TmpFile
                /sbin/auditctl -R $TmpFile
                if [ $? -ne 0 ]; then
                    rm -f $TmpFile
                    exit 7
                fi
                rm -f $TmpFile
            fi
        fi
        ;;
    *)
        echo "Invalid command '$1'"
        exit 1
        ;;
esac