From owner-trustedbsd-announce@freebsd.org Tue Dec 6 13:15:16 2016 Return-Path: Delivered-To: trustedbsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 02F87C69B79; Tue, 6 Dec 2016 13:15:16 +0000 (UTC) (envelope-from brueffer@FreeBSD.org) Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.126.134]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mout.kundenserver.de", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 71ED212C; Tue, 6 Dec 2016 13:15:14 +0000 (UTC) (envelope-from brueffer@FreeBSD.org) Received: from [130.235.5.34] ([130.235.5.34]) by mrelayeu.kundenserver.de (mreue001 [212.227.15.167]) with ESMTPSA (Nemesis) id 0MOG72-1cHXN12LFk-005V7l; Tue, 06 Dec 2016 14:15:07 +0100 To: trustedbsd-announce@freebsd.org, trustedbsd-audit@freebsd.org, freebsd-security@freebsd.org From: Christian Brueffer Subject: OpenBSM 1.2 alpha 5 released Message-ID: Date: Tue, 6 Dec 2016 14:15:03 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr" X-Provags-ID: V03:K0:+N4rc+2knqlOmnyOxU3AQN1PRWfNwcqriAN60DuBb8El0SlrlGQ mpok2S5Jk98fbbEGoDmpq7GKPwcGMhvdq6PviV6QIF6Cwz+zqzn7zFs3FtJ0MfyguZqalLN Im+pNeAK/1P3dAqLzVtgQzz6bTGjWTQjb3fs/fv44zPq2xdsXzhuGMwMMWaf+qFBcutE443 ip1fk5BmIGyAlxR4X7hsg== X-UI-Out-Filterresults: notjunk:1;V01:K0:+KVg6eoI+0M=:8HU0A9pXu0ryUJJr8VnBLP uw6tAaNXnvhSx81WTrNjs7wpMdpc8gtT9Gk7R85S7LVsQcSVltFOqj8ouHz2nkKuH+Hh0bQqB R4c8oP5OAYJZDpVEwsD52NOsPTB0WlWMRjJj/DzqbZUeimPuYOtByn8MC5XCqB8Z4wR8rYYzU qpMoDNnRYkKNLj0ZjvSmClyJRQlL1rmp1AWqD4ZUYEIFncF/dt20kmUUYiXb0YlCneMZQ5L1M SOC52l1SvZgmSIoL/UBLKpDHezjpSpQuNPb4nRDtvMGm6jwcmCY6uOfBGaJ1XpaUb1Q3aeLIa mfnb1XEbRG0tDonf5MTkkdR0qpwEd4OhbAlA51EbM4s0EsP2whJapwgipVZr+XX5OJMtGfxlq oneRrdwAbsqO1GmpjgjQEdl0GBDaHcH0qM0icz8PEcRt3sT/zcohlbmxcGBHVh3SaVRGlgVF1 pHN7woRlF4cDSnaMHUwp80wtcY3NvB0u4KB48SFz2xl8yKd8DavlWg6iV9PyiIATXtPaOD4SQ M2DP7GKPPtmsJ3n4/5LB17nqpVyiqtidD768bSiIR/YUdk+zta6GeQk8xq1CRjFmob1j5W3+y 4y9ogBt6iH0KYmsow0VfleNPktWRUFQJJnPA13TKtmaJMS9dTNLJ3XaPpG6wlKsN7lurl6Xyc UGc+i+NaisvCg9W49feKpP5CrFjAyOKWmHATu4ASj1PSKOBL3hFc1EUwqQz2iL5f2YQA= X-Mailman-Approved-At: Tue, 06 Dec 2016 14:42:37 +0000 X-BeenThere: trustedbsd-announce@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: TrustedBSD Project Announcements List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Dec 2016 13:15:16 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr Content-Type: multipart/mixed; boundary="gakAD1xgRTRfXmIwnlDnW9IXLUcLQ7DU0"; protected-headers="v1" From: Christian Brueffer To: trustedbsd-announce@freebsd.org, trustedbsd-audit@freebsd.org, freebsd-security@freebsd.org Message-ID: Subject: OpenBSM 1.2 alpha 5 released --gakAD1xgRTRfXmIwnlDnW9IXLUcLQ7DU0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable I'm pleased to announce the availability of OpenBSM 1.2 alpha 5. This release contains the following changes: - Added a new "qsize" parameter in audit_control and the getacqsize(3) API to query it, allowing to set the kernel's maximum audit queue length. - Added support to push a mapping between audit event names and event numbers into the kernel (where supported) using new A_GETEVENT and A_SETEVENT auditon(2) operations. - Added audit event identifiers for a number of new (and not-so-new) FreeBSD system calls including those for asynchronous I/O, thread management, SCTP, jails, multi-FIB support, and misc. POSIX interfaces such as posix_fallocate(2) and posix_fadvise(2). - On operating systems supporting Capsicum, auditreduce(1) and praudit(1) now run sandboxed. - Empty "flags" and "naflags" fields are now permitted in audit_control(5). You can download OpenBSM releases and snapshots from the following places= : The OpenBSM project web page http://www.OpenBSM.org/ The OpenBSM GitHub repository https://github.com/openbsm/openbsm This test release is known to build and run (to varying degrees) on FreeBSD 10.x, 11.x, 12-CURRENT, Mac OS X Mavericks, Yosemite, El Capitan, and Ubuntu Linux 16.04 LTS. If you encounter a problem, please open an issue report on GitHub. Christian Brueffer --gakAD1xgRTRfXmIwnlDnW9IXLUcLQ7DU0-- --23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQJ8BAEBCgBmBQJYRrnaXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5QzhCQjQ5MDgzNDUwNjkyOUM5Mjg2NDE3 OEM4MzY5ODQ3RTE2NDg3AAoJEHjINphH4WSHQssP/iV2UVsHByR3eLv/ThYbMNuL clTz64SEQXsJFDBTDi4EvdUie0ylx+6PGXTjTsMb8avLk8DH05gTVCJmWfUx/BK8 4dkpt80yS/OFj48fYGuq50RKBGm57iSC2et7jcoUb0KlxPvYxEW1sKspcgh3hpjq 1MeYjhqW/Pc9bJsFH85/ah7KT0Zc4EAEs7VlgI78STwWY8uEzJ/MtrI+AYYT6RRb E3Ou4e85BEfo7SM7qdcZiX66H1HHeaX5QYg6OSwOB4zrej5M1TfYP4h2XeGt/Tvr qDKXbWljRl2M2XdrvAmphfCFpR7pPA/4okriLWPYBQgs4StUMKCyk8yjuFI/azGc w6lOrg/WSbeYIsI5JcJcn4FL/g7v2PrDYvdjyqS2387vY6UY159nKOHVzcA+YiKb 02VDjA4Wp0y6F3LZfl7zh/vR5lS8IB3kDx5jt/+HOx3AB8PotEOzKtfku+PNLGQs XUSs2vV+OiXvgqdbacQQamAyHSgY3DSbZ4PSmh7Myyl3Hh8furHcZ2fzoZLw099Z 231x7V5XUSSUTWBINh9hLRUCKhgeQmet2JSeaSXTXwCMLdz64EY++ntGLb8JOelx Ojwpa/ysnLJwwhbfNXGV+Awcj/gYcPwVd5rS+qqKjiYkGanAMtLF3lQcocXPIVFr iHO+H9x5bvfMB0BXr67z =Q6wl -----END PGP SIGNATURE----- --23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr--