Date: Tue, 6 Dec 2016 14:15:03 +0100 From: Christian Brueffer <brueffer@FreeBSD.org> To: trustedbsd-announce@freebsd.org, trustedbsd-audit@freebsd.org, freebsd-security@freebsd.org Subject: OpenBSM 1.2 alpha 5 released Message-ID: <b8cc9e4c-b794-4ac9-6bfe-1214c35e2f96@FreeBSD.org>
next in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr Content-Type: multipart/mixed; boundary="gakAD1xgRTRfXmIwnlDnW9IXLUcLQ7DU0"; protected-headers="v1" From: Christian Brueffer <brueffer@FreeBSD.org> To: trustedbsd-announce@freebsd.org, trustedbsd-audit@freebsd.org, freebsd-security@freebsd.org Message-ID: <b8cc9e4c-b794-4ac9-6bfe-1214c35e2f96@FreeBSD.org> Subject: OpenBSM 1.2 alpha 5 released --gakAD1xgRTRfXmIwnlDnW9IXLUcLQ7DU0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable I'm pleased to announce the availability of OpenBSM 1.2 alpha 5. This release contains the following changes: - Added a new "qsize" parameter in audit_control and the getacqsize(3) API to query it, allowing to set the kernel's maximum audit queue length. - Added support to push a mapping between audit event names and event numbers into the kernel (where supported) using new A_GETEVENT and A_SETEVENT auditon(2) operations. - Added audit event identifiers for a number of new (and not-so-new) FreeBSD system calls including those for asynchronous I/O, thread management, SCTP, jails, multi-FIB support, and misc. POSIX interfaces such as posix_fallocate(2) and posix_fadvise(2). - On operating systems supporting Capsicum, auditreduce(1) and praudit(1) now run sandboxed. - Empty "flags" and "naflags" fields are now permitted in audit_control(5). You can download OpenBSM releases and snapshots from the following places= : The OpenBSM project web page http://www.OpenBSM.org/ The OpenBSM GitHub repository https://github.com/openbsm/openbsm This test release is known to build and run (to varying degrees) on FreeBSD 10.x, 11.x, 12-CURRENT, Mac OS X Mavericks, Yosemite, El Capitan, and Ubuntu Linux 16.04 LTS. If you encounter a problem, please open an issue report on GitHub. Christian Brueffer --gakAD1xgRTRfXmIwnlDnW9IXLUcLQ7DU0-- --23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQJ8BAEBCgBmBQJYRrnaXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5QzhCQjQ5MDgzNDUwNjkyOUM5Mjg2NDE3 OEM4MzY5ODQ3RTE2NDg3AAoJEHjINphH4WSHQssP/iV2UVsHByR3eLv/ThYbMNuL clTz64SEQXsJFDBTDi4EvdUie0ylx+6PGXTjTsMb8avLk8DH05gTVCJmWfUx/BK8 4dkpt80yS/OFj48fYGuq50RKBGm57iSC2et7jcoUb0KlxPvYxEW1sKspcgh3hpjq 1MeYjhqW/Pc9bJsFH85/ah7KT0Zc4EAEs7VlgI78STwWY8uEzJ/MtrI+AYYT6RRb E3Ou4e85BEfo7SM7qdcZiX66H1HHeaX5QYg6OSwOB4zrej5M1TfYP4h2XeGt/Tvr qDKXbWljRl2M2XdrvAmphfCFpR7pPA/4okriLWPYBQgs4StUMKCyk8yjuFI/azGc w6lOrg/WSbeYIsI5JcJcn4FL/g7v2PrDYvdjyqS2387vY6UY159nKOHVzcA+YiKb 02VDjA4Wp0y6F3LZfl7zh/vR5lS8IB3kDx5jt/+HOx3AB8PotEOzKtfku+PNLGQs XUSs2vV+OiXvgqdbacQQamAyHSgY3DSbZ4PSmh7Myyl3Hh8furHcZ2fzoZLw099Z 231x7V5XUSSUTWBINh9hLRUCKhgeQmet2JSeaSXTXwCMLdz64EY++ntGLb8JOelx Ojwpa/ysnLJwwhbfNXGV+Awcj/gYcPwVd5rS+qqKjiYkGanAMtLF3lQcocXPIVFr iHO+H9x5bvfMB0BXr67z =Q6wl -----END PGP SIGNATURE----- --23af0Ig4OPjGQJSBTQXJSdmFLpDKvvAUr--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?b8cc9e4c-b794-4ac9-6bfe-1214c35e2f96>