From owner-soc-status@freebsd.org Fri Jul 31 18:35:49 2020 Return-Path: Delivered-To: soc-status@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F229E37F71E for ; Fri, 31 Jul 2020 18:35:49 +0000 (UTC) (envelope-from shivankgarg98@gmail.com) Received: from mail-ed1-f54.google.com (mail-ed1-f54.google.com [209.85.208.54]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BJGF114npz3Yrw; Fri, 31 Jul 2020 18:35:49 +0000 (UTC) (envelope-from shivankgarg98@gmail.com) Received: by mail-ed1-f54.google.com with SMTP id c15so13333391edj.3; Fri, 31 Jul 2020 11:35:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=nCcbe8SacoLsTt1+ZMAW328bFXN1K8dfYCODdKhlPiQ=; b=giff5aGhd4zWVm8Bal4ZvJJHDWS8GoYYTPx+k2p72TB06wdpwiRI4cpNtLHWO9uhJ5 p17a1gdveYWb0TPlk6KYTuddbfyfTyxx+xSQDkBSHbx2CDvqO7mk4S4IwEgjDi/QwhY7 m12tQMX0UHWxucabqiJZnJPVi/kx8FPmHuObVhK2qcRY8osVJ5yAxzjtxZUrWVv+h8wD Y8XYQs7+xjXRFaUNSxUWI9QqYQy2QKsiGDpYcnTb2S6deFtUQosy+UdwlKqdmR1zMP6j vs1EY/bTT0owvUgxK4kLPLXqrpsyiRIGBLVy7oIGCZajSA2e15YTR/F+JUnm7LQnX/s+ kBUw== X-Gm-Message-State: AOAM53109G4GvMeFr2/6vr2dZxzeuZJXxZSkLZb9ajEwS/79vQTy7n4I N02Zd8+WnEWOjm/Iqf1xoTEY8ggf1m0= X-Google-Smtp-Source: ABdhPJzc7aRzOP6OqKkv6QmqkLoexr/+Azm1+cF+hCXacr4jAywRCPmraDHjhidNOilj5IUFCbysvw== X-Received: by 2002:aa7:d1cc:: with SMTP id g12mr5272820edp.385.1596220547564; Fri, 31 Jul 2020 11:35:47 -0700 (PDT) Received: from mail-ed1-f52.google.com (mail-ed1-f52.google.com. [209.85.208.52]) by smtp.gmail.com with ESMTPSA id v21sm1917236ejx.26.2020.07.31.11.35.47 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 31 Jul 2020 11:35:47 -0700 (PDT) Received: by mail-ed1-f52.google.com with SMTP id q4so19784840edv.13; Fri, 31 Jul 2020 11:35:47 -0700 (PDT) X-Received: by 2002:aa7:d84d:: with SMTP id f13mr4941367eds.155.1596220547030; Fri, 31 Jul 2020 11:35:47 -0700 (PDT) MIME-Version: 1.0 From: Shivank Garg Date: Sat, 1 Aug 2020 00:05:31 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: [GSoC'20 Weekly Update] Adding audit(4) support to NFS To: soc-status@freebsd.org Cc: Alan Somers X-Rspamd-Queue-Id: 4BJGF114npz3Yrw X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of shivankgarg98@gmail.com designates 209.85.208.54 as permitted sender) smtp.mailfrom=shivankgarg98@gmail.com X-Spamd-Result: default: False [-1.60 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-0.40)[-0.402]; RCVD_COUNT_THREE(0.00)[4]; NEURAL_HAM_MEDIUM(-0.89)[-0.886]; NEURAL_HAM_SHORT(-0.31)[-0.312]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[209.85.208.54:from]; FORGED_SENDER(0.30)[shivank@freebsd.org,shivankgarg98@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.208.54:from]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[shivank@freebsd.org,shivankgarg98@gmail.com]; FREEMAIL_ENVFROM(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: soc-status@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Summer of Code Status Reports and Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Jul 2020 18:35:50 -0000 Hi, This project aims to add audit(4) support to NFS, which will allow auditd(8) to just run on the NFS server and audit all activities within the NFS network. Audit works mostly on the syscall level and NFS is implemented within the kernel, which means the NFS RPCs don't generate any audit records on the server. Note that audit(4) can still be used on the NFS network but auditd(8) must run on every NFS client. This week I made the following progress: * make the TestSuite and /sys code ready for review. * Created a diff revision on phabricator for NFSv3 /sys code - https://reviews.freebsd.org/D25869 * Followed up on the suggested changes. Currently, I'm: * Fixing the AUDIT_NFSARG_UPATH1 to avoid unlocking/relocking of vnode for locked vnode, as it may cause problems. * Reading the NFSv4 code and RFC for the adding audit support to it. Please, do Check this project on Github: https://github.com/shivankgarg98/freebsd/tree/user/shivank/nfs_audit Project wiki: https://wiki.freebsd.org/SummerOfCode2020Projects/AddAuditSupportToNFS TestSuite: https://github.com/shivankgarg98/NFSAuditTestSuite Please feel free to share your ideas and feedback on this project. Best Regards, Shivank Garg