summary: Empty addr parameter to audit logging function should cause to bypass reverse dns lookup. description: | Test Name: dns-reverse-lookup Author: Eduard Benes Location: /CoreOS/audit/Sanity/dns-reverse-lookup Short Description: Empty addr parameter to audit logging function should cause to bypass reverse dns lookup. Long Description: If the addr parameter being passed to an audit logging function (such as audit_log_user_message) is "", it should bypass a reverse dns lookup. This can be verified by stracing this program: #include int main(void) { int fd = audit_open(); audit_log_user_message(fd, AUDIT_USER_AUTH, "", NULL, "", NULL, 1); return 0; } Stracing this program will give much more than ~40 lines of output if dns reverse lookup has been performed. Number around 40 is acceptable. contact: omoris@redhat.com component: - audit test: ./runtest.sh recommend: - audit - audit-libs - audit-libs-devel - strace - gcc duration: 5m enabled: true tag: - CI-Tier-1 - NoRHEL3 - NoRHEL4 - Tier1 - Tier1security tier: '1' adjust: - enabled: false when: distro != rhel-6 and distro != rhel-7 continue: false extra-nitrate: TC#0075628 extra-summary: /CoreOS/audit/Sanity/dns-reverse-lookup extra-task: /CoreOS/audit/Sanity/dns-reverse-lookup