summaryrefslogtreecommitdiffstats
path: root/perl-install/security/help.pm
blob: 9300126e0e42b142d7bfd1fed946a6e06afa6942 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
package security::help;
# !! THIS FILE WAS AUTO-GENERATED BY draksec_help.py !!
# !! DO NOT MODIFY HERE, MODIFY IN THE *MSEC* CVS !!

use strict;
use common;

our %help = (

'accept_bogus_error_responses' => N("Arguments: (arg)

Accept/Refuse bogus IPv4 error messages."),

'accept_broadcasted_icmp_echo' => N("Arguments: (arg)

 Accept/Refuse broadcasted icmp echo."),

'accept_icmp_echo' => N("Arguments: (arg)

 Accept/Refuse icmp echo."),

'allow_autologin' => N("Arguments: (arg)

Allow/Forbid autologin."),

'allow_issues' => N("Arguments: (arg)

If \fIarg\fP = ALL allow /etc/issue and /etc/issue.net to exist. If \fIarg\fP = NONE no issues are
allowed else only /etc/issue is allowed."),

'allow_reboot' => N("Arguments: (arg)

Allow/Forbid reboot by the console user."),

'allow_remote_root_login' => N("Arguments: (arg)

Allow/Forbid remote root login."),

'allow_root_login' => N("Arguments: (arg)

Allow/Forbid direct root login."),

'allow_user_list' => N("Arguments: (arg)

Allow/Forbid the list of users on the system on display managers (kdm and gdm)."),

'allow_x_connections' => N("Arguments: (arg, listen_tcp=None)

Allow/Forbid X connections. First arg specifies what is done
on the client side: ALL (all connections are allowed), LOCAL (only
local connection) and NONE (no connection)."),

'allow_xserver_to_listen' => N("Arguments: (arg)

The argument specifies if clients are authorized to connect
to the X server on the tcp port 6000 or not."),

'authorize_services' => N("Arguments: (arg)

Authorize all services controlled by tcp_wrappers (see hosts.deny(5)) if \fIarg\fP = ALL. Only local ones
if \fIarg\fP = LOCAL and none if \fIarg\fP = NONE. To authorize the services you need, use /etc/hosts.allow
(see hosts.allow(5))."),

'create_server_link' => N("Arguments: ()

If SERVER_LEVEL (or SECURE_LEVEL if absent) is greater than 3
in /etc/security/msec/security.conf, creates the symlink /etc/security/msec/server
to point to /etc/security/msec/server.<SERVER_LEVEL>. The /etc/security/msec/server
is used by chkconfig --add to decide to add a service if it is present in the file
during the installation of packages."),

'enable_at_crontab' => N("Arguments: (arg)

Enable/Disable crontab and at for users. Put allowed users in /etc/cron.allow and /etc/at.allow
(see man at(1) and crontab(1))."),

'enable_console_log' => N("Arguments: (arg, expr='*.*', dev='tty12')

Enable/Disable syslog reports to console 12. \fIexpr\fP is the
expression describing what to log (see syslog.conf(5) for more details) and
dev the device to report the log."),

'enable_dns_spoofing_protection' => N("Arguments: (arg, alert=1)

Enable/Disable name resolution spoofing protection.  If
\fIalert\fP is true, also reports to syslog."),

'enable_ip_spoofing_protection' => N("Arguments: (arg, alert=1)

Enable/Disable IP spoofing protection."),

'enable_libsafe' => N("Arguments: (arg)

Enable/Disable libsafe if libsafe is found on the system."),

'enable_log_strange_packets' => N("Arguments: (arg)

Enable/Disable the logging of IPv4 strange packets."),

'enable_msec_cron' => N("Arguments: (arg)

Enable/Disable msec hourly security check."),

'enable_pam_wheel_for_su' => N("Arguments: (arg)

 Enabling su only from members of the wheel group or allow su from any user."),

'enable_password' => N("Arguments: (arg)

Use password to authenticate users."),

'enable_promisc_check' => N("Arguments: (arg)

Activate/Disable ethernet cards promiscuity check."),

'enable_security_check' => N("Arguments: (arg)

 Activate/Disable daily security check."),

'enable_sulogin' => N("Arguments: (arg)

 Enable/Disable sulogin(8) in single user level."),

'no_password_aging_for' => N("Arguments: (name)

Add the name as an exception to the handling of password aging by msec."),

'password_aging' => N("Arguments: (max, inactive=-1)

Set password aging to \fImax\fP days and delay to change to \fIinactive\fP."),

'password_history' => N("Arguments: (arg)

Set the password history length to prevent password reuse."),

'password_length' => N("Arguments: (length, ndigits=0, nupper=0)

Set the password minimum length and minimum number of digit and minimum number of capitalized letters."),

'set_root_umask' => N("Arguments: (umask)

Set the root umask."),
CHECK_UNOWNED => N("if set to yes, report unowned files."),
CHECK_SHADOW => N("if set to yes, check empty password in /etc/shadow."),
CHECK_SUID_MD5 => N("if set to yes, verify checksum of the suid/sgid files."),
CHECK_SECURITY => N("if set to yes, run the daily security checks."),
CHECK_PASSWD => N("if set to yes, check for empty passwords, for no password in /etc/shadow and for users with the 0 id other than root."),
SYSLOG_WARN => N("if set to yes, report check result to syslog."),
CHECK_SUID_ROOT => N("if set to yes, check additions/removals of suid root files."),
CHECK_PERMS => N("if set to yes, check permissions of files in the users' home."),
CHKROOTKIT_CHECK => N("if set to yes, run chkrootkit checks."),
CHECK_PROMISC => N("if set to yes, check if the network devices are in promiscuous mode."),
RPM_CHECK => N("if set to yes, run some checks against the rpm database."),
TTY_WARN => N("if set to yes, reports check result to tty."),
CHECK_WRITABLE => N("if set to yes, check files/directories writable by everybody."),
MAIL_WARN => N("if set to yes, report check result by mail."),
MAIL_USER => N("if set, send the mail report to this email address else send it to root."),
CHECK_OPEN_PORT => N("if set to yes, check open ports."),
CHECK_SGID => N("if set to yes, check additions/removals of sgid files."),

'set_shell_history_size' => N("Arguments: (size)

Set shell commands history size. A value of -1 means unlimited."),

'set_shell_timeout' => N("Arguments: (val)

Set the shell timeout. A value of zero means no timeout."),

'set_user_umask' => N("Arguments: (umask)

Set the user umask."),
);