diff options
author | Frederic Lepied <flepied@mandriva.com> | 2005-11-21 10:21:35 +0000 |
---|---|---|
committer | Frederic Lepied <flepied@mandriva.com> | 2005-11-21 10:21:35 +0000 |
commit | a5b572c4a4e73bc0b369c20c9cdf7b2f5804b8ea (patch) | |
tree | c034eff966c53778d419a8a92a594a63f61c5650 /init-sh/level2.sh | |
parent | d54dc7df63f32c3353fef943c32e67c6958512af (diff) | |
download | msec-a5b572c4a4e73bc0b369c20c9cdf7b2f5804b8ea.tar msec-a5b572c4a4e73bc0b369c20c9cdf7b2f5804b8ea.tar.gz msec-a5b572c4a4e73bc0b369c20c9cdf7b2f5804b8ea.tar.bz2 msec-a5b572c4a4e73bc0b369c20c9cdf7b2f5804b8ea.tar.xz msec-a5b572c4a4e73bc0b369c20c9cdf7b2f5804b8ea.zip |
no longer needed (since the switch to python)
Diffstat (limited to 'init-sh/level2.sh')
-rwxr-xr-x | init-sh/level2.sh | 102 |
1 files changed, 0 insertions, 102 deletions
diff --git a/init-sh/level2.sh b/init-sh/level2.sh deleted file mode 100755 index 8a82518..0000000 --- a/init-sh/level2.sh +++ /dev/null @@ -1,102 +0,0 @@ -#!/bin/bash - -# -# Security level implementation... -# Writen by Vandoorselaere Yoann <yoann@mandrakesoft.com> -# - - - -if [[ -f /usr/share/msec/lib.sh ]]; then - . /usr/share/msec/lib.sh -else - echo "Can't find /usr/share/msec/lib.sh, exiting." - exit 1 -fi - -# login as root on console granted... -echo "Login as root is granted :" -AddRules "tty1" /etc/securetty quiet -AddRules "tty2" /etc/securetty quiet -AddRules "tty3" /etc/securetty quiet -AddRules "tty4" /etc/securetty quiet -AddRules "tty5" /etc/securetty quiet -AddRules "tty6" /etc/securetty -AddRules "vc/1" /etc/securetty quiet -AddRules "vc/2" /etc/securetty quiet -AddRules "vc/3" /etc/securetty quiet -AddRules "vc/4" /etc/securetty quiet -AddRules "vc/5" /etc/securetty quiet -AddRules "vc/6" /etc/securetty - -# Security check -echo "Updating file check variable : " -echo -e "\t- Check security : yes." - AddRules "CHECK_SECURITY=yes" /etc/security/msec/security.conf quiet -echo -e "\t- Check important permissions : no." - AddRules "CHECK_PERMS=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check suid root file : yes." - AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf quiet -echo -e "\t- Check suid root file integrity (backdoor check) : yes." - AddRules "CHECK_SUID_MD5=yes" /etc/security/msec/security.conf quiet -echo -e "\t- Check suid group file : yes." - AddRules "CHECK_SUID_GROUP=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check world writable file : yes." - AddRules "CHECK_WRITEABLE=yes" /etc/security/msec/security.conf quiet -echo -e "\t- Check unowned file : no." - AddRules "CHECK_UNOWNED=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check promiscuous mode : no." - AddRules "CHECK_PROMISC=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check listening port : no." - AddRules "CHECK_OPEN_PORT=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check passwd file integrity : no." - AddRules "CHECK_PASSWD=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check shadow file integrity : no." - AddRules "CHECK_SHADOW=no" /etc/security/msec/security.conf quiet -echo -e "\t- Security warning on tty : no." - AddRules "TTY_WARN=no" /etc/security/msec/security.conf quiet -echo -e "\t- Security warning by mail : no." - AddRules "MAIL_WARN=no" /etc/security/msec/security.conf quiet -echo -e "\t- Security warning in syslog : yes." - AddRules "SYSLOG_WARN=yes" /etc/security/msec/security.conf -# end security check - -export SECURE_LEVEL=2 -echo "Setting secure level variable to 2 :" -AddRules "SECURE_LEVEL=2" /etc/sysconfig/msec - -echo "Setting umask to 022 (u=rw,g=r,o=r) :" -AddRules "UMASK_ROOT=022" /etc/sysconfig/msec -AddRules "UMASK_USER=022" /etc/sysconfig/msec - -# Xserver -echo "Allowing users to connect X server from localhost :" -AddBegRules "/usr/X11R6/bin/xhost + localhost" /etc/X11/xinit.d/msec - -# group -echo "Adding system users to specifics groups :" -/usr/share/msec/grpuser.sh --refresh -grpconv -echo -e "done.\n" - -# icmp echo -echo "Enabling icmp echo :" -AddRules "net.ipv4.icmp_echo_ignore_all=0" /etc/sysctl.conf -AddRules "net.ipv4.icmp_echo_ignore_broadcasts=0" /etc/sysctl.conf - -# bad error -echo "Disabling bad error message Protection :" -AddRules "net.ipv4.icmp_ignore_bogus_error_responses=0" /etc/sysctl.conf - -# log strange packets -echo "Disabling logging Spoofed Packets, Source Routed Packets, Redirect Packets :" -AddRules "net.ipv4.conf.all.log_martians=0" /etc/sysctl.conf - -LoadSysctl - -AllowAutologin - -# Do not boot on a shell -AllowReboot -AllowUserList -RootSshLogin 2 |