summaryrefslogtreecommitdiffstats
path: root/perl-install/security/help.pm
blob: a3b7f940e3bb863119bbeb1fd0797285da1b0fc3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
package security::help;
# This help was forked from msec internal function descriptions
# They were then reworked in order to be targeted for end users, not msec developpers


use strict;
use common;

our %help = (

'accept_bogus_error_responses' => N("Accept/Refuse bogus IPv4 error messages."),

'accept_broadcasted_icmp_echo' => N(" Accept/Refuse broadcasted icmp echo."),

'accept_icmp_echo' => N(" Accept/Refuse icmp echo."),

'allow_autologin' => N("Allow/Forbid autologin."),

'allow_issues' => N("If set to \"ALL\", /etc/issue and /etc/issue.net are allowed to exist.
If set to NONE, no issues are allowed.
Else only /etc/issue is allowed."),

'allow_reboot' => N("Allow/Forbid reboot by the console user."),

'allow_remote_root_login' => N("Allow/Forbid remote root login."),

'allow_root_login' => N("Allow/Forbid direct root login."),

'allow_user_list' => N("Allow/Forbid the list of users on the system on display managers (kdm and gdm)."),

'allow_x_connections' => N("Allow/Forbid X connections. First arg specifies what is done
on the client side: ALL (all connections are allowed), LOCAL (only
local connection) and NONE (no connection)."),

'allow_xserver_to_listen' => N("The argument specifies if clients are authorized to connect
to the X server on the tcp port 6000 or not."),

'authorize_services' => N("Authorize:

- all services controlled by tcp_wrappers (see hosts.deny(5) man page) if set to \"ALL\",

- only local ones if set to \"LOCAL\"

- none if set to \"NONE\".

To authorize the services you need, use /etc/hosts.allow (see hosts.allow(5))."),

'create_server_link' => N("If SERVER_LEVEL (or SECURE_LEVEL if absent) is greater than 3
in /etc/security/msec/security.conf, creates the symlink /etc/security/msec/server
to point to /etc/security/msec/server.<SERVER_LEVEL>. The /etc/security/msec/server
is used by chkconfig --add to decide to add a service if it is present in the file
during the installation of packages."),

'enable_at_crontab' => N("Enable/Disable crontab and at for users. Put allowed users in /etc/cron.allow and /etc/at.allow
(see man at(1) and crontab(1))."),

'enable_console_log' => N("Enable/Disable syslog reports to console 12. \"expr\" is the
expression describing what to log (see syslog.conf(5) for more details) and
dev the device to report the log."),

'enable_dns_spoofing_protection' => N("Enable/Disable name resolution spoofing protection.  If
\"alert\" is true, also reports to syslog."),

'enable_ip_spoofing_protection' => N("Enable/Disable IP spoofing protection."),

'enable_libsafe' => N("Enable/Disable libsafe if libsafe is found on the system."),

'enable_log_strange_packets' => N("Enable/Disable the logging of IPv4 strange packets."),

'enable_msec_cron' => N("Enable/Disable msec hourly security check."),

'enable_pam_wheel_for_su' => N(" Enabling su only from members of the wheel group or allow su from any user."),

'enable_password' => N("Use password to authenticate users."),

'enable_promisc_check' => N("Activate/Disable ethernet cards promiscuity check."),

'enable_security_check' => N(" Activate/Disable daily security check."),

'enable_sulogin' => N(" Enable/Disable sulogin(8) in single user level."),

'no_password_aging_for' => N("Add the name as an exception to the handling of password aging by msec."),

'password_aging' => N("Set password aging to \"max\" days and delay to change to \"inactive\"."),

'password_history' => N("Set the password history length to prevent password reuse."),

'password_length' => N("Set the password minimum length and minimum number of digit and minimum number of capitalized letters."),

'set_root_umask' => N("Set the root umask."),
CHECK_UNOWNED => N("if set to yes, report unowned files."),
CHECK_SHADOW => N("if set to yes, check empty password in /etc/shadow."),
CHECK_SUID_MD5 => N("if set to yes, verify checksum of the suid/sgid files."),
CHECK_SECURITY => N("if set to yes, run the daily security checks."),
CHECK_PASSWD => N("if set to yes, check for empty passwords, for no password in /etc/shadow and for users with the 0 id other than root."),
SYSLOG_WARN => N("if set to yes, report check result to syslog."),
CHECK_SUID_ROOT => N("if set to yes, check additions/removals of suid root files."),
CHECK_PERMS => N("if set to yes, check permissions of files in the users' home."),
CHKROOTKIT_CHECK => N("if set to yes, run chkrootkit checks."),
CHECK_PROMISC => N("if set to yes, check if the network devices are in promiscuous mode."),
RPM_CHECK => N("if set to yes, run some checks against the rpm database."),
TTY_WARN => N("if set to yes, reports check result to tty."),
CHECK_WRITABLE => N("if set to yes, check files/directories writable by everybody."),
MAIL_WARN => N("if set to yes, report check result by mail."),
MAIL_USER => N("if set, send the mail report to this email address else send it to root."),
CHECK_OPEN_PORT => N("if set to yes, check open ports."),
CHECK_SGID => N("if set to yes, check additions/removals of sgid files."),

'set_shell_history_size' => N("Set shell commands history size. A value of -1 means unlimited."),

'set_shell_timeout' => N("Set the shell timeout. A value of zero means no timeout."),

'set_user_umask' => N("Set the user umask."),
);