diff options
Diffstat (limited to 'init-sh/level0.sh')
-rwxr-xr-x | init-sh/level0.sh | 100 |
1 files changed, 0 insertions, 100 deletions
diff --git a/init-sh/level0.sh b/init-sh/level0.sh deleted file mode 100755 index b893546..0000000 --- a/init-sh/level0.sh +++ /dev/null @@ -1,100 +0,0 @@ -#!/bin/bash - -# -# Security level implementation... -# Writen by Vandoorselaere Yoann <yoann@mandrakesoft.com> -# - - -if [[ -f /usr/share/msec/lib.sh ]]; then - . /usr/share/msec/lib.sh -else - echo "Can't find /usr/share/msec/lib.sh, exiting." - exit 1 -fi - -# login as root on console granted... -echo "Login as root is granted :" -AddRules "tty1" /etc/securetty quiet -AddRules "tty2" /etc/securetty quiet -AddRules "tty3" /etc/securetty quiet -AddRules "tty4" /etc/securetty quiet -AddRules "tty5" /etc/securetty quiet -AddRules "tty6" /etc/securetty -AddRules "vc/1" /etc/securetty quiet -AddRules "vc/2" /etc/securetty quiet -AddRules "vc/3" /etc/securetty quiet -AddRules "vc/4" /etc/securetty quiet -AddRules "vc/5" /etc/securetty quiet -AddRules "vc/6" /etc/securetty - -# Security check -echo "Updating file check variable : " -echo -e "\t- Check security : no." - AddRules "CHECK_SECURITY=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check important permissions : no." - AddRules "CHECK_PERMS=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check suid root file : no." - AddRules "CHECK_SUID_ROOT=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check suid root file integrity (backdoor check) : no." - AddRules "CHECK_SUID_MD5=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check suid group file : no." - AddRules "CHECK_SUID_GROUP=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check world writable file : no." - AddRules "CHECK_WRITEABLE=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check unowned file : no." - AddRules "CHECK_UNOWNED=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check promiscuous mode : no." - AddRules "CHECK_PROMISC=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check listening port : no." - AddRules "CHECK_OPEN_PORT=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check passwd file integrity : no." - AddRules "CHECK_PASSWD=no" /etc/security/msec/security.conf quiet -echo -e "\t- Check shadow file integrity : no." - AddRules "CHECK_SHADOW=no" /etc/security/msec/security.conf quiet -echo -e "\t- Security warning on tty : no." - AddRules "TTY_WARN=no" /etc/security/msec/security.conf quiet -echo -e "\t- Security warning by mail : no." - AddRules "MAIL_WARN=no" /etc/security/msec/security.conf quiet -echo -e "\t- Security warning in syslog : no." - AddRules "SYSLOG_WARN=no" /etc/security/msec/security.conf -# end security check - -export SECURE_LEVEL=0 -echo "Setting secure level variable to 0 :" -AddRules "SECURE_LEVEL=0" /etc/sysconfig/msec - -echo "Setting umask to 022 (u=rw,g=r,o=r) :" -AddRules "UMASK_ROOT=022" /etc/sysconfig/msec -AddRules "UMASK_USER=022" /etc/sysconfig/msec - -# Xserver -echo "Allowing users to connect X server from everywhere :" -AddBegRules "/usr/X11R6/bin/xhost +" /etc/X11/xinit.d/msec quiet - -# Group -echo "Adding system users to specific groups :" -/usr/share/msec/grpuser.sh --refresh -echo -e "done.\n" - -# icmp echo -echo "Enabling icmp echo :" -AddRules "net.ipv4.icmp_echo_ignore_all=0" /etc/sysctl.conf -AddRules "net.ipv4.icmp_echo_ignore_broadcasts=0" /etc/sysctl.conf - -# bad error -echo "Disabling bad error message Protection :" -AddRules "net.ipv4.icmp_ignore_bogus_error_responses=0" /etc/sysctl.conf - -# log strange packets -echo "Disabling logging Spoofed Packets, Source Routed Packets, Redirect Packets :" -AddRules "net.ipv4.conf.all.log_martians=0" /etc/sysctl.conf - -LoadSysctl - -AllowAutologin - -# Boot on a shell / authorize ctrl-alt-del -AllowReboot -AllowUserList -RootSshLogin 0 |