diff options
Diffstat (limited to 'init-sh/level4.sh')
-rwxr-xr-x | init-sh/level4.sh | 66 |
1 files changed, 47 insertions, 19 deletions
diff --git a/init-sh/level4.sh b/init-sh/level4.sh index a255b35..c3e0e5e 100755 --- a/init-sh/level4.sh +++ b/init-sh/level4.sh @@ -14,51 +14,79 @@ else fi # Log in append only mode +echo -e "Changing attribute of /var/log/* to append only...\n" chattr +a /var/log/* # All events logged on tty12 +echo "Loging all messages on tty12 : " AddRules "*.* /dev/tty12" /etc/syslog.conf # Prevent all kind of connection except from localhost +echo "Denying all kind of connection except localhost : " AddRules "ALL:ALL EXCEPT localhost:DENY" /etc/hosts.deny # Login as root on the console allowed : -AddRules "tty1" /etc/securetty -AddRules "tty2" /etc/securetty -AddRules "tty3" /etc/securetty -AddRules "tty4" /etc/securetty -AddRules "tty5" /etc/securetty -AddRules "tty6" /etc/securetty +echo "Denying login as root (except on the console) :" +AddRules "tty1" /etc/securetty quiet +AddRules "tty2" /etc/securetty quiet +AddRules "tty3" /etc/securetty quiet +AddRules "tty4" /etc/securetty quiet +AddRules "tty5" /etc/securetty quiet +AddRules "tty6" /etc/securetty # Suid check -AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf -AddRules "CHECK_SUID_GROUP=yes" /etc/security/msec/security.conf -AddRules "CHECK_WRITABLE=yes" /etc/security/msec/security.conf -AddRules "CHECK_UNOWNED=yes" /etc/security/msec/security.conf -AddRules "CHECK_PROMISC=yes" /etc/security/msec/security.conf -AddRules "TTY_WARN=yes" /etc/security/msec/security.conf +echo "Updating file check variable : " +echo -e "\t- Check suid root file : yes." +AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf quiet +echo -e "\t- Check suid goup file : yes." +AddRules "CHECK_SUID_GROUP=yes" /etc/security/msec/security.conf quiet +echo -e "\t- Check world writable file : yes." +AddRules "CHECK_WRITABLE=yes" /etc/security/msec/security.conf quiet +echo -e "\t- Check unowned file : yes." +AddRules "CHECK_UNOWNED=yes" /etc/security/msec/security.conf quiet +echo -e "\t- Check promiscuous mode : yes." +AddRules "CHECK_PROMISC=yes" /etc/security/msec/security.conf quiet +echo -e "\t- Security warning on tty : \"yes\" :" +AddRules "TTY_WARN=yes" /etc/security/msec/security.conf quiet +echo -e "\t- Security warning in syslog : \"yes\" :" AddRules "SYSLOG_WARN=yes" /etc/security/msec/security.conf # Check every 1 minutes for promisc problem +echo "Adding promisc check in crontab (scheduled every minutes) :" AddRules "*/1 * * * * root nice --adjustment=+19 /etc/security/msec/cron-sh/promisc_check.sh" /etc/crontab + +echo "Adding permission check in crontab (scheduled every midnight) :" AddRules "0 0-23 * * * root nice --adjustment=+19 /etc/security/msec/cron-sh/file_check.sh" /etc/crontab # Do you want a password ? LiloUpdate; -/sbin/lilo +echo -n "Running lilo to record new config : " +/sbin/lilo >& /dev/null +echo -e "done.\n" # Server update +echo "Setting secure level variable to 4 :" AddRules "SECURE_LEVEL=4" /etc/profile export SECURE_LEVEL=4 +echo -n "Disabling all service, except : {" for service in `chkconfig --list | awk '{print $1}'`; do - chkconfig --del "${service}" - chkconfig --msec --add "${service}" + if grep -qx ${service} /etc/security/msec/init-sh/server.4; then + echo -n " ${service}" + fi done +echo " } : " -# Permissions -AddRules "umask 022" /etc/profile +for service in `chkconfig --list | awk '{print $1}'`; do + chkconfig --del "${service}" + if ! chkconfig --msec --add "${service}"; then + echo -e "\t- Services ${service} is now disabled." + fi +done +echo -e "done.\n"; -# Path +# /etc/profile +echo "Setting umask to 077 (user = rw) :" +AddRules "umask 077" /etc/profile +echo "Adding \"normal\" PATH variable :" AddRules "PATH=\$PATH:/usr/X11R6/bin" /etc/profile - |