aboutsummaryrefslogtreecommitdiffstats
path: root/init-sh/level4.sh
diff options
context:
space:
mode:
Diffstat (limited to 'init-sh/level4.sh')
-rwxr-xr-xinit-sh/level4.sh66
1 files changed, 47 insertions, 19 deletions
diff --git a/init-sh/level4.sh b/init-sh/level4.sh
index a255b35..c3e0e5e 100755
--- a/init-sh/level4.sh
+++ b/init-sh/level4.sh
@@ -14,51 +14,79 @@ else
fi
# Log in append only mode
+echo -e "Changing attribute of /var/log/* to append only...\n"
chattr +a /var/log/*
# All events logged on tty12
+echo "Loging all messages on tty12 : "
AddRules "*.* /dev/tty12" /etc/syslog.conf
# Prevent all kind of connection except from localhost
+echo "Denying all kind of connection except localhost : "
AddRules "ALL:ALL EXCEPT localhost:DENY" /etc/hosts.deny
# Login as root on the console allowed :
-AddRules "tty1" /etc/securetty
-AddRules "tty2" /etc/securetty
-AddRules "tty3" /etc/securetty
-AddRules "tty4" /etc/securetty
-AddRules "tty5" /etc/securetty
-AddRules "tty6" /etc/securetty
+echo "Denying login as root (except on the console) :"
+AddRules "tty1" /etc/securetty quiet
+AddRules "tty2" /etc/securetty quiet
+AddRules "tty3" /etc/securetty quiet
+AddRules "tty4" /etc/securetty quiet
+AddRules "tty5" /etc/securetty quiet
+AddRules "tty6" /etc/securetty
# Suid check
-AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf
-AddRules "CHECK_SUID_GROUP=yes" /etc/security/msec/security.conf
-AddRules "CHECK_WRITABLE=yes" /etc/security/msec/security.conf
-AddRules "CHECK_UNOWNED=yes" /etc/security/msec/security.conf
-AddRules "CHECK_PROMISC=yes" /etc/security/msec/security.conf
-AddRules "TTY_WARN=yes" /etc/security/msec/security.conf
+echo "Updating file check variable : "
+echo -e "\t- Check suid root file : yes."
+AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf quiet
+echo -e "\t- Check suid goup file : yes."
+AddRules "CHECK_SUID_GROUP=yes" /etc/security/msec/security.conf quiet
+echo -e "\t- Check world writable file : yes."
+AddRules "CHECK_WRITABLE=yes" /etc/security/msec/security.conf quiet
+echo -e "\t- Check unowned file : yes."
+AddRules "CHECK_UNOWNED=yes" /etc/security/msec/security.conf quiet
+echo -e "\t- Check promiscuous mode : yes."
+AddRules "CHECK_PROMISC=yes" /etc/security/msec/security.conf quiet
+echo -e "\t- Security warning on tty : \"yes\" :"
+AddRules "TTY_WARN=yes" /etc/security/msec/security.conf quiet
+echo -e "\t- Security warning in syslog : \"yes\" :"
AddRules "SYSLOG_WARN=yes" /etc/security/msec/security.conf
# Check every 1 minutes for promisc problem
+echo "Adding promisc check in crontab (scheduled every minutes) :"
AddRules "*/1 * * * * root nice --adjustment=+19 /etc/security/msec/cron-sh/promisc_check.sh" /etc/crontab
+
+echo "Adding permission check in crontab (scheduled every midnight) :"
AddRules "0 0-23 * * * root nice --adjustment=+19 /etc/security/msec/cron-sh/file_check.sh" /etc/crontab
# Do you want a password ?
LiloUpdate;
-/sbin/lilo
+echo -n "Running lilo to record new config : "
+/sbin/lilo >& /dev/null
+echo -e "done.\n"
# Server update
+echo "Setting secure level variable to 4 :"
AddRules "SECURE_LEVEL=4" /etc/profile
export SECURE_LEVEL=4
+echo -n "Disabling all service, except : {"
for service in `chkconfig --list | awk '{print $1}'`; do
- chkconfig --del "${service}"
- chkconfig --msec --add "${service}"
+ if grep -qx ${service} /etc/security/msec/init-sh/server.4; then
+ echo -n " ${service}"
+ fi
done
+echo " } : "
-# Permissions
-AddRules "umask 022" /etc/profile
+for service in `chkconfig --list | awk '{print $1}'`; do
+ chkconfig --del "${service}"
+ if ! chkconfig --msec --add "${service}"; then
+ echo -e "\t- Services ${service} is now disabled."
+ fi
+done
+echo -e "done.\n";
-# Path
+# /etc/profile
+echo "Setting umask to 077 (user = rw) :"
+AddRules "umask 077" /etc/profile
+echo "Adding \"normal\" PATH variable :"
AddRules "PATH=\$PATH:/usr/X11R6/bin" /etc/profile
-