blob: de4e5f3563c4cbdf37f752f96363cebfac987a14 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
|
#!/bin/bash
#
# Security level implementation...
# Writen by Vandoorselaere Yoann <yoann@mandrakesoft.com>
#
if [ -f /etc/security/msec/init-sh/lib.sh ]; then
. /etc/security/msec/init-sh/lib.sh
else
exit 1
fi
# All events logged on tty12
AddRules "*.* /dev/tty12" /etc/syslog.conf
# login as root from the console allowed
AddRules "tty1" /etc/securetty
AddRules "tty2" /etc/securetty
AddRules "tty3" /etc/securetty
AddRules "tty4" /etc/securetty
AddRules "tty5" /etc/securetty
AddRules "tty6" /etc/securetty
# Suid Check
AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf
AddRules "CHECK_SUID_GROUP=yes" /etc/security/msec/security.conf
AddRules "CHECK_WRITABLE=yes" /etc/security/msec/security.conf
AddRules "CHECK_UNOWNED=yes" /etc/security/msec/security.conf
AddRules "CHECK_PROMISC=no" /etc/security/msec/security.conf
AddRules "TTY_WARN=no" /etc/security/msec/security.conf
AddRules "SYSLOG_WARN=yes" /etc/security/msec/security.conf
# Crontab
AddRules "0 0-23 * * * root nice --adjustment=+19 /etc/security/msec/cron-sh/file_check.sh" /etc/crontab
# Permissions
AddRules "umask 022" /etc/profile
/sbin/lilo
# Path
if [ ${HAVE_X}==1 ]; then
AddRules "PATH=$PATH:/usr/X11R6/bin" /etc/profile
fi
|