-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Le Samedi 17 Ao�t 2002 22:18, Levi Ramsey a �crit :
> On Sat Aug 17 12:22 -0700, Ben Reser wrote:
> > My guess is that msec actually removed the suid group flag. Are the
> > files still on your system? No matter what msec probably ought to be
> > clarified...
>
> Could we please have real msec documentation for 9.0? At least
> man-pages describing the various configuration options and the formats
> of the configuration files (or, barring that, config files with
> comments, much like apache).
I found the mseclib man page, which describe this and used it to create a
sample /etc/security/msec.local file.
I attach it as a proposal.
> msec is one of the critical parts of a Mandrake system, especially since
> it performs system altering maintenance. To leave a user-space utility
> of its importance undocumented is unforgivable, imho.
It was not undocumented, just a little hard to find.
CU
CPHIL
- --
Le juge pensait impassible "qu'on me prenne pour une guenon,
c'est compl�tement impossible" la suite lui prouva que non.
-- Georges Brassens "Le gorille"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE9XxkoYJwqltj/jHgRAgkAAJ9HRGkgbQ6CJQ+G6mN2v3fG+/GVkQCgw2Vh
ZQ3zWHLXqZX8/ymOm5c2VBQ=
=XqdE
-----END PGP SIGNATURE-----
# DESCRIPTION
# mseclib is a python library to access the function used by the msec
# program. This functions can be used in /etc/security/msec/level.local
# to override the behaviour of the msec program or in standalone scripts.
# The first argument of the functions takes a value of 1 or 0 or -1 (or
# yes/no/ignore) except when specified otherwise.
# IMPORTANT NOTE : Values showed in this file DO NOT reflect default values
# of your system as these values are controlled by your msec level.
# Value proposed are just a guess of what you may want by editing this file.
from mseclib import *
# Accept/Refuse bogus IPv4 error messages.
# accept_bogus_error_responses('no')
# Accept/Refuse broadcasted icmp echo.
# accept_broadcasted_icmp_echo('no')
# Accept/Refuse icmp echo.
# accept_icmp_echo('no')
# Allow/Forbid autologin.
# allow_autologin('no')
# If arg = ALL allow /etc/issue and /etc/issue.net to exist. If arg =
# NONE no issues are allowed else only /etc/issue is allowed.
# allow_issues('ALL')
# Allow/Forbid reboot by the console user.
# allow_reboot('no')
# Allow/Forbid remote root login.
# allow_remote_root_login('no')
# Allow/Forbid direct root login.
# allow_root_login('yes')
# Allow/Forbid the list of users on the system on display managers
# (kdm and gdm).
# allow_user_list('no')
# Allow/Forbid X connections. First arg specifies what is done on the
# client side: ALL (all connections are allowed), LOCAL (only local
# connection) and NONE (no connection).
# second argument is "listen_tcp"
# allow_x_connections(local, None)
# he argument specifies if clients are authorized to connect to the X
# server on the tcp port 6000 or not.
# allow_xserver_to_listen('yes')
# Authorize all services controlled by tcp_wrappers (see
# hosts.deny(5)) if arg = ALL. Only local ones if arg = LOCAL and
# none if arg = NONE. To authorize the services you need, use
# /etc/hosts.allow (see hosts.allow(5)).
# authorize_services(local)
# If SERVER_LEVEL (or SECURE_LEVEL if absent) is greater than 3 in
# /etc/security/msec/security.conf, creates the symlink /etc/secu-
# rity/msec/server to point to /etc/secu-
# rity/msec/server.<SERVER_LEVEL>. The /etc/security/msec/server is
# used by chkconfig --add to decide to add a service if it is present
# in the file during the installation of packages.
# create_server_link('yes')
# Enable/Disable crontab and at for users. Put allowed users in
# /etc/cron.allow and /etc/at.allow (see man at(1) and crontab(1)).
# enable_at_crontab('yes')
# Enable/Disable syslog reports to console 12. expr is the expression
# describing what to log (see syslog.conf(5) for more details) and
# dev the device to report the log.
# enable_console_log(arg, expr='*.*', dev='tty12')
# enable_console_log('yes', '*.*','tty12')
# Enable/Disable name resolution spoofing protection. If alert is
# true, also reports to syslog.
# enable_dns_spoofing_protection(arg, alert=1)
# enable_dns_spoofing_protection('yes', 1)
# Enable/Disable libsafe if libsafe is found on the system.
# enable_libsafe('yes')
# Enable/Disable the logging of IPv4 strange packets.
# enable_log_strange_packets('yes')
# Enable/Disable msec hourly security check.
# enable_msec_cron('yes')
# Enabling su only from members of the wheel group or allow su from
# any user.
# enable_pam_wheel_for_su('no')
# Use password to authenticate users.
# enable_password('yes')
# Activate/Disable ethernet cards promiscuity check.
# enable_promisc_check('yes')
# Activate/Disable daily security check.
# enable_security_check('yes')
# Enable/Disable sulogin(8) in single user level.
# enable_sulogin('yes')
# Add the name as an exception to the handling of password aging by
# msec.
# no_password_aging_for(nobody)
# Set password aging to max days and delay to change to inactive.
# password_aging(max, inactive=-1)
# password_aging(60, -1)
# Set the password history length to prevent password reuse.
# password_history('yes')
# Set the password minimum length and minimum number of digit and
# minimum number of capitalized letters.
# password_length(length, ndigits=0, nupper=0)
# password_length(8, 0, 0)
# Set the root umask.
# set_root_umask(077)
# Set the variable var to the value value in /var/lib/msec/secu-
# rity.conf. The best way to override the default setting is to use
# create /etc/security/msec/security.conf with the value you want.
# set_security_conf(var, value)
# CHECK_UNOWNED if set to yes, report unowned files.
# set_security_conf(CHECK_UNOWNED, 'yes')
# CHECK_SHADOW if set to yes, check empty password in /etc/shadow.
# set_security_conf(CHECK_SHADOW, 'yes')
#
# CHECK_SUID_MD5 if set to yes, verify checksum of the suid/sgid
# files.
# set_security_conf(CHECK_SUID_MD5, 'yes')
#
# CHECK_SECURITY if set to yes, run the daily security checks.
# set_security_conf(CHECK_SECURITY, 'yes')
#
# CHECK_PASSWD if set to yes, check for empty password, or a password
# while it should be in /etc/shadow or other users with id 0.
# set_security_conf(CHECK_PASSWD, 'yes')
#
# SYSLOG_WARN if set to yes, report check result to syslog.
# set_security_conf(SYSLOG_WARN, 'yes')
#
# CHECK_SUID_ROOT if set to yes, check additions/removals of suid
# root files.
# set_security_conf(CHECK_SUID_ROOT, 'yes')
# CHECK_PERMS if set to yes, check permissions of files in the users'
# home.
# set_security_conf(CHECK_PERMS, 'yes')
#
# CHKROOTKIT_CHECK if set to yes, run chkrootkit checks.
# set_security_conf(CHKROOTKIT_CHECK, 'yes')
#
# CHECK_PROMISC if set to yes, check if the network devices are in
# promiscuous mode.
# set_security_conf(CHECK_PROMISC, 'yes')
#
# RPM_CHECK if set to yes, run some checks against the rpm database.
# set_security_conf(RPM_CHECK, 'yes')
#
# TTY_WARN if set to yes, reports check result to tty.
# set_security_conf(TTY_WARN, 'yes')
#
# CHECK_WRITEABLE if set to yes, check files/directories writable by
# everybody.
# set_security_conf(CHECK_WRITEABLE, 'yes')
#
# MAIL_WARN if set to yes, report check result by mail.
# set_security_conf(MAIL_WARN, 'yes')
#
# MAIL_USER if set, send the mail report to this email address else
# send it to root.
# set_security_conf(MAIL_USER, 'not_root')
#
# CHECK_OPEN_PORT if set to yes, check open ports.
# set_security_conf(CHECK_OPEN_PORT, 'yes')
# CHECK_SUID_GROUP if set to yes, check additions/removals of sgid
# files.
# set_security_conf(CHECK_SUID_GROUP, 'yes')
# Set shell commands history size. A value of -1 means unlimited.
# set_shell_history_size(1000)
# Set the shell timeout. A value of zero means no timeout.
# set_shell_timeout(1200)
# Set the user umask.
# set_user_umask(022)