What should go into a security-checking shell script?
Jon Zeeff
zeeff at b-tech.ann-arbor.mi.us
Sat Oct 28 04:00:10 AEST 1989
> - Compare checksums of all vendor-supplied executables
> with known-correct checksums.
> - Use find(1) to search the disks for set-uid
> and set-gid executables as well as special
> devices (since they can only be made by root).
> - Validate the permissions of all important
> configuration files (/etc/passwd, /etc/group,
> /etc/{tty,ini}tab, UUCP L.sys/Systems files,
> etc).
I have a couple of small programs that do this if anyone is interested.
--
Branch Technology <zeeff at b-tech.ann-arbor.mi.us>
More information about the Comp.unix.wizards
mailing list