File: README.Debian

package info (click to toggle)
tiger 2.2.4-22
  • links: PTS
  • area: main
  • in suites: woody
  • size: 2,188 kB
  • ctags: 240
  • sloc: sh: 8,388; ansic: 2,109; makefile: 141; perl: 106
file content (146 lines) | stat: -rw-r--r-- 6,127 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
tiger for Debian
----------------------

PLEASE NOTE:

Some of the checks do not apply to Debian system or are Debian default.
In some cases this might be Tiger's problem (of it being an old UNIX
auditing program) or it might be Debian's. If you feel a report is
not appropriate to your system discuss it in the
debian-security@lists.debian.org mailing list
Unless you think it's really a BUG of Tiger, then send a bug-report
for the package (using 'bug' or 'reportbug')

Changes in behavior:
--------------------

First of all make sure to read, understand and customize
/etc/tiger/tigerrc and /etc/tiger/cronrc to adapt to your local security
policy, as the warning on installation says "You cannot expect to tiger to work 
fully to your needs without adapting it". Bugs regarding false positives
which can be fixed by the proper configuration and/or use of templates (see below)
will be set to "wishlist", even if the bug submitter thinks they are
"serious".

All and all, Debian's Tiger works quite fine out-of-the box, even if there's
still room for improvement.

Using Templates
...............

Tiger in Debian can compare against "templates" when running through
a cron job. That is, you can take a given log from a previous run
(at /var/log/tiger) rename it with a ".template" instead of a ".[number]"
and place it under /etc/tiger/templates.
Tiger check will compare against it. That way tiger will only report issues
when they changed from the template (if configured in /etc/tiger/tigerrc).
NOTE: Previous to 2.2.4-20 templates could be placed in /var/log/tiger,
this behaviour is preserved but templates at /etc/tiger/ are used
first if available.

Another (less secure) method is to have tiger only report changes from previous
runs, please note that in this setup problems will only be reported *once*
in cron jobs, regardless of importance. This is the default behavior, that
is, this will (should, at least from version 2.2.4-22 and above)  work 
just after installation.

KNOWN ISSUES 
-------------
(these are *not* BUGS)

- shells on Debian default users. PENDING discussion on debian-security, in
any case it should check if the services are enabled (i.e. the user is useful
here). Maybe Debian policy could ask for ids in /etc/passwd disabled
with /dev/null as shell and enable them when services are installed? (CHANGE
script/check_accounts)


- Debian specific checks take quite some time to finish, I have changed the
Cron job to do this only once in a day, and you can optimize the check by
changing the $Tiger_DPKG_Optimize variable in /etc/tiger. In any case
finding packages in Debian takes quite some time... (due to the *very*
large package list)

Known BUGS in Debian systems:
----------------------------
(please check bugs.debian.org/tiger also)

- Debian's /etc/services definition leads to false positives due
to ports being repeated in there. In order to remove them see
the "Using templates" above. This cannot be completely fixed without
extensive revision of the check_services file ("the a3fs vs ircd bug").

- signature files are replaced with installed md5sums in /var/lib/
Tiger could be distributed with predefined signatures (BTW, signatures 
should depend on distribution and not on kernel, oh well...)

- tiger does not seem to look for CRACK before doing password testing
(this package should Depend: on some password cracker, but note that
the 'john' package already can do password testing run by cron). The
test is disabled from cronrc but it will still give some erros when
the full report is run (using 'tiger')

- incorrect reports for /etc/cron.hourly (does not exist)

- should not check /proc dir when checking for tests (this is a virtual dir)

TODO
----

- Possible new checks:
  . check all files and see if they are of the same user/group as their root dir
  . look for files with no uid in /etc/passwd and gid in /etc/group

- The Debian security group could update signature files for binaries which
are in the Debian stable release and have been found vulnerable (packages
in stable-updates) so that tiger can (if not online) check a Debian system
and tell the administrator he *must* upgrade them from security.debian.org
For an example look at information on doc/signatures. Tigexp is very useful
here and could be very informative.


TESTING
-------

  . Check for files not in /usr/local and /home 
    not owned by any package (easy with dpkg -S) (Note: Currently looks only
    in binary paths /bin /usr/bin... not in all the filesystem)
  . Check for md5sums of files installed by packages by looking into
   /var/lib/dpkg/info/*md5sums. The check currently does not include
   /usr/share/doc. Should it check /usr/share/locale, and /etc or should they
   be removed too?
   BTW, I coded it after knowing about debsums which seems to run a bit faster.
   (maybe debsums code should be included here or used if it exists)
   . users in Debian are assigned to a group and are umask 022 by default
   (should not warn due to some files in home having group read if no other
   user is in the group). CHANGED script/check_accounts

DONE
----

  . Check for open TCP/IP sockets and warn when user running the socket is
    not root, otherwise inform on open sockets. Works with lsof and netstat
    (since its not Debian specific it has been renamed to deb_)
  . Check of security advisories taken from the WWW webml sources. The
  package version is checked against the one in the advisory. Some checks are
  very redundant since users should not have packages older than the released
  ones, oh well...
  . Understand Linux NFS exports file





Known FIXED BUGS:
----------------
- md5.c is corrupted by default the tiger binaries will not be recompiled
each time (BTW, IMHO this is not a good idea anyway). Fetched original sources
and replaced them. 

- rhosts # accepted (FIXED scripts/check_rhosts)

- Tiger now understands and will not give false warnings when "localepurge" has 
been installed and a lot of files removed (FIXED scripts/Linux/2/deb_checkmd5sums)

 -- Javier Fernandez-Sanguino Pea <jfs@computer.org>, Wed, 27 Mar 2002 19:00:39 +0100