Voici la résultat de trois logicieles
sudo rkhunter --checkall --report-warnings-only
Warning: The file properties have changed:
File: /usr/bin/last
Current hash: b278e69e86979d2293bbdb7049fa4b4fdc7c6c17
Stored hash : 5c5ada03d31a54736ad5a4acfa6c8a0a6aa0ecc3
Current inode: 5382858 Stored inode: 5374402
Current size: 17964 Stored size: 17960
Current file modification time: 1323931247 (15-déc.-2011 07:40:47)
Stored file modification time : 1310620283 (14-juil.-2011 07:11:23)
Warning: The command '/usr/bin/unhide.rb' has been replaced by a script: /usr/bin/unhide.rb: a /usr/bin/ruby -w script text executable
Warning: The file properties have changed:
File: /sbin/sulogin
Current hash: a341f5865137d2204a05e8e9391432f6d0e5e079
Stored hash : 754537100d8a4c6e1388ee44fa10395bf4f3b047
Current inode: 3145790 Stored inode: 3145895
Current file modification time: 1323931247 (15-déc.-2011 07:40:47)
Stored file modification time : 1310620283 (14-juil.-2011 07:11:23)
Warning: Hidden directory found: /etc/.java
Warning: Hidden directory found: /dev/.udev
Warning: Hidden file found: /dev/.initramfs: symbolic link to `/run/initramfs'
sudo chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not found
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not found
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not found
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not found
Checking `syslogd'... not tested
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not found
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for rootkit HiDrootkit's default files... nothing found
Searching for rootkit t0rn's default files... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for rootkit Lion's default files... nothing found
Searching for rootkit RSHA's default files... nothing found
Searching for rootkit RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while... The following suspicious files and directories were found:
/usr/lib/jvm/.java-1.6.0-openjdk.jinfo /usr/lib/pymodules/python2.7/.path
Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for LOC rootkit... nothing found
Searching for Romanian rootkit... nothing found
Searching for Suckit rootkit... nothing found
Searching for Volc rootkit... nothing found
Searching for Gold2 rootkit... nothing found
Searching for TC2 Worm default files and dirs... nothing found
Searching for Anonoying rootkit default files and dirs... nothing found
Searching for ZK rootkit default files and dirs... nothing found
Searching for ShKit rootkit default files and dirs... nothing found
Searching for AjaKit rootkit default files and dirs... nothing found
Searching for zaRwT rootkit default files and dirs... nothing found
Searching for Madalin rootkit default files... nothing found
Searching for Fu rootkit default files... nothing found
Searching for ESRK rootkit default files... nothing found
Searching for rootedoor... nothing found
Searching for ENYELKM rootkit default files... nothing found
Searching for common ssh-scanners default files... nothing found
Searching for suspect PHP files... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... chkproc: nothing detected
chkdirs: nothing detected
Checking `rexedcs'... not found
Checking `sniffer'... lo: not promisc and no packet sniffer sockets
wlan0: PACKET SNIFFER(/sbin/wpa_supplicant[1015], /sbin/dhclient[1374])
Checking `w55808'... not infected
Checking `wted'... chkwtmp: nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... chklastlog: nothing deleted
Checking `chkutmp'... The tty of the following user process(es) were not found
in /var/run/utmp !
! RUID PID TTY CMD
! root 1147 tty7 /usr/bin/X :0 vt07 -nolisten tcp
! azad 3351 pts/0 /bin/bash
! root 22153 pts/0 /bin/sh /usr/sbin/chkrootkit
! root 22792 pts/0 ./chkutmp
! root 22794 pts/0 ps axk tty,ruser,args -o tty,pid,ruser,args
! root 22793 pts/0 sh -c ps axk "tty,ruser,args" -o "tty,pid,ruser,args"
! root 22152 pts/0 sudo chkrootkit
chkutmp: nothing deleted
Checking `OSX_RSPLUG'... not infected
sudo lynis --check-all
[ Lynis 1.2.9 ]
################################################################################
Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See LICENSE file for details about using this software.
Copyright 2007-2009 - Michael Boelen,
http://www.rootkit.nl/
################################################################################
[+] Initializing program
------------------------------------
Warning: PID file exists, probably another Lynis process is running.
------------------------------------------------------------------------------
If you are unsure another Lynis process is running currently, you are adviced
to stop current process and check the process list first. If you cancelled
(by using CTRL+C) a previous instance, you can ignore this message.
You are adviced to check for temporary files after program completion.
------------------------------------------------------------------------------
Note: Cancelling the program can leave temporary files behind
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
/usr/sbin/lynis: 246: \033[2C- Deleting old PID file...\033[33C [ DONE ]: not found
- Detecting OS... [ DONE ]
- Clearing log file (/var/log/lynis.log)... [ DONE ]
---------------------------------------------------
Program version: 1.2.9
Operating system: Linux
Operating system name: Ubuntu
Operating system version: 11.10
Kernel version: 3.0.0-14-generic
Hardware platform: i686
Hostname: azad
Auditor: [Unknown]
Profile: /etc/lynis/default.prf
Log file: /var/log/lynis.log
Report file: /var/log/lynis-report.dat
Report version: 1.0
---------------------------------------------------
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
- Checking profile file (/etc/lynis/default.prf)...
- Program update status... [ UPDATE AVAILABLE ]
===============================================================================
Notice: Lynis update available
Current version : 129 Latest version : 130
Please update to the latest version for new features, bug fixes, tests
and baselines.
===============================================================================
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] System Tools
------------------------------------
- Scanning available tools...
- Checking system binaries...
- Checking /bin... [ FOUND ]
- Checking /sbin... [ FOUND ]
- Checking /usr/bin... [ FOUND ]
- Checking /usr/sbin... [ FOUND ]
- Checking /usr/local/bin... [ FOUND ]
- Checking /usr/local/sbin... [ FOUND ]
- Checking /usr/local/libexec... [ NOT FOUND ]
- Checking /usr/libexec... [ NOT FOUND ]
- Checking /usr/sfw/bin... [ NOT FOUND ]
- Checking /usr/sfw/sbin... [ NOT FOUND ]
- Checking /usr/sfw/libexec... [ NOT FOUND ]
- Checking /opt/sfw/bin... [ NOT FOUND ]
- Checking /opt/sfw/sbin... [ NOT FOUND ]
- Checking /opt/sfw/libexec... [ NOT FOUND ]
- Checking /usr/xpg4/bin... [ NOT FOUND ]
- Checking /usr/css/bin... [ NOT FOUND ]
- Checking /usr/ucb... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Boot and services
------------------------------------
- Checking boot loaders
- Checking presence GRUB2... [ OK ]
- Checking presence LILO... [ NOT FOUND ]
- Checking presence YABOOT... [ NOT FOUND ]
- Check services at startup (rc2.d)... [ DONE ]
Result: found 9 services
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Kernel
------------------------------------
- Checking default run level... [ UNKNOWN ]
- Checking CPU support (NX/PAE)
CPU supports PAE and NoeXecute [ YES ]
- Checking kernel version [ DONE ]
- Checking kernel type [ DONE ]
- Checking loaded kernel modules [ DONE ]
Found 78 active modules
- Checking Linux kernel configuration file... [ FOUND ]
- Checking for available kernel update... [ OK ]
- Checking core dumps configuration... [ ENABLED ]
- Checking setuid core dumps configuration... [ DISABLED ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Memory and processes
------------------------------------
- Checking /proc/meminfo... [ FOUND ]
- Searching for dead/zombie processes... [ OK ]
- Searching for IO waiting processes... [ OK ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Users, Groups and Authentication
------------------------------------
- Search administrator accounts... [ OK ]
- Checking consistency of group files (grpck)... [ OK ]
- Checking non unique group ID's... [ OK ]
- Checking non unique group names... [ OK ]
- Checking password file consistency... [ OK ]
- Query system users (non daemons)... [ DONE ]
- Checking NIS+ authentication support [ NOT ENABLED ]
- Checking NIS authentication support [ NOT ENABLED ]
- Checking sudoers file [ FOUND ]
- Check sudoers file permissions [ OK ]
- Checking PAM password strength tools [ SUGGESTION ]
- Checking PAM configuration files (pam.conf) [ FOUND ]
- Checking PAM configuration files (pam.d) [ FOUND ]
- Checking PAM modules [ FOUND ]
- Checking LDAP module in PAM [ NOT FOUND ]
- Checking accounts without expire date [ SUGGESTION ]
- Checking user password aging [ DISABLED ]
- Determining default umask
- Checking umask (/etc/profile) [ SUGGESTION ]
- Checking umask (/etc/login.defs) [ SUGGESTION ]
- Checking umask (/etc/init.d/rc) [ SUGGESTION ]
- Checking LDAP authentication support [ NOT ENABLED ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Shells
------------------------------------
- Checking shells from /etc/shells...
Result: found 12 shells (valid shells: 4).
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] File systems
------------------------------------
- Checking mount points
- Checking /home mount point... [ OK ]
- Checking /tmp mount point... [ SUGGESTION ]
- Checking for old files in /tmp... [ OK ]
- Checking /tmp sticky bit... [ OK ]
- ACL support root file system... [ DISABLED ]
- Checking Locate database... [ FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Storage
------------------------------------
- Checking usb-storage driver (modprobe config)... [ NOT DISABLED ]
- Checking firewire ohci driver (modprobe config)... [ NOT DISABLED ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
- Check running NFS daemon... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: name services
------------------------------------
- Checking default DNS search domain... [ NONE ]
- Checking /etc/resolv.conf options... [ NONE ]
- Searching DNS domain name... [ UNKNOWN ]
- Checking nscd status... [ NOT FOUND ]
- Checking BIND status... [ NOT FOUND ]
- Checking PowerDNS status... [ NOT FOUND ]
- Checking ypbind status... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Ports and packages
------------------------------------
- Searching package managers...
- Searching dpkg package manager... [ FOUND ]
- Querying package manager...
- Checking security repository in sources.list file... [ OK ]
- Checking APT package database... [ OK ]
- Checking vulnerable packages... [ OK ]
- Checking upgradeable packages... [ SKIPPED ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Networking
------------------------------------
- Checking configured nameservers...
- Testing nameservers...
Nameserver: 192.168.0.254... [ OK ]
Nameserver: 2a01:e00::2... [ OK ]
Nameserver: 2a01:e00::1... [ OK ]
- Minimal of 2 responsive nameservers... [ OK ]
- Checking default gateway... [ DONE ]
- Checking promiscuous interfaces... [ OK ]
- Checking waiting connections... [ OK ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Printers and Spools
------------------------------------
- Checking cups daemon... [ RUNNING ]
- Checking cups configuration file... [ OK ]
- Checking cups addresses/sockets... [ FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: e-mail and messaging
------------------------------------
- Checking Exim status... [ NOT FOUND ]
- Checking Postfix status... [ NOT FOUND ]
- Checking Qmail smtpd status... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: firewalls
------------------------------------
- Checking iptables kernel module... [ FOUND ]
- Checking for empty ruleset... [ OK ]
- Checking for unused rules... [ WARNING ]
- Checking pf configuration... [ NOT FOUND ]
- Checking host based firewall [ ACTIVE ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: webserver
------------------------------------
- Checking Apache... [ NOT FOUND ]
- Searching nginx process... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] SSH Support
------------------------------------
- Checking running SSH daemon... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] SNMP Support
------------------------------------
- Checking running SNMP daemon... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Databases
------------------------------------
- MySQL process status... [ NOT FOUND ]
- PostgreSQL processes status... [ NOT FOUND ]
- Oracle processes status... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] LDAP Services
------------------------------------
- Checking OpenLDAP instance... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: PHP
------------------------------------
- Checking PHP... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Squid Support
------------------------------------
- Checking running Squid daemon... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Logging and files
------------------------------------
- Checking for a running syslog daemon... [ OK ]
- Checking Syslog-NG status [ NOT FOUND ]
- Checking Metalog status [ NOT FOUND ]
- Checking RSyslog status [ FOUND ]
- Checking RFC 3195 daemon status [ NOT FOUND ]
- Checking minilogd instances [ NONE ]
- Checking logrotate presence [ OK ]
- Checking log directories (static list) [ DONE ]
lsof: WARNING: can't stat() fuse.gvfs-fuse-daemon file system /home/azad/.gvfs
Output information may be incomplete.
- Checking open log files [ DONE ]
lsof: WARNING: can't stat() fuse.gvfs-fuse-daemon file system /home/azad/.gvfs
Output information may be incomplete.
- Checking deleted files in use [ FILES FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Insecure services
------------------------------------
- Checking inetd status... [ NOT ACTIVE ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Banners and identification
------------------------------------
- Checking banners...
- /etc/motd... [ FOUND ]
- /etc/issue... [ FOUND ]
- /etc/issue contents... [ WEAK ]
- /etc/issue.net... [ FOUND ]
- /etc/issue.net contents... [ WEAK ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Scheduled tasks
------------------------------------
- Checking crontab/cronjob [ DONE ]
- Checking atd status [ NOT RUNNING ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Accounting
------------------------------------
- Checking accounting information... [ NOT FOUND ]
- Checking auditd [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Time and Synchronization
------------------------------------
- Checking running NTP daemon... [ FOUND ]
- Checking NTP client in crontab file... [ NOT FOUND ]
- Checking NTP client in cron.d files... [ NOT FOUND ]
- Checking for a running NTP daemon or client... [ OK ]
- Checking NTP daemon... [ FOUND ]
- Checking valid association ID's... [ FOUND ]
- Checking high stratum ntp peers... [ OK ]
- Checking unreliable ntp peers... [ FOUND ]
- Checking selected time source... [ OK ]
- Checking time source candidates... [ OK ]
- Checking falsetickers... [ OK ]
- Checking NTP version... [ FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Cryptography
------------------------------------
- Checking SSL certificate expiration... [ WARNING ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Virtualization
------------------------------------
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Security frameworks
------------------------------------
- Checking presence AppArmor [ FOUND ]
- Checking AppArmor status [ ENABLED ]
- Checking presence SELinux [ NOT FOUND ]
- Checking presence grsecurity [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: file integrity
------------------------------------
- Checking AFICK... [ NOT FOUND ]
- Checking AIDE... [ NOT FOUND ]
- Checking Osiris... [ NOT FOUND ]
- Checking Samhain... [ NOT FOUND ]
- Checking Tripwire... [ NOT FOUND ]
- Checking presence integrity tool... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Software: Malware scanners
------------------------------------
- Checking chkrootkit... [ FOUND ]
- Checking Rootkit Hunter... [ FOUND ]
- Checking ClamAV scanner... [ NOT FOUND ]
- Checking ClamAV daemon... [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] System Tools
------------------------------------
- Starting file permissions check...
/etc/lilo.conf [ NOT FOUND ]
/root/.ssh [ NOT FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Home directories
------------------------------------
- Checking shell history files... [ OK ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Kernel Hardening
------------------------------------
- Comparing sysctl key pairs with scan profile...
- kernel.core_uses_pid (1) [ DIFFERENT ]
- kernel.ctrl-alt-del (0) [ OK ]
- kernel.sysrq (0) [ DIFFERENT ]
- net.ipv4.conf.all.accept_redirects (0) [ OK ]
- net.ipv4.conf.all.accept_source_route (0) [ OK ]
- net.ipv4.conf.all.bootp_relay (0) [ OK ]
- net.ipv4.conf.all.forwarding (0) [ OK ]
- net.ipv4.conf.all.log_martians (1) [ DIFFERENT ]
- net.ipv4.conf.all.mc_forwarding (0) [ OK ]
- net.ipv4.conf.all.proxy_arp (0) [ OK ]
- net.ipv4.conf.all.rp_filter (1) [ OK ]
- net.ipv4.conf.all.send_redirects (0) [ DIFFERENT ]
- net.ipv4.conf.default.accept_redirects (0) [ OK ]
- net.ipv4.conf.default.accept_source_route (0) [ DIFFERENT ]
- net.ipv4.conf.default.log_martians (1) [ DIFFERENT ]
- net.ipv4.icmp_echo_ignore_broadcasts (1) [ OK ]
- net.ipv4.icmp_ignore_bogus_error_responses (1) [ OK ]
- net.ipv4.tcp_syncookies (1) [ OK ]
- net.ipv4.tcp_timestamps (0) [ DIFFERENT ]
- net.ipv6.conf.all.accept_redirects (0) [ OK ]
- net.ipv6.conf.all.accept_source_route (0) [ OK ]
- net.ipv6.conf.default.accept_redirects (0) [ OK ]
- net.ipv6.conf.default.accept_source_route (0) [ OK ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
[+] Hardening
------------------------------------
- Installed compiler(s)... [ NOT FOUND ]
- Installed malware scanner... [ FOUND ]
[ Press [ENTER] to continue, or [CTRL]+C to stop ]
================================================================================
-[ Lynis 1.2.9 Results ]-
Tests performed: 145
Warnings:
----------------------------
- [13:22:10] Warning: Found possible unused iptables rules (4 5 6 1 2 3 4 5 1 3 4 5 6 7 1 1 1 3 4 5 6 7 8 9 10 13 1 1 2 1 4 5 1 1 1 2 1 2 1) [test:FIRE-4513] [impact:L]
- [13:22:24] Warning: Found SSL certificate expiration (/etc/ssl/certs/ca-certificates.crt) [test:CRYP-7902] [impact:M]
Suggestions:
----------------------------
- [13:21:22] Suggestion: update to the latest stable release.
- [13:21:35] Suggestion: Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc [test:AUTH-9262]
- [13:21:35] Suggestion: When possible set expire dates for all password protected accounts [test:AUTH-9282]
- [13:21:35] Suggestion: Configure password aging limits to enforce password changing on a regular base [test:AUTH-9286]
- [13:21:35] Suggestion: Default umask in /etc/profile could be more strict like 027 [test:AUTH-9328]
- [13:21:35] Suggestion: Default umask in /etc/login.defs could be more strict like 027 [test:AUTH-9328]
- [13:21:35] Suggestion: Default umask in /etc/init.d/rc could be more strict like 027 [test:AUTH-9328]
- [13:21:37] Suggestion: To decrease the impact of a full /tmp file system, place /tmp on a separated partition [test:FILE-6310]
- [13:21:39] Suggestion: Disable drivers like USB storage when not used, to prevent unauthorized storage or data theft [test:STRG-1840]
- [13:21:39] Suggestion: Disable drivers like firewire storage when not used, to prevent unauthorized storage or data theft [test:STRG-1846]
- [13:21:52] Suggestion: Install package apt-show-versions for patch management purposes [test:PKGS-7394]
- [13:22:10] Suggestion: Check iptables rules to see which rules are currently not used (iptables --list --numeric --verbose) [test:FIRE-4513]
- [13:22:20] Suggestion: Add legal banner to /etc/issue, to warn unauthorized users [test:BANN-7126]
- [13:22:20] Suggestion: Add legal banner to /etc/issue.net, to warn unauthorized users [test:BANN-7130]
- [13:22:22] Suggestion: Enable auditd to collect audit information [test:ACCT-9628]
- [13:22:24] Suggestion: Renew SSL expired certificates. [test:CRYP-7902]
================================================================================
Files:
- Test and debug information : /var/log/lynis.log
- Report data : /var/log/lynis-report.dat
================================================================================
Notice: Lynis update available
Current version : 129 Latest version : 130
================================================================================
Hardening index : [61] [############ ]
================================================================================
Lynis 1.2.9
Copyright 2007-2009 - Michael Boelen,
http://www.rootkit.nl/
================================================================================