What should go into a security-checking shell script?

Jon Zeeff zeeff at b-tech.ann-arbor.mi.us
Sat Oct 28 04:00:10 AEST 1989


>	- Compare checksums of all vendor-supplied executables
>	  with known-correct checksums.
>	- Use find(1) to search the disks for set-uid
>	  and set-gid executables as well as special 
>	  devices (since they can only be made by root).
>	- Validate the permissions of all important 
>	  configuration files (/etc/passwd, /etc/group,
>	  /etc/{tty,ini}tab, UUCP L.sys/Systems files,
>	  etc).


I have a couple of small programs that do this if anyone is interested.












-- 
Branch Technology  <zeeff at b-tech.ann-arbor.mi.us>



More information about the Comp.unix.wizards mailing list