.\" $OpenBSD: security.8,v 1.14 2008/04/17 19:49:16 sthen Exp $ .\" .\" David Leonard, 2001. Public Domain. .\" .Dd $Mdocdate: April 17 2008 $ .Dt SECURITY 8 .Os .Sh NAME .Nm security .Nd periodic system security check .Sh SYNOPSIS .Nm /etc/security .Sh DESCRIPTION .Nm is a command script that examines the system for some signs of security weaknesses. It is only a security aid and does not offer complete protection. The .Nm script is normally run from the .Pa /etc/daily script (see .Xr daily 8 for further details), which logs to .Pa /var/log/daily.out . .Pp The .Nm script carries out the following list of simple checks: .Bl -bullet .It Check the .Xr master.passwd 5 and .Xr group 5 files for syntax, empty passwords, partially closed accounts, suspicious UIDs, suspicious GIDs, and duplicate entries. .It Check root's home directory and login environment for insecure permissions, suspicious paths, and umask commands in the dotfiles. .It Check that root and uucp are in .Pa /etc/ftpusers . .It Check for insecurities in various trust files such as .Pa /etc/hosts.equiv and .Pa /etc/shosts.equiv . .It Check user .Pa .rhosts and .Pa .shosts files for open access. .It Check user home directory permissions. .It Check many user dotfile permissions. .It Check NFS .Xr exports 5 file for global export entries. .It Check for changes in setuid/setgid files and devices. .It Check disk ownership and permissions. .It Check for changes in the device file list. .It Check for permission changes in special files and system binaries listed in .Pa /etc/mtree/special . .Nm also provides hooks for administrators to create their own lists. These lists should be kept in .Pa /etc/mtree/ and filenames must have the suffix .Dq .secure . The following example shows how to create such a list, to protect the home directory of user .Dq bob : .Bd -literal -offset 4n # mtree -cx -p /home/bob -K md5digest,type \*(Gt/etc/mtree/bob.secure # chown root:wheel /etc/mtree/bob.secure # chmod 600 /etc/mtree/bob.secure .Ed .Pp .Sy Note: These checks do not provide complete protection against Trojan horsed binaries, as the miscreant can modify the tree specification to match the replaced binary. For details on really protecting yourself against modified binaries, see .Xr mtree 8 . .It Check for changes in files listed in .Pa /etc/changelist . Files being created or deleted, as well as content change in the files themselves, are reported. See .Xr changelist 5 for further details. .It Check for changes to the disklabels of mounted disks. .It Report on the installation or removal of any system .Xr package 5 . .It Check .Xr hostname.if 5 file permissions. .El .Pp The intent of the .Nm script is to point out some obvious holes to the system administrator. .Sh FILES .Bl -tag -width /dev/changelist -compact .It Pa /etc/changelist .It Pa /etc/daily .It Pa /etc/mtree .It Pa /var/backups .El .Sh SEE ALSO .Xr changelist 5 , .Xr daily 8 , .Xr mtree 8 .Sh BUGS The name of this script may provide a false sense of .Nm security . .\" Well, I thought it was amusing. .Pp There are perhaps an infinite number of ways the system can be compromised without this script noticing.