[Revenir à la liste des mesures](https://hackmd.io/6YW9CAjBQzyNT_nndnQ4AQ)
# Rapport Lynis
[ Lynis 3.0.8 ]
################################################################################
Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See the LICENSE file for details about using this software.
2007-2021, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)
################################################################################
[+] Initializing program
------------------------------------
Usage: lynis command [options]
Command:
audit
audit system : Perform local security scan
audit system remote <host> : Remote security scan
audit dockerfile <file> : Analyze Dockerfile
show
show : Show all commands
show version : Show Lynis version
show help : Show help
update
update info : Show update details
Options:
Alternative system audit modes
--forensics : Perform forensics on a running or mounted system
--pentest : Non-privileged, show points of interest for pentesting
Layout options
--no-colors : Don't use colors in output
--quiet (-q) : No output
--reverse-colors : Optimize color display for light backgrounds
--reverse-colours : Optimize colour display for light backgrounds
Misc options
--debug : Debug logging to screen
--no-log : Don't create a log file
--profile <profile> : Scan the system with the given profile file
--view-manpage (--man) : View man page
--verbose : Show more details on screen
--version (-V) : Display version number and quit
--wait : Wait between a set of tests
--slow-warning <seconds> : Threshold for slow test warning in seconds (default 10)
Enterprise options
--plugindir <path> : Define path of available plugins
--upload : Upload data to central node
More options available. Run '/usr/sbin/lynis show options', or use the man page.
No command provided. Exiting..
vboxuser@LinuxTP:~$ ^C
vboxuser@LinuxTP:~$ ^C
vboxuser@LinuxTP:~$ lynis audit system
[ Lynis 3.0.8 ]
################################################################################
Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See the LICENSE file for details about using this software.
2007-2021, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)
################################################################################
[+] Initializing program
------------------------------------
###################################################################
# #
# NON-PRIVILEGED SCAN MODE #
# #
###################################################################
NOTES:
--------------
* Some tests will be skipped (as they require root permissions)
* Some tests might fail silently or give different results
- Detecting OS... [ DONE ]
- Checking profiles... [ DONE ]
- Detecting language and localization [ fr ]
---------------------------------------------------
Program version: 3.0.8
Operating system: Linux
Operating system name: Debian
Operating system version: 12
Kernel version: 6.1.0
Hardware platform: x86_64
Hostname: LinuxTP
---------------------------------------------------
Profiles: /etc/lynis/default.prf
Log file: /home/vboxuser/lynis.log
Report file: /home/vboxuser/lynis-report.dat
Report version: 1.0
Plugin directory: /etc/lynis/plugins
---------------------------------------------------
Auditor: [Not Specified]
Language: fr
Test category: all
Test group: all
---------------------------------------------------
- Program update status... [ PAS DE MISE A JOUR ]
[+] Outils système
------------------------------------
- Scanning available tools...
- Checking system binaries...
[+] Plugins (phase 1)
------------------------------------
Note : Les plugins ont des tests plus poussés qui peuvent prendre plusieurs minutes
- Plugin: debian
[
[+] Debian Tests
------------------------------------
- Checking for system binaries that are required by Debian Tests...
- Checking /bin... [ FOUND ]
- Checking /sbin... [ FOUND ]
- Checking /usr/bin... [ FOUND ]
- Checking /usr/sbin... [ FOUND ]
- Checking /usr/local/bin... [ FOUND ]
- Checking /usr/local/sbin... [ FOUND ]
- Authentication:
- PAM (Pluggable Authentication Modules):
- libpam-tmpdir [ Not Installed ]
- File System Checks:
- DM-Crypt, Cryptsetup & Cryptmount:
- Software:
- apt-listbugs [ Not Installed ]
- apt-listchanges [ Installed and enabled for apt ]
- needrestart [ Not Installed ]
- fail2ban [ Not Installed ]
]
[+] Démarrage et services
------------------------------------
- Service Manager [ systemd ]
- Checking presence GRUB2 [ TROUVÉ ]
- Checking for password protection [ AUCUN ]
- Check running services (systemctl) [ FAIT ]
Result: found 25 running services
- Check enabled services at boot (systemctl) [ FAIT ]
Result: found 24 enabled services
- Check startup files (permissions) [ OK ]
- Running 'systemd-analyze security'
- ModemManager.service: [ MOYEN ]
- NetworkManager.service: [ EXPOSÉ ]
- accounts-daemon.service: [ MOYEN ]
- alsa-state.service: [ RISQUÉ ]
- anacron.service: [ RISQUÉ ]
- avahi-daemon.service: [ RISQUÉ ]
- colord.service: [ EXPOSÉ ]
- cron.service: [ RISQUÉ ]
- cups-browsed.service: [ RISQUÉ ]
- cups.service: [ RISQUÉ ]
- dbus.service: [ RISQUÉ ]
- emergency.service: [ RISQUÉ ]
- exim4.service: [ RISQUÉ ]
- gdm.service: [ RISQUÉ ]
- geoclue.service: [ EXPOSÉ ]
- getty@tty1.service: [ RISQUÉ ]
- low-memory-monitor.service: [ MOYEN ]
- lynis.service: [ RISQUÉ ]
- plymouth-start.service: [ RISQUÉ ]
- polkit.service: [ RISQUÉ ]
- power-profiles-daemon.service: [ EXPOSÉ ]
- rc-local.service: [ RISQUÉ ]
- rescue.service: [ RISQUÉ ]
- rtkit-daemon.service: [ MOYEN ]
- switcheroo-control.service: [ EXPOSÉ ]
- systemd-ask-password-console.service: [ RISQUÉ ]
- systemd-ask-password-plymouth.service: [ RISQUÉ ]
- systemd-ask-password-wall.service: [ RISQUÉ ]
- systemd-fsckd.service: [ RISQUÉ ]
- systemd-initctl.service: [ RISQUÉ ]
- systemd-journald.service: [ PROTÉGÉ ]
- systemd-logind.service: [ PROTÉGÉ ]
- systemd-networkd.service: [ PROTÉGÉ ]
- systemd-rfkill.service: [ RISQUÉ ]
- systemd-timesyncd.service: [ PROTÉGÉ ]
- systemd-udevd.service: [ MOYEN ]
- udisks2.service: [ RISQUÉ ]
- upower.service: [ PROTÉGÉ ]
- user@1000.service: [ RISQUÉ ]
- wpa_supplicant.service: [ RISQUÉ ]
[+] Noyau
------------------------------------
- Checking default run level [ RUNLEVEL 5 ]
- Checking CPU support (NX/PAE)
CPU support: PAE and/or NoeXecute supported [ TROUVÉ ]
- Checking kernel version and release [ FAIT ]
- Checking kernel type [ FAIT ]
- Checking loaded kernel modules [ FAIT ]
Found 90 active modules
- Checking Linux kernel configuration file [ TROUVÉ ]
- Checking default I/O kernel scheduler [ NON TROUVÉ ]
- Checking for available kernel update [ OK ]
- Checking core dumps configuration
- configuration in systemd conf files [ PAR DÉFAUT ]
- configuration in /etc/profile [ PAR DÉFAUT ]
- 'hard' configuration in /etc/security/limits.conf [ PAR DÉFAUT ]
- 'soft' configuration in /etc/security/limits.conf [ PAR DÉFAUT ]
- Checking setuid core dumps configuration [ DÉSACTIVÉ ]
- Check if reboot is needed [ NON ]
[+] Mémoire et processus
------------------------------------
- Checking /proc/meminfo [ TROUVÉ ]
- Searching for dead/zombie processes [ NON TROUVÉ ]
- Searching for IO waiting processes [ NON TROUVÉ ]
- Search prelink tooling [ NON TROUVÉ ]
[+] Utilisateurs, groupes et authentification
------------------------------------
- Administrator accounts [ OK ]
- Unique UIDs [ OK ]
- Unique group IDs [ OK ]
- Unique group names [ OK ]
- Password file consistency [ SUGGESTION ]
- Checking password hashing rounds [ DÉSACTIVÉ ]
- Query system users (non daemons) [ FAIT ]
- NIS+ authentication support [ NON ACTIVÉ ]
- NIS authentication support [ NON ACTIVÉ ]
- Sudoers file(s) [ TROUVÉ ]
- PAM password strength tools [ SUGGESTION ]
- PAM configuration files (pam.conf) [ TROUVÉ ]
- PAM configuration files (pam.d) [ TROUVÉ ]
- PAM modules [ TROUVÉ ]
- LDAP module in PAM [ NON TROUVÉ ]
- Accounts without expire date [ OK ]
- Accounts without password [ OK ]
- Locked accounts [ OK ]
- Checking user password aging (minimum) [ DÉSACTIVÉ ]
- User password aging (maximum) [ DÉSACTIVÉ ]
- Checking Linux single user mode authentication [ OK ]
- Determining default umask
- umask (/etc/profile) [ NON TROUVÉ ]
- umask (/etc/login.defs) [ SUGGESTION ]
- LDAP authentication support [ NON ACTIVÉ ]
- Logging failed login attempts [ ACTIVÉ ]
[+] Shells
------------------------------------
- Checking shells from /etc/shells
Result: found 7 shells (valid shells: 7).
- Session timeout settings/tools [ AUCUN ]
- Checking default umask values
- Checking default umask in /etc/bash.bashrc [ AUCUN ]
- Checking default umask in /etc/profile [ AUCUN ]
[+] Systèmes de fichier
------------------------------------
- Checking mount points
- Checking /home mount point [ SUGGESTION ]
- Checking /tmp mount point [ SUGGESTION ]
- Checking /var mount point [ SUGGESTION ]
- Query swap partitions (fstab) [ OK ]
- Testing swap partitions [ OK ]
- Checking for old files in /tmp [ OK ]
- Checking /tmp sticky bit [ OK ]
- Checking /var/tmp sticky bit [ OK ]
- Mount options of / [ PAS PAR DÉFAUT ]
- Mount options of /dev [ PARTIELLEMENT RENFORCÉ ]
- Mount options of /dev/shm [ PARTIELLEMENT RENFORCÉ ]
- Mount options of /run [ RENFORCÉ ]
- Total without nodev:5 noexec:8 nosuid:3 ro or noexec (W^X): 8 of total 27
- Disable kernel support of some filesystems
[+] Périphériques USB
------------------------------------
- Checking usb-storage driver (modprobe config) [ NON DESACTIVÉ ]
- Checking USB devices authorization [ ACTIVÉ ]
- Checking USBGuard [ NON TROUVÉ ]
[+] Stockage
------------------------------------
- Checking firewire ohci driver (modprobe config) [ NON DESACTIVÉ ]
[+] NFS
------------------------------------
- Check running NFS daemon [ NON TROUVÉ ]
[+] Services de noms
------------------------------------
- Searching DNS domain name [ TROUVÉ ]
Domain name: myguest.virtualbox.org
- Checking /etc/hosts
- Duplicate entries in hosts file [ AUCUN ]
- Presence of configured hostname in /etc/hosts [ TROUVÉ ]
- Hostname mapped to localhost [ NON TROUVÉ ]
- Localhost mapping to IP address [ OK ]
[+] Ports et packages
------------------------------------
- Searching package managers
- Searching dpkg package manager [ TROUVÉ ]
- Querying package manager
- Query unpurged packages [ AUCUN ]
- debsecan utility [ TROUVÉ ]
- debsecan cron job [ TROUVÉ ]
- Checking security repository in sources.list file [ OK ]
- Checking upgradeable packages [ IGNORÉ ]
- Checking package audit tool [ INSTALLÉ ]
Found: debsecan
- Toolkit for automatic upgrades [ NON TROUVÉ ]
[+] Mise en réseau
------------------------------------
- Checking IPv6 configuration [ ACTIVÉ ]
Configuration method [ AUTO ]
IPv6 only [ NON ]
- Checking configured nameservers
- Testing nameservers
Nameserver: 10.0.2.1 [ OK ]
- Minimal of 2 responsive nameservers [ AVERTISSEMENT ]
- Getting listening ports (TCP/UDP) [ FAIT ]
- Checking promiscuous interfaces [ OK ]
- Checking status DHCP client
- Checking for ARP monitoring software [ NON TROUVÉ ]
- Uncommon network protocols [ 0 ]
[+] Imprimantes et serveurs d'impression
------------------------------------
- Checking cups daemon [ EN COURS ]
- Checking CUPS configuration file [ OK ]
- File permissions [ AVERTISSEMENT ]
- Checking CUPS addresses/sockets [ TROUVÉ ]
- Checking lp daemon [ NON LANCÉ ]
[+] Logiciel : Email et messagerie
------------------------------------
- Exim status [ EN COURS ]
- Type [ LOCAL ONLY ]
[+] Logiciel : Pare-feu
------------------------------------
- Checking iptables kernel module [ TROUVÉ ]
- Checking host based firewall [ ACTIF ]
[+] Logiciel : Serveur web
------------------------------------
- Checking Apache (binary /usr/sbin/apache2) [ TROUVÉ ]
[Notice] possible directory/file parts found, but still unsure what the real configuration file is. Skipping some Apache related tests
=================================================================
Exception found!
Function/test: [HTTP-6624:1]
Message: Found some unknown directory or file references in Apache configuration
Help improving the Lynis community with your feedback!
Steps:
- Ensure you are running the latest version (/usr/sbin/lynis update check)
- If so, create a GitHub issue at https://github.com/CISOfy/lynis
- Include relevant parts of the log file or configuration file
Thanks!
=================================================================
Info: No virtual hosts found
* Loadable modules [ TROUVÉ (119) ]
- Found 119 loadable modules
mod_evasive: anti-DoS/brute force [ NON TROUVÉ ]
mod_reqtimeout/mod_qos [ TROUVÉ ]
ModSecurity: web application firewall [ NON TROUVÉ ]
- Checking nginx [ NON TROUVÉ ]
[+] Prise en charge SSH
------------------------------------
- Checking running SSH daemon [ NON TROUVÉ ]
[+] Prise en charge SNMP
------------------------------------
- Checking running SNMP daemon [ NON TROUVÉ ]
[+] Bases de données
------------------------------------
No database engines found
[+] Services LDAP
------------------------------------
- Checking OpenLDAP instance [ NON TROUVÉ ]
[+] PHP
------------------------------------
- Checking PHP [ NON TROUVÉ ]
[+] Prise en charge Squid
------------------------------------
- Checking running Squid daemon [ NON TROUVÉ ]
[+] Journalisation et fichiers
------------------------------------
- Checking for a running log daemon [ OK ]
- Checking Syslog-NG status [ NON TROUVÉ ]
- Checking systemd journal status [ TROUVÉ ]
- Checking Metalog status [ NON TROUVÉ ]
- Checking RSyslog status [ NON TROUVÉ ]
- Checking RFC 3195 daemon status [ NON TROUVÉ ]
- Checking minilogd instances [ NON TROUVÉ ]
- Checking logrotate presence [ OK ]
- Checking remote logging [ NON ACTIVÉ ]
- Checking log directories (static list) [ FAIT ]
- Checking open log files [ FAIT ]
- Checking deleted files in use [ FICHIERS TROUVÉS ]
[+] Services non sécurisés
------------------------------------
- Installed inetd package [ NON TROUVÉ ]
- Installed xinetd package [ OK ]
- xinetd status
- Installed rsh client package [ OK ]
- Installed rsh server package [ OK ]
- Installed telnet client package [ OK ]
- Installed telnet server package [ NON TROUVÉ ]
- Checking NIS client installation [ OK ]
- Checking NIS server installation [ OK ]
- Checking TFTP client installation [ OK ]
- Checking TFTP server installation [ OK ]
[+] Bannières et identification
------------------------------------
- /etc/issue [ TROUVÉ ]
- /etc/issue contents [ FAIBLE ]
- /etc/issue.net [ TROUVÉ ]
- /etc/issue.net contents [ FAIBLE ]
[+] Tâches planifiées
------------------------------------
- Checking crontab and cronjob files [ FAIT ]
[+] Comptes
------------------------------------
- Checking accounting information [ NON TROUVÉ ]
- Checking sysstat accounting data [ NON TROUVÉ ]
- Checking auditd [ NON TROUVÉ ]
[+] Heure et synchronisation
------------------------------------
- NTP daemon found: systemd (timesyncd) [ TROUVÉ ]
- Checking for a running NTP daemon or client [ OK ]
- Last time synchronization [ 8s ]
[+] Cryptographie
------------------------------------
- Checking for expired SSL certificates [0/145] [ AUCUN ]
[WARNING]: Test CRYP-7902 had a long execution: 13.022034 seconds
- Kernel entropy is sufficient [ OUI ]
- HW RNG & rngd [ NON ]
- SW prng [ NON ]
- MOR variable not found [ FAIBLE ]
[+] Virtualisation
------------------------------------
[+] Conteneurs
------------------------------------
[+] Frameworks de sécurité
------------------------------------
- Checking presence AppArmor [ TROUVÉ ]
- Checking AppArmor status [ INCONNU ]
- Checking presence SELinux [ NON TROUVÉ ]
- Checking presence TOMOYO Linux [ NON TROUVÉ ]
- Checking presence grsecurity [ NON TROUVÉ ]
- Checking for implemented MAC framework [ AUCUN ]
[+] Logiciel : Intégrité de fichier
------------------------------------
- Checking file integrity tools
- Checking presence integrity tool [ NON TROUVÉ ]
[+] Logiciel : System tooling
------------------------------------
- Checking automation tooling
- Automation tooling [ NON TROUVÉ ]
- Checking for IDS/IPS tooling [ AUCUN ]
[+] Logiciel : Malveillants
------------------------------------
pgrep: pattern that searches for process name longer than 15 characters will result in zero matches
Try `pgrep -f' option to match against the complete command line.
- Malware software components [ NON TROUVÉ ]
[+] Permissions de fichier
------------------------------------
- Starting file permissions check
File: /boot/grub/grub.cfg [ OK ]
File: /etc/crontab [ SUGGESTION ]
File: /etc/group [ OK ]
File: /etc/group- [ OK ]
File: /etc/hosts.allow [ OK ]
File: /etc/hosts.deny [ OK ]
File: /etc/issue [ OK ]
File: /etc/issue.net [ OK ]
File: /etc/motd [ OK ]
File: /etc/passwd [ OK ]
File: /etc/passwd- [ OK ]
Directory: /etc/cron.d [ SUGGESTION ]
Directory: /etc/cron.daily [ SUGGESTION ]
Directory: /etc/cron.hourly [ SUGGESTION ]
Directory: /etc/cron.weekly [ SUGGESTION ]
Directory: /etc/cron.monthly [ SUGGESTION ]
[+] Dossiers personnels
------------------------------------
- Permissions of home directories [ OK ]
- Ownership of home directories [ OK ]
- Checking shell history files [ OK ]
[+] Kernel Hardening
------------------------------------
- Comparing sysctl key pairs with scan profile
- dev.tty.ldisc_autoload (exp: 0) [ DIFFÉRENT ]
- fs.protected_fifos (exp: 2) [ DIFFÉRENT ]
- fs.protected_hardlinks (exp: 1) [ OK ]
- fs.protected_regular (exp: 2) [ OK ]
- fs.protected_symlinks (exp: 1) [ OK ]
- fs.suid_dumpable (exp: 0) [ OK ]
- kernel.core_uses_pid (exp: 1) [ DIFFÉRENT ]
- kernel.ctrl-alt-del (exp: 0) [ OK ]
- kernel.dmesg_restrict (exp: 1) [ OK ]
- kernel.kptr_restrict (exp: 2) [ DIFFÉRENT ]
- kernel.modules_disabled (exp: 1) [ DIFFÉRENT ]
- kernel.perf_event_paranoid (exp: 3) [ OK ]
- kernel.randomize_va_space (exp: 2) [ OK ]
- kernel.sysrq (exp: 0) [ DIFFÉRENT ]
- kernel.unprivileged_bpf_disabled (exp: 1) [ DIFFÉRENT ]
- kernel.yama.ptrace_scope (exp: 1 2 3) [ DIFFÉRENT ]
- net.ipv4.conf.all.accept_redirects (exp: 0) [ DIFFÉRENT ]
- net.ipv4.conf.all.accept_source_route (exp: 0) [ OK ]
- net.ipv4.conf.all.bootp_relay (exp: 0) [ OK ]
- net.ipv4.conf.all.forwarding (exp: 0) [ OK ]
- net.ipv4.conf.all.log_martians (exp: 1) [ DIFFÉRENT ]
- net.ipv4.conf.all.mc_forwarding (exp: 0) [ OK ]
- net.ipv4.conf.all.proxy_arp (exp: 0) [ OK ]
- net.ipv4.conf.all.rp_filter (exp: 1) [ DIFFÉRENT ]
- net.ipv4.conf.all.send_redirects (exp: 0) [ DIFFÉRENT ]
- net.ipv4.conf.default.accept_redirects (exp: 0) [ DIFFÉRENT ]
- net.ipv4.conf.default.accept_source_route (exp: 0) [ DIFFÉRENT ]
- net.ipv4.conf.default.log_martians (exp: 1) [ DIFFÉRENT ]
- net.ipv4.icmp_echo_ignore_broadcasts (exp: 1) [ OK ]
- net.ipv4.icmp_ignore_bogus_error_responses (exp: 1) [ OK ]
- net.ipv4.tcp_syncookies (exp: 1) [ OK ]
- net.ipv4.tcp_timestamps (exp: 0 1) [ OK ]
- net.ipv6.conf.all.accept_redirects (exp: 0) [ DIFFÉRENT ]
- net.ipv6.conf.all.accept_source_route (exp: 0) [ OK ]
- net.ipv6.conf.default.accept_redirects (exp: 0) [ DIFFÉRENT ]
- net.ipv6.conf.default.accept_source_route (exp: 0) [ OK ]
[+] Hardening
------------------------------------
- Installed compiler(s) [ TROUVÉ ]
- Installed malware scanner [ NON TROUVÉ ]
- Non-native binary formats [ TROUVÉ ]
[+] Tests personnalisés
------------------------------------
- Running custom tests... [ AUCUN ]
[+] Plugins (phase 2)
------------------------------------
================================================================================
-[ Lynis 3.0.8 Results ]-
Warnings (1):
----------------------------
! Couldn't find 2 responsive nameservers [NETW-2705]
https://cisofy.com/lynis/controls/NETW-2705/
Suggestions (44):
----------------------------
* This release is more than 4 months old. Check the website or GitHub to see if there is an update available. [LYNIS]
https://cisofy.com/lynis/controls/LYNIS/
* Install libpam-tmpdir to set $TMP and $TMPDIR for PAM sessions [DEB-0280]
https://cisofy.com/lynis/controls/DEB-0280/
* Install apt-listbugs to display a list of critical bugs prior to each APT installation. [DEB-0810]
https://cisofy.com/lynis/controls/DEB-0810/
* Install needrestart, alternatively to debian-goodies, so that you can run needrestart after upgrades to determine which daemons are using old versions of libraries and need restarting. [DEB-0831]
https://cisofy.com/lynis/controls/DEB-0831/
* Install fail2ban to automatically ban hosts that commit multiple authentication errors. [DEB-0880]
https://cisofy.com/lynis/controls/DEB-0880/
* Set a password on GRUB boot loader to prevent altering boot configuration (e.g. boot in single user mode without password) [BOOT-5122]
https://cisofy.com/lynis/controls/BOOT-5122/
* Consider hardening system services [BOOT-5264]
- Details : Run '/usr/bin/systemd-analyze security SERVICE' for each service
https://cisofy.com/lynis/controls/BOOT-5264/
* If not required, consider explicit disabling of core dump in /etc/security/limits.conf file [KRNL-5820]
https://cisofy.com/lynis/controls/KRNL-5820/
* Run pwck manually and correct any errors in the password file [AUTH-9228]
https://cisofy.com/lynis/controls/AUTH-9228/
* Configure password hashing rounds in /etc/login.defs [AUTH-9230]
https://cisofy.com/lynis/controls/AUTH-9230/
* Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc [AUTH-9262]
https://cisofy.com/lynis/controls/AUTH-9262/
* Configure minimum password age in /etc/login.defs [AUTH-9286]
https://cisofy.com/lynis/controls/AUTH-9286/
* Configure maximum password age in /etc/login.defs [AUTH-9286]
https://cisofy.com/lynis/controls/AUTH-9286/
* Default umask in /etc/login.defs could be more strict like 027 [AUTH-9328]
https://cisofy.com/lynis/controls/AUTH-9328/
* To decrease the impact of a full /home file system, place /home on a separate partition [FILE-6310]
https://cisofy.com/lynis/controls/FILE-6310/
* To decrease the impact of a full /tmp file system, place /tmp on a separate partition [FILE-6310]
https://cisofy.com/lynis/controls/FILE-6310/
* To decrease the impact of a full /var file system, place /var on a separate partition [FILE-6310]
https://cisofy.com/lynis/controls/FILE-6310/
* Disable drivers like USB storage when not used, to prevent unauthorized storage or data theft [USB-1000]
https://cisofy.com/lynis/controls/USB-1000/
* Disable drivers like firewire storage when not used, to prevent unauthorized storage or data theft [STRG-1846]
https://cisofy.com/lynis/controls/STRG-1846/
* Install debsums utility for the verification of packages with known good database. [PKGS-7370]
https://cisofy.com/lynis/controls/PKGS-7370/
* Install package apt-show-versions for patch management purposes [PKGS-7394]
https://cisofy.com/lynis/controls/PKGS-7394/
* Consider using a tool to automatically apply upgrades [PKGS-7420]
https://cisofy.com/lynis/controls/PKGS-7420/
* Check your resolv.conf file and fill in a backup nameserver if possible [NETW-2705]
https://cisofy.com/lynis/controls/NETW-2705/
* Determine if protocol 'dccp' is really needed on this system [NETW-3200]
https://cisofy.com/lynis/controls/NETW-3200/
* Determine if protocol 'sctp' is really needed on this system [NETW-3200]
https://cisofy.com/lynis/controls/NETW-3200/
* Determine if protocol 'rds' is really needed on this system [NETW-3200]
https://cisofy.com/lynis/controls/NETW-3200/
* Determine if protocol 'tipc' is really needed on this system [NETW-3200]
https://cisofy.com/lynis/controls/NETW-3200/
* Access to CUPS configuration could be more strict. [PRNT-2307]
https://cisofy.com/lynis/controls/PRNT-2307/
* Install Apache mod_evasive to guard webserver against DoS/brute force attempts [HTTP-6640]
https://cisofy.com/lynis/controls/HTTP-6640/
* Install Apache modsecurity to guard webserver against web application attacks [HTTP-6643]
https://cisofy.com/lynis/controls/HTTP-6643/
* Enable logging to an external logging host for archiving purposes and additional protection [LOGG-2154]
https://cisofy.com/lynis/controls/LOGG-2154/
* Check what deleted files are still in use and why. [LOGG-2190]
https://cisofy.com/lynis/controls/LOGG-2190/
* Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
https://cisofy.com/lynis/controls/BANN-7126/
* Add legal banner to /etc/issue.net, to warn unauthorized users [BANN-7130]
https://cisofy.com/lynis/controls/BANN-7130/
* Enable process accounting [ACCT-9622]
https://cisofy.com/lynis/controls/ACCT-9622/
* Enable sysstat to collect accounting (no results) [ACCT-9626]
https://cisofy.com/lynis/controls/ACCT-9626/
* Enable auditd to collect audit information [ACCT-9628]
https://cisofy.com/lynis/controls/ACCT-9628/
* Check output of aa-status [MACF-6208]
- Details : /sys/kernel/security/apparmor/profiles
- Solution : Run aa-status
https://cisofy.com/lynis/controls/MACF-6208/
* Install a file integrity tool to monitor changes to critical and sensitive files [FINT-4350]
https://cisofy.com/lynis/controls/FINT-4350/
* Determine if automation tools are present for system management [TOOL-5002]
https://cisofy.com/lynis/controls/TOOL-5002/
* Consider restricting file permissions [FILE-7524]
- Details : See screen output or log file
- Solution : Use chmod to change file permissions
https://cisofy.com/lynis/controls/FILE-7524/
* One or more sysctl values differ from the scan profile and could be tweaked [KRNL-6000]
- Solution : Change sysctl value or disable test (skip-test=KRNL-6000:<sysctl-key>)
https://cisofy.com/lynis/controls/KRNL-6000/
* Harden compilers like restricting access to root user only [HRDN-7222]
https://cisofy.com/lynis/controls/HRDN-7222/
* Harden the system by installing at least one malware scanner, to perform periodic file system scans [HRDN-7230]
- Solution : Install a tool like rkhunter, chkrootkit, OSSEC
https://cisofy.com/lynis/controls/HRDN-7230/
Follow-up:
----------------------------
- Show details of a test (lynis show details TEST-ID)
- Check the logfile for all details (less /home/vboxuser/lynis.log)
- Read security controls texts (https://cisofy.com)
- Use --upload to upload data to central system (Lynis Enterprise users)
================================================================================
Lynis security scan details:
Hardening index : 60 [############ ]
Tests performed : 239
Plugins enabled : 1
Components:
- Firewall [V]
- Malware scanner [X]
Scan mode:
Normal [ ] Forensics [ ] Integration [ ] Pentest [V] (running non-privileged)
Lynis modules:
- Compliance status [?]
- Security audit [V]
- Vulnerability scan [V]
Files:
- Test and debug information : /home/vboxuser/lynis.log
- Report data : /home/vboxuser/lynis-report.dat
================================================================================
Exceptions trouvées
Des événements ou informations exceptionnels ont été trouvés!
Que faire:
Vous pouvez aider en envoyant votre fichier journal (/home/vboxuser/lynis.log).
Go to https://cisofy.com/contact/ and send your file to the e-mail address listed
================================================================================
Tests ignorés faute de privilèges
BOOT-5108 - Check Syslinux as bootloader
BOOT-5109 - Check rEFInd as bootloader
BOOT-5116 - Check if system is booted in UEFI mode
BOOT-5140 - Check for ELILO boot loader presence
AUTH-9216 - Check group and shadow group files
AUTH-9229 - Check password hashing methods
AUTH-9252 - Check ownership and permissions for sudo configuration files
AUTH-9288 - Checking for expired passwords
FILE-6368 - Checking ACL support on root file system
PKGS-7390 - Check Ubuntu database consistency
PKGS-7392 - Check for Debian/Ubuntu security updates
FIRE-4540 - Check for empty nftables configuration
FIRE-4586 - Check firewall logging
CRYP-7930 - Determine if system uses LUKS block device encryption
================================================================================
Lynis 3.0.8
Auditing, system hardening, and compliance for UNIX-based systems
(Linux, macOS, BSD, and others)
2007-2021, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)
================================================================================
[TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)