On Sun, May 17, 2009 at 03:04:18AM +0200, Ingo Schwarze wrote:
> Hi Joachim, hi Yurij,
> 
> Joachim Schipper wrote on Sat, May 16, 2009 at 01:23:20PM +0200:
> > On Fri, May 15, 2009 at 10:39:06PM +0500, Yuriy Grishin wrote:
> 
> >> I've installed OpenBSD 4.5 on my home gateway.
> >> Random pids and critical files permission are really cool.
> >> I just confused a little bit because I haven't found any way
> >> to check the vulnerabilities of my configuration.
> >> Are there any?
> 
> > This is not what you are asking for, but security(8) will run nightly
> > and check various files. This detects unsophisticated intruders and -
> > more importantly - makes it easy to spot and fix misconfigurations.
> 
> But be aware of this:
> 
>  $ man security | tail -n 7  
> BUGS
>      The name of this script may provide a false sense of security.
> 
>      There are perhaps an infinite number of ways the system can be
>      compromised without this script noticing.

Of course.

> > Of course, it can be extended with your own critical files, if desired.
> 
> Actually, security(8), in contrast to daily(8)/weekly/monthly, does not
> support security.local additions right now.  I don't see a pressing need
> to implement that hook, either; it would be easy enough, though, just
> adding the two lines
> 
>   next_part "Running /etc/security.local:"
>   run_script "security.local"
> 
> at the very end of /etc/security does the trick.
> 
> Apart from that, i would recommend against locally modifying the script
> /etc/security itself.  You can use daily.local for local additions.
> Of course, you can also add files to the changelist(5).
> Perhaps the latter is what you were hinting at.

Oh, I'm sorry, I should have been more clear.

security(8) runs mtree(8) on, amongst others, /etc/mtree/*.secure. Such
files can be freely added, no?

That is what I intended to say, but I didn't actually say it... sorry
for any confusion that may have resulted!

                Joachim

Reply via email to