Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/CISOfy/lynis.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2021-09-01Added two tests using apk (Alpine Package Keeper) to check forSteve Kolenich
installed packages and packages that can be upgraded
2021-07-20Fix: show 'egrep' instead of 'grep' when egrep is missingMichael Boelen
2021-07-20Replaced tab with spaceMichael Boelen
2021-04-02Initial draft for Cmd supportChristian Bourque
2021-01-07Preparation for release 3.0.3Michael Boelen
2020-12-15Merge pull request #1064 from Varbin/solaris-ips-svcsMichael Boelen
Add support for Solaris services, run BOOT-5184 there
2020-11-21Quote binary variables during SUID/GID enumerationSimon Biewald
Fixes cisofy/lynis#1078. Signed-off-by: Simon Biewald <sbiewald@fam-biewald.de>
2020-10-26Add support for Solaris services, run BOOT-5184 thereSimon Biewald
The Solaris IPS service manager (svcs) is now detected, and services managed with it are enumerated. Test BOOT-5184 now runs on Solaris, too, as SysV init scripts are supported as well, even with IPS. SysV Init has been the traditional init system on Solaris.
2020-10-22add Synology Antivirus Essential malware scannerThomas Sjögren
Signed-off-by: Thomas Sjögren <konstruktoid@users.noreply.github.com>
2020-10-22Add translate function for all sectionsStéphane
+ add EN and FR up to date languages files
2020-07-22add Microsoft Defender ATP, malware scannerThomas Sjögren
Signed-off-by: Thomas Sjögren <konstruktoid@users.noreply.github.com>
2020-04-12Merge pull request #883 from topimiettinen/check-encrypted-swap-devicesMichael Boelen
Check if system uses encrypted swap devices
2020-04-01Split count values so they are reported as individual itemsMichael Boelen
2020-03-31Enhance binaries reportTopi Miettinen
Report also number of set-uid and set-gid binaries found. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-30Add NetBSD pkgsrc pkg_info to known binariesBrian Ginsbach
The NetBSD pkgsrc package management system uses pkg_info for determining information about packages. This is also the command used in PKGS-7302.
2020-03-27Check if system uses encrypted swap devicesTopi Miettinen
Add test CRYP-7931 to check if the system uses any encrypted swap devices. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-24Merge pull request #824 from Varbin/masterMichael Boelen
Add detection of OpenNTPD
2020-03-24Merge pull request #879 from topimiettinen/enhance-tomoyo-checkMichael Boelen
Enhance TOMOYO Linux check
2020-03-23Enhance TOMOYO Linux checkTopi Miettinen
Count and log unconfined processes, which are not using policy profile 3. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-23Run 'systemd-analyze security'Topi Miettinen
'systemd-analyze security' (available since systemd v240) makes a nice overall evaluation of hardening levels of services in a system. More details can be found with 'systemd-analyze security SERVICE' for each service. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-23Merge pull request #878 from topimiettinen/check-ima-evmMichael Boelen
Check IMA/EVM, dm-integrity and dm-verity statuses
2020-03-23Check for dm-integrity and dm-verityTopi Miettinen
Detect tools for dm-integrity and dm-verity, check if some devices in /dev/mapper/* use them and especially the system root device. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-22Check IMA/EVM statusTopi Miettinen
Check for evmctl (Extended Verification Module) tool and system IMA (Integrity Measurement Architecture) status. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-21Check password hashing methodsTopi Miettinen
Manual page crypt(5) gives recommendations for choosing password hashing methods, so let's check if there are weakly encrypted passwords in the system. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-20Updated date/yearMichael Boelen
2020-03-20Merge pull request #861 from topimiettinen/enhance-selinux-checkMichael Boelen
Enhance SELinux checks
2020-03-20Check DNSSEC status with resolvectl when availableTopi Miettinen
'resolvectl statistics' shows if DNSSEC is supported by systemd-resolved and upstream DNS servers. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-19Enhance SELinux checksTopi Miettinen
Display and log: permissive types (rules are not enforced), unconfined processes (not confined by rules) and processes with initrc_t type (generic type with weak rules). Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-17Skip pacman when it is the game instead of package managerMichael Boelen
2020-02-21add basic xbps/void supportKevin
2020-01-08add openntpd detection and a few tests for itSimon Biewald
2019-12-06Style change, add curly bracketsMichael Boelen
2019-10-22don't fail relative paths check with spaces in PATHKristian Schuster
2019-10-13add check for disabled coredumps in etc/profile and systemdKristian Schuster
2019-09-21Fixed a typoMichael Boelen
2019-09-19Style improvementsMichael Boelen
2019-09-13Tests using lsof may ignore threads (if supported)Michael Boelen
2019-08-21Merge pull request #731 from chr0mag/cryp-7930Michael Boelen
[CRYP-7930] Modify to use 'lsblk' and 'cryptsetup'
2019-08-04Added support for swupd (Clear Linux OS)Michael Boelen
2019-07-18[CRYP-7930] Modify to use 'lsblk' and 'cryptsetup'Julian Phillips
There are several challenges with the existing method of using /etc/crypttab: 1)encrypted rootfs partitions are not typically listed in this file (users are prompted for password in early boot instead) 2)the 'luks' option is the default option so it is possible for /etc/crypttab entries to never have this set explicitly and any block device configured as such will be missed currently 3)any device mounted manually, or using any other mechanism aside from /etc/crypttab will be missed This commit executes 'cryptsetup isLuks' on every block device in the system to determine whether it is a LUKS device. This handles all 3 cases mentioned above. Test case wording was also updated to reflect the fact that it only checks for LUKS entrypted block devices. So, plain dm-crypt and TrueCrypt/VeraCrypt block device encryption is not detected. Nor is any file system level encryption such as eCryptfs, EncFs, gocryptfs.
2019-07-16Use -n instead of ! -zMichael Boelen
2019-07-14Disable testing for other tools, as xxd is not present on all systems by defaultMichael Boelen
2019-07-05Only check empty binaries when we did a full scan, as for some commands the ↵Michael Boelen
binary scanning is not performed
2019-07-01When PATH is defined, only locations from variableMichael Boelen
2019-06-30Security: test PATH and warn or exit on discovery of dangerous locationMichael Boelen
2019-06-30Added check to ensure that common system tools are defined as extra safety ↵Michael Boelen
measure
2019-06-24Added Suricata (IDS)Michael Boelen
2019-06-24Added Bro (IDS)Michael Boelen
2019-04-09Corrected lsvg binary detectionMichael Boelen
2019-04-07Detect equery binaryMichael Boelen