bonjour
j'ai passé tout mon disque avec bitdefender j'avais 2 ou 3 fichiers suspects que j'ai eliminé,je verrai demain si la mise à jour se passe bien,pour repondre a benjarobin je ne vois pas ce que j'aurais configuré qui poserait problème ,je suis pas trop kamikase pour faire n'importe quoi,je ne suis pas un utilisateur d'arch aussi calé que certains sur ce forum ,donc je m'abstiens quand je ne suis pas sûr, et quand j'ai un doute je vais sur le forum et je me renseigne
j'ai fait un scan avec lynis qui parait il est mieux que rkhunter mais je comprends pas grand chose aux resultats
Code : Tout sélectionner
[[jean@arch ~]$ sudo lynis audit system
[sudo] Mot de passe de jean :
[ Lynis 2.5.5 ]
################################################################################
Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See the LICENSE file for details about using this software.
2007-2017, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)
################################################################################
[+] Initializing program
------------------------------------
- Detecting OS... [ DONE ]
- Checking profiles... [ DONE ]
- Detecting language and localization [ fr ]
---------------------------------------------------
Program version: 2.5.5
Operating system: Linux
Operating system name: Arch Linux
Operating system version: Rolling release
Kernel version: 4.9.51
Hardware platform: x86_64
Hostname: localhost
---------------------------------------------------
Profiles: /etc/lynis/default.prf
Log file: /var/log/lynis.log
Report file: /var/log/lynis-report.dat
Report version: 1.0
Plugin directory: /usr/share/lynis/plugins
---------------------------------------------------
Auditor: [Not Specified]
Test category: all
Test group: all
---------------------------------------------------
- Program update status... [ NO UPDATE ]
[+] System Tools
------------------------------------
- Scanning available tools...
- Checking system binaries...
[+] Plugins (phase 1)
------------------------------------
Note: les plugins ont des tests plus poussés et peuvent prendre plusieurs minutes
- Plugins activés [ NONE ]
[+] Boot and services
------------------------------------
/usr/share/lynis/include/tests_boot_services: ligne 72: avertissement :command substitution: ignored null byte in input
- Service Manager [ systemd ]
- Checking UEFI boot [ DÉSACTIVÉ ]
- Checking presence GRUB2 [ TROUVÉ ]
- Checking for password protection [ ATTENTION ]
- Check running services (systemctl) [ FAIT ]
Result: found 17 running services
- Check enabled services at boot (systemctl) [ FAIT ]
Result: found 17 enabled services
- Check startup files (permissions) [ OK ]
- Checking sulogin in rescue.service [ NON TROUVÉ ]
[+] Kernel
------------------------------------
- Checking CPU support (NX/PAE)
CPU support: PAE and/or NoeXecute supported [ TROUVÉ ]
- Checking kernel version and release [ FAIT ]
- Checking kernel type [ FAIT ]
- Checking loaded kernel modules [ FAIT ]
Found 138 active modules
- Checking Linux kernel configuration file [ TROUVÉ ]
- Checking core dumps configuration [ DÉSACTIVÉ ]
- Checking setuid core dumps configuration [ DEFAULT ]
- Check if reboot is needed [ INCONNU ]
[+] Mémoire et Processus
------------------------------------
- Checking /proc/meminfo [ TROUVÉ ]
- Searching for dead/zombie processes [ OK ]
- Searching for IO waiting processes [ OK ]
[+] Users, Groups and Authentication
------------------------------------
- Administrator accounts [ OK ]
- Unique UIDs [ OK ]
- Consistency of group files (grpck) [ OK ]
- Unique group IDs [ OK ]
- Unique group names [ OK ]
- Password file consistency [ OK ]
- Query system users (non daemons) [ FAIT ]
- NIS+ authentication support [ NOT ENABLED ]
- NIS authentication support [ NOT ENABLED ]
- sudoers file [ TROUVÉ ]
- Check sudoers file permissions [ OK ]
- PAM password strength tools [ OK ]
- PAM configuration file (pam.conf) [ NON TROUVÉ ]
- PAM configuration files (pam.d) [ TROUVÉ ]
- PAM modules [ TROUVÉ ]
- Accounts without expire date [ OK ]
- Accounts without password [ OK ]
- Checking user password aging (minimum) [ DÉSACTIVÉ ]
- User password aging (maximum) [ DÉSACTIVÉ ]
- Checking expired passwords [ OK ]
- Checking Linux single user mode authentication [ ATTENTION ]
- Determining default umask
- umask (/etc/profile and /etc/profile.d) [ SUGGESTION ]
- umask (/etc/login.defs) [ OK ]
- LDAP authentication support [ NOT ENABLED ]
- Logging failed login attempts [ DÉSACTIVÉ ]
[+] Shells
------------------------------------
- Checking shells from /etc/shells
Result: found 3 shells (valid shells: 3).
- Session timeout settings/tools [ AUCUN ]
- Checking default umask values
- Checking default umask in /etc/bash.bashrc [ AUCUN ]
- Checking default umask in /etc/profile [ WEAK ]
[+] File systems
------------------------------------
- Checking mount points
- Checking /home mount point [ SUGGESTION ]
- Checking /tmp mount point [ OK ]
- Checking /var mount point [ SUGGESTION ]
- Query swap partitions (fstab) [ OK ]
- Testing swap partitions [ OK ]
- Testing /proc mount (hidepid) [ SUGGESTION ]
- Checking for old files in /tmp [ OK ]
- Checking /tmp sticky bit [ OK ]
- ACL support root file system [ ACTIVÉ ]
- Mount options of / [ NON DEFAULT ]
- Disable kernel support of some filesystems
- Discovered kernel modules: cramfs hfs hfsplus jffs2 squashfs udf
[+] Storage
------------------------------------
- Checking usb-storage driver (modprobe config) [ NOT DISABLED ]
- Checking USB devices authorization [ ACTIVÉ ]
- Checking firewire ohci driver (modprobe config) [ NOT DISABLED ]
[+] NFS
------------------------------------
- Query rpc registered programs [ FAIT ]
- Query NFS versions [ FAIT ]
- Query NFS protocols [ FAIT ]
- Check running NFS daemon [ NON TROUVÉ ]
[+] Name services
------------------------------------
- Searching DNS domain name [ TROUVÉ ]
Domain name: localdomain
- Checking /etc/hosts
- Checking /etc/hosts (duplicates) [ OK ]
- Checking /etc/hosts (hostname) [ OK ]
- Checking /etc/hosts (localhost) [ OK ]
- Checking /etc/hosts (localhost to IP) [ OK ]
[+] Ports and packages
------------------------------------
- Searching package managers
- Searching pacman package manager [ TROUVÉ ]
- Querying pacman package manager
- Searching update status (checkupdates) [ UP-TO-DATE ]
- Searching dpkg package manager [ TROUVÉ ]
- Querying package manager
- Query unpurged packages [ AUCUN ]
- Checking package audit tool [ AUCUN ]
[+] Networking
------------------------------------
- Checking IPv6 configuration [ ACTIVÉ ]
Configuration method [ AUTO ]
IPv6 only [ NO ]
- Checking configured nameservers
- Testing nameservers
Nameserver: 212.27.40.240 [ OK ]
Nameserver: 212.27.40.241 [ OK ]
- Minimal of 2 responsive nameservers [ OK ]
- Checking default gateway [ FAIT ]
- Getting listening ports (TCP/UDP) [ FAIT ]
* Found 15 ports
- Checking promiscuous interfaces [ OK ]
- Checking waiting connections [ OK ]
- Checking status DHCP client [ EN COURS: ]
- Checking for ARP monitoring software [ NON TROUVÉ ]
[+] Printers and Spools
------------------------------------
- Checking cups daemon [ EN COURS: ]
- Checking CUPS configuration file [ OK ]
- File permissions [ OK ]
- Checking CUPS addresses/sockets [ TROUVÉ ]
- Checking lp daemon [ NON LANCÉ ]
[+] Software: e-mail and messaging
------------------------------------
[+] Software: firewalls
------------------------------------
- Checking iptables kernel module [ TROUVÉ ]
- Checking iptables policies of chains [ TROUVÉ ]
/usr/share/lynis/include/tests_firewalls: ligne 118: avertissement :command substitution: ignored null byte in input
- Checking for empty ruleset [ OK ]
- Checking for unused rules [ TROUVÉ ]
- Checking host based firewall [ ACTIVE ]
[+] Software: webserver
------------------------------------
- Checking Apache (binary /usr/bin/httpd) [ TROUVÉ ]
Info: Configuration file found (/etc/httpd/conf/httpd.conf)
Info: Found 4 virtual hosts
* Loadable modules [ TROUVÉ (232) ]
- Found 232 loadable modules
mod_evasive: anti-DoS/brute force [ NON TROUVÉ ]
mod_reqtimeout/mod_qos [ TROUVÉ ]
ModSecurity: web application firewall [ NON TROUVÉ ]
- Checking nginx [ NON TROUVÉ ]
[+] SSH Support
------------------------------------
- Checking running SSH daemon [ NON TROUVÉ ]
[+] SNMP Support
------------------------------------
- Checking running SNMP daemon [ NON TROUVÉ ]
[+] Databases
------------------------------------
No database engines found
[+] LDAP Services
------------------------------------
- Checking OpenLDAP instance [ NON TROUVÉ ]
[+] PHP
------------------------------------
- Checking PHP [ TROUVÉ ]
- Checking PHP disabled functions [ TROUVÉ ]
- Checking expose_php option [ ON ]
- Checking enable_dl option [ OFF ]
- Checking allow_url_fopen option [ ON ]
- Checking allow_url_include option [ OFF ]
- Checking PHP suhosin extension status [ ATTENTION ]
- Suhosin simulation mode status [ ATTENTION ]
[+] Squid Support
------------------------------------
- Checking running Squid daemon [ NON TROUVÉ ]
[+] Logging and files
------------------------------------
- Checking for a running log daemon [ OK ]
- Checking Syslog-NG status [ NON TROUVÉ ]
- Checking systemd journal status [ TROUVÉ ]
- Checking Metalog status [ NON TROUVÉ ]
- Checking RSyslog status [ NON TROUVÉ ]
- Checking RFC 3195 daemon status [ NON TROUVÉ ]
- Checking minilogd instances [ NON TROUVÉ ]
- Checking logrotate presence [ OK ]
- Checking log directories (static list) [ FAIT ]
- Checking open log files [ FAIT ]
- Checking deleted files in use [ FILES FOUND ]
[+] Insecure services
------------------------------------
- Checking inetd status [ NOT ACTIVE ]
[+] Banners and identification
------------------------------------
- /etc/issue [ TROUVÉ ]
- /etc/issue contents [ WEAK ]
- /etc/issue.net [ NON TROUVÉ ]
[+] Scheduled tasks
------------------------------------
- Checking crontab/cronjob [ FAIT ]
[+] Accounting
------------------------------------
- Checking accounting information [ NON TROUVÉ ]
- Checking sysstat accounting data [ NON TROUVÉ ]
- Checking auditd [ NON TROUVÉ ]
[+] Time and Synchronization
------------------------------------
- NTP daemon found: ntpd [ TROUVÉ ]
- NTP daemon found: systemd (timesyncd) [ TROUVÉ ]
- Checking for a running NTP daemon or client [ OK ]
- Checking valid association ID's [ TROUVÉ ]
- Checking high stratum ntp peers [ OK ]
- Checking unreliable ntp peers [ AUCUN ]
- Checking selected time source [ OK ]
- Checking time source candidates [ OK ]
- Checking falsetickers [ OK ]
- Checking NTP version [ TROUVÉ ]
[+] Cryptography
------------------------------------
- Checking for expired SSL certificates [0/0] [ AUCUN ]
[+] Virtualization
------------------------------------
[+] Containers
------------------------------------
[+] Security frameworks
------------------------------------
- Checking presence AppArmor [ NON TROUVÉ ]
- Checking presence SELinux [ NON TROUVÉ ]
- Checking presence grsecurity [ NON TROUVÉ ]
- Checking for implemented MAC framework [ AUCUN ]
[+] Software: file integrity
------------------------------------
- Checking file integrity tools
- Checking presence integrity tool [ NON TROUVÉ ]
[+] Software: System tooling
------------------------------------
- Checking automation tooling
- Automation tooling [ NON TROUVÉ ]
- Checking for IDS/IPS tooling [ AUCUN ]
[+] Software: Malware
------------------------------------
[+] File Permissions
------------------------------------
- Starting file permissions check
[+] Home directories
------------------------------------
- Checking shell history files [ OK ]
[+] Kernel Hardening
------------------------------------
- Comparing sysctl key pairs with scan profile
- fs.protected_hardlinks (exp: 1) [ OK ]
- fs.protected_symlinks (exp: 1) [ OK ]
- fs.suid_dumpable (exp: 0) [ OK ]
- kernel.core_uses_pid (exp: 1) [ OK ]
- kernel.ctrl-alt-del (exp: 0) [ OK ]
- kernel.dmesg_restrict (exp: 1) [ DIFFERENT ]
- kernel.kptr_restrict (exp: 2) [ DIFFERENT ]
- kernel.randomize_va_space (exp: 2) [ OK ]
- kernel.sysrq (exp: 0) [ DIFFERENT ]
- net.ipv4.conf.all.accept_redirects (exp: 0) [ OK ]
- net.ipv4.conf.all.accept_source_route (exp: 0) [ OK ]
- net.ipv4.conf.all.bootp_relay (exp: 0) [ OK ]
- net.ipv4.conf.all.forwarding (exp: 0) [ OK ]
- net.ipv4.conf.all.log_martians (exp: 1) [ DIFFERENT ]
- net.ipv4.conf.all.mc_forwarding (exp: 0) [ OK ]
- net.ipv4.conf.all.proxy_arp (exp: 0) [ OK ]
- net.ipv4.conf.all.rp_filter (exp: 1) [ OK ]
- net.ipv4.conf.all.send_redirects (exp: 0) [ DIFFERENT ]
- net.ipv4.conf.default.accept_redirects (exp: 0) [ OK ]
- net.ipv4.conf.default.accept_source_route (exp: 0) [ OK ]
- net.ipv4.conf.default.log_martians (exp: 1) [ DIFFERENT ]
- net.ipv4.icmp_echo_ignore_broadcasts (exp: 1) [ OK ]
- net.ipv4.icmp_ignore_bogus_error_responses (exp: 1) [ OK ]
- net.ipv4.tcp_syncookies (exp: 1) [ DIFFERENT ]
- net.ipv4.tcp_timestamps (exp: 0) [ DIFFERENT ]
- net.ipv6.conf.all.accept_redirects (exp: 0) [ OK ]
- net.ipv6.conf.all.accept_source_route (exp: 0) [ OK ]
- net.ipv6.conf.default.accept_redirects (exp: 0) [ OK ]
- net.ipv6.conf.default.accept_source_route (exp: 0) [ OK ]
[+] Hardening
------------------------------------
- Installed compiler(s) [ TROUVÉ ]
- Installed malware scanner [ NON TROUVÉ ]
[+] Tests Personnalisés
------------------------------------
- Running custom tests... [ NONE ]
[+] Plugins (phase 2)
------------------------------------
================================================================================
-[ Lynis 2.5.5 Results ]-
Warnings (2):
----------------------------
! No password set for single mode [AUTH-9308]
https://cisofy.com/controls/AUTH-9308/
! PHP option expose_php is possibly turned on, which can reveal useful information for attackers. [PHP-2372]
https://cisofy.com/controls/PHP-2372/
Suggestions (31):
----------------------------
* Set a password on GRUB bootloader to prevent altering boot configuration (e.g. boot in single user mode without password) [BOOT-5122]
https://cisofy.com/controls/BOOT-5122/
* Protect rescue.service by using sulogin [BOOT-5260]
https://cisofy.com/controls/BOOT-5260/
* Configure minimum password age in /etc/login.defs [AUTH-9286]
https://cisofy.com/controls/AUTH-9286/
* Configure maximum password age in /etc/login.defs [AUTH-9286]
https://cisofy.com/controls/AUTH-9286/
* Set password for single user mode to minimize physical access attack surface [AUTH-9308]
https://cisofy.com/controls/AUTH-9308/
* Default umask in /etc/profile or /etc/profile.d/custom.sh could be more strict (e.g. 027) [AUTH-9328]
https://cisofy.com/controls/AUTH-9328/
* To decrease the impact of a full /home file system, place /home on a separated partition [FILE-6310]
https://cisofy.com/controls/FILE-6310/
* To decrease the impact of a full /var file system, place /var on a separated partition [FILE-6310]
https://cisofy.com/controls/FILE-6310/
* Disable drivers like USB storage when not used, to prevent unauthorized storage or data theft [STRG-1840]
https://cisofy.com/controls/STRG-1840/
* Disable drivers like firewire storage when not used, to prevent unauthorized storage or data theft [STRG-1846]
https://cisofy.com/controls/STRG-1846/
* Consider installing arch-audit to determine vulnerable packages [PKGS-7320]
- Details : arch-audit
- Solution : Install arch-audit
https://cisofy.com/controls/PKGS-7320/
* Install debsums utility for the verification of packages with known good database. [PKGS-7370]
https://cisofy.com/controls/PKGS-7370/
* Install a package audit tool to determine vulnerable packages [PKGS-7398]
https://cisofy.com/controls/PKGS-7398/
* Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032]
https://cisofy.com/controls/NETW-3032/
* Check iptables rules to see which rules are currently not used [FIRE-4513]
https://cisofy.com/controls/FIRE-4513/
* Install Apache mod_evasive to guard webserver against DoS/brute force attempts [HTTP-6640]
https://cisofy.com/controls/HTTP-6640/
* Install Apache modsecurity to guard webserver against web application attacks [HTTP-6643]
https://cisofy.com/controls/HTTP-6643/
* Change the expose_php line to: expose_php = Off [PHP-2372]
https://cisofy.com/controls/PHP-2372/
* Change the allow_url_fopen line to: allow_url_fopen = Off, to disable downloads via PHP [PHP-2376]
https://cisofy.com/controls/PHP-2376/
* Harden PHP by enabling suhosin extension [PHP-2379]
https://cisofy.com/controls/PHP-2379/
* Harden PHP by deactivating suhosin simulation mode [PHP-2379]
https://cisofy.com/controls/PHP-2379/
* Check what deleted files are still in use and why. [LOGG-2190]
https://cisofy.com/controls/LOGG-2190/
* Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
https://cisofy.com/controls/BANN-7126/
* Enable process accounting [ACCT-9622]
https://cisofy.com/controls/ACCT-9622/
* Enable sysstat to collect accounting (no results) [ACCT-9626]
https://cisofy.com/controls/ACCT-9626/
* Enable auditd to collect audit information [ACCT-9628]
https://cisofy.com/controls/ACCT-9628/
* Install a file integrity tool to monitor changes to critical and sensitive files [FINT-4350]
https://cisofy.com/controls/FINT-4350/
* Determine if automation tools are present for system management [TOOL-5002]
https://cisofy.com/controls/TOOL-5002/
* One or more sysctl values differ from the scan profile and could be tweaked [KRNL-6000]
https://cisofy.com/controls/KRNL-6000/
* Harden compilers like restricting access to root user only [HRDN-7222]
https://cisofy.com/controls/HRDN-7222/
* Harden the system by installing at least one malware scanner, to perform periodic file system scans [HRDN-7230]
- Solution : Install a tool like rkhunter, chkrootkit, OSSEC
https://cisofy.com/controls/HRDN-7230/
Follow-up:
----------------------------
- Show details of a test (lynis show details TEST-ID)
- Check the logfile for all details (less /var/log/lynis.log)
- Read security controls texts (https://cisofy.com)
- Use --upload to upload data to central system (Lynis Enterprise users)
================================================================================
Lynis security scan details:
Hardening index : 68 [############# ]
Tests performed : 223
Plugins enabled : 0
Components:
- Firewall [V]
- Malware scanner [X]
Lynis Modules:
- Compliance Status [?]
- Security Audit [V]
- Vulnerability Scan [V]
Files:
- Test and debug information : /var/log/lynis.log
- Report data : /var/log/lynis-report.dat
================================================================================
Exceptions trouvées
Des événements ou informations exceptionnels ont été trouvés!
Que faire:
Vous pouvez aider en envoyant votre fichier journal (/var/log/lynis.log).
Go to https://cisofy.com/contact/ and send your file to the e-mail address listed
================================================================================
Lynis 2.5.5
Auditing, system hardening, and compliance for UNIX-based systems
(Linux, macOS, BSD, and others)
2007-2017, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)
================================================================================
[TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
[jean@arch ~]$
si quelqu'un y retrouve ses petits !!!!!