squeeze.conf.j2 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860
  1. {% if ansible_prolog -%}
  2. {% from 'templates/ansible/prolog.j2' import prolog with context %}
  3. {{ prolog() }}
  4. {% endif -%}
  5. #
  6. # This is the main configuration file for Rootkit Hunter.
  7. #
  8. # You can either modify this file directly, or you can create a local
  9. # configuration file. The local file must be named 'rkhunter.conf.local',
  10. # and must reside in the same directory as this file. Please modify one
  11. # or both files to your own requirements.
  12. #
  13. # Please review the documentation before posting bug reports or questions.
  14. # To report bugs, obtain updates, or provide patches or comments, please go to:
  15. # http://rkhunter.sourceforge.net
  16. #
  17. # To ask questions about rkhunter, please use the rkhunter-users mailing list.
  18. # Note this is a moderated list: please subscribe before posting.
  19. #
  20. # Lines beginning with a hash (#), and blank lines, are ignored.
  21. # End-of-line comments are not supported.
  22. #
  23. # Most of the following options need only be specified once. If
  24. # they appear more than once, then the last one seen will be used.
  25. # Some options are allowed to appear more than once, and the text
  26. # describing the option will say if this is so.
  27. #
  28. #
  29. # If this option is set to 1, it specifies that the mirrors file
  30. # ('mirrors.dat'), which is used when the '--update' and '--versioncheck'
  31. # options are used, is to be rotated. Rotating the entries in the file
  32. # allows a basic form of load-balancing between the mirror sites whenever
  33. # the above options are used.
  34. # If the option is set to 0, then the mirrors will be treated as if in
  35. # a priority list. That is, the first mirror listed will always be used
  36. # first. The second mirror will only be used if the first mirror fails,
  37. # the third mirror will only be used if the second mirror fails, and so on.
  38. #
  39. # If the mirrors file is read-only, then the '--versioncheck' command-line
  40. # option can only be used if this option is set to 0.
  41. #
  42. ROTATE_MIRRORS=1
  43. #
  44. # If this option is set to 1, it specifies that when the '--update'
  45. # option is used, then the mirrors file is to be checked for updates
  46. # as well. If the current mirrors file contains any local mirrors,
  47. # these will be prepended to the updated file.
  48. # If this option is set to 0, the mirrors file can only be updated
  49. # manually. This may be useful if only using local mirrors.
  50. #
  51. UPDATE_MIRRORS=1
  52. #
  53. # The MIRRORS_MODE option tells rkhunter which mirrors are to be
  54. # used when the '--update' or '--versioncheck' command-line options
  55. # are given. Possible values are:
  56. # 0 - use any mirror (the default)
  57. # 1 - only use local mirrors
  58. # 2 - only use remote mirrors
  59. #
  60. # Local and remote mirrors can be defined in the mirrors file
  61. # by using the 'local=' and 'remote=' keywords respectively.
  62. #
  63. MIRRORS_MODE=0
  64. #
  65. # Email a message to this address if a warning is found when the
  66. # system is being checked. Multiple addresses may be specified
  67. # simply be separating them with a space. Setting this option to
  68. # null disables the option.
  69. #
  70. # NOTE: This option should be present in the configuration file.
  71. #
  72. #MAIL-ON-WARNING=me@mydomain root@mydomain
  73. MAIL-ON-WARNING=""
  74. #
  75. # Specify the mail command to use if MAIL-ON-WARNING is set.
  76. # NOTE: Double quotes are not required around the command, but
  77. # are required around the subject line if it contains spaces.
  78. #
  79. MAIL_CMD=mail -s "[rkhunter] Warnings found for ${HOST_NAME}"
  80. #
  81. # Specify the temporary directory to use.
  82. #
  83. # NOTE: Do not use /tmp as your temporary directory. Some
  84. # important files will be written to this directory, so be
  85. # sure that the directory permissions are tight.
  86. #
  87. TMPDIR=/var/lib/rkhunter/tmp
  88. #
  89. # Specify the database directory to use.
  90. #
  91. DBDIR=/var/lib/rkhunter/db
  92. #
  93. # Specify the script directory to use.
  94. #
  95. SCRIPTDIR=/usr/share/rkhunter/scripts
  96. #
  97. # Specify the root directory to use.
  98. #
  99. #ROOTDIR=""
  100. #
  101. # Specify the command directories to be checked. This is a
  102. # space-separated list of directories.
  103. #
  104. BINDIR="/bin /usr/bin /sbin /usr/sbin /usr/local/bin /usr/local/sbin /usr/libexec /usr/local/libexec"
  105. #
  106. # Specify the default language to use. This should be similar
  107. # to the ISO 639 language code.
  108. #
  109. # NOTE: Please ensure that the language you specify is supported.
  110. # For a list of supported languages use the following command:
  111. #
  112. # rkhunter --lang en --list languages
  113. #
  114. #LANGUAGE=en
  115. #
  116. # This option is a space-separated list of the languages that are to
  117. # be updated when the '--update' option is used. If unset, then all
  118. # the languages will be updated. If none of the languages are to be
  119. # updated, then set this option to just 'en'.
  120. #
  121. # The default is for all the languages to be updated. The default
  122. # language, specified above, and the English (en) language file will
  123. # always be updated regardless of this option.
  124. #
  125. UPDATE_LANG=""
  126. #
  127. # Specify the log file pathname.
  128. #
  129. # NOTE: This option should be present in the configuration file.
  130. #
  131. LOGFILE=/var/log/rkhunter.log
  132. #
  133. # Set the following option to 1 if the log file is to be appended to
  134. # whenever rkhunter is run.
  135. #
  136. APPEND_LOG=0
  137. #
  138. # Set the following option to 1 if the log file is to be copied when
  139. # rkhunter finishes and an error or warning has occurred. The copied
  140. # log file name will be appended with the current date and time
  141. # (in YYYY-MM-DD_HH:MM:SS format).
  142. # For example: rkhunter.log.2009-04-21_00:57:51
  143. #
  144. COPY_LOG_ON_ERROR=0
  145. #
  146. # Set the following option to enable the rkhunter check start and finish
  147. # times to be logged by syslog. Warning messages will also be logged.
  148. # The value of the option must be a standard syslog facility and
  149. # priority, separated by a dot.
  150. #
  151. # For example: USE_SYSLOG=authpriv.warning
  152. #
  153. # Setting the value to 'none', or just leaving the option commented out,
  154. # disables the use of syslog.
  155. #
  156. #USE_SYSLOG=authpriv.notice
  157. #
  158. # Set the following option to 1 if the second colour set is to be used.
  159. # This can be useful if your screen uses black characters on a white
  160. # background (for example, a PC instead of a server).
  161. #
  162. COLOR_SET2=0
  163. #
  164. # Set the following option to 0 if rkhunter should not detect if X is
  165. # being used. If X is detected as being used, then the second colour
  166. # set will automatically be used.
  167. #
  168. AUTO_X_DETECT=1
  169. #
  170. # Set the following option to 1 if it is wanted that any 'Whitelisted'
  171. # results are shown in white rather than green. For colour set 2 users,
  172. # setting this option will cause the result to be shown in black.
  173. #
  174. WHITELISTED_IS_WHITE=0
  175. #
  176. # The following option is checked against the SSH configuration file
  177. # 'PermitRootLogin' option. A warning will be displayed if they do not
  178. # match. However, if a value has not been set in the SSH configuration
  179. # file, then a value here of 'yes' or 'unset' will not cause a warning.
  180. # This option has a default value of 'no'.
  181. #
  182. ALLOW_SSH_ROOT_USER=without-password
  183. #
  184. # Set this option to '1' to allow the use of the SSH-1 protocol, but note
  185. # that theoretically it is weaker, and therefore less secure, than the
  186. # SSH-2 protocol. Do not modify this option unless you have good reasons
  187. # to use the SSH-1 protocol (for instance for AFS token passing or Kerberos4
  188. # authentication). If the 'Protocol' option has not been set in the SSH
  189. # configuration file, then a value of '2' may be set here in order to
  190. # suppress a warning message. This option has a default value of '0'.
  191. #
  192. ALLOW_SSH_PROT_V1=0
  193. #
  194. # This setting tells rkhunter the directory containing the SSH configuration
  195. # file. This setting will be worked out by rkhunter, and so should not
  196. # usually need to be set.
  197. #
  198. #SSH_CONFIG_DIR=/etc/ssh
  199. #
  200. # These two options determine which tests are to be performed.
  201. # The ENABLE_TESTS option can use the word 'all' to refer to all the
  202. # available tests. The DISABLE_TESTS option can use the word 'none' to
  203. # mean that no tests are disabled. The list of disabled tests is applied to
  204. # the list of enabled tests. Both options are space-separated lists of test
  205. # names. The currently available test names can be seen by using the command
  206. # 'rkhunter --list tests'.
  207. #
  208. # The program defaults are to enable all tests and disable none. However, if
  209. # either option is specified in this file, then it overrides the program
  210. # default. The supplied rkhunter.conf file has some tests already disabled,
  211. # and these are tests that will be used only incidentally, can be considered
  212. # "advanced" or those that are prone to produce more than the "average" number
  213. # of "false positives".
  214. #
  215. # Please read the README file for more details about enabling and disabling
  216. # tests, the test names, and how rkhunter behaves when these options are used.
  217. #
  218. # hidden_procs test requires the unhide command which is part of the unhide
  219. # package in Debian.
  220. #
  221. # apps test is disabled by default as it triggers warnings about outdated
  222. # applications (and warns about possible security risk: we better trust
  223. # the Debian Security Team).
  224. #
  225. ENABLE_TESTS="all"
  226. {% set disable_tests = [] %}
  227. {% if not ansible_virtualization_role is defined or ansible_virtualization_role != 'guest' -%}
  228. {% if disable_tests.append('os_specific') %}{% endif %}
  229. {%- endif %}
  230. {% if not ansible_virtualization_role is defined or ansible_virtualization_role != 'host' -%}
  231. {% if disable_tests.append('promisc') %}{% endif %}
  232. {%- endif %}
  233. DISABLE_TESTS="suspscan hidden_procs deleted_files packet_cap_apps apps {{ disable_tests|join(' ') }}"
  234. #
  235. # The HASH_FUNC option can be used to specify the command to use
  236. # for the file hash value check. It can be specified as just the
  237. # command name or the full pathname. If just the command name is
  238. # given, and it is one of MD5, SHA1, SHA224, SHA256, SHA384 or
  239. # SHA512, then rkhunter will first look for the relevant command,
  240. # such as 'sha256sum', and then for 'sha256'. If neither of these
  241. # are found, it will then look to see if a perl module has been
  242. # installed which will support the relevant hash function.
  243. #
  244. # The default is SHA1, or MD5 if SHA1 cannot be found.
  245. #
  246. # Systems using prelinking are restricted to using either the
  247. # SHA1 or MD5 function.
  248. #
  249. # A value of 'NONE' (in uppercase) can be specified to indicate that
  250. # no hash function should be used. Rootkit Hunter will detect this and
  251. # automatically disable the file hash checks.
  252. #
  253. # Examples:
  254. # For Solaris 9 : HASH_FUNC=gmd5sum
  255. # For Solaris 10: HASH_FUNC=sha1sum
  256. # For AIX (>5.2): HASH_FUNC="csum -hMD5"
  257. # For NetBSD : HASH_FUNC="cksum -a sha512"
  258. #
  259. # NOTE: If the hash function is changed then you MUST run rkhunter with
  260. # the '--propupd' option to rebuild the file properties database.
  261. #
  262. #HASH_FUNC=sha1sum
  263. #
  264. # The HASH_FLD_IDX option specifies which field from the HASH_FUNC
  265. # command output contains the hash value. The fields are assumed to
  266. # be space-separated. The default value is one, but for *BSD users
  267. # rkhunter will, by default, use a value of 4 if the HASH_FUNC option
  268. # has not been set. The option value must be a positive integer.
  269. #
  270. #HASH_FLD_IDX=4
  271. #
  272. # The PKGMGR option tells rkhunter to use the specified package manager
  273. # to obtain the file property information. This is used when updating
  274. # the file properties file ('rkhunter.dat'), and when running the file
  275. # properties check. For RedHat/RPM-based systems, 'RPM' can be used
  276. # to get information from the RPM database. For Debian-based systems
  277. # 'DPKG' can be used, and for *BSD systems 'BSD' can be used.
  278. # No value, or a value of 'NONE', indicates that no package manager
  279. # is to be used. The default is 'NONE'.
  280. #
  281. # The current package managers store the file hash values using an
  282. # MD5 hash function.
  283. #
  284. # The 'DPKG' and 'BSD' package managers only provide MD5 hash values.
  285. # The 'RPM' package manager additionally provides values for the inode,
  286. # file permissions, uid, gid and other values.
  287. #
  288. # For any file not part of a package, rkhunter will revert to using
  289. # the HASH_FUNC hash function instead.
  290. #
  291. # Whenever this option is changed 'rkhunter --propupd' must be run.
  292. #
  293. # NONE is the default for Debian as well, as running --propupd takes
  294. # about 4 times longer when it's set to DPKG
  295. #
  296. #PKGMGR=NONE
  297. #
  298. # It is possible that a file which is part of a package may be modified
  299. # by the administrator. Typically this occurs for configuration files.
  300. # However, the RPM verify function may list the file as being modified,
  301. # it does for some but not for others depending on how the package was
  302. # built. The PKGMGR_NO_VRFY option is a space-separated list of file
  303. # pathnames which are to be exempt from the package manager verification
  304. # process, and which will be treated as non-packaged files. As such, the
  305. # files properties are still checked.
  306. #
  307. # This option may be used more than once. It only takes effect if the
  308. # PKGMGR option has been set, and is not 'NONE'.
  309. #
  310. # Whenever this option is changed 'rkhunter --propupd' must be run.
  311. #
  312. #PKGMGR_NO_VRFY=""
  313. #
  314. # This option is a space-separated list of command pathnames. Rkhunter will
  315. # ignore any prelink dependency errors for the given files. However, a
  316. # warning will be issued if the error does not occur. As such this option
  317. # must only be used on commands which experience a persistent problem.
  318. #
  319. # Short-term prelink dependency errors can usually be resolved simply by
  320. # running the prelink command on the given pathname.
  321. #
  322. # NOTE: The command 'rkhunter --propupd' must be run whenever this option
  323. # is changed.
  324. #
  325. #IGNORE_PRELINK_DEP_ERR="/bin/ps /usr/bin/top"
  326. #
  327. # This option is a space-separated list of commands, directories and file
  328. # pathnames. This option can be specified more than once.
  329. #
  330. # Whenever this option is changed, 'rkhunter --propupd' must be run.
  331. #
  332. # Simple command names - for example, 'top' - and directory names are
  333. # added to the internal list of directories to be searched for each of
  334. # the command names in the command list. Additionally, full pathnames
  335. # to files, which need not be commands, may be given. Any files or
  336. # directories which are already part of the internal lists will be
  337. # silently ignored from the configuration.
  338. #
  339. # Normal globbing wildcards are allowed, except for simple command names.
  340. # For example, 'top*' cannot be given, but '/usr/bin/top*' is allowed.
  341. #
  342. # Specific files may be excluded by preceding their name with an
  343. # exclamation mark (!). For example, '!/opt/top'. By combining this
  344. # with wildcarding, whole directories can be excluded. For example,
  345. # '/etc/* /etc/*/* !/etc/rc?.d/*'. This will look for files in the first
  346. # two directory levels of '/etc'. However, anything in '/etc/rc0.d',
  347. # '/etc/rc1.d', '/etc/rc2.d' and so on, will be excluded.
  348. #
  349. # NOTE: Only files and directories which have been added by the user,
  350. # and are not part of the internal lists, can be excluded. So, for
  351. # example, it is not possible to exclude the 'ps' command by using
  352. # '!/bin/ps'. These will be silently ignored from the configuration.
  353. #
  354. #USER_FILEPROP_FILES_DIRS="top /usr/local/sbin !/opt/ps*"
  355. #USER_FILEPROP_FILES_DIRS="/etc/rkhunter.conf"
  356. #USER_FILEPROP_FILES_DIRS="/etc/rkhunter.conf.local"
  357. #USER_FILEPROP_FILES_DIRS="/var/lib/rkhunter/db/*"
  358. #USER_FILEPROP_FILES_DIRS="!/var/lib/rkhunter/db/mirrors.dat"
  359. #USER_FILEPROP_FILES_DIRS="!/var/lib/rkhunter/db/rkhunter*"
  360. #USER_FILEPROP_FILES_DIRS="/var/lib/rkhunter/db/i18n/*"
  361. #
  362. # Whitelist various attributes of the specified files.
  363. # The attributes are those of the 'attributes' test.
  364. # Specifying a file name here does not include it being
  365. # whitelisted for the write permission test below.
  366. # One command per line (use multiple ATTRWHITELIST lines).
  367. #
  368. #ATTRWHITELIST=/bin/ps
  369. #
  370. # Allow the specified commands to have the 'others'
  371. # (world) permission have the write-bit set.
  372. #
  373. # For example, files with permissions r-xr-xrwx
  374. # or rwxrwxrwx.
  375. #
  376. # One command per line (use multiple WRITEWHITELIST lines).
  377. #
  378. #WRITEWHITELIST=/bin/ps
  379. #
  380. # Allow the specified commands to be scripts.
  381. # One command per line (use multiple SCRIPTWHITELIST lines).
  382. #
  383. SCRIPTWHITELIST=/bin/egrep
  384. SCRIPTWHITELIST=/bin/fgrep
  385. SCRIPTWHITELIST=/bin/which
  386. SCRIPTWHITELIST=/usr/bin/groups
  387. SCRIPTWHITELIST=/usr/bin/ldd
  388. SCRIPTWHITELIST=/usr/bin/lwp-request
  389. SCRIPTWHITELIST=/usr/sbin/adduser
  390. SCRIPTWHITELIST=/usr/sbin/prelink
  391. #
  392. # Allow the specified commands to have the immutable attribute set.
  393. # One command per line (use multiple IMMUTWHITELIST lines).
  394. #
  395. #IMMUTWHITELIST=/sbin/ifup
  396. #
  397. # Allow the specified hidden directories.
  398. # One directory per line (use multiple ALLOWHIDDENDIR lines).
  399. #
  400. ALLOWHIDDENDIR=/etc/.java
  401. ALLOWHIDDENDIR=/dev/.udev
  402. #ALLOWHIDDENDIR=/dev/.udevdb
  403. #ALLOWHIDDENDIR=/dev/.udev.tdb
  404. #ALLOWHIDDENDIR=/dev/.static
  405. ALLOWHIDDENDIR=/dev/.initramfs
  406. #ALLOWHIDDENDIR=/dev/.SRC-unix
  407. ALLOWHIDDENDIR=/dev/.mdadm
  408. ALLOWHIDDENDIR=/dev/.git
  409. #
  410. # Allow the specified hidden files.
  411. # One file per line (use multiple ALLOWHIDDENFILE lines).
  412. #
  413. #ALLOWHIDDENFILE=/etc/.java
  414. #ALLOWHIDDENFILE=/usr/share/man/man1/..1.gz
  415. #ALLOWHIDDENFILE=/etc/.pwd.lock
  416. #ALLOWHIDDENFILE=/etc/.init.state
  417. #ALLOWHIDDENFILE=/lib/.libcrypto.so.0.9.8e.hmac
  418. #ALLOWHIDDENFILE=/lib/.libcrypto.so.6.hmac
  419. #ALLOWHIDDENFILE=/lib/.libssl.so.0.9.8e.hmac
  420. #ALLOWHIDDENFILE=/lib/.libssl.so.6.hmac
  421. #ALLOWHIDDENFILE=/usr/bin/.fipscheck.hmac
  422. #ALLOWHIDDENFILE=/usr/bin/.ssh.hmac
  423. #ALLOWHIDDENFILE=/usr/lib/.libfipscheck.so.1.1.0.hmac
  424. #ALLOWHIDDENFILE=/usr/lib/.libfipscheck.so.1.hmac
  425. #ALLOWHIDDENFILE=/usr/lib/.libgcrypt.so.11.hmac
  426. #ALLOWHIDDENFILE=/usr/lib/hmaccalc/sha1hmac.hmac
  427. #ALLOWHIDDENFILE=/usr/lib/hmaccalc/sha256hmac.hmac
  428. #ALLOWHIDDENFILE=/usr/lib/hmaccalc/sha384hmac.hmac
  429. #ALLOWHIDDENFILE=/usr/lib/hmaccalc/sha512hmac.hmac
  430. #ALLOWHIDDENFILE=/usr/sbin/.sshd.hmac
  431. #ALLOWHIDDENFILE=/usr/share/man/man5/.k5login.5.gz
  432. ALLOWHIDDENFILE=/etc/.etckeeper
  433. ALLOWHIDDENFILE=/etc/.gitignore
  434. #
  435. # Allow the specified processes to use deleted files.
  436. # One process per line (use multiple ALLOWPROCDELFILE lines).
  437. #
  438. # The process name may be followed by a colon-separated list
  439. # of full pathnames. The process will then only be whitelisted
  440. # if it is using one of the given files. For example:
  441. #
  442. # ALLOWPROCDELFILE=/usr/libexec/gconfd-2:/tmp/abc:/var/tmp/xyz
  443. #
  444. #ALLOWPROCDELFILE=/sbin/cardmgr
  445. #ALLOWPROCDELFILE=/usr/sbin/gpm
  446. #ALLOWPROCDELFILE=/usr/lib/libgconf2-4/gconfd-2
  447. #ALLOWPROCDELFILE=/usr/sbin/mysqld
  448. #ALLOWPROCDELFILE=/usr/lib/iceweasel/firefox-bin
  449. #ALLOWPROCDELFILE=/usr/bin/file-roller
  450. #
  451. # Allow the specified network interfaces to be in promiscuous mode.
  452. # This is a space-separated list of interface names.
  453. #
  454. #ALLOWPROMISCIF="eth0"
  455. #
  456. # Allow the specified processes to listen on any network interface.
  457. # One process per line (use multiple ALLOWPROCLISTEN lines).
  458. #
  459. #ALLOWPROCLISTEN=/usr/sbin/pppoe
  460. #ALLOWPROCLISTEN=/usr/sbin/tcpdump
  461. #ALLOWPROCLISTEN=/usr/sbin/snort-plain
  462. #ALLOWPROCLISTEN=/sbin/dhclient3
  463. #ALLOWPROCLISTEN=/sbin/dhcpcd
  464. #
  465. # SCAN_MODE_DEV governs how we scan /dev for suspicious files.
  466. # The two allowed options are: THOROUGH or LAZY.
  467. # If commented out we do a THOROUGH scan which will increase the runtime.
  468. # Even though this adds to the running time it is highly recommended to
  469. # leave it like this.
  470. #
  471. #SCAN_MODE_DEV=THOROUGH
  472. #
  473. # The PHALANX2_DIRTEST option is used to indicate if the Phalanx2 test is to
  474. # perform a basic check, or a more thorough check. If the option is set to 0,
  475. # then a basic check is performed. If it is set to 1, then all the directries
  476. # in the /etc and /usr directories are scanned. The default value is 0. Users
  477. # should note that setting this option to 1 will cause the test to take longer
  478. # to complete.
  479. #
  480. #PHALANX2_DIRTEST=0
  481. #
  482. # Allow the specified files to be present in the /dev directory,
  483. # and not regarded as suspicious. One file per line (use multiple
  484. # ALLOWDEVFILE lines).
  485. #
  486. ALLOWDEVFILE=/dev/shm/network/ifstate
  487. #ALLOWDEVFILE=/dev/abc
  488. #ALLOWDEVFILE=/dev/shm/pulse-shm-*
  489. #ALLOWDEVFILE=/dev/shm/sem.ADBE_ReadPrefs_*
  490. #ALLOWDEVFILE=/dev/shm/sem.ADBE_REL_*
  491. #ALLOWDEVFILE=/dev/shm/sem.ADBE_WritePrefs_*
  492. #
  493. # This setting tells rkhunter where the inetd configuration
  494. # file is located.
  495. #
  496. #INETD_CONF_PATH=/etc/inetd.conf
  497. #
  498. # Allow the following enabled inetd services.
  499. # Only one service per line (use multiple INETD_ALLOWED_SVC lines).
  500. #
  501. # For non-Solaris users the simple service name should be used.
  502. # For example:
  503. #
  504. # INETD_ALLOWED_SVC=echo
  505. #
  506. # For Solaris 9 users the simple service name should also be used, but
  507. # if it is an RPC service, then the executable pathname should be used.
  508. # For example:
  509. #
  510. # INETD_ALLOWED_SVC=imaps
  511. # INETD_ALLOWED_SVC=/usr/sbin/rpc.metad
  512. # INETD_ALLOWED_SVC=/usr/sbin/rpc.metamhd
  513. #
  514. # For Solaris 10 users the service/FMRI name should be used. For example:
  515. #
  516. # INETD_ALLOWED_SVC=/network/rpc/meta
  517. # INETD_ALLOWED_SVC=/network/rpc/metamed
  518. # INETD_ALLOWED_SVC=/application/font/stfsloader
  519. # INETD_ALLOWED_SVC=/network/rpc-100235_1/rpc_ticotsord
  520. #
  521. #INETD_ALLOWED_SVC=echo
  522. #INETD_ALLOWED_SVC=/usr/sbin/tcpd
  523. #
  524. # This setting tells rkhunter where the xinetd configuration
  525. # file is located.
  526. #
  527. #XINETD_CONF_PATH=/etc/xinetd.conf
  528. #
  529. # Allow the following enabled xinetd services. Whilst it would be
  530. # nice to use the service names themselves, at the time of testing
  531. # we only have the pathname available. As such, these entries are
  532. # the xinetd file pathnames.
  533. # Only one service (file) per line (use multiple XINETD_ALLOWED_SVC lines).
  534. #
  535. #XINETD_ALLOWED_SVC=/etc/xinetd.d/echo
  536. #
  537. # This option tells rkhunter the local system startup file pathnames.
  538. # It is a space-separated list of files and directories. The directories
  539. # will be searched for files. By default rkhunter will use certain
  540. # filenames and directories. If the option is set to 'none', then
  541. # certain tests will be skipped.
  542. #
  543. #STARTUP_PATHS="/etc/init.d /etc/rc.local"
  544. #
  545. # This setting tells rkhunter the pathname to the file containing the
  546. # user account passwords. This setting will be worked out by rkhunter,
  547. # and so should not usually need to be set. Users of TCB shadow files
  548. # should not set this option.
  549. #
  550. #PASSWORD_FILE=/etc/shadow
  551. #
  552. # Allow the following accounts to be root equivalent. These accounts
  553. # will have a UID value of zero. This option is a space-separated list
  554. # of account names. The 'root' account does not need to be listed as it
  555. # is automatically whitelisted.
  556. #
  557. # NOTE: For *BSD systems you may need to enable this for the 'toor' account.
  558. #
  559. #UID0_ACCOUNTS="toor rooty sashroot"
  560. #
  561. # Allow the following accounts to have no password. This option is a
  562. # space-separated list of account names. NIS/YP entries do not need to
  563. # be listed as they are automatically whitelisted.
  564. #
  565. #PWDLESS_ACCOUNTS="abc"
  566. #
  567. # This setting tells rkhunter the pathname to the syslog configuration
  568. # file. This setting will be worked out by rkhunter, and so should not
  569. # usually need to be set. A value of 'NONE' can be used to indicate
  570. # that there is no configuration file, but that the syslog daemon process
  571. # may be running.
  572. #
  573. #SYSLOG_CONFIG_FILE=/etc/syslog.conf
  574. #
  575. # This option permits the use of syslog remote logging.
  576. #
  577. ALLOW_SYSLOG_REMOTE_LOGGING=0
  578. #
  579. # Allow the following applications, or a specific version of an application,
  580. # to be whitelisted. This option is a space-separated list consisting of the
  581. # application names. If a specific version is to be whitelisted, then the
  582. # name must be followed by a colon and then the version number.
  583. #
  584. # For example: APP_WHITELIST="openssl:0.9.7d gpg httpd:1.3.29"
  585. #
  586. # Note above that for the Apache web server, the name 'httpd' is used.
  587. #
  588. #APP_WHITELIST=""
  589. #
  590. # Scan for suspicious files in directories containing temporary files and
  591. # directories posing a relatively higher risk due to user write access.
  592. # Please do not enable by default as suspscan is CPU and I/O intensive and prone to
  593. # producing false positives. Do review all settings before usage.
  594. # Also be aware that running suspscan in combination with verbose logging on,
  595. # RKH's default, will show all ignored files.
  596. # Please consider adding all directories the user the (web)server runs as has
  597. # write access to including the document root (example: "/var/www") and log
  598. # directories (example: "/var/log/httpd").
  599. #
  600. # A space-separated list of directories to scan.
  601. #
  602. SUSPSCAN_DIRS="/tmp /var/tmp"
  603. #
  604. # Directory for temporary files. A memory-based one is better (faster).
  605. # Do not use a directory name that is listed in SUSPSCAN_DIRS.
  606. # Please make sure you have a tempfs mounted and the directory exists.
  607. #
  608. SUSPSCAN_TEMP=/dev/shm
  609. #
  610. # Maximum filesize in bytes. Files larger than this will not be inspected.
  611. # Do make sure you have enough space left in your temporary files directory.
  612. #
  613. SUSPSCAN_MAXSIZE=10240000
  614. #
  615. # Score threshold. Below this value no hits will be reported.
  616. # A value of "200" seems "good" after testing on malware. Please adjust
  617. # locally if necessary.
  618. #
  619. SUSPSCAN_THRESH=200
  620. #
  621. # The following option can be used to whitelist network ports which
  622. # are known to have been used by malware. The option is a space-
  623. # separated list of one or more of three types of whitelisting.
  624. # These are:
  625. #
  626. # 1) a 'protocol:port' pair (e.g. TCP:25)
  627. # 2) a pathname to an executable (e.g. /usr/sbin/squid)
  628. # 3) an asterisk ('*')
  629. #
  630. # Only the UDP or TCP protocol may be specified, and the port number
  631. # must be between 1 and 65535 inclusive.
  632. #
  633. # The asterisk can be used to indicate that any executable in a trusted
  634. # path directory will be whitelisted. A trusted path directory is one which
  635. # rkhunter uses to locate commands. It is composed of the root PATH
  636. # environment variable, and the BINDIR command-line or configuration
  637. # file option.
  638. #
  639. # For example: PORT_WHITELIST="/home/user1/abc /opt/xyz TCP:2001 UDP:32011"
  640. #
  641. #PORT_WHITELIST=""
  642. #
  643. # The following option can be used to tell rkhunter where the operating
  644. # system 'release' file is located. This file contains information
  645. # specifying the current O/S version. RKH will store this information
  646. # itself, and check to see if it has changed between each run. If it has
  647. # changed, then the user is warned that RKH may issue warning messages
  648. # until RKH has been run with the '--propupd' option.
  649. #
  650. # Since the contents of the file vary according to the O/S distribution,
  651. # RKH will perform different actions when it detects the file itself. As
  652. # such, this option should not be set unless necessary. If this option is
  653. # specified, then RKH will assume the O/S release information is on the
  654. # first non-blank line of the file.
  655. #
  656. #OS_VERSION_FILE="/etc/debian_version"
  657. #
  658. # The following two options can be used to whitelist files and directories
  659. # that would normally be flagged with a warning during the rootkit and
  660. # malware checks. They are both space-separated lists, and as such if the
  661. # file or directory name contains a space, then the percent character ('%')
  662. # must be used instead. Only existing files and directories can be specified,
  663. # and these must be full pathnames not links.
  664. #
  665. # NOTE: It is recommended that if you whitelist any files, then you include
  666. # those files in the file properties check. See the USER_FILEPROP_FILES_DIRS
  667. # configuration option.
  668. #
  669. #RTKT_DIR_WHITELIST=""
  670. #RTKT_FILE_WHITELIST=""
  671. #
  672. # The following option can be used to whitelist shared library files that would
  673. # normally be flagged with a warning during the preloaded shared library check.
  674. # These library pathnames usually exist in the '/etc/ld.so.preload' file. This is
  675. # a space-separated list of library pathnames.
  676. #
  677. # NOTE: It is recommended that if you whitelist any files, then you include
  678. # those files in the file properties check. See the USER_FILEPROP_FILES_DIRS
  679. # configuration option.
  680. #
  681. #SHARED_LIB_WHITELIST="/lib/snoopy.so"
  682. #
  683. # To force rkhunter to use the supplied script for the 'stat' or 'readlink'
  684. # command, then the following two options can be used. The value must be
  685. # set to 'BUILTIN'.
  686. #
  687. # NOTE: IRIX users will probably need to enable STAT_CMD.
  688. #
  689. #STAT_CMD=BUILTIN
  690. #READLINK_CMD=BUILTIN
  691. #
  692. # In the file properties test any modification date/time is displayed as the
  693. # number of epoch seconds. Rkhunter will try and use the 'date' command, or
  694. # failing that the 'perl' command, to display the date and time in a
  695. # human-readable format as well. This option may be used if some other command
  696. # should be used instead. The given command must understand the '%s' and
  697. # 'seconds ago' options found in the GNU date command.
  698. #
  699. # A value of 'NONE' may be used to request that only the epoch seconds be shown.
  700. # A value of 'PERL' may be used to force rkhunter to use the 'perl' command, if
  701. # it is present.
  702. #
  703. #EPOCH_DATE_CMD=""
  704. #
  705. # This setting tells rkhunter the directory containing the available
  706. # kernel modules. This setting will be worked out by rkhunter, and
  707. # so should not usually need to be set.
  708. #
  709. #MODULES_DIR=""
  710. #
  711. # The following option can be set to a command which rkhunter will use when
  712. # downloading files from the Internet - that is, when the '--update' or
  713. # '--versioncheck' option is used. The command can take options.
  714. #
  715. # This allows the user to use a command other than the one automatically
  716. # selected by rkhunter, but still one which it already knows about.
  717. #
  718. # For example: WEBCMD=curl
  719. #
  720. # Alternatively, the user may specify a completely new command. However, note
  721. # that rkhunter expects the downloaded file to be written to stdout, and that
  722. # everything written to stderr is ignored.
  723. #
  724. # For example: WEBCMD="/opt/bin/dlfile --timeout 5m -q"
  725. #
  726. #WEBCMD=""
  727. #
  728. # Set the following option to 0 if you do not want to receive a warning if
  729. # any O/S information has changed since the last run of 'rkhunter --propupd'.
  730. # The warnings occur during the file properties check. The default is to
  731. # issue a warning if something has changed.
  732. #
  733. #WARN_ON_OS_CHANGE=1
  734. #
  735. # Set the following option to 1 if you want rkhunter to automatically run
  736. # a file properties update ('--propupd') if the O/S has changed. Detection
  737. # of an O/S change occurs during the file properties check. The default is
  738. # not to do an automatic update.
  739. #
  740. # WARNING: Only set this option if you are sure that the update will work
  741. # correctly. That is, that the database directory is writeable, that a valid
  742. # hash function is available, and so on. This can usually be checked simply
  743. # by running 'rkhunter --propupd' at least once.
  744. #
  745. #UPDT_ON_OS_CHANGE=0
  746. #
  747. # Set the following option to 1 if locking is to be used when rkhunter runs.
  748. # The lock is set just before logging starts, and is removed when the program
  749. # ends. It is used to prevent items such as the log file, and the file
  750. # properties file, from becoming corrupted if rkhunter is running more than
  751. # once. The mechanism used is to simply create a lock file in the TMPDIR
  752. # directory. If the lock file already exists, because rkhunter is already
  753. # running, then the current process simply loops around sleeping for 10 seconds
  754. # and then retrying the lock.
  755. #
  756. # The default is not to use locking.
  757. #
  758. USE_LOCKING=0
  759. #
  760. # If locking is used, then rkhunter may have to wait to get the lock file.
  761. # This option sets the total amount of time, in seconds, that rkhunter should
  762. # wait. It will retry the lock every 10 seconds, until either it obtains the
  763. # lock or the timeout value has been reached. If no value is set, then a
  764. # default of 300 seconds (5 minutes) is used.
  765. #
  766. LOCK_TIMEOUT=300
  767. #
  768. # If locking is used, then rkhunter may be doing nothing for some time if it
  769. # has to wait for the lock. Some simple messages are echo'd to the users screen
  770. # to let them know that rkhunter is waiting for the lock. Set this option to 0
  771. # if the messages are not to be displayed. The default is to show them.
  772. #
  773. SHOW_LOCK_MSGS=1
  774. #
  775. # If the option SCANROOTKITMODE is set to "THOROUGH" the scanrootkit() function
  776. # will search (on a per rootkit basis) for filenames in all of the directories (as defined
  777. # by the result of running 'find "${RKHROOTDIR}/" -xdev'). While still not optimal, as it
  778. # still searches for only file names as opposed to file contents, this is one step away
  779. # from the rigidity of searching in known (evidence) or default (installation) locations.
  780. #
  781. # THIS OPTION SHOULD NOT BE ENABLED BY DEFAULT
  782. # You should only activate this feature as part of a more thorough investigation which
  783. # should be based on relevant best practices and procedures.
  784. # Enabling this feature implies you have the knowledge to interprete results properly.
  785. #
  786. #SCANROOTKITMODE=THOROUGH
  787. INSTALLDIR="/usr"