checksecurity
CHECKSECURITY(Y)                                 CHECKSECURITY(Y)



NAME
       checksecurity - check for changes to setuid programs

SYNOPSIS
       checksecurity

DESCRIPTION
       The  checksecurity command scans the mounted files systems
       (subject to the filter defined in /etc/checksecurity.conf)
       and  compares the list of setuid programs to the list cre-
       ated on the previous run. Any changes are printed to stan-
       dard  output.  Also,  it  generates  a list of nfs and afs
       filesystems that are mounted  insecurely  (i.e.  they  are
       missing  the nodev and either the noexec or nosuid flags).

       checksecurity is run by cron on a  daily  basis,  and  the
       output stored in /var/log/setuid.changes.

CONFIGURATION
       The  checksecurity.conf file defines several configuration
       variables:  CHECKSECURITY_FILTER,  CHECKSECURITY_NOFINDER-
       RORS,    CHECKSECURITY_DISABLE,    CHECKSECURITY_NONFSAFS,
       CHECKSECURITY_EMAIL, CHECKSECURITY_DEVICEFILTER,  CHECKSE-
       CURITY_PATHFILTER, and LOGDIR.  Each is described below.

       The CHECKSECURITY_FILTER environment variable which is the
       argument of 'grep -vE' applied to the output of the  mount
       command. In other words, the value of CHECKSECURITY_FILTER
       is a regular expression that removes matching  lines  from
       those file systems that will be scanned. The default value
       removes all file systems of  type  proc,  msdos,  iso9660,
       ncpfs,  nfs,  afs,  smbfs,  auto, ntfs, coda file systems,
       anything mounted on /dev/fd*, anything mounted on /mnt  or
       /amd, and anything mounted with option nosuid or noexec.

       The checksecurity.conf file is sourced from checksecurity,
       so you could do some fairly tricky things to define CHECK-
       SECURITY_FILTER.

       The  CHECKSECURITY_NOFINDERRORS  environment  variable, if
       set to the  literal  "TRUE",  disables  find  errors  from
       checksecurity (actually, it re-routes them to /dev/null ).

       The CHECKSECURITY_DISABLE environment variable, if set  to
       the  literal "TRUE", disables checksecurity entirely, as a
       sop to those who think it's safe to allow random  mounting
       of NFS and AFS disks without the nosuid or noexec flags.

       The CHECKSECURITY_NONFSAFS environment variable, if set to
       the literal "TRUE", disables the message about nfs and afs
       file systems that are mounted without the nodev and either
       the noexec or nosuid options.

       If set, the CHECKSECURITY_EMAIL variable  defines  who  is
       sent a copy of the setuid.changes file.

       The  CHECKSECURITY_DEVICEFILTER  variable specifies a find
       clause for which matching block and character device files
       will not be monitored for changing owners and permissions.
       For example, if you didn't want to  check  for  permission
       changes  on  tty  device files beneath /dev, you could set
       the following:

              CHECKSECURITY_DEVICEFILTER='-path /dev/tty*'

       Note that any added or modified suid programs  under  that
       path  would still be detected. If you want to specify mul-
       tiple expressions, separate them with '-o', but  there  is
       no  need to surround the whole clause with parentheses. To
       disable this filter, specify it as

       The CHECKSECURITY_PATHFILTER  variable  specifies  a  find
       clause  which  will  be pruned from the search path.  This
       means that the entire subtree will be completely  skipped.
       Thus, specifying

              CHECKSECURITY_PATHFILTER='-path /var/ftp'

       then  the entire /var/ftp tree will be skipped. To disable
       this  filter,  specify  it  as  '-false'  (which  is   the
       default).

       LOGDIR  sets  the  name  of the directory which stores the
       files which track the permission and ownership changes. By
       default, they are in /var/log.

FILES
       /etc/checksecurity.conf
              checksecurity configuration file

       /var/log/setuid.today
              setuid files from the most recent run

       /var/log/setuid.yesterday
              setuid files from the previous run



Debian Linux             2 February 1997         CHECKSECURITY(Y)