tiger 1:3.2.4~rc1-2 source package in Ubuntu
Changelog
tiger (1:3.2.4~rc1-2) unstable; urgency=medium * debian/config: Remove only files using xarg instead of -exec. Use rmdir to remove the main directory instead of using find. (Closes: #931581, #931926) * debian/rules: - Fix the code creating symlinks (Closes: #909620) - Add symlink for 5 and default (Closes: #928641) * config: Add the possibility of having a 'default' definition and use that one instead of the generic one. This change and above symlinks should avoid any errors to users upgrading to linux-image or latest version of the kernel in the future (Closes: #928641) (LP: #1836789) * default/config: Fix typo in export call (Closes: #928640) (LP: #1830825) * scripts/check_passwd: Include patch based on the one provided by Christoph Anton Mitterer that includes the output of 'pwck -r' when the message is reported. (Closes: #512076) * scripts/check_group: Include the output of 'grpck -r' when the message is reported. * scripts/check_accounts: Do not complain about dormant accounts for accounts that are system accounts * debian/control: Improve the explanation of the package and reference other software for those users that are looking for alternatives. -- Javier Fernández-Sanguino Peña <email address hidden> Mon, 19 Aug 2019 00:12:13 +0200
Upload details
- Uploaded by:
- Javier Fernández-Sanguino
- Uploaded to:
- Sid
- Original maintainer:
- Javier Fernández-Sanguino
- Architectures:
- any
- Section:
- admin
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Focal | release | universe | admin |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tiger_3.2.4~rc1-2.dsc | 1.9 KiB | e2e3c76570016e3f55d7bc0acc904a2bf29cb9f8aeb5fa1ec0599b1322b31494 |
tiger_3.2.4~rc1.orig.tar.gz | 1.1 MiB | 91b259da8f0d3f6244f815c2b067ea4433b9ae378308ce63c2eb60b93efe7f96 |
tiger_3.2.4~rc1-2.diff.gz | 6.9 KiB | c7196aec7f230935cd3cf0073c3d8f6664e711097a511ac26c0f96f46afcb16c |
Available diffs
- diff from 1:3.2.4~rc1-1 to 1:3.2.4~rc1-2 (6.1 KiB)
No changes file available.
Binary packages built by this source
- tiger: security auditing and intrusion detection tools for Linux
TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
programs) which are used to perform a security audit of different operating
systems components. The tools can be both run all at once to generate an
audit report of the system and to detect elements that could be fixed
when hardening it.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Most of the tools are independent, but some of them rely on specialised
external security tools such as John the Ripper, Chkroot and integrity check
tools (like Tripwire, Integrit or Aide) to execute some tasks.
.
The same checks are also configured by default to run periodically and
detect deviations or unauthorised changes. This makes it possible to
used them also as a host intrusion detection mechanism.
This review mechanism relies on the use of the cron task scheduler and an
email delivery system to report errors and deviations.
.
This package provides all the security scripts and data files for Linux.
A separate package is available providing the scripts for other operating
systems so they can be run from a centralised repository.
.
The Linux scripts incorporate specific checks targetting the Debian OS
including: md5sums checks of installed files, location of files not belonging
to packages, and analysis of local listening processes.
.
Alternatives to TIGER available in Debian include lynis and ossec. If you are
aiming for a small set of checks, try checksecurity, lsat or yasat.
- tiger-dbgsym: No summary available for tiger-dbgsym in ubuntu eoan.
No description available for tiger-dbgsym in ubuntu eoan.
- tiger-otheros: security auditing and intrusion detection scripts for Unix based systems
TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
programs) which are used to perform a security audit of different operating
systems components. The tools can be both run all at once to generate an
audit report of the system and to detect elements that could be fixed
when hardening it. They can also be run periodically to compare the operating
system status against a baseline and report deviations. In this way, they can
be used also as a host intrusion detection mechanism.
.
This package provides all the scripts for Unix-based operating systems (other
than Linux) which are provided in the Tiger application upstream. They are
separately packaged in Debian as most users do not need them to run Tiger.
.
On the other hand, they might be useful for administrators that wish to run
Tiger in hosts running different Unix variants in a distributed environment.
Hosts can run the Tiger scripts through the network (e.g. NFS) and generate
locally reports for analysis and intrusion detection.