tiger 1:3.2.3-15 source package in Ubuntu
Changelog
tiger (1:3.2.3-15) unstable; urgency=medium * Acknowledge previous NMU (thank you Francois Marier) (Closes: 830714, 830716, 848621) * debian/compat: Update to compatibility version 11 * debian/control: Update to standards version 4.1.3 - Remove debian/tiger.menu - Add the upstream key in debian/upstream and the 'gpsigurlmangle' in debian/watch - Use https url in debian/control VCS-Git headers - debian/tiger.menu: Remove as we already have a .desktop file as per Technical CTTE decission #741573 (and fix lintian error) - debian/rules: Add build-arch and build-indep targets (fix lintian error) * Include content provided in GIT repository upstream including: - script/check_accounts: Fix error when eval'ing code - script/check_passwd: Add a check of the sudoers files using visudo - systems/Linux/2/check: Disable deb_checkadvisories as the Debian website content does not provide information to generate up to date listing of advisories. This feature can be best implemented using apticron, cront-apt or painintheapt - systems/Linux/2/deb_checkmd5sums: Do not call prelink with -c - systems/Linux/2/gen_mounts: Update with a large number of filesystems currently supported in the Kernel. Additionally, to prevent false positives, try to determine if the filesystem is within the list of supported filesystems in the kernel by using two different mechanisms. This should reduce the number of configuration warnings in the future (and the need to update this script whenever a new, esoteric, filesystem is used) - util/genmsgidx: Do not assume the tempfile binary exists, check first. - tigerrc, system/Linux/2/check: Make it possible to disable or enable the Debian specific checks using the patch provided by Nicholas Bamber (Closes: 512085) - ./systems/Linux/2/check_listeningprocs: Handle all addresses in the 127.0.0.0/8 range as loopback addresses - scripts/check_signatures: Fix interpretation of md5sum output which was broken in the script -- Javier Fernández-Sanguino Peña <email address hidden> Sun, 04 Feb 2018 20:44:04 +0100
Upload details
- Uploaded by:
- Javier Fernández-Sanguino
- Uploaded to:
- Sid
- Original maintainer:
- Javier Fernández-Sanguino
- Architectures:
- any
- Section:
- admin
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tiger_3.2.3-15.dsc | 1.9 KiB | cc11a34f763d1bcc646b1decca673936af4d2ec024bdd597df1c0a983319c4d8 |
tiger_3.2.3.orig.tar.gz | 991.4 KiB | 80db27618de0d806805e77653e568fb9ae556537cfd5a4b17b6b6c9dc442a415 |
tiger_3.2.3-15.diff.gz | 255.0 KiB | 53be62e721bfc6944b7b6a15b935c8de02609b4dbd933c1dd0359c98445423eb |
Available diffs
- diff from 1:3.2.3-14.3 to 1:3.2.3-15 (35.4 KiB)
No changes file available.
Binary packages built by this source
- tiger: Report system security vulnerabilities
TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
and data files which are used to perform a security audit of different
operating systems. The tools can be both run altogether once to generate an
audit report of the system and they can also be run periodically to
provide information on changes to the system's security once a
security baseline has been defined. Consequently, they can be used
also as a host intrusion detection mechanism.
.
The tools rely on specialised external security tools such as John the Ripper,
Chkroot and integrity check tools (like Tripwire, Integrit or Aide) for some
of the tasks. The periodic review mechanism relies on the use of the cron task
scheduler and an email delivery system.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Debian's TIGER incorporates new checks primarily oriented towards Debian
distribution including: md5sums checks of installed files, location of files
not belonging to packages, and analysis of local listening processes.
.
This package provides all the security scripts and data files.
- tiger-dbgsym: debug symbols for tiger
- tiger-otheros: Scripts to run Tiger in other operating systems
TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
and data files which are used to perform a security audit of different
operating systems. The tools can be both run altogether once to generate an
audit report of the system and they can also be run periodically to
provide information on changes to the system's security once a
security baseline has been defined. Consequently, they can be used
also as a host intrusion detection mechanism.
.
This package provides all the scripts for operating systems other than Linux
provided for in the Tiger distribution. It is provided in the hope it will be
useful for administrators that wish to run tiger in a distributed environment
sharing these files through the network (e.g. NFS).