tiger 1:3.2.4~rc1-3.2 source package in Ubuntu

Changelog

tiger (1:3.2.4~rc1-3.2) unstable; urgency=medium

  * Non-maintainer upload.
  * debian/rules: add symlink for Linux 6 (Closes: #1022940)

 -- Francois Marier <email address hidden>  Thu, 27 Oct 2022 21:35:23 -0700

Upload details

Uploaded by:
Javier Fernández-Sanguino
Uploaded to:
Sid
Original maintainer:
Javier Fernández-Sanguino
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Mantic release universe admin
Lunar release universe admin

Downloads

File Size SHA-256 Checksum
tiger_3.2.4~rc1-3.2.dsc 2.1 KiB a3cee77f18aefc423f095b878fb39e6dae322bbf614d3644175007239ab96ad9
tiger_3.2.4~rc1.orig.tar.gz 1.1 MiB 91b259da8f0d3f6244f815c2b067ea4433b9ae378308ce63c2eb60b93efe7f96
tiger_3.2.4~rc1-3.2.diff.gz 570.1 KiB eb1b9d3610b89d08c436a20df9163a1a2da2c92921691955995dd2eac8a05244

Available diffs

No changes file available.

Binary packages built by this source

tiger: security auditing and intrusion detection tools for Linux

 TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
 programs) which are used to perform a security audit of different operating
 systems components. The tools can be both run all at once to generate an
 audit report of the system and to detect elements that could be fixed
 when hardening it.
 .
 TIGER has one primary goal: report ways the system's security can be
 compromised.
 .
 Most of the tools are independent, but some of them rely on specialised
 external security tools such as John the Ripper, Chkroot and integrity check
 tools (like Tripwire, Integrit or Aide) to execute some tasks.
 .
 The same checks are also configured by default to run periodically and
 detect deviations or unauthorised changes. This makes it possible to
 used them also as a host intrusion detection mechanism.
 This review mechanism relies on the use of the cron task scheduler and an
 email delivery system to report errors and deviations.
 .
 This package provides all the security scripts and data files for Linux.
 A separate package is available providing the scripts for other operating
 systems so they can be run from a centralised repository.
 .
 The Linux scripts incorporate specific checks targetting the Debian OS
 including: md5sums checks of installed files, location of files not belonging
 to packages, and analysis of local listening processes.
 .
 Alternatives to TIGER available in Debian include lynis and ossec. If you are
 aiming for a small set of checks, try checksecurity, lsat or yasat.

tiger-dbgsym: debug symbols for tiger
tiger-otheros: security auditing and intrusion detection scripts for Unix based systems

 TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
 programs) which are used to perform a security audit of different operating
 systems components. The tools can be both run all at once to generate an
 audit report of the system and to detect elements that could be fixed
 when hardening it. They can also be run periodically to compare the operating
 system status against a baseline and report deviations. In this way, they can
 be used also as a host intrusion detection mechanism.
 .
 This package provides all the scripts for Unix-based operating systems (other
 than Linux) which are provided in the Tiger application upstream. They are
 separately packaged in Debian as most users do not need them to run Tiger.
 .
 On the other hand, they might be useful for administrators that wish to run
 Tiger in hosts running different Unix variants in a distributed environment.
 Hosts can run the Tiger scripts through the network (e.g. NFS) and generate
 locally reports for analysis and intrusion detection.