warden.int.autonlab.org daily security run output

punosevac72 at gmail.com punosevac72 at gmail.com
Sat Aug 1 03:02:11 EDT 2015


Checking setuid files and devices:

Checking negative group permissions:

Checking for uids of 0:
root 0
toor 0

Checking for passwordless accounts:

Checking login.conf permissions:

warden.int.autonlab.org ipfw denied packets:

warden.int.autonlab.org pf denied packets:
+++ /tmp/security.MpfSvpyQ	2015-08-01 03:02:11.511595672 -0400
+block return in all [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block return quick from <bruteforce> to any [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block return in quick on egress proto tcp from <sshguard> to any port = ssh label "ssh bruteforce" [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick on ! lo0 inet from 127.0.0.0/8 to any [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick from urpf-failed to any [ Evaluations: 31026 Packets: 20784 Bytes: 11857844 States: 0 ]
+block return in on ! lo0 proto tcp from any to any port 6000:6010 [ Evaluations: 10242 Packets: 0 Bytes: 0 States: 0 ]

warden.int.autonlab.org kernel log messages:
+++ /tmp/security.S4LzQcgZ	2015-08-01 03:02:11.563596290 -0400
+CPU: Intel(R) Atom(TM) CPU  C2758  @ 2.40GHz (2400.06-MHz K8-class CPU)
+SMP: AP CPU #2 Launched!
+SMP: AP CPU #5 Launched!
+SMP: AP CPU #3 Launched!
+Timecounter "TSC-low" frequency 1200032352 Hz quality 1000

warden.int.autonlab.org login failures:

warden.int.autonlab.org refused connections:

Checking for packages with security vulnerabilities:
Database fetched: Fri Jul 31 03:02:03 EDT 2015
libxml2-2.9.2_2
php55-5.5.24
curl-7.42.1
pcre-8.35_2
libressl-2.1.6
php55-gd-5.5.24
ruby-2.0.0.645,1

-- End of security output --


More information about the Autonlab-sysinfo mailing list