warden.int.autonlab.org daily security run output
punosevac72 at gmail.com
punosevac72 at gmail.com
Sat Aug 1 03:02:11 EDT 2015
Checking setuid files and devices:
Checking negative group permissions:
Checking for uids of 0:
root 0
toor 0
Checking for passwordless accounts:
Checking login.conf permissions:
warden.int.autonlab.org ipfw denied packets:
warden.int.autonlab.org pf denied packets:
+++ /tmp/security.MpfSvpyQ 2015-08-01 03:02:11.511595672 -0400
+block return in all [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block return quick from <bruteforce> to any [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block return in quick on egress proto tcp from <sshguard> to any port = ssh label "ssh bruteforce" [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick on ! lo0 inet from 127.0.0.0/8 to any [ Evaluations: 34743 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick from urpf-failed to any [ Evaluations: 31026 Packets: 20784 Bytes: 11857844 States: 0 ]
+block return in on ! lo0 proto tcp from any to any port 6000:6010 [ Evaluations: 10242 Packets: 0 Bytes: 0 States: 0 ]
warden.int.autonlab.org kernel log messages:
+++ /tmp/security.S4LzQcgZ 2015-08-01 03:02:11.563596290 -0400
+CPU: Intel(R) Atom(TM) CPU C2758 @ 2.40GHz (2400.06-MHz K8-class CPU)
+SMP: AP CPU #2 Launched!
+SMP: AP CPU #5 Launched!
+SMP: AP CPU #3 Launched!
+Timecounter "TSC-low" frequency 1200032352 Hz quality 1000
warden.int.autonlab.org login failures:
warden.int.autonlab.org refused connections:
Checking for packages with security vulnerabilities:
Database fetched: Fri Jul 31 03:02:03 EDT 2015
libxml2-2.9.2_2
php55-5.5.24
curl-7.42.1
pcre-8.35_2
libressl-2.1.6
php55-gd-5.5.24
ruby-2.0.0.645,1
-- End of security output --
More information about the Autonlab-sysinfo
mailing list