warden.int.autonlab.org daily security run output

punosevac72 at gmail.com punosevac72 at gmail.com
Mon Jul 27 03:02:14 EDT 2015


Checking setuid files and devices:

Checking negative group permissions:

Checking for uids of 0:
root 0
toor 0

Checking for passwordless accounts:

Checking login.conf permissions:

warden.int.autonlab.org ipfw denied packets:

warden.int.autonlab.org pf denied packets:
+++ /tmp/security.tRqDGVpY	2015-07-27 03:02:11.405673121 -0400
+block return in all [ Evaluations: 39970 Packets: 23950 Bytes: 13664352 States: 0 ]
+block return quick from <bruteforce> to any [ Evaluations: 39970 Packets: 0 Bytes: 0 States: 0 ]
+block return in quick on egress proto tcp from <sshguard> to any port = ssh label "ssh bruteforce" [ Evaluations: 39970 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick on ! lo0 inet from 127.0.0.0/8 to any [ Evaluations: 39970 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick from urpf-failed to any [ Evaluations: 35601 Packets: 0 Bytes: 0 States: 0 ]
+block return in on ! lo0 proto tcp from any to any port 6000:6010 [ Evaluations: 35601 Packets: 0 Bytes: 0 States: 0 ]

warden.int.autonlab.org kernel log messages:
+++ /tmp/security.49LmI6td	2015-07-27 03:02:11.460673423 -0400
+CPU: Intel(R) Atom(TM) CPU  C2758  @ 2.40GHz (2400.07-MHz K8-class CPU)
+SMP: AP CPU #6 Launched!
+SMP: AP CPU #3 Launched!
+SMP: AP CPU #7 Launched!
+Timecounter "TSC-low" frequency 1200034392 Hz quality 1000

warden.int.autonlab.org login failures:

warden.int.autonlab.org refused connections:

Checking for packages with security vulnerabilities:
libxml2-2.9.2_2
php55-5.5.24
curl-7.42.1
pcre-8.35_2
libressl-2.1.6
php55-gd-5.5.24
ruby-2.0.0.645,1

-- End of security output --


More information about the Autonlab-sysinfo mailing list