neill-backup.int.autonlab.org daily security run output
punosevac72 at gmail.com
punosevac72 at gmail.com
Thu Oct 15 03:37:24 EDT 2015
Checking setuid files and devices:
Checking negative group permissions:
Checking for uids of 0:
root 0
toor 0
Checking for passwordless accounts:
Checking login.conf permissions:
neill-backup.int.autonlab.org pf denied packets:
+++ /tmp/security.Y4QDjHMw 2015-10-15 03:35:30.000000000 -0400
+block return in all [ Evaluations: 96366 Packets: 64210 Bytes: 36473672 States: 0 ]
+block return quick from <bruteforce> to any [ Evaluations: 96365 Packets: 0 Bytes: 0 States: 0 ]
+block return in quick on egress proto tcp from <sshguard> to any port = ssh label "ssh bruteforce" [ Evaluations: 96367 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick on ! lo0 inet from 127.0.0.0/8 to any [ Evaluations: 96367 Packets: 0 Bytes: 0 States: 0 ]
+block drop in quick from urpf-failed to any [ Evaluations: 89627 Packets: 0 Bytes: 0 States: 0 ]
+block return in on ! lo0 proto tcp from any to any port 6000:6010 [ Evaluations: 89627 Packets: 0 Bytes: 0 States: 0 ]
neill-backup.int.autonlab.org kernel log messages:
+++ /tmp/security.ilSSsuUu 2015-10-15 03:35:31.000000000 -0400
+em0: promiscuous mode enabled
+lo0: promiscuous mode enabled
+em0: promiscuous mode disabled
+lo0: promiscuous mode disabled
neill-backup.int.autonlab.org login failures:
neill-backup.int.autonlab.org refused connections:
Checking for packages with security vulnerabilities:
-- End of security output --
More information about the Autonlab-sysinfo
mailing list