diff options
author | Seemant Kulleen <seemant@gentoo.org> | 2003-08-02 10:13:51 +0000 |
---|---|---|
committer | Seemant Kulleen <seemant@gentoo.org> | 2003-08-02 10:13:51 +0000 |
commit | 4ba98dc30a5075b43692c1e24a02ef4a65032e6f (patch) | |
tree | e05eebbe325b050b4cc006e362b77d501ecaf02e /net-firewall | |
parent | Update to 1.1_rc2 (diff) | |
download | gentoo-2-4ba98dc30a5075b43692c1e24a02ef4a65032e6f.tar.gz gentoo-2-4ba98dc30a5075b43692c1e24a02ef4a65032e6f.tar.bz2 gentoo-2-4ba98dc30a5075b43692c1e24a02ef4a65032e6f.zip |
Bastille security hardener
Diffstat (limited to 'net-firewall')
-rw-r--r-- | net-firewall/bastille/ChangeLog | 11 | ||||
-rw-r--r-- | net-firewall/bastille/Manifest | 4 | ||||
-rw-r--r-- | net-firewall/bastille/bastille-2.1.1.ebuild | 121 | ||||
-rw-r--r-- | net-firewall/bastille/files/bastille-2.1.1.patch | 1811 | ||||
-rw-r--r-- | net-firewall/bastille/files/digest-bastille-2.1.1 | 1 |
5 files changed, 1948 insertions, 0 deletions
diff --git a/net-firewall/bastille/ChangeLog b/net-firewall/bastille/ChangeLog new file mode 100644 index 000000000000..39b9bdc52d6d --- /dev/null +++ b/net-firewall/bastille/ChangeLog @@ -0,0 +1,11 @@ +# ChangeLog for net-firewall/bastille +# Copyright 2000-2003 Gentoo Technologies, Inc.; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/net-firewall/bastille/ChangeLog,v 1.1 2003/08/02 10:13:47 seemant Exp $ + +*bastille-2.1.1 (02 Aug 2003) + + 02 Aug 2003; Seemant Kulleen <seemant@gentoo.org> bastille-2.1.1.ebuild, + files/bastille-2.1.1.patch: + initial import. This was patched heavily to work with Gentoo (gentooficated) + by the venerable: Bryan Stine <admin@kentonet.net> + diff --git a/net-firewall/bastille/Manifest b/net-firewall/bastille/Manifest new file mode 100644 index 000000000000..839d552f0735 --- /dev/null +++ b/net-firewall/bastille/Manifest @@ -0,0 +1,4 @@ +MD5 c205aa57e143182e77056f4bb5776f79 bastille-2.1.1.ebuild 2821 +MD5 e8e6cf83d64c20009d491617892f2790 ChangeLog 494 +MD5 384267398266569f1bd16b388e8fc195 files/bastille-2.1.1.patch 66189 +MD5 577b935edc8f3805c7b84188386f91b7 files/digest-bastille-2.1.1 67 diff --git a/net-firewall/bastille/bastille-2.1.1.ebuild b/net-firewall/bastille/bastille-2.1.1.ebuild new file mode 100644 index 000000000000..6abc86171cb2 --- /dev/null +++ b/net-firewall/bastille/bastille-2.1.1.ebuild @@ -0,0 +1,121 @@ +# Copyright 1999-2003 Gentoo Technologies, Inc. +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-firewall/bastille/bastille-2.1.1.ebuild,v 1.1 2003/08/02 10:13:47 seemant Exp $ + +inherit perl-module + +IUSE="" + +MY_PN=${PN/b/B} +MY_P=${MY_PN}-${PV} +S=${WORKDIR}/${MY_PN} +DESCRIPTION="Bastille-Linux is a security hardening tool" +HOMEPAGE="http://bastille-linux.org/" +SRC_URI="mirror://sourceforge/${PN}-linux/${MY_P}.tar.bz2" + +SLOT="0" +LICENSE="GPL-2" +KEYWORDS="~x86 ~ppc ~sparc ~alpha ~mips ~hppa" + + +RDEPEND="dev-perl/Curses + dev-perl/perl-tk" + +src_unpack() { + unpack ${A} + epatch ${FILESDIR}/${P}.patch +} + +src_compile() { + + cd ${S}/psad/Psad.pm + SRC_PREP="no" perl-module_src_compile + make test + + cd ${S}/psad/Unix-Syslog-0.98 + SRC_PREP="no" perl-module_src_compile + make test + + cd ${S}/psad/whois-4.5.29 + make || die + + cd ${S} +} + +src_install() { + + keepdir /var/log/psad /var/lib/psad /var/run/psad /var/lock/subsys/${PN} + dodir /etc/Bastille + + cd ${S}/psad/Psad.pm + perl-module_src_install + + cd ${S}/psad/Unix-Syslog-0.98 + perl-module_src_install + + cd ${S} + into /usr + dosbin bastille AutomatedBastille InteractiveBastille \ + BastilleBackEnd RevertBastille *.pl + + dosym RevertBastille /usr/sbin/UndoBastille + + insinto /usr/share/Bastille + doins Questions* Credits bastille-* *.xbm *.config + + insinto /usr/share/Bastille + doins Questions.txt Credits complete.xbm incomplete.xbm \ + ifup-local hosts.allow + + exeinto /usr/share/Bastille + doexe bastille-firewall* bastille-tmpdir* \ + bastille-ipchains bastille-netfilter \ + firewall/*.sh + + perlinfo + insinto ${SITE_LIB} + doins Bastille_Curses.pm Bastille_Tk.pm + insinto ${SITE_LIB}/Curses + doins Curses/Widgets.pm + + doman docs/bastille.1m + dodoc docs/* firewall/*.txt + + cd ${S}/psad + insinto /usr/share/Bastille + doins psad psadwatchd kmsgsd diskmond psad-init + doman psad.8 + + insinto /etc/psad + doins psad_signatures psad_auto_ips psad.conf + + cd ${S}/psad/whois-4.5.29 + exeinto /usr/share/Bastille + doexe whois + + cd ${S}/Bastille + + insinto /usr/lib/Bastille + doins AccountSecurity.pm Apache.pm API.pm OSX_API.pm BootSecurity.pm \ + ConfigureMiscPAM.pm DisableUserTools.pm DNS.pm \ + FilePermissions.pm FTP.pm Firewall.pm HP_API.pm HP_UX.pm \ + IOLoader.pm Patches.pm Logging.pm \ + MiscellaneousDaemons.pm PatchDownload.pm Printing.pm PSAD.pm \ + RemoteAccess.pm SecureInetd.pm Sendmail.pm TMPDIR.pm \ + test_AccountSecurity.pm test_Apache.pm test_DNS.pm \ + test_FTP.pm test_HP_UX.pm test_MiscellaneousDaemons.pm \ + test_SecureInetd.pm test_Sendmail.pm TestAPI.pm IPFilter.pm + + # Documentation + cd ${S} + dodoc *.txt COPYING BUGS Change* README* +} + +pkg_postinst() { + if [ -z ${ROOT}/var/log/psadfifo ] + then + ebegin "Creating FIFO device for PSAD..." + mknod -m 600 ${ROOT}/var/log/psadfifo p + eend $? + fi +} diff --git a/net-firewall/bastille/files/bastille-2.1.1.patch b/net-firewall/bastille/files/bastille-2.1.1.patch new file mode 100644 index 000000000000..47e500fad733 --- /dev/null +++ b/net-firewall/bastille/files/bastille-2.1.1.patch @@ -0,0 +1,1811 @@ +diff -urN Bastille/Bastille/API.pm Bastille2/Bastille/API.pm +--- Bastille/Bastille/API.pm 2003-05-05 06:42:25.000000000 -0400 ++++ Bastille2/Bastille/API.pm 2003-08-02 05:02:58.000000000 -0400 +@@ -389,6 +389,13 @@ + } + close(REDHAT_RELEASE); + } ++ elsif ( -e "/etc/gentoo-release" ) { ++ open(*GENTOO_RELEASE,"/etc/gentoo-release"); ++ $release=<GENTOO_RELEASE>; ++ if ($release =~ /^Gentoo Base System version */) { ++ $distro="GE1.4"; ++ } ++ } + elsif ( -e "/etc/debian_version" ) { + $stable="3.0"; #Change this when Debian stable changes + open(*DEBIAN_RELEASE,"/etc/debian_version"); +@@ -508,7 +515,7 @@ + "MN6.0","MN6.1","MN7.0","MN7.1","MN7.2","MN8.0","MN8.1","MN8.2", + "HP-UX11.00","HP-UX11.11", "HP-UX11.22", "HP-UX11.23", + "SE7.2","SE7.3", "SE8.0","TB7.0", +- "OSX10.2.0","OSX10.2.1","OSX10.2.2","OSX10.2.3","OSX10.2.4"); ++ "OSX10.2.0","OSX10.2.1","OSX10.2.2","OSX10.2.3","OSX10.2.4","GE1.4"); + return \@list; + } + +@@ -565,7 +572,7 @@ + + # Directories, as explained in Bastille directory structure... + +- if ( ($actualDistro =~ "^RH" ) or ($actualDistro =~ "^MN") or ($actualDistro =~ "^DB") or ($actualDistro =~ "^SE") or ($actualDistro =~ "^TB")){ ++ if ( ($actualDistro =~ "^RH" ) or ($actualDistro =~ "^MN") or ($actualDistro =~ "^DB") or ($actualDistro =~ "^SE") or ($actualDistro =~ "^TB") or ($actualDistro =~ "^GE")){ + + $GLOBAL_BDIR{"home"}= "/root/Bastille"; + +@@ -618,13 +625,13 @@ + else { + return 0; + } +- if ( ($distro =~ "^RH" ) or ($distro =~ "^MN") or ($distro =~ "^DB") or ($distro =~ "^SE") or ($distro =~ "^TB")){ ++ if ( ($distro =~ "^RH" ) or ($distro =~ "^MN") or ($distro =~ "^DB") or ($distro =~ "^SE") or ($distro =~ "^TB") or ($distro =~ "^GE")){ + + # + # Set necessary binaries + # + +- if (($distro =~ "^RH" ) or ($distro =~ "^MN") or ($distro =~ "^SE") or ($distro =~ "^TB") or ($distro =~ "^DB") ) { ++ if (($distro =~ "^RH" ) or ($distro =~ "^MN") or ($distro =~ "^SE") or ($distro =~ "^TB") or ($distro =~ "^DB") or ($distro =~ "^GE")) { + $GLOBAL_BIN{"accton"} = "/usr/sbin/accton"; + $GLOBAL_FILE{"accton"} = "/usr/sbin/accton"; + } +@@ -713,7 +720,7 @@ + + $GLOBAL_DIR{"home"}="/home"; + $GLOBAL_DIR{"initd"}="/etc/rc.d/init.d"; +- if ( ($distro =~ /^DB/) or ($distro =~ /^SE/)) { ++ if ( ($distro =~ /^DB/) or ($distro =~ /^SE/) or ($distro =~ /^GE/)) { + $GLOBAL_DIR{"initd"} = "/etc/init.d"; + } + $GLOBAL_DIR{"log"}="/var/log"; +@@ -722,6 +729,9 @@ + if ( $distro =~ /^DB/ ) { + $GLOBAL_DIR{"rcd"} = "/etc"; + } ++ if ( $distro =~ /^GE/ ) { ++ $GLOBAL_DIR{"rcd"} = "/etc/runlevels/default"; ++ } + $GLOBAL_DIR{"sbin"}="/sbin"; + + +@@ -759,7 +769,7 @@ + + $GLOBAL_FILE{"inittab"}="/etc/inittab"; + $GLOBAL_FILE{"lilo.conf"}="/etc/lilo.conf"; +- $GLOBAL_FILE{"grub.conf"}="/etc/grub.conf"; ++ $GLOBAL_FILE{"grub.conf"}="/boot/grub/grub.conf"; + $GLOBAL_FILE{"limits.conf"}="/etc/security/limits.conf"; + $GLOBAL_FILE{"mtab"}="/etc/mtab"; + $GLOBAL_FILE{"pam_access.conf"}="/etc/security/access.conf"; +@@ -806,8 +816,17 @@ + # $GLOBAL_FILE{"chkconfig_ypbind"}=&getGlobal('DIR', "rcd")."/rc3.d/S17ypbind"; + # $GLOBAL_FILE{"chkconfig_snmpd"}=&getGlobal('DIR', "rcd")."/rc3.d/S50snmpd"; + } +- +- ++ if ( $distro =~ /^GE/) { ++ $GLOBAL_FILE{"chkconfig_apmd"}=&getGlobal('DIR', "rcd")."/apmd"; ++ $GLOBAL_FILE{"chkconfig_nfs"}=&getGlobal('DIR', "rcd")."/nfs"; ++ $GLOBAL_FILE{"chkconfig_pcmcia"}=&getGlobal('DIR', "rcd")."/pcmcia"; ++ $GLOBAL_FILE{"chkconfig_dhcpd"}=&getGlobal('DIR', "rcd")."/dhcp"; ++ $GLOBAL_FILE{"chkconfig_innd"}=&getGlobal('DIR', "rcd")."/innd"; ++ $GLOBAL_FILE{"chkconfig_gated"}=&getGlobal('DIR', "rcd")."/gated"; ++ $GLOBAL_FILE{"chkconfig_routed"}=&getGlobal('DIR', "rcd")."/routed"; ++ $GLOBAL_FILE{"chkconfig_ypbind"}=&getGlobal('DIR', "rcd")."/ypbind"; ++ $GLOBAL_FILE{"chkconfig_snmpd"}=&getGlobal('DIR', "rcd")."/snmpd"; ++ } + $GLOBAL_FILE{"sendmail.cf"}="/etc/sendmail.cf"; + $GLOBAL_FILE{"sysconfig_sendmail"}="/etc/sysconfig/sendmail"; + $GLOBAL_FILE{"named"}="/usr/sbin/named"; +@@ -2683,6 +2702,12 @@ + } + return $retval; + } ++ elsif (&GetDistro =~/^GE.*/) { ++ print "[chkconfig_on] Gentoo detected, using rc-update to run $startup_script on boot\n"; ++ $ci = system("/sbin/rc-update add $startup_script default"); ++ return 0; ++ } ++ + # Run through the init script looking for the chkconfig line... + $retval = open CHKCONFIG,&getGlobal('DIR', "initd") . "/$startup_script"; + unless ($retval) { +@@ -2840,6 +2865,10 @@ + #} + } + } ++ elsif ( &GetDistro =~/^GE.*/ ) { ++ $ci = system("/sbin/rc-update del $startup_script default"); ++ return $ci; ++ } + else { + + # Run through the init script looking for the chkconfig line... +diff -urN Bastille/Bastille/FilePermissions.pm Bastille2/Bastille/FilePermissions.pm +--- Bastille/Bastille/FilePermissions.pm 2003-04-07 06:03:08.000000000 -0400 ++++ Bastille2/Bastille/FilePermissions.pm 2003-08-02 05:02:58.000000000 -0400 +@@ -43,7 +43,7 @@ + + if (&getGlobalConfig("FilePermissions","generalperms_1_1") eq "Y") { + +- if ($distro =~ /^RH/ or $distro =~ /^MN/ or $distro =~ /^DB/ or $distro =~ /^SE/ or $distro =~ /^TB/) { ++ if ($distro =~ /^RH/ or $distro =~ /^MN/ or $distro =~ /^DB/ or $distro =~ /^SE/ or $distro =~ /^TB/ or $distro=~ /^GE/) { + &B_chmod_if_exists(0700,"/bin/linuxconf"); + &B_chmod_if_exists(0750,"/bin/mt"); + &B_chmod_if_exists(0750,"/bin/setserial"); +diff -urN Bastille/Bastille/Firewall.pm Bastille2/Bastille/Firewall.pm +--- Bastille/Bastille/Firewall.pm 2003-01-07 08:00:49.000000000 -0500 ++++ Bastille2/Bastille/Firewall.pm 2003-08-02 05:02:58.000000000 -0400 +@@ -342,7 +342,7 @@ + B_replace_line (&getGlobal('DIR', "sbin") . "/bastille-firewall-reset",'^INITBASEDIR=/etc/rc.d/init.d',"INITBASEDIR=".&getGlobal('DIR', "initd")."\n"); + } + +- if ( (&GetDistro =~ /^RH/) || (&GetDistro =~ /^MN/) || (&GetDistro =~ /^SE/) || (&GetDistro =~ /^TB/)) { ++ if ( (&GetDistro =~ /^RH/) || (&GetDistro =~ /^MN/) || (&GetDistro =~ /^SE/) || (&GetDistro =~ /^TB/) || (&GetDistro =~ /^GE/)) { + + my $ifup_file = &getGlobal('DIR', "sbin") . "/ifup-local"; + +diff -urN Bastille/Bastille/IOLoader.pm Bastille2/Bastille/IOLoader.pm +--- Bastille/Bastille/IOLoader.pm 2003-05-02 12:30:27.000000000 -0400 ++++ Bastille2/Bastille/IOLoader.pm 2003-08-02 05:02:58.000000000 -0400 +@@ -267,6 +267,10 @@ + my $supported_versions = 'RH6.0 RH6.1 RH6.2 RH7.0 RH7.1 RH7.2 RH7.3 RH8.0 RH9.0 RH9'; + $data =~ s/\bRH\b/$supported_versions/; + } ++ if ($data =~ /\bGE\b/) { ++ my $supported_versions = 'GE1.4'; ++ $data =~ s/\bGE\b/$supported_versions/; ++ } + if ($data =~ /\bMN\b/) { + my $supported_versions = 'MN6.0 MN6.1 MN6.2 MN7.0 MN7.1 MN7.2 MN8.0 MN8.1 MN8.2'; + $data =~ s/\bMN\b/$supported_versions/; +diff -urN Bastille/Bastille/PSAD.pm Bastille2/Bastille/PSAD.pm +--- Bastille/Bastille/PSAD.pm 2003-01-07 08:00:50.000000000 -0500 ++++ Bastille2/Bastille/PSAD.pm 2003-08-02 05:02:58.000000000 -0400 +@@ -126,7 +126,7 @@ + my $virgin_kmsgsd_daemon = '/kmsgsd'; + my $diskmond_daemon = '/usr/sbin/diskmond'; + my $virgin_diskmond_daemon = '/diskmond'; +- my $psad_init = '/etc/rc.d/init.d/psad'; ++ my $psad_init = '/etc/init.d/psad'; + my $pre_place_psad_init = '/psad-init'; + my $whois_psad = '/usr/bin/whois.psad'; + my $orig_whois_psad = '/whois'; +diff -urN Bastille/Questions.txt Bastille2/Questions.txt +--- Bastille/Questions.txt 2003-05-05 05:34:36.000000000 -0400 ++++ Bastille2/Questions.txt 2003-08-02 05:02:58.000000000 -0400 +@@ -178,7 +178,7 @@ + there's a chance it will inconvenience your users." + QUESTION: "Would you like to set more restrictive permissions on the + administration utilities? [N]" +-REQUIRE_DISTRO: RH MN DB SE TB ++REQUIRE_DISTRO: RH MN DB SE TB GE + YN_TOGGLE: 1 + YES_EXP: + NO_EXP: +@@ -333,7 +333,7 @@ + If you answer \"Yes\" and then realize later that you do need SUID permissions + on a specific program, you can always turn it back on later with chmod u+s <file name>." + QUESTION: +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + YN_TOGGLE: 0 + YES_EXP: + NO_EXP: +@@ -348,7 +348,7 @@ + still allow anyone with the root password to mount and unmount drives." + REQUIRE_IS_SUID: mount umount smbmnt + QUESTION: "Would you like to disable SUID status for mount/umount?" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + YN_TOGGLE: 1 + DEFAULT_ANSWER: Y + REG_EXP: "^Y$|^N$" +@@ -366,7 +366,7 @@ + for networking the host, who normally has root access, we recommend + disabling SUID status for it." + QUESTION: "Would you like to disable SUID status for ping? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_IS_SUID: ping + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -385,7 +385,7 @@ + access granted by the administrator. It's extremely unlikely that there will + be any problems with disabling SUID for dump and restore." + QUESTION: "Would you like to disable SUID status for dump and restore? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_IS_SUID: dump restore + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -404,7 +404,7 @@ + notebook computer, then you probably don't have any PCMCIA devices, and + you should definitely disable this." + QUESTION: "Would you like to disable SUID status for cardctl? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_IS_SUID: cardctl + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -422,7 +422,7 @@ + can be found in cron (and removing cron is not practical) so there is + no need to retain privileged access for \"at\"." + QUESTION: "Would you like to disable SUID status for at? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_IS_SUID: at + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -439,7 +439,7 @@ + area of security problems. We recommend that only root have access to + this type of application, unless your users have a pressing need for it." + QUESTION: "Would you like to disable SUID status for DOSEMU? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_IS_SUID: dos + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -455,7 +455,7 @@ + server. For this reason, we'd like to disable SUID status for the INN news + server tools inndstart and startinnfeed." + QUESTION: "Would you like to disable SUID status for news server tools? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_IS_SUID: inndstart startinnfeed + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -474,7 +474,7 @@ + we'll ask about disabling printing entirely including stopping the print + scheduler." + QUESTION: "Would you like to disable SUID status for printing utilities? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_IS_SUID: lpr lpq lprm lpalt + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -529,7 +529,7 @@ + them when needed. This will disable the \"client\" side of these tools, + so that people cannot use them to connect to other machines." + QUESTION: "Would you like to disable the r-tools? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_IS_SUID: rcp rlogin rsh rdist rexec + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -545,7 +545,7 @@ + network interfaces. In general, there's no reason for anyone other than the + system administrator to control network interfaces." + QUESTION: "Would you like to disable SUID status for usernetctl? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_IS_SUID: usernetctl + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -563,7 +563,7 @@ + debug network connections, you can leave the SUID bit on traceroute. + Otherwise, you should disable it." + QUESTION: "Would you like to disable SUID status for traceroute? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_IS_SUID: traceroute + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -583,7 +583,7 @@ + safely answer yes is when this system will be running without a monitor of + any kind." + QUESTION: "Would you like to disable SUID status for Xwrapper? [N]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + REQUIRE_IS_SUID: Xwrapper + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -605,7 +605,7 @@ + safely answer yes is when this system will be running without a monitor of + any kind." + QUESTION: "Would you like to disable SUID status for XFree86? [N]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + REQUIRE_IS_SUID: XFree86 + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -647,7 +647,7 @@ + crackers access to the machine. This option will disable the use of those + r-tools both from your machine and as a means of logging into your machine." + QUESTION: "Should Bastille disable clear-text r-protocols that use IP-based authentication? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_FILE_EXISTS: rsh + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -674,7 +674,7 @@ + 180 days, if the password has not been changed, the account will be + temporarily disabled. We would make this change in /etc/login.defs." + QUESTION: "Would you like to enforce password aging? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -704,7 +704,7 @@ + allowed to use cron." + QUESTION: "Would you like to restrict the use of cron to administrative + accounts? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -724,7 +724,7 @@ + is if you are sure that you have already set one." + QUESTION: "Do you want to set the default umask? [Y]" + DEFAULT_ANSWER: 077 +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + YES_EXP: +@@ -769,7 +769,7 @@ + will be overridden by the trusted system default umask, which is 077." + QUESTION: "What umask would you like to set for users on the system? [077]" + DEFAULT_ANSWER: 077 +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX GE + YN_TOGGLE: 0 + YES_EXP: + NO_EXP: +@@ -1263,7 +1263,7 @@ + from logging in directly. He has to steal a second account's password to + make use of the root password via the ttys." + QUESTION: "Should we disallow root login on tty's 1-6? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: N + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1337,7 +1337,7 @@ + Otherwise, this is strongly recommended for general use workstations and + servers which are not locked away in their own room." + QUESTION: "Would you like to password-protect the GRUB prompt? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: grub.conf + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -1356,7 +1356,7 @@ + WARNING: Please do not make this the root password for this computer, as the + GRUB password will be stored unencrypted on the machine." + QUESTION: "Enter GRUB password, please. []" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: grub.conf + DEFAULT_ANSWER: + YN_TOGGLE: 0 +@@ -1380,7 +1380,7 @@ + Otherwise, this is strongly recommended for general use workstations and + servers which are not locked away in their own room." + QUESTION: "Would you like to password-protect the LILO prompt? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: lilo.conf + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -1399,7 +1399,7 @@ + WARNING: Please do not make this the root password for this computer, as the + LILO password will be stored unencrypted on the machine." + QUESTION: "Enter LILO password, please. []" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: lilo.conf + DEFAULT_ANSWER: + YN_TOGGLE: 0 +@@ -1415,7 +1415,7 @@ + machines will allow an attacker to place keystrokes into the keyboard buffer + before he or she reaches the LILO prompt." + QUESTION: "Would you like to reduce the LILO delay time to zero? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: lilo.conf + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -1432,7 +1432,7 @@ + Do you boot from your hard drive? That is, is LILO installed on your hard + drive?" + QUESTION: "Do you ever boot Linux from the hard drive? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: lilo.conf + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -1446,7 +1446,7 @@ + LABEL: lilosub_floppy + SHORT_EXP: "If you have a Linux boot floppy, either for normal booting or for emergency use, you should also write these LILO changes to that floppy. If you do not already have a customized Linux boot floppy, or if you did not choose to make any changes to your LILO configuration, you should answer \"no\" here." + QUESTION: "Would you like to write the LILO changes to a boot floppy? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: lilo.conf + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -1467,7 +1467,7 @@ + fd1 floppy drive + " + QUESTION: "Floppy drive device name: [fd0]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: lilo.conf + DEFAULT_ANSWER: fd0 + YN_TOGGLE: 0 +@@ -1501,7 +1501,7 @@ + here, since having to repair/ignore the damage and wait for file system + checks may slow the attacker down." + QUESTION: "Would you like to disable CTRL-ALT-DELETE rebooting? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: N + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1526,7 +1526,7 @@ + + We HIGHLY recommend that you password protect single user mode." + QUESTION: "Would you like to password protect single-user mode? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1597,7 +1597,7 @@ + /etc/hosts.allow. All other wrappers-based programs, like sshd, will + obey the default-deny." + QUESTION: "Would you like to set a default-deny on TCP Wrappers and xinetd? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + DEFAULT_ANSWER: N + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1633,7 +1633,7 @@ + + NOTE: Deactivating the telnetd service will not affect your telnet client." + QUESTION: "Should Bastille ensure the telnet service does not run on this system? [y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1659,7 +1659,7 @@ + NOTE: Answering \"yes\" to this question will also prevent the use of this + machine as an anonymous ftp server." + QUESTION: "Should Bastille ensure inetd's FTP service does not run on this system? [y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1684,7 +1684,7 @@ + Remote ignition, backup, etc. using Ignite-UX requires the remshd services + for remote execution of commands." + QUESTION: "Should Bastille ensure that the login, shell, and exec services do not run on this system?" +-REQUIRE_DISTRO: HP-UX ++REQUIRE_DISTRO: HP-UX + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1925,7 +1925,7 @@ + messages which you may then later edit. This is sort of like an + \"anti-welcome mat\" for your computer." + QUESTION: "Would you like to display \"Authorized Use\" messages at log-in time? [Y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -1956,7 +1956,7 @@ + machine. Please type in the name of the company, person, or other + organization who owns or is responsible for this machine." + QUESTION: "Who is responsible for granting authorization to use this machine?" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX GE + DEFAULT_ANSWER: "its owner" + YN_TOGGLE: 0 + YES_CHILD: log_inetd +@@ -2020,7 +2020,7 @@ + users by disabling the compiler. If you do chose to disable it, we'll do so by + only allowing root access to the compiler." + QUESTION: "Would you like to disable the gcc compiler? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + REQUIRE_FILE_EXISTS: gcc + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -2067,7 +2067,7 @@ + + All of these values can be edited later." + QUESTION: "Would you like to put limits on system resource usage? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB OSX ++REQUIRE_DISTRO: LINUX DB SE TB OSX GE + DEFAULT_ANSWER: N + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -2084,7 +2084,7 @@ + can disable this special access entirely, but a more flexible option is to + restrict console access to a small group of trusted user accounts." + QUESTION: "Should we restrict console access to a small group of user accounts? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: N + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -2099,7 +2099,7 @@ + SHORT_EXP: "Please enter in the account names that should be able to login + via the console, placing a space between each name." + QUESTION: "Which accounts should be able to login at console? [root]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: root + YN_TOGGLE: 0 + YES_CHILD: morelogging +@@ -2118,7 +2118,7 @@ + logging will not change the existing log files at all, so this is by no means + a \"risky\" move." + QUESTION: "Would you like to add additional logging? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -2141,7 +2141,7 @@ + SHORT_EXP: "If you already have a remote logging host, we can set this + machine to log to it." + QUESTION: "Do you have a remote logging host? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: N + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -2161,7 +2161,7 @@ + poisoning attacks on logging. You may use a hostname, but it should be + added to your /etc/hosts file..." + QUESTION: "What is the IP address of the machine you want to log to? [127.0.0.1]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: 127.0.0.1 + YN_TOGGLE: 0 + YES_CHILD: pacct +@@ -2179,7 +2179,7 @@ + As this is rather disk and CPU intensive, please choose NO unless you have + carefully considered this option." + QUESTION: "Would you like to set up process accounting? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: accton + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -2206,7 +2206,7 @@ + section will require careful attention, but if you have doubts, you should + be able to safely select the default value in most cases." + QUESTION: +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB OSX GE + YN_TOGGLE: 0 + YES_EXP: + NO_EXP: +@@ -2218,7 +2218,7 @@ + SHORT_EXP: "apmd is used to monitor battery power and is used almost + exclusively by notebook/laptop computers." + QUESTION: "Would you like to disable apmd? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_apmd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2246,7 +2246,7 @@ + probably best to deactivate them until you can investigate whether or not + you need them and how to best secure them." + QUESTION: "Would you like to deactivate NFS and Samba? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_nfs + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2330,7 +2330,7 @@ + devices. If this machine has no PCMCIA ports, you should be able to disable + PCMCIA services without any problems." + QUESTION: "Would you like to disable PCMCIA services? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_pcmcia + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2348,7 +2348,7 @@ + should deactivate the DHCP daemon. Deactivating the daemon will not + prevent you from running DHCP as a client." + QUESTION: "Would you like to disable the DHCP daemon? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_dhcpd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2364,7 +2364,7 @@ + text mode. If you will be using this machine in console mode and will want + mouse support, leave GPM on." + QUESTION: "Would you like to disable GPM? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_gpm + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2384,7 +2384,7 @@ + of disk space, processor power, bandwidth and maintenance. In all but the + rarest of cases, you should disable the news server daemon." + QUESTION: "Would you like to disable the news server daemon? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_innd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2408,7 +2408,7 @@ + using routed, you should leave this on, then migrate to gated manually later. + (Bastille will not enable gated for you.)" + QUESTION: "Would you like to deactivate routed? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_routed + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2427,7 +2427,7 @@ + disable routing protocols. If this machine is acting as a router, then + you should leave gated on." + QUESTION: "Would you like to deactivate gated? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_gated + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2460,7 +2460,7 @@ + We recommend that you deactivate NIS server programs. + Alternatives include NIS+, LDAP, and Kerberos." + QUESTION: "Would you like to deactivate NIS server programs? [Y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + REQUIRE_FILE_EXISTS: ypserv + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2499,7 +2499,7 @@ + We recommend that you deactivate NIS client programs. + Alternatives include NIS+, LDAP, and Kerberos" + QUESTION: "Would you like to deactivate NIS client programs? [Y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -2530,7 +2530,7 @@ + Network management software, such as HP Openview, which relies + on SNMP" + QUESTION: "Would you like to disable SNMPD? [Y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -2739,7 +2739,7 @@ + POP/IMAP read functionality. The only reason to run sendmail in daemon + mode is if you are running a mail server." + QUESTION: "Do you want to stop sendmail from running in daemon mode? [Y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + REQUIRE_FILE_EXISTS: sysconfig_sendmail + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2766,7 +2766,7 @@ + + NOTE: The 15 minute interval can be easily changed later, see crontab(1)." + QUESTION: "Would you like to run sendmail via cron to process the queue? [N]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + REQUIRE_FILE_EXISTS: sysconfig_sendmail + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2790,7 +2790,7 @@ + (2) you are using them to debug your own mail server, or (3) the very small + chance that some software you use relies on this." + QUESTION: "Would you like to disable the VRFY and EXPN sendmail commands? [Y]" +-REQUIRE_DISTRO: LINUX HP-UX DB SE TB ++REQUIRE_DISTRO: LINUX HP-UX DB SE TB GE + REQUIRE_FILE_EXISTS: sendmail.cf + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2851,7 +2851,7 @@ + (MANUAL ACTION REQUIRED TO COMPLETE THIS CONFIGURATION, + see TODO list for details)" + QUESTION: "Would you like to chroot named and set it to run as a non-root user? [N]" +-REQUIRE_DISTRO: LINUX HP-UX ++REQUIRE_DISTRO: LINUX HP-UX GE + REQUIRE_FILE_EXISTS: named + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -2893,7 +2893,7 @@ + deactivate it for now until you get the configuration files setup. You + can reactivate it then by typing, as root: /sbin/chkconfig named on " + QUESTION: "Would you like to deactivate named, at least for now? [Y]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + REQUIRE_FILE_EXISTS: chkconfig_named + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2933,7 +2933,7 @@ + /sbin/chkconfig httpd on + " + QUESTION: "Would you like to deactivate the Apache web server? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: chkconfig_httpd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -2969,7 +2969,7 @@ + it doesn't represent as great a risk if it isn't set to allow + connections from the entire internet." + QUESTION: "Would you like to bind the web server to listen only to the localhost? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -2988,7 +2988,7 @@ + web server. This is highly recommended if you're building an internal-only + web server." + QUESTION: "Would you like to bind the web server to a particular interface? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3008,7 +3008,7 @@ + or + 10.0.0.1:8080" + QUESTION: "Address to bind the web server to? [127.0.0.1]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + YN_TOGGLE: 0 + DEFAULT_ANSWER: 127.0.0.1 +@@ -3030,7 +3030,7 @@ + under which any user on the system can instruct the server to execute + arbitrary code for anyone who comes to the site, via CGI scripts." + QUESTION: +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + YN_TOGGLE: 0 + YES_EXP: +@@ -3053,7 +3053,7 @@ + vulnerability in Apache could be exploited to alter world writeable files + on the system." + QUESTION: "Would you like to deactivate the following of symbolic links? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -3071,7 +3071,7 @@ + web pages, but they represent a security risk you may not want to take until + you better understand the Apache web server." + QUESTION: "Would you like to deactivate server-side includes? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -3097,7 +3097,7 @@ + dangerous, but they need to be very carefully controlled by people who + understand the dangers." + QUESTION: "Would you like to disable CGI scripts, at least for now? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + DEFAULT_ANSWER: Y + YN_TOGGLE: 1 +@@ -3124,7 +3124,7 @@ + breaking the most obvious rule of web site creation, \"don't put any sensitive + files in a web directory with world readable permissions!\" " + QUESTION: "Would you like to disable indexes? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: httpd + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3222,7 +3222,7 @@ + in the near future. If you deactivate this, you might want to write + down the commands above in case you decide to re-enable printing later." + QUESTION: "Would you like to disable printing? [N]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + REQUIRE_FILE_EXISTS: lpd + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3255,7 +3255,7 @@ + in the near future. If you deactivate this, you might want to write + down the commands above in case you decide to re-enable printing later." + QUESTION: "Would you like to disable printing? [N]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + REQUIRE_FILE_EXISTS: cupsd + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3325,7 +3325,7 @@ + " + REQUIRE_FILE_EXISTS: ftpaccess + QUESTION: +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + YN_TOGGLE: 0 + YES_EXP: + NO_EXP: +@@ -3362,7 +3362,7 @@ + If this is a 3 account server, that kind of user education may be quite + possible." + QUESTION: "Would you like to disable user privileges on the FTP daemon? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: ftpaccess + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3380,7 +3380,7 @@ + secure Apache web server. Any files that you want accessible to the world + can be placed on an easy-to-configure web server." + QUESTION: "Would you like to disable anonymous download? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + REQUIRE_FILE_EXISTS: ftpaccess + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3933,7 +3933,7 @@ + + This script supports both kernel 2.2 (ipchains) and 2.4 (iptables if available, otherwise ipchains)." + QUESTION: "Would you like to run the packet filtering script? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: End_Screen + DEFAULT_ANSWER: N + YN_TOGGLE: 1 +@@ -3946,7 +3946,7 @@ + + LABEL: ip_detail_level_kludge + QUESTION: +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_exp_type + DEFAULT_ANSWER: Y + YN_TOGGLE: 0 +@@ -3975,7 +3975,7 @@ + Unless you really understand networking, you should ask for more information on most + of the options in this script." + QUESTION: +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + YN_TOGGLE: 0 + YES_EXP: + NO_EXP: +@@ -3992,7 +3992,7 @@ + If this is a server that deals with multiple interfaces or provides IP + Masquerading/NAT service, then you do need the advanced networking options." + QUESTION: "Do you need the advanced networking options?" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_dns + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" +@@ -4027,7 +4027,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "DNS servers: [0.0.0.0/0]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_trustiface + DEFAULT_ANSWER: 0.0.0.0/0 + CONFIRM_TEXT: " \nY" +@@ -4051,7 +4051,7 @@ + List the interface names of all interfaces you want to have unrestricted + access to this machine. You should at least trust \"lo\", the \"loopback\" interface." + QUESTION: "Trusted interface names: [lo]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_publiciface + DEFAULT_ANSWER: lo + CONFIRM_TEXT: " \nY" +@@ -4073,7 +4073,7 @@ + Using the \"+\" suffix allows you to configure more interfaces (for + instance, more PPP dialup entries) without having to modify the firewall script. " + QUESTION: "Public interfaces: [eth+ ppp+ slip+]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_internaliface + DEFAULT_ANSWER: eth+ ppp+ slip+ + YN_TOGGLE: 0 +@@ -4097,7 +4097,7 @@ + + Normal workstations should leave this as the empty default. " + QUESTION: "Internal interfaces: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_tcpaudit + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4121,7 +4121,7 @@ + attempts to several services, although you may not have them installed or enabled. " + QUESTION: "TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login + linuxconf ssh]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_udpaudit + DEFAULT_ANSWER: telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh + CONFIRM_TEXT: " \nY" +@@ -4145,7 +4145,7 @@ + While attackers probing for Back Orifice may not pose a threat to your + Linux system, logging their attempts helps identify the \"bad guys\" " + QUESTION: "UDP services to audit: [31337]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_icmpaudit + DEFAULT_ANSWER: 31337 + CONFIRM_TEXT: " \nY" +@@ -4162,7 +4162,7 @@ + as types, not numbers. One example is \"echo-request\" which is used by Microsoft ping + and tracert [sic] clients." + QUESTION: "ICMP services to audit: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_publictcp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4195,7 +4195,7 @@ + Not doing so means you will be able to access the service locally, but \"public\" + hosts will not." + QUESTION: "TCP service names or port numbers to allow on public interfaces:[ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_publicudp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4212,7 +4212,7 @@ + services available, but if you're running caching or real DNS servers, you will need + to enable domain (port 53)." + QUESTION: "UDP service names or port numbers to allow on public interfaces:[ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_internaltcp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4241,7 +4241,7 @@ + case you would set this value to \"smtp imap\". This does not affect IP Masquerading's + ability to let masq'ed users access any services on outside/Internet hosts. " + QUESTION: "TCP service names or port numbers to allow on private interfaces: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_internaludp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4263,7 +4263,7 @@ + As with internal TCP. You do not need to enable domain service if the + internal clients are using IP Masq to query outside DNS servers. " + QUESTION: "UDP service names or port numbers to allow on private interfaces: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_passiveftp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4298,7 +4298,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "Force passive mode? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: N + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 1 +@@ -4328,7 +4328,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "TCP services to block: [2049 2065:2090 6000:6020 7100]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_udpblock + DEFAULT_ANSWER: 2049 2065:2090 6000:6020 7100 + CONFIRM_TEXT: " \nY" +@@ -4349,7 +4349,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "UDP services to block: [2049 6770]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_icmpallowed + DEFAULT_ANSWER: 2049 6770 + CONFIRM_TEXT: " \nY" +@@ -4374,7 +4374,7 @@ + able to use ping and traceroute to debug issues on the \"public\" networks. " + QUESTION: "ICMP allowed types: [destination-unreachable echo-reply time-exceeded]" + SKIP_CHILD: ip_s_srcaddr +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: destination-unreachable echo-reply time-exceeded + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -4394,7 +4394,7 @@ + + This is a standard, and highly recommended, precaution. " + QUESTION: "Enable source address verification? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: Y + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 1 +@@ -4423,7 +4423,7 @@ + Note this expects _network_ addresses (either with 0's on the end or with + explicit netmasks), _not_ interface names. " + QUESTION: "Masqueraded networks: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_kernelmasq + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4441,7 +4441,7 @@ + name should have the usual prefix, e.g. \"raudio\" will cause the script to load the + \"ip_masq_raudio\" module." + QUESTION: "Kernel modules to masquerade: [ftp raudio vdolive]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_rejectmethod + DEFAULT_ANSWER: ftp raudio vdolive + CONFIRM_TEXT: " \nY" +@@ -4468,7 +4468,7 @@ + There's no definite right answer here. With DENY, your machine will be less + visible, especially if using kernel 2.4/iptables. " + QUESTION: "Reject method: [DENY]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_dhcpiface + DEFAULT_ANSWER: DENY + CONFIRM_TEXT: " \nY" +@@ -4489,7 +4489,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "Interfaces for DHCP queries: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_ntpsrv + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4518,7 +4518,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "NTP servers to query: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_s_icmpout + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4540,7 +4540,7 @@ + \"destination-unreachable\" is (ab)used by the traceroute program to check + routing to individual hosts. " + QUESTION: "ICMP types to disallow outbound: [destination-unreachable time-exceeded]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_enable_firewall + DEFAULT_ANSWER: destination-unreachable time-exceeded + CONFIRM_TEXT: " \nY" +@@ -4583,7 +4583,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "DNS Servers: [0.0.0.0/0]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_trustiface + DEFAULT_ANSWER: 0.0.0.0/0 + CONFIRM_TEXT: " \nY" +@@ -4596,7 +4596,7 @@ + + LABEL: ip_b_trustiface + DEFAULT_ANSWER: lo +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_publiciface + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -4617,7 +4617,7 @@ + Using the \"+\" suffix allows you to configure more interfaces (for + instance, more PPP dialup entries) without having to modify the firewall script. " + QUESTION: "Public interfaces: [eth+ ppp+ slip+]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_internaliface + DEFAULT_ANSWER: eth+ ppp+ slip+ + CONFIRM_TEXT: " \nY" +@@ -4631,7 +4631,7 @@ + LABEL: ip_b_internaliface + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_tcpaudit + YN_TOGGLE: 0 + YES_EXP: +@@ -4653,7 +4653,7 @@ + attempts to several services, although you may not have them installed or enabled. " + QUESTION: "TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login + linuxconf ssh]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_udpaudit + DEFAULT_ANSWER: telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh + CONFIRM_TEXT: " \nY" +@@ -4677,7 +4677,7 @@ + While attackers probing for Back Orifice may not pose a threat to your + Linux system, logging their attempts helps identify the \"bad guys\" " + QUESTION: "UDP services to audit: [31337]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_icmpaudit + DEFAULT_ANSWER: 31337 + CONFIRM_TEXT: " \nY" +@@ -4694,7 +4694,7 @@ + as types, not numbers. One example is \"echo-request\" which is used by Microsoft ping + and tracert [sic] clients." + QUESTION: "ICMP services to audit: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_publictcp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4727,7 +4727,7 @@ + Not doing so means you will be able to access the service locally, but \"public\" + hosts will not." + QUESTION: "TCP service names or port numbers to allow on public interfaces: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_publicudp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4744,7 +4744,7 @@ + services available, but if you're running caching or real DNS servers, you will need + to enable domain (port 53)." + QUESTION: "UDP service names or port numbers to allow on public interfaces: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_passiveftp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -4758,7 +4758,7 @@ + LABEL: ip_b_internaltcp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_internaludp + YN_TOGGLE: 0 + YES_EXP: +@@ -4770,7 +4770,7 @@ + LABEL: ip_b_internaludp + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_passiveftp + YN_TOGGLE: 0 + YES_EXP: +@@ -4806,7 +4806,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "Force passive mode? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: N + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 1 +@@ -4840,7 +4840,7 @@ + difference if you use kernel 2.4 and iptables." + QUESTION: "TCP services to block: [2049 2065:2090 6000:6020 7100]" + DEFAULT_ANSWER: 2049 2065:2090 6000:6020 7100 +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_udpblock + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -4860,7 +4860,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "UDP services to block: [2049 6770]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_icmpallowed + DEFAULT_ANSWER: 2049 6770 + CONFIRM_TEXT: " \nY" +@@ -4884,7 +4884,7 @@ + getting into. If you don't allow \"echo-reply\" and \"time-exceeded\", you won't be + able to use ping and traceroute to debug issues on the \"public\" networks. " + QUESTION: "ICMP allowed types: [destination-unreachable echo-reply time-exceeded]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_srcaddr + DEFAULT_ANSWER: destination-unreachable echo-reply time-exceeded + CONFIRM_TEXT: " \nY" +@@ -4905,7 +4905,7 @@ + + This is a standard, and highly recommended, precaution. " + QUESTION: "Enable source address verification? [Y]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + DEFAULT_ANSWER: Y + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 1 +@@ -4918,7 +4918,7 @@ + + LABEL: ip_b_ipmasq + DEFAULT_ANSWER: +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_kernelmasq + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -4930,7 +4930,7 @@ + + LABEL: ip_b_kernelmasq + DEFAULT_ANSWER: ftp raudio vdolive +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_rejectmethod + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -4956,7 +4956,7 @@ + _completely_ invisible, even if you choose \"DENY\", but with \"DENY\" and _no_ public + services, you will not be visible to casual probes. " + QUESTION: "Reject method: [DENY]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_dhcpiface + DEFAULT_ANSWER: DENY + CONFIRM_TEXT: " \nY" +@@ -4977,7 +4977,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "Interfaces for DHCP queries: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_ntpsrv + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -5006,7 +5006,7 @@ + What you answer is important if you use kernel 2.2/ipchains, but makes no + difference if you use kernel 2.4 and iptables." + QUESTION: "NTP servers to query: [ ]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_b_icmpout + DEFAULT_ANSWER: + CONFIRM_TEXT: " \nY" +@@ -5028,7 +5028,7 @@ + \"destination-unreachable\" is (ab)used by the traceroute program to check + routing to individual hosts. " + QUESTION: "ICMP types to disallow outbound: [destination-unreachable time-exceeded]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + SKIP_CHILD: ip_enable_firewall + DEFAULT_ANSWER: destination-unreachable time-exceeded + CONFIRM_TEXT: " \nY" +@@ -5040,17 +5040,16 @@ + PROPER_PARENT: ip_b_ntpsrv + + LABEL: ip_enable_firewall +-SHORT_EXP: "The firewall is controlled by /etc/rc.d/init.d/bastille-firewall. The ++SHORT_EXP: "The firewall is controlled by /etc/init.d/bastille-firewall. The + configuration file is /etc/Bastille/bastille-firewall.cfg, which you may modify. + After it has been installed, you can then test the firewall by using +- /etc/rc.d/init.d/bastille-firewall start ++ /etc/init.d/bastille-firewall start + and (to remove all firewall rules) +- /etc/rc.d/init.d/bastille-firewall stop ++ /etc/init.d/bastille-firewall stop + + Once you have a configuration that will work on your system, you can make it + run at every normal boot-up by typing +- /sbin/chkconfig --add bastille-firewall +- /sbin/chkconfig bastille-firewall reset ++ rc-update add bastille-firewall default + + If you are confident of your selections, Bastille can start the firewall + and configure it to run at boot time for you. +@@ -5058,7 +5057,7 @@ + ** It is strongly recommended that you answer N if you are not logged in to + the system's console, as your network access my be blocked by the firewall. **" + QUESTION: "Should Bastille run the firewall and enable it at boot time? [N]" +-REQUIRE_DISTRO: LINUX DB SE TB ++REQUIRE_DISTRO: LINUX DB SE TB GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + YES_EXP: +@@ -5082,7 +5081,7 @@ + + NOTE: For psad to be effective, it is required that the firewall is active." + QUESTION: "Would you like to setup PSAD?" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + DEFAULT_ANSWER: N +@@ -5103,7 +5102,7 @@ + alerts and utilize much of your systems resources if your machine is subjected to a + high-traffic scan." + QUESTION: "psad check interval: [15]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: 15 + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -5125,7 +5124,7 @@ + ignore the traffic. This also implies that multiple packets sent to the same port do + not qualify as a port scan." + QUESTION: "Port range scan threshold: [1]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: 1 + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -5146,7 +5145,7 @@ + The default is N since most scans are easily recognizable within a short time interval + which is configured in the next question box if you leave this value as N." + QUESTION: "Enable scan persistence?" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + DEFAULT_ANSWER: N +@@ -5165,7 +5164,7 @@ + + The default is 3600 seconds (one hour)." + QUESTION: "Scan timeout: [3600]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: 3600 + CONFIRM_TEXT: " \nY" + YN_TOGGLE: 0 +@@ -5186,7 +5185,7 @@ + The default is N since the email record will already contain just the most recently + matched signatures." + QUESTION: "Show all scan signatures?" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + DEFAULT_ANSWER: N +@@ -5208,7 +5207,7 @@ + Danger Level 4 = 5000 packets + Danger Level 5 = 10000 packets" + QUESTION: "Danger Levels: [5 50 1000 5000 10000]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: 5 50 1000 5000 10000 + YN_TOGGLE: 0 + YES_EXP: +@@ -5224,7 +5223,7 @@ + + The default email address is root@localhost." + QUESTION: "Email addresses: [root@localhost]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: root@localhost + YN_TOGGLE: 0 + YES_EXP: +@@ -5241,7 +5240,7 @@ + + The default danger level is 1." + QUESTION: "Email alert danger level: [1]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: 1 + YN_TOGGLE: 0 + YES_EXP: +@@ -5258,7 +5257,7 @@ + The default is Y since once a scan reaches the threshold assigned in the previous + section you will probably want as much information on it as psad can produce." + QUESTION: "Alert on all new packets?" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + DEFAULT_ANSWER: Y +@@ -5283,7 +5282,7 @@ + feature and the next section will ask you to define a corresponding danger + threshold." + QUESTION: "Enable automatic blocking of scanning IPs?" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + DEFAULT_ANSWER: N +@@ -5302,7 +5301,7 @@ + + The default danger level is 5." + QUESTION: "Auto blocking danger level: [5]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + DEFAULT_ANSWER: 5 + YN_TOGGLE: 0 + YES_EXP: +@@ -5313,15 +5312,15 @@ + + LABEL: psad_enable_at_boot + SHORT_EXP: "The Port Scan Attack Detector is controlled by a standard Sys V style +-init script, /etc/rc.d/init.d/psad. To start the psad daemons, simply execute +- /etc/rc.d/init.d/psad start ++init script, /etc/init.d/psad. To start the psad daemons, simply execute ++ /etc/init.d/psad start + and to stop psad, execute +- /etc/rc.d/init.d/psad stop ++ /etc/init.d/psad stop + + Bastille can configure your system to start psad at boot time by executing +- chkconfig psad on." ++ rc-update add psad default" + QUESTION: "Should Bastille enable psad at boot time? [N]" +-REQUIRE_DISTRO: LINUX ++REQUIRE_DISTRO: LINUX GE + YN_TOGGLE: 1 + REG_EXP: "^Y$|^N$" + YES_EXP: +diff -urN Bastille/bastille-firewall Bastille2/bastille-firewall +--- Bastille/bastille-firewall 2002-02-24 12:19:14.000000000 -0500 ++++ Bastille2/bastille-firewall 2003-08-02 05:02:58.000000000 -0400 +@@ -26,8 +26,8 @@ + # + # It should be run with a "start" argument + # 1) as an rc?.d "S" script, _before_ the "network" script +-# [copy this to /etc/rc.d/init.d/bastille-firewall (or your equivalent of +-# /etc/rc.d/init.d) and run 'chkconfig -add bastille-firewall' ] ++# [copy this to /etc/init.d/bastille-firewall (or your equivalent of ++# /etc/init.d) and run 'rc-update add bastille-firewall default' ] + # 2) any time an interface is brought up or changed, e.g. + # establishing a PPP conection or renewing a DHCP lease + # [copy 'bastille-firewall-reset', 'bastille-firewall-schedule' +diff -urN Bastille/bastille-firewall-install.sh Bastille2/bastille-firewall-install.sh +--- Bastille/bastille-firewall-install.sh 2002-01-24 23:44:26.000000000 -0500 ++++ Bastille2/bastille-firewall-install.sh 2003-08-02 05:02:58.000000000 -0400 +@@ -76,10 +76,10 @@ + exit 3 + fi + +-initdbase="" +-for t in /etc /etc/rc.d ; do +- [ -d ${t}/init.d ] && initdbase="${t}" +-done ++initdbase="/etc" ++#for t in /etc /etc/rc.d ; do ++# [ -d ${t}/init.d ] && initdbase="${t}" ++#done + if [ -z "${initdbase}" ]; then + echo "ERROR: Cannot find init.d directory; unable to install" + exit 1 +@@ -235,10 +235,11 @@ + app_available chkconfig && chk=1 + rcd=0 + app_available update-rc.d && rcd=1 +-ci=`chkconfig --list bastille-firewall 2>/dev/null | grep :on` +-dtest=`ls ${initdbase}/rc3.d/[SK]??bastille-firewall 2>/dev/null` ++#ci=`chkconfig --list bastille-firewall 2>/dev/null | grep :on` ++chk=1 ++dtest=`ls /etc/runlevels/default/bastille-firewall 2>/dev/null` + if [ $c -eq 1 ]; then +- if [ \( $chk -eq 1 -a -z "${ci}" \) -o \( $rcd -eq 1 -a -z "${dtest}" \) ]; then ++ if [ \( $chk -eq 1 \) -o \( $rcd -eq 1 -a -z "${dtest}" \) ]; then + echo + echo "You may configure bastille-firewall to run automatically; we" + echo "recommend you examine $CFG" +@@ -247,8 +248,7 @@ + enable=$? + if [ $enable -eq 1 ]; then + if [ $chk -eq 1 ]; then +- chkconfig --add bastille-firewall +- chkconfig --level 2345 bastille-firewall on ++ rc-update add bastille-firewall default + rc=$? + else + update-rc.d -f bastille-firewall remove 2>/dev/null +@@ -289,12 +289,12 @@ + done + fi + +-echo +-get_answer "Start/reload bastille-firewall rules?" +-reload=$? +-if [ $reload -eq 1 ]; then +- ${initdbase}/init.d/bastille-firewall start +-fi ++#echo ++#get_answer "Start/reload bastille-firewall rules?" ++#reload=$? ++#if [ $reload -eq 1 ]; then ++# ${initdbase}/init.d/bastille-firewall start ++#fi + + echo + echo "Finished $what bastille-firewall" +diff -urN Bastille/psad/install.pl Bastille2/psad/install.pl +--- Bastille/psad/install.pl 2002-09-23 22:06:20.000000000 -0400 ++++ Bastille2/psad/install.pl 2003-08-02 05:02:58.000000000 -0400 +@@ -54,7 +54,7 @@ + #============== config =============== + my $INSTALL_LOG = "${PSAD_DIR}/install.log"; + my $PSAD_FIFO = "${LIBDIR}/psadfifo"; +-my $INIT_DIR = '/etc/rc.d/init.d'; ++my $INIT_DIR = '/etc/init.d'; + my $SBIN_DIR = '/usr/sbin'; ### consistent with FHS (Filesystem Hierarchy Standard) + my $CONF_ARCHIVE = "${PSAD_CONFDIR}/archive"; + my @LOGR_FILES = (*STDOUT, $INSTALL_LOG); +@@ -62,7 +62,7 @@ + my $WHOIS_PSAD = '/usr/bin/whois.psad'; + + ### system binaries ### +-my $chkconfigCmd = '/sbin/chkconfig'; ++my $chkconfigCmd = '/sbin/rc-update'; + my $mknodCmd = '/bin/mknod'; + my $makeCmd = '/usr/bin/make'; + my $findCmd = '/usr/bin/find'; +@@ -411,6 +411,16 @@ + &logr("@@@@@ The init script directory, \"${INIT_DIR}\" does not exist!.\n"); + &logr("Edit the \$INIT_DIR variable in the config section to point to where the init scripts are.\n"); + } ++ elsif ($distro =~ /gentoo/) { ++ if ( -d $INIT_DIR) { ++ &logr(" ... Gentoo found. Copying psad-init.generic -> ${INIT_DIR}/psad\n"); ++ copy('psad-init.generic', "${INIT_DIR}/psad"); ++ &perms_ownership("${INIT_DIR}/psad", 0744); ++ &enable_psad_at_boot($distro); ++ } else { ++ &logr("@@@@@ The init script directory, \"${INIT_DIR}\" does not exist!.\n"); ++ &logr("Edit the \$INIT_DIR variable in the config section to point to where the init scripts are.\n"); ++ } + } else { ### psad is being installed on a non-redhat distribution + if (-d $INIT_DIR) { + &logr(" ... Copying psad-init.generic -> ${INIT_DIR}/psad\n"); +@@ -567,6 +577,8 @@ + } + close ISSUE; + return 'NA'; ++ } elsif (-e '/etc/gentoo-release') { ++ return 'gentoo'; + } else { + return 'NA'; + } +@@ -740,7 +752,9 @@ + if ($ans eq 'y') { + if ($distro =~ /redhat/) { + system "$Cmds{'chkconfig'} --add psad"; +- } else { ### it is a non-redhat distro, try to get the runlevel from /etc/inittab ++ } elsif ($distro =~ /gentoo/) { ++ system "$Cmds{'chkconfigCmd'} add psad default"; ++ } else { ### it is a non-redhat distro, try to get the runlevel from /etc/inittab + if ($RUNLEVEL) { + unless (-e "/etc/rc.d/rc${RUNLEVEL}.d/S99psad") { ### the link already exists, so don't re-create it + symlink '/etc/rc.d/init.d/psad', "/etc/rc.d/rc${RUNLEVEL}.d/S99psad"; +diff -urN Bastille/psad/psad Bastille2/psad/psad +--- Bastille/psad/psad 2002-09-23 22:06:20.000000000 -0400 ++++ Bastille2/psad/psad 2003-08-02 05:23:15.000000000 -0400 +@@ -228,7 +228,8 @@ + + ### disable whois lookups if for some reason the whois client that is + ### bundled with psad can't be found +-$whoislookups = 1 if ($Cmds{'whois.psad'} !~ /psad/); ++#$whoislookups = 1 if ($Cmds{'whois.psad'} !~ /psad/); ++$whoislookups = 0; + + ### if psad is running on a syslog server, don't check the firewall + ### rules since they may not be local. +@@ -1611,20 +1612,20 @@ + unless (-e $Config{'PSAD_FIFO'}) { + system "$Cmds{'mknod'} -m 600 $Config{'PSAD_FIFO'} p"; + } +- copy('/etc/syslog.conf', '/etc/syslog.conf.orig') unless (-e '/etc/syslog.conf.orig'); +- open RS, '< /etc/syslog.conf' or die " ... @@@ Unable to open /etc/syslog.conf: $!"; +- my @slines = <RS>; +- close RS; +- open SYSLOG, '> /etc/syslog.conf' or die " ... @@@ Unable to open /etc/syslog.conf: $!"; +- for my $l (@slines) { +- chomp $l; +- unless ($l =~ /psadfifo/) { +- print SYSLOG "$l\n"; +- } +- } +- print SYSLOG "kern.info |$Config{'PSAD_FIFO'}\n\n"; ### reinstate kernel logging to our named pipe +- close SYSLOG; +- system "$Cmds{'killall'} -HUP $Cmds{'syslogd'}"; ++# copy('/etc/syslog.conf', '/etc/syslog.conf.orig') unless (-e '/etc/syslog.conf.orig'); ++# open RS, '< /etc/syslog.conf' or die " ... @@@ Unable to open /etc/syslog.conf: $!"; ++# my @slines = <RS>; ++# close RS; ++# open SYSLOG, '> /etc/syslog.conf' or die " ... @@@ Unable to open /etc/syslog.conf: $!"; ++# for my $l (@slines) { ++# chomp $l; ++# unless ($l =~ /psadfifo/) { ++# print SYSLOG "$l\n"; ++# } ++# } ++# print SYSLOG "kern.info |$Config{'PSAD_FIFO'}\n\n"; ### reinstate kernel logging to our named pipe ++# close SYSLOG; ++# system "$Cmds{'killall'} -HUP $Cmds{'syslogd'}"; + return; + } + sub check_config() { +diff -urN Bastille/psad/psad-init Bastille2/psad/psad-init +--- Bastille/psad/psad-init 2002-09-23 22:06:20.000000000 -0400 ++++ Bastille2/psad/psad-init 2003-08-02 05:02:58.000000000 -0400 +@@ -8,10 +8,7 @@ + # pidfile: /var/run/psad.pid + # config: /etc/psad/psad.conf + # +-# $Id: bastille-2.1.1.patch,v 1.1 2003/08/02 10:13:47 seemant Exp $ +- +-# Source function library. +-. /etc/rc.d/init.d/functions ++# $Id: bastille-2.1.1.patch,v 1.1 2003/08/02 10:13:47 seemant Exp $ + + restart() { + $0 stop +@@ -21,48 +18,18 @@ + # See how we were called. + case "$1" in + start) +- if grep -q psadfifo /etc/syslog.conf; then +- echo -n "Starting the psad daemons: " +- daemon /usr/sbin/psad -s /etc/psad/psad_signatures -a /etc/psad/psad_auto_ips +- RETVAL=$? +- echo +- if [ $RETVAL -eq 0 ]; then +- touch /var/lock/subsys/psad +- fi +- else +- echo "Syslog has not been configured to send kern.info messages to" +- echo "/var/lib/psad/psadfifo. Do you need to run the psad installer?" +- fi ++ /usr/sbin/psad -s /etc/psad/psad_signatures -a /etc/psad/psad_auto_ips + ;; + stop) +- echo -n "Shutting down the psadwatchd monitoring daemon: " +- killproc psadwatchd +- echo +- echo -n "Shutting down the psad daemon: " +- killproc psad +- RETVAL=$? +- [ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/psad +- echo +- echo -n "Shutting down the kmsgs daemon: " +- killproc kmsgsd +- echo +- echo -n "Shutting down the disk monitoring daemon: " +- killproc diskmond +- echo ++ /usr/sbin/psad --Kill + ;; + status) +- status kmsgsd +- status psad +- status psadwatchd +- status diskmond ++ /usr/sbin/psad --Status + ;; +-restart|reload) ++restart) + restart + ;; +-condrestart) +- [ -f /var/lock/subsys/psad ] && restart || : +- ;; + *) +- echo "Usage: psad {start|stop|status|restart|reload|condrestart}" ++ echo "Usage: psad {start|stop|status|restart}" + exit 1 + esac +diff -urN Bastille/psad/psad-init.redhat Bastille2/psad/psad-init.redhat +--- Bastille/psad/psad-init.redhat 1969-12-31 19:00:00.000000000 -0500 ++++ Bastille2/psad/psad-init.redhat 2003-08-02 05:02:58.000000000 -0400 +@@ -0,0 +1,68 @@ ++#!/bin/sh ++# ++# Startup script for psad ++# ++# chkconfig: 345 99 05 ++# description: The Port Scan Attack Detector (psad) ++# processname: psad ++# pidfile: /var/run/psad.pid ++# config: /etc/psad/psad.conf ++# ++# $Id: bastille-2.1.1.patch,v 1.1 2003/08/02 10:13:47 seemant Exp $ ++ ++# Source function library. ++. /etc/rc.d/init.d/functions ++ ++restart() { ++ $0 stop ++ $0 start ++} ++ ++# See how we were called. ++case "$1" in ++start) ++ if grep -q psadfifo /etc/syslog.conf; then ++ echo -n "Starting the psad daemons: " ++ daemon /usr/sbin/psad -s /etc/psad/psad_signatures -a /etc/psad/psad_auto_ips ++ RETVAL=$? ++ echo ++ if [ $RETVAL -eq 0 ]; then ++ touch /var/lock/subsys/psad ++ fi ++ else ++ echo "Syslog has not been configured to send kern.info messages to" ++ echo "/var/lib/psad/psadfifo. Do you need to run the psad installer?" ++ fi ++ ;; ++stop) ++ echo -n "Shutting down the psadwatchd monitoring daemon: " ++ killproc psadwatchd ++ echo ++ echo -n "Shutting down the psad daemon: " ++ killproc psad ++ RETVAL=$? ++ [ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/psad ++ echo ++ echo -n "Shutting down the kmsgs daemon: " ++ killproc kmsgsd ++ echo ++ echo -n "Shutting down the disk monitoring daemon: " ++ killproc diskmond ++ echo ++ ;; ++status) ++ status kmsgsd ++ status psad ++ status psadwatchd ++ status diskmond ++ ;; ++restart|reload) ++ restart ++ ;; ++condrestart) ++ [ -f /var/lock/subsys/psad ] && restart || : ++ ;; ++*) ++ echo "Usage: psad {start|stop|status|restart|reload|condrestart}" ++ exit 1 ++esac +diff -urN Bastille/psad/psad.conf Bastille2/psad/psad.conf +--- Bastille/psad/psad.conf 2002-09-23 22:06:20.000000000 -0400 ++++ Bastille2/psad/psad.conf 2003-08-02 05:27:19.000000000 -0400 +@@ -103,11 +103,9 @@ + mailCmd /bin/mail; + ifconfigCmd /sbin/ifconfig; + grepCmd /bin/grep; +-syslogdCmd /sbin/syslogd; + killallCmd /usr/bin/killall; + netstatCmd /bin/netstat; + unameCmd /bin/uname; +-whoisCmd /usr/bin/whois.psad; + psadwatchdCmd /usr/sbin/psadwatchd; + kmsgsdCmd /usr/sbin/kmsgsd; + diskmondCmd /usr/sbin/diskmond; +diff -urN Bastille/tools/bastille-firewall-convert.sh Bastille2/tools/bastille-firewall-convert.sh +--- Bastille/tools/bastille-firewall-convert.sh 2001-09-02 10:13:35.000000000 -0400 ++++ Bastille2/tools/bastille-firewall-convert.sh 2003-08-02 05:02:58.000000000 -0400 +@@ -5,7 +5,7 @@ + # version 1.4 + # + # script to pull the configuration settings +-# of an existing, old-style, /etc/rc.d/init.d/bastille-firewall ++# of an existing, old-style, /etc/init.d/bastille-firewall + # script for the new-style /etc/Bastille/bastille-firewall.cfg + # configuration used by Bastille 1.2.0 and newer + # +@@ -20,7 +20,7 @@ + # along with this program; if not, write to the Free Software + # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + +-OLDFILE=/etc/rc.d/init.d/bastille-firewall ++OLDFILE=/etc/init.d/bastille-firewall + NEWCFGFILE=/etc/Bastille/bastille-firewall.cfg + LASTCFGNUMBER=14 + diff --git a/net-firewall/bastille/files/digest-bastille-2.1.1 b/net-firewall/bastille/files/digest-bastille-2.1.1 new file mode 100644 index 000000000000..7df9c46c7621 --- /dev/null +++ b/net-firewall/bastille/files/digest-bastille-2.1.1 @@ -0,0 +1 @@ +MD5 67b4d6a110fbe833bfc14dc46e75fa83 Bastille-2.1.1.tar.bz2 338227 |