2021-01-07 15:58:16 Starting Lynis 3.0.3 with PID 33646, build date 2021-01-07 2021-01-07 15:58:16 ==== 2021-01-07 15:58:16 ### 2007-2021, CISOfy - https://cisofy.com/lynis/ ### 2021-01-07 15:58:16 Checking permissions of /root/scans/lynis/include/profiles 2021-01-07 15:58:16 File permissions are OK 2021-01-07 15:58:16 Reading profile/configuration /root/scans/lynis/default.prf 2021-01-07 15:58:16 Action: created temporary file /tmp/lynis.6YdHvjlCxY 2021-01-07 15:58:16 Language set via profile to '' 2021-01-07 15:58:16 Plugin 'authentication' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'compliance' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'configuration' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'control-panels' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'crypto' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'dns' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'docker' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'file-integrity' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'file-systems' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'firewalls' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'forensics' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'hardware' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'intrusion-detection' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'intrusion-prevention' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'kernel' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'malware' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'memory' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'nginx' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'pam' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'processes' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'security-modules' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'software' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'system-integrity' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'systemd' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:16 Plugin 'users' enabled according profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:17 Set option to default value: NTPD_ROLE --> client 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 EOL check: 1 2021-01-07 15:58:17 Warning: This version 14.04 is marked end-of-life as of 2019-05-01 [test:GEN-0010] [details:-] [solution:-] 2021-01-07 15:58:17 Program version: 3.0.3 2021-01-07 15:58:17 Operating system: Linux 2021-01-07 15:58:17 Operating system name: Ubuntu 2021-01-07 15:58:17 Operating system version: 14.04 2021-01-07 15:58:17 Kernel version: 4.4.0 2021-01-07 15:58:17 Kernel version (full): 4.4.0-142-generic 2021-01-07 15:58:17 Hardware platform: x86_64 2021-01-07 15:58:17 ----------------------------------------------------- 2021-01-07 15:58:17 Hostname: ubuntu1404 2021-01-07 15:58:17 Auditor: [Not Specified] 2021-01-07 15:58:17 Profiles: /root/scans/lynis/default.prf 2021-01-07 15:58:17 Work directory: /root/scans/lynis 2021-01-07 15:58:17 Include directory: /root/scans/lynis/include 2021-01-07 15:58:17 Plugin directory: ./plugins 2021-01-07 15:58:17 ----------------------------------------------------- 2021-01-07 15:58:17 Log file: /var/log/lynis.log 2021-01-07 15:58:17 Report file: /var/log/lynis-report.dat 2021-01-07 15:58:17 Report version: 1.0 2021-01-07 15:58:17 ----------------------------------------------------- 2021-01-07 15:58:17 Test category: all 2021-01-07 15:58:17 Test group: all 2021-01-07 15:58:17 BusyBox used: 0 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Test: Checking for program update... 2021-01-07 15:58:17 Current installed version : 303 2021-01-07 15:58:17 Latest stable version : 303 2021-01-07 15:58:17 No Lynis update available. 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Checking permissions of /root/scans/lynis/include/binaries 2021-01-07 15:58:17 File permissions are OK 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Action: Performing tests from category: System tools 2021-01-07 15:58:17 Start scanning for available audit binaries and tools... 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Performing test ID CORE-1000 (Check all system binaries) 2021-01-07 15:58:17 Status: Starting binary scan... 2021-01-07 15:58:17 Test: Checking binaries in directory /usr/local/games 2021-01-07 15:58:17 Directory /usr/local/games exists. Starting directory scanning... 2021-01-07 15:58:17 Test: Checking binaries in directory /usr/games 2021-01-07 15:58:17 Directory /usr/games exists. Starting directory scanning... 2021-01-07 15:58:17 Test: Checking binaries in directory /bin 2021-01-07 15:58:17 Directory /bin exists. Starting directory scanning... 2021-01-07 15:58:17 Found known binary: cat (generic file handling) - /bin/cat 2021-01-07 15:58:17 Found known binary: dnsdomainname (DNS domain) - /bin/dnsdomainname 2021-01-07 15:58:17 Found known binary: domainname (NIS domain) - /bin/domainname 2021-01-07 15:58:17 Found known binary: egrep (text search) - /bin/egrep 2021-01-07 15:58:17 Found known binary: grep (text search) - /bin/grep 2021-01-07 15:58:17 Found known binary: gzip (compressing utility) - /bin/gzip 2021-01-07 15:58:17 Found known binary: ip (IP configuration) - /bin/ip 2021-01-07 15:58:17 Found known binary: ls (file listing) - /bin/ls 2021-01-07 15:58:17 Found known binary: lsblk (block devices) - /bin/lsblk 2021-01-07 15:58:17 Found known binary: lsmod (kernel modules) - /bin/lsmod 2021-01-07 15:58:17 Found known binary: mount (disk utility) - /bin/mount 2021-01-07 15:58:17 Found known binary: netstat (network statistics) - /bin/netstat 2021-01-07 15:58:17 Found known binary: ps (process listing) - /bin/ps 2021-01-07 15:58:17 Found known binary: readlink (follows symlinks) - /bin/readlink 2021-01-07 15:58:17 Found known binary: sed (text stream editor) - /bin/sed 2021-01-07 15:58:17 Found known binary: ss (show sockets) - /bin/ss 2021-01-07 15:58:17 Found known binary: uname (operating system details) - /bin/uname 2021-01-07 15:58:17 Found known binary: zgrep (text search for compressed files) - /bin/zgrep 2021-01-07 15:58:17 Test: Checking binaries in directory /sbin 2021-01-07 15:58:17 Directory /sbin exists. Starting directory scanning... 2021-01-07 15:58:17 Found known binary: blkid (information about block devices) - /sbin/blkid 2021-01-07 15:58:17 Found known binary: getcap (kernel capabilities) - /sbin/getcap 2021-01-07 15:58:17 Found known binary: ipconfig (IP configuration) - /sbin/ifconfig 2021-01-07 15:58:17 Found known binary: initctl (client to upstart init) - /sbin/initctl 2021-01-07 15:58:17 Found known binary: ip (IP configuration) - /sbin/ip 2021-01-07 15:58:17 Found known binary: iptables (firewall) - /sbin/iptables 2021-01-07 15:58:17 Found known binary: iptables-save (firewall) - /sbin/iptables-save 2021-01-07 15:58:17 Found known binary: lsmod (kernel modules) - /sbin/lsmod 2021-01-07 15:58:17 Found known binary: modprobe (kernel modules) - /sbin/modprobe 2021-01-07 15:58:17 Found known binary: runlevel (system utility) - /sbin/runlevel 2021-01-07 15:58:17 Found known binary: swapon (swap device tool) - /sbin/swapon 2021-01-07 15:58:17 Found known binary: sysctl (kernel parameters) - /sbin/sysctl 2021-01-07 15:58:17 Found known binary: tune2fs (file system tool) - /sbin/tune2fs 2021-01-07 15:58:17 Test: Checking binaries in directory /usr/bin 2021-01-07 15:58:17 Directory /usr/bin exists. Starting directory scanning... 2021-01-07 15:58:17 Found known binary: apt (package manager) - /usr/bin/apt 2021-01-07 15:58:17 Found known binary: as (compiler) - /usr/bin/as 2021-01-07 15:58:17 Found known binary: awk (string tool) - /usr/bin/awk 2021-01-07 15:58:17 Found known binary: base64 (encoding tool) - /usr/bin/base64 2021-01-07 15:58:17 Found known binary: comm (file compare) - /usr/bin/comm 2021-01-07 15:58:17 Found known binary: curl (browser, download utility) - /usr/bin/curl 2021-01-07 15:58:17 Found known binary: cut (text stream editor) - /usr/bin/cut 2021-01-07 15:58:17 Found known binary: dig (network/dns tool) - /usr/bin/dig 2021-01-07 15:58:17 Found known binary: dpkg (package management) - /usr/bin/dpkg 2021-01-07 15:58:17 Found known binary: fail2ban (IPS tool) - /usr/bin/fail2ban-server 2021-01-07 15:58:17 Found known binary: file (file type detection) - /usr/bin/file 2021-01-07 15:58:17 Found known binary: find (search tool) - /usr/bin/find 2021-01-07 15:58:17 Found known binary: getent (query tool for name service switch libraries) - /usr/bin/getent 2021-01-07 15:58:17 Found known binary: head (text filter) - /usr/bin/head 2021-01-07 15:58:17 Found known binary: locate (file database) - /usr/bin/locate 2021-01-07 15:58:17 Found known binary: lsattr (file attributes) - /usr/bin/lsattr 2021-01-07 15:58:17 Found known binary: lsof (open files) - /usr/bin/lsof 2021-01-07 15:58:17 Found known binary: md5sum (hash tool) - /usr/bin/md5sum 2021-01-07 15:58:17 Found /usr/bin/openssl (version 1.0.1f) 2021-01-07 15:58:17 Found /usr/bin/perl (version 5.18.2) 2021-01-07 15:58:17 Found known binary: pgrep (search in process list) - /usr/bin/pgrep 2021-01-07 15:58:17 Found known binary: python (programming language interpreter) - /usr/bin/python (version 2.7.6) 2021-01-07 15:58:17 Found known binary: python2 (programming language interpreter) - /usr/bin/python2 (version 2.7.6) 2021-01-07 15:58:17 Found known binary: python3 (programming language interpreter) - /usr/bin/python3 (version 3.4.3) 2021-01-07 15:58:17 Found known binary: rkhunter (malware scanner) - /usr/bin/rkhunter 2021-01-07 15:58:17 Found known binary: service (system services) - /usr/bin/service 2021-01-07 15:58:17 Found known binary: sha1/sha1sum/shasum (crypto hashing) - /usr/bin/sha1sum 2021-01-07 15:58:17 Found known binary: sha256/sha256sum (crypto hashing) - /usr/bin/sha256sum 2021-01-07 15:58:17 Found known binary: sha1/sha1sum/shasum (crypto hashing) - /usr/bin/shasum 2021-01-07 15:58:17 Found known binary: sort (sort data streams) - /usr/bin/sort 2021-01-07 15:58:17 Found known binary: ssh-keyscan (scanner for SSH keys) - /usr/bin/ssh-keyscan 2021-01-07 15:58:17 Found known binary: stat (file information) - /usr/bin/stat 2021-01-07 15:58:17 Found known binary: strings (text strings search) - /usr/bin/strings 2021-01-07 15:58:17 Found known binary: tail (text filter) - /usr/bin/tail 2021-01-07 15:58:17 Found known binary: timedatectl (timedate client) - /usr/bin/timedatectl 2021-01-07 15:58:17 Found known binary: tr (text transformation) - /usr/bin/tr 2021-01-07 15:58:17 Found known binary: uniq (text manipulation utility) - /usr/bin/uniq 2021-01-07 15:58:17 Found known binary: wc (word count) - /usr/bin/wc 2021-01-07 15:58:17 Found /usr/bin/wget (version 1.15) 2021-01-07 15:58:17 Found known binary: xargs (command output redirection) - /usr/bin/xargs 2021-01-07 15:58:17 Test: Checking binaries in directory /usr/sbin 2021-01-07 15:58:17 Directory /usr/sbin exists. Starting directory scanning... 2021-01-07 15:58:17 Found known binary: aa-status (apparmor component) - /usr/sbin/aa-status 2021-01-07 15:58:17 Found known binary: chkrootkit (malware scanner) - /usr/sbin/chkrootkit 2021-01-07 15:58:17 Found known binary: dmidecode (hardware collector tool) - /usr/sbin/dmidecode 2021-01-07 15:58:17 Found known binary: grpck (consistency checker) - /usr/sbin/grpck 2021-01-07 15:58:17 Found known binary: logrotate (log rotation tool) - /usr/sbin/logrotate 2021-01-07 15:58:17 Found known binary: service (system services) - /usr/sbin/service 2021-01-07 15:58:17 Found /usr/sbin/sshd (version 6.6.1) 2021-01-07 15:58:17 Found known binary: tripwire (file integrity) - /usr/sbin/tripwire 2021-01-07 15:58:17 Found known binary: vmtoolsd (VMWare tools) - /usr/sbin/vmtoolsd 2021-01-07 15:58:17 Test: Checking binaries in directory /usr/local/bin 2021-01-07 15:58:17 Directory /usr/local/bin exists. Starting directory scanning... 2021-01-07 15:58:17 Test: Checking binaries in directory /usr/local/sbin 2021-01-07 15:58:17 Directory /usr/local/sbin exists. Starting directory scanning... 2021-01-07 15:58:17 Discovered directories: /usr/local/games,/usr/games,/bin,/sbin,/usr/bin,/usr/sbin,/usr/local/bin,/usr/local/sbin 2021-01-07 15:58:17 Result: found 1193 binaries including 23 set-uid and 23 set-gid 2021-01-07 15:58:17 Result: set-uid binaries: /bin/fusermount /bin/mount /bin/ping /bin/ping6 /bin/su /bin/umount /usr/bin/chfn /usr/bin/chsh /usr/bin/gpasswd /usr/bin/mtr /usr/bin/newgrp /usr/bin/passwd /usr/bin/pkexec /usr/bin/procmail /usr/bin/sg /usr/bin/sudo /usr/bin/sudoedit /usr/bin/traceroute6 /usr/bin/traceroute6.iputils /usr/bin/vmware-user /usr/sbin/pppd /usr/sbin/sensible-mda /usr/sbin/uuidd 2021-01-07 15:58:17 Result: set-gid binaries: /sbin/unix_chkpwd /usr/bin/bsd-write /usr/bin/chage /usr/bin/crontab /usr/bin/dotlockfile /usr/bin/expiry /usr/bin/locate /usr/bin/lockfile /usr/bin/mail-lock /usr/bin/mail-touchlock /usr/bin/mail-unlock /usr/bin/mlocate /usr/bin/procmail /usr/bin/screen /usr/bin/ssh-agent /usr/bin/wall /usr/bin/write /usr/sbin/hoststat /usr/sbin/purgestat /usr/sbin/sendmail /usr/sbin/sendmail-msp /usr/sbin/sendmail-mta /usr/sbin/uuidd 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Informational: package manager is used 2021-01-07 15:58:17 Test: Determine if this system is a virtual machine 2021-01-07 15:58:17 Result: facter utility not found 2021-01-07 15:58:17 Result: systemd-detect-virt not found 2021-01-07 15:58:17 Test: trying to guess virtualization with lscpu 2021-01-07 15:58:17 Result: found VMware 2021-01-07 15:58:17 Result: skipped dmidecode test, as we already found machine type 2021-01-07 15:58:17 Result: skipped processes test, as we already found platform 2021-01-07 15:58:17 Result: skipped Amazon EC2 test, as we already found platform 2021-01-07 15:58:17 Result: skipped sysctl test, as we already found platform 2021-01-07 15:58:17 Result: skipped lshw test, as we already found machine type 2021-01-07 15:58:17 Result: found virtual machine (type: vmware, VMware product) 2021-01-07 15:58:17 Result: Lynis is not running in container 2021-01-07 15:58:17 Result: systemd not found 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Action: Performing plugin tests 2021-01-07 15:58:17 Searching plugins... 2021-01-07 15:58:17 Found plugin file: ./plugins/plugin_pam_phase1 2021-01-07 15:58:17 Action: checking plugin status in profile: /root/scans/lynis/default.prf 2021-01-07 15:58:17 Result: plugin enabled in profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:17 Result: plugin pam is enabled 2021-01-07 15:58:17 Checking permissions of ./plugins/plugin_pam_phase1 2021-01-07 15:58:17 File permissions are OK 2021-01-07 15:58:17 Including plugin file: ./plugins/plugin_pam_phase1 (version: 1.0.5) 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Skipped test PLGN-0008 (Check PAM configuration (pwquality.conf)) 2021-01-07 15:58:17 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:17 ==== 2021-01-07 15:58:17 Performing test ID PLGN-0010 (Check PAM configuration) 2021-01-07 15:58:17 Result: /etc/pam.d exists 2021-01-07 15:58:17 Now checking PAM file /etc/pam.d/newusers 2021-01-07 15:58:17 Now checking PAM file /etc/pam.d/passwd 2021-01-07 15:58:17 Now checking PAM file /etc/pam.d/sshd 2021-01-07 15:58:17 Result: using module pam_nologin.so (required) without options configured 2021-01-07 15:58:17 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad 2021-01-07 15:58:17 Result: brackets used, ignoring control flags 2021-01-07 15:58:17 Result: using module pam_selinux.so (other) with options close 2021-01-07 15:58:17 Result: using module pam_loginuid.so (required) without options configured 2021-01-07 15:58:17 Result: using module pam_keyinit.so (optional) with options force revoke 2021-01-07 15:58:17 Result: using module pam_motd.so (optional) with options motd=/run/motd.dynamic noupdate 2021-01-07 15:58:18 Result: using module pam_motd.so (optional) without options configured 2021-01-07 15:58:18 Result: using module pam_mail.so (optional) with options standard noenv 2021-01-07 15:58:18 Result: using module pam_limits.so (required) without options configured 2021-01-07 15:58:18 Result: using module pam_env.so (required) without options configured 2021-01-07 15:58:18 Result: using module pam_env.so (required) with options user_readenv=1 envfile=/etc/default/locale 2021-01-07 15:58:18 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad 2021-01-07 15:58:18 Result: brackets used, ignoring control flags 2021-01-07 15:58:18 Result: using module pam_selinux.so (other) with options open 2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/common-auth 2021-01-07 15:58:18 Result: Found brackets in line, indicating multiple options for control flags: success=1 default=ignore 2021-01-07 15:58:18 Result: brackets used, ignoring control flags 2021-01-07 15:58:18 Result: using module pam_unix.so (other) with options nullok_secure 2021-01-07 15:58:18 Result: found pam_unix.so module (generic) 2021-01-07 15:58:18 Result: using module pam_deny.so (requisite) without options configured 2021-01-07 15:58:18 Result: using module pam_permit.so (required) without options configured 2021-01-07 15:58:18 Result: using module pam_cap.so (optional) without options configured 2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/polkit-1 2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 user_readenv=0 2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale user_readenv=0 2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/cron 2021-01-07 15:58:18 Result: using module pam_env.so (required) without options configured 2021-01-07 15:58:18 Result: using module pam_env.so (required) with options envfile=/etc/default/locale 2021-01-07 15:58:18 Result: using module pam_limits.so (required) without options configured 2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/other 2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/chsh 2021-01-07 15:58:18 Result: using module pam_shells.so (required) without options configured 2021-01-07 15:58:18 Result: using module pam_rootok.so (sufficient) without options configured 2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/su 2021-01-07 15:58:18 Result: using module pam_rootok.so (sufficient) without options configured 2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale 2021-01-07 15:58:19 Result: using module pam_mail.so (optional) with options nopen 2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-password 2021-01-07 15:58:19 Result: using module pam_cracklib.so (requisite) with options retry=3 minlen=8 difok=3 2021-01-07 15:58:19 Result: found module pam_cracklib.so for password strength testing 2021-01-07 15:58:19 Result: Max password Retry configured 2021-01-07 15:58:19 Value is now: 3 2021-01-07 15:58:19 Returning value: 3 2021-01-07 15:58:19 Result: minlen configured 2021-01-07 15:58:19 Value is now: 8 2021-01-07 15:58:19 Returning value: 8 2021-01-07 15:58:19 Result: unknown option found: difok with value 3 2021-01-07 15:58:19 Result: Found brackets in line, indicating multiple options for control flags: success=1 default=ignore 2021-01-07 15:58:19 Result: brackets used, ignoring control flags 2021-01-07 15:58:19 Result: using module pam_unix.so (other) with options obscure use_authtok try_first_pass sha512 2021-01-07 15:58:19 Result: found pam_unix.so module (generic) 2021-01-07 15:58:19 Result: using module pam_deny.so (requisite) without options configured 2021-01-07 15:58:19 Result: using module pam_permit.so (required) without options configured 2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-session-noninteractive 2021-01-07 15:58:19 Result: Found brackets in line, indicating multiple options for control flags: default=1 2021-01-07 15:58:19 Result: brackets used, ignoring control flags 2021-01-07 15:58:19 Result: using module pam_permit.so (other) without options configured 2021-01-07 15:58:19 Result: using module pam_deny.so (requisite) without options configured 2021-01-07 15:58:19 Result: using module pam_permit.so (required) without options configured 2021-01-07 15:58:19 Result: using module pam_umask.so (optional) without options configured 2021-01-07 15:58:19 Result: using module pam_unix.so (required) without options configured 2021-01-07 15:58:19 Result: found pam_unix.so module (generic) 2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/vmtoolsd 2021-01-07 15:58:19 Result: using module pam_shells.so (required) without options configured 2021-01-07 15:58:19 Result: using module pam_unix.so (sufficient) with options shadow 2021-01-07 15:58:19 Result: found pam_unix.so module (generic) 2021-01-07 15:58:19 Result: using module pam_unix_auth.so (required) with options shadow 2021-01-07 15:58:19 Result: using module pam_shells.so (required) without options configured 2021-01-07 15:58:19 Result: using module pam_unix.so (sufficient) without options configured 2021-01-07 15:58:19 Result: found pam_unix.so module (generic) 2021-01-07 15:58:19 Result: using module pam_unix_acct.so (required) without options configured 2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/smtp 2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-session 2021-01-07 15:58:19 Result: Found brackets in line, indicating multiple options for control flags: default=1 2021-01-07 15:58:19 Result: brackets used, ignoring control flags 2021-01-07 15:58:19 Result: using module pam_permit.so (other) without options configured 2021-01-07 15:58:19 Result: using module pam_deny.so (requisite) without options configured 2021-01-07 15:58:19 Result: using module pam_permit.so (required) without options configured 2021-01-07 15:58:19 Result: using module pam_umask.so (optional) without options configured 2021-01-07 15:58:19 Result: using module pam_unix.so (required) without options configured 2021-01-07 15:58:19 Result: found pam_unix.so module (generic) 2021-01-07 15:58:19 Result: using module pam_systemd.so (optional) without options configured 2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-account 2021-01-07 15:58:20 Result: Found brackets in line, indicating multiple options for control flags: success=1 new_authtok_reqd=done default=ignore 2021-01-07 15:58:20 Result: brackets used, ignoring control flags 2021-01-07 15:58:20 Result: using module pam_unix.so (other) without options configured 2021-01-07 15:58:20 Result: found pam_unix.so module (generic) 2021-01-07 15:58:20 Result: using module pam_deny.so (requisite) without options configured 2021-01-07 15:58:20 Result: using module pam_permit.so (required) without options configured 2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/sudo 2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 user_readenv=0 2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale user_readenv=0 2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/ppp 2021-01-07 15:58:20 Result: using module pam_nologin.so (required) without options configured 2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/chfn 2021-01-07 15:58:20 Result: using module pam_rootok.so (sufficient) without options configured 2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/accountsservice 2021-01-07 15:58:20 Unknown control flag found (substack) 2021-01-07 15:58:20 Result: using module common-password (substack) without options configured 2021-01-07 15:58:20 Result: found pluggable authentication module common-password, which is unknown 2021-01-07 15:58:20 Result: using module pam_pin.so (optional) without options configured 2021-01-07 15:58:20 Result: found pluggable authentication module pam_pin.so, which is unknown 2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/chpasswd 2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/login 2021-01-07 15:58:20 Result: using module pam_faildelay.so (optional) with options delay=3000000 2021-01-07 15:58:20 Result: Found brackets in line, indicating multiple options for control flags: success=ok new_authtok_reqd=ok ignore=ignore user_unknown=bad default=die 2021-01-07 15:58:20 Result: brackets used, ignoring control flags 2021-01-07 15:58:20 Result: using module pam_securetty.so (other) without options configured 2021-01-07 15:58:20 Result: using module pam_nologin.so (requisite) without options configured 2021-01-07 15:58:20 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad 2021-01-07 15:58:20 Result: brackets used, ignoring control flags 2021-01-07 15:58:20 Result: using module pam_selinux.so (other) with options close 2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale 2021-01-07 15:58:20 Result: using module pam_group.so (optional) without options configured 2021-01-07 15:58:20 Result: using module pam_limits.so (required) without options configured 2021-01-07 15:58:20 Result: using module pam_lastlog.so (optional) without options configured 2021-01-07 15:58:20 Result: using module pam_motd.so (optional) with options motd=/run/motd.dynamic noupdate 2021-01-07 15:58:21 Result: using module pam_motd.so (optional) without options configured 2021-01-07 15:58:21 Result: using module pam_mail.so (optional) with options standard 2021-01-07 15:58:21 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad 2021-01-07 15:58:21 Result: brackets used, ignoring control flags 2021-01-07 15:58:21 Result: using module pam_selinux.so (other) with options open 2021-01-07 15:58:21 [PAM] PAM 2F authentication enabled: 0 2021-01-07 15:58:21 [PAM] PAM 2F authentication required: 0 2021-01-07 15:58:21 [PAM] Authentication unlock time: not configured 2021-01-07 15:58:21 [PAM] Password brute force protection: 0 2021-01-07 15:58:21 [PAM] Minimum password length: 8 2021-01-07 15:58:21 [PAM] Password strength testing enabled: 1 2021-01-07 15:58:21 [PAM] Minimum password class out of 4: 0 2021-01-07 15:58:21 [PAM] Maximum credit for Digital characters: 1 2021-01-07 15:58:21 [PAM] Maximum credit for Lowercase characters: 1 2021-01-07 15:58:21 [PAM] Maximum credit for Other characters: 1 2021-01-07 15:58:21 [PAM] Maximum credit for Uppercase characters: 1 2021-01-07 15:58:21 [PAM] Password maximum retry: 3 2021-01-07 15:58:21 [PAM] Password history with pam_pwhistory IS NOT enabled 2021-01-07 15:58:21 [PAM] Password history with pam_unix IS NOT enabled 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Result: pam plugin (phase 1) finished 2021-01-07 15:58:21 -- 2021-01-07 15:58:21 Found plugin file: ./plugins/plugin_systemd_phase1 2021-01-07 15:58:21 Action: checking plugin status in profile: /root/scans/lynis/default.prf 2021-01-07 15:58:21 Result: plugin enabled in profile (/root/scans/lynis/default.prf) 2021-01-07 15:58:21 Result: plugin systemd is enabled 2021-01-07 15:58:21 Checking permissions of ./plugins/plugin_systemd_phase1 2021-01-07 15:58:21 File permissions are OK 2021-01-07 15:58:21 Including plugin file: ./plugins/plugin_systemd_phase1 (version: 1.0.4) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3800 (Gather systemctl exit code) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3802 (Query systemd version and options) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3804 (Gather systemd unit files and their status) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3806 (Gather failed systemd units) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3808 (Gather systemd machine ID) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3810 (Query main systemd binaries) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3812 (Query journal for boot related information) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3814 (Verify journal integrity) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3816 (Query journal for boot related information) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3818 (Query journal meta data) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3820 (Check for journal FSS configuration) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3830 (Query systemd status) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3832 (Query systemd status for processes which can not be found) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3834 (Collect service units which can not be found in systemd) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3856 (Check if systemd-coredump is used) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test PLGN-3860 (Query coredumps from journals since Yesterday) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Result: systemd plugin (phase 1) finished 2021-01-07 15:58:21 -- 2021-01-07 15:58:21 Result: Found 2 plugins of which 2 are enabled 2021-01-07 15:58:21 Result: Plugins phase 1 finished 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Info: using hardware address 00:0c:29:d7:de:37 to create ID 2021-01-07 15:58:21 Result: Found HostID: 605d4ca91000f6389fbf4706cb904caab69b2b15 2021-01-07 15:58:21 Info: creating a HostID (version 2) 2021-01-07 15:58:21 Result: found file ssh_host_ed25519_key.pub in /etc/ssh, using that to create host identifier 2021-01-07 15:58:21 Using SSH public key to create the second host identifier 2021-01-07 15:58:21 Hash (hostname): c72655fc467dee3c64ab04fd46a37dc5ec1bf9769ada12cce421fda8b581f281 2021-01-07 15:58:21 Hash (ssh or machineid): 9e032cc594257ab07ca76d51fb5bccee42dbceab2614a1f9ff1ae03970922b8f 2021-01-07 15:58:21 Info: found valid HostID 605d4ca91000f6389fbf4706cb904caab69b2b15 2021-01-07 15:58:21 Info: no machine ID found 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Info: perform tests from all categories 2021-01-07 15:58:21 Security check: file is normal 2021-01-07 15:58:21 Checking permissions of /root/scans/lynis/include/tests_boot_services 2021-01-07 15:58:21 File permissions are OK 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Action: Performing tests from category: Boot and services 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5102 (Check for AIX boot device) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (AIX only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5104 (Determine service manager) 2021-01-07 15:58:21 Result: cmdline found = /sbin/init 2021-01-07 15:58:21 Result: file on disk = /sbin/init 2021-01-07 15:58:21 Found: init 2021-01-07 15:58:21 Result: service manager found = upstart 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5106 (Check EFI boot file on Mac OS X/macOS) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (macOS only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5108 (Check Syslinux as bootloader) 2021-01-07 15:58:21 Test: checking if file /boot/syslinux/syslinux.cfg exists 2021-01-07 15:58:21 Result: file /boot/syslinux/syslinux.cfg NOT found 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5109 (Check rEFInd as bootloader) 2021-01-07 15:58:21 Test: checking if file /boot/refind_linux.conf exists 2021-01-07 15:58:21 Result: file /boot/refind_linux.conf NOT found 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5116 (Check if system is booted in UEFI mode) 2021-01-07 15:58:21 Test: checking if UEFI is used 2021-01-07 15:58:21 Result: UEFI not used, can't find /sys/firmware/efi directory 2021-01-07 15:58:21 Test: determine if Secure Boot is used 2021-01-07 15:58:21 Result: system not booted with Secure Boot (no SecureBoot file found) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5117 (Check for systemd-boot bootloader presence) 2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5121 (Check for GRUB boot loader presence) 2021-01-07 15:58:21 Test: Checking for presence GRUB conf file (/boot/grub/grub.conf or /boot/grub/menu.lst) 2021-01-07 15:58:21 Result: found GRUB2 configuration file (/boot/grub/grub.cfg) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5122 (Check for GRUB boot password) 2021-01-07 15:58:21 Found file /boot/grub/grub.cfg, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /boot/grub/grub.cfg (escaped: /boot/grub/grub.cfg) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /boot/grub/grub.cfg is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Result: File '/boot/grub/custom.cfg' does not exist 2021-01-07 15:58:21 Found file /etc/grub.d/30_os-prober, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/30_os-prober (escaped: /etc/grub.d/30_os-prober) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/30_os-prober is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/30_uefi-firmware, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/30_uefi-firmware (escaped: /etc/grub.d/30_uefi-firmware) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/30_uefi-firmware is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/20_memtest86+, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/20_memtest86+ (escaped: /etc/grub.d/20_memtest86+) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/20_memtest86+ is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/40_custom, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/40_custom (escaped: /etc/grub.d/40_custom) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/40_custom is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/10_linux, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/10_linux (escaped: /etc/grub.d/10_linux) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/10_linux is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/41_custom, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/41_custom (escaped: /etc/grub.d/41_custom) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/41_custom is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/05_debian_theme, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/05_debian_theme (escaped: /etc/grub.d/05_debian_theme) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/05_debian_theme is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/20_linux_xen, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/20_linux_xen (escaped: /etc/grub.d/20_linux_xen) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/20_linux_xen is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Found file /etc/grub.d/00_header, proceeding with tests. 2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/00_header (escaped: /etc/grub.d/00_header) 2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:21 Result: file /etc/grub.d/00_header is readable (or directory accessible). 2021-01-07 15:58:21 Result: did not find hashed password line in this file 2021-01-07 15:58:21 Result: Didn't find hashed password line in GRUB configuration 2021-01-07 15:58:21 Suggestion: Set a password on GRUB boot loader to prevent altering boot configuration (e.g. boot in single user mode without password) [test:BOOT-5122] [details:-] [solution:-] 2021-01-07 15:58:21 Hardening: assigned partial number of hardening points (0 of 2). Currently having 0 points (out of 2) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5124 (Check for FreeBSD boot loader presence) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5261 (Check for DragonFly boot loader presence) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (DragonFly only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5126 (Check for NetBSD boot loader presence) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (NetBSD only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5139 (Check for LILO boot loader presence) 2021-01-07 15:58:21 Test: checking for presence LILO configuration file 2021-01-07 15:58:21 Result: LILO configuration file not found 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5142 (Check SPARC Improved boot loader (SILO)) 2021-01-07 15:58:21 Result: no SILO configuration file found. 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5155 (Check for YABOOT boot loader configuration file) 2021-01-07 15:58:21 Test: Check for /etc/yaboot.conf 2021-01-07 15:58:21 Result: no YABOOT configuration file found. 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5159 (Check for OpenBSD boot loader presence) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (OpenBSD only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5165 (Check for FreeBSD boot services) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Skipped test BOOT-5170 (Check for Solaris boot daemons) 2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5177 (Check for Linux boot and running services) 2021-01-07 15:58:21 Test: checking presence systemctl binary 2021-01-07 15:58:21 Result: systemctl binary not found, checking chkconfig binary 2021-01-07 15:58:21 Result: both systemctl and chkconfig not found. Skipping this test 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5180 (Check for Linux boot services (Debian style)) 2021-01-07 15:58:21 Result: found runlevel 2 2021-01-07 15:58:21 Result: performing find in /etc/rc2.d as runlevel 2 is found 2021-01-07 15:58:21 Found service (at boot, runlevel 2): acct 2021-01-07 15:58:21 Found service (at boot, runlevel 2): dns-clean 2021-01-07 15:58:21 Found service (at boot, runlevel 2): fail2ban 2021-01-07 15:58:21 Found service (at boot, runlevel 2): grub-common 2021-01-07 15:58:21 Found service (at boot, runlevel 2): ondemand 2021-01-07 15:58:21 Found service (at boot, runlevel 2): portsentry 2021-01-07 15:58:21 Found service (at boot, runlevel 2): pppd-dns 2021-01-07 15:58:21 Found service (at boot, runlevel 2): rc.local 2021-01-07 15:58:21 Found service (at boot, runlevel 2): rsync 2021-01-07 15:58:21 Found service (at boot, runlevel 2): screen-cleanup 2021-01-07 15:58:21 Found service (at boot, runlevel 2): sendmail 2021-01-07 15:58:21 Result: found 11 services 2021-01-07 15:58:21 ==== 2021-01-07 15:58:21 Performing test ID BOOT-5184 (Check permissions for boot files/scripts) 2021-01-07 15:58:21 Result: checking /etc/init.d scripts for writable bit 2021-01-07 15:58:21 Test: checking if directory /etc/init.d exists 2021-01-07 15:58:21 Result: directory /etc/init.d found 2021-01-07 15:58:21 Test: checking for available files in directory 2021-01-07 15:58:21 Result: found files in directory, checking permissions now 2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/.legacy-bootordering 2021-01-07 15:58:21 Result: good, file /etc/init.d/.legacy-bootordering not world writable 2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/README 2021-01-07 15:58:21 Result: good, file /etc/init.d/README not world writable 2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/acct 2021-01-07 15:58:21 Result: good, file /etc/init.d/acct not world writable 2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/acpid 2021-01-07 15:58:22 Result: good, file /etc/init.d/acpid not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/apparmor 2021-01-07 15:58:22 Result: good, file /etc/init.d/apparmor not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/apport 2021-01-07 15:58:22 Result: good, file /etc/init.d/apport not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/console-setup 2021-01-07 15:58:22 Result: good, file /etc/init.d/console-setup not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/dbus 2021-01-07 15:58:22 Result: good, file /etc/init.d/dbus not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/dns-clean 2021-01-07 15:58:22 Result: good, file /etc/init.d/dns-clean not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/fail2ban 2021-01-07 15:58:22 Result: good, file /etc/init.d/fail2ban not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/grub-common 2021-01-07 15:58:22 Result: good, file /etc/init.d/grub-common not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/halt 2021-01-07 15:58:22 Result: good, file /etc/init.d/halt not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/irqbalance 2021-01-07 15:58:22 Result: good, file /etc/init.d/irqbalance not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/killprocs 2021-01-07 15:58:22 Result: good, file /etc/init.d/killprocs not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/kmod 2021-01-07 15:58:22 Result: good, file /etc/init.d/kmod not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/networking 2021-01-07 15:58:22 Result: good, file /etc/init.d/networking not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/ondemand 2021-01-07 15:58:22 Result: good, file /etc/init.d/ondemand not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/portsentry 2021-01-07 15:58:22 Result: good, file /etc/init.d/portsentry not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/pppd-dns 2021-01-07 15:58:22 Result: good, file /etc/init.d/pppd-dns not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/procps 2021-01-07 15:58:22 Result: good, file /etc/init.d/procps not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rc 2021-01-07 15:58:22 Result: good, file /etc/init.d/rc not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rc.local 2021-01-07 15:58:22 Result: good, file /etc/init.d/rc.local not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rcS 2021-01-07 15:58:22 Result: good, file /etc/init.d/rcS not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/reboot 2021-01-07 15:58:22 Result: good, file /etc/init.d/reboot not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/resolvconf 2021-01-07 15:58:22 Result: good, file /etc/init.d/resolvconf not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rsync 2021-01-07 15:58:22 Result: good, file /etc/init.d/rsync not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rsyslog 2021-01-07 15:58:22 Result: good, file /etc/init.d/rsyslog not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/screen-cleanup 2021-01-07 15:58:22 Result: good, file /etc/init.d/screen-cleanup not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/sendmail 2021-01-07 15:58:22 Result: good, file /etc/init.d/sendmail not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/sendsigs 2021-01-07 15:58:22 Result: good, file /etc/init.d/sendsigs not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/single 2021-01-07 15:58:22 Result: good, file /etc/init.d/single not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/skeleton 2021-01-07 15:58:22 Result: good, file /etc/init.d/skeleton not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/ssh 2021-01-07 15:58:22 Result: good, file /etc/init.d/ssh not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/sudo 2021-01-07 15:58:22 Result: good, file /etc/init.d/sudo not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/udev 2021-01-07 15:58:22 Result: good, file /etc/init.d/udev not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/umountfs 2021-01-07 15:58:22 Result: good, file /etc/init.d/umountfs not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/umountnfs.sh 2021-01-07 15:58:22 Result: good, file /etc/init.d/umountnfs.sh not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/umountroot 2021-01-07 15:58:22 Result: good, file /etc/init.d/umountroot not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/unattended-upgrades 2021-01-07 15:58:22 Result: good, file /etc/init.d/unattended-upgrades not world writable 2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/urandom 2021-01-07 15:58:22 Result: good, file /etc/init.d/urandom not world writable 2021-01-07 15:58:22 Test: checking if directory /etc/rc.d exists 2021-01-07 15:58:22 Result: directory /etc/rc.d not found. Skipping.. 2021-01-07 15:58:22 Test: checking if directory /etc/rcS.d exists 2021-01-07 15:58:22 Result: directory /etc/rcS.d found 2021-01-07 15:58:22 Test: checking for available files in directory 2021-01-07 15:58:22 Result: found files in directory, checking permissions now 2021-01-07 15:58:22 Test: checking permissions of file /etc/rcS.d/README 2021-01-07 15:58:22 Result: good, file /etc/rcS.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc0.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc0.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc1.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc1.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc2.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc2.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc3.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc3.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc4.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc4.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc5.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc5.d/README not world writable 2021-01-07 15:58:22 Test: Checking /etc/rc6.d scripts for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc6.d/README not world writable 2021-01-07 15:58:22 Action: checking symlink for file /etc/rc.local 2021-01-07 15:58:22 Result: file /etc/rc.local is not a symlink 2021-01-07 15:58:22 Test: Checking /etc/rc.local file for writable bit 2021-01-07 15:58:22 Result: good, file /etc/rc.local not world writable 2021-01-07 15:58:22 Hardening: assigned maximum number of hardening points for this item (3). Currently having 3 points (out of 5) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID BOOT-5202 (Check uptime of system) 2021-01-07 15:58:22 Uptime (in seconds): 4335 2021-01-07 15:58:22 Uptime (in days): 0 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID BOOT-5260 (Check single user mode for systemd) 2021-01-07 15:58:22 Test: Searching /usr/lib/systemd/system/rescue.service 2021-01-07 15:58:22 Result: file /usr/lib/systemd/system/rescue.service does not exist 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test BOOT-5262 (Check for OpenBSD boot daemons) 2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (OpenBSD only) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test BOOT-5263 (Check permissions for boot files/scripts) 2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (OpenBSD only) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test BOOT-5264 (Run systemd-analyze security) 2021-01-07 15:58:22 Reason to skip: systemd-analyze not available 2021-01-07 15:58:22 Security check: file is normal 2021-01-07 15:58:22 Checking permissions of /root/scans/lynis/include/tests_kernel 2021-01-07 15:58:22 File permissions are OK 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Action: Performing tests from category: Kernel 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5622 (Determine Linux default run level) 2021-01-07 15:58:22 Test: Checking for systemd default.target 2021-01-07 15:58:22 Result: no systemd found, so trying inittab 2021-01-07 15:58:22 Test: Checking /etc/inittab 2021-01-07 15:58:22 Result: file /etc/inittab not found 2021-01-07 15:58:22 Test: Checking run level with who -r, for Debian based systems 2021-01-07 15:58:22 Result: Found default run level '2' 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5677 (Check CPU options and support) 2021-01-07 15:58:22 Test: Checking /proc/cpuinfo 2021-01-07 15:58:22 Result: found /proc/cpuinfo 2021-01-07 15:58:22 Test: Checking CPU options (XD/NX/PAE) 2021-01-07 15:58:22 PAE: Yes 2021-01-07 15:58:22 NX: Yes 2021-01-07 15:58:22 Result: PAE or No eXecute option(s) both found 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5695 (Determine Linux kernel version and release number) 2021-01-07 15:58:22 Result: found kernel release 4.4.0-142-generic 2021-01-07 15:58:22 Result: found kernel version #168~14.04.1-Ubuntu SMP Sat Jan 19 11:26:28 UTC 2019 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5723 (Determining if Linux kernel is monolithic) 2021-01-07 15:58:22 Test: checking if kernel is monolithic or modular 2021-01-07 15:58:22 Result: Found modular kernel 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5726 (Checking Linux loaded kernel modules) 2021-01-07 15:58:22 Loaded modules according lsmod: 2021-01-07 15:58:22 Loaded module: 8250_fintek 2021-01-07 15:58:22 Loaded module: ablk_helper 2021-01-07 15:58:22 Loaded module: ac97_bus 2021-01-07 15:58:22 Loaded module: aes_x86_64 2021-01-07 15:58:22 Loaded module: aesni_intel 2021-01-07 15:58:22 Loaded module: ahci 2021-01-07 15:58:22 Loaded module: btrfs 2021-01-07 15:58:22 Loaded module: cpuid 2021-01-07 15:58:22 Loaded module: crc32_pclmul 2021-01-07 15:58:22 Loaded module: crct10dif_pclmul 2021-01-07 15:58:22 Loaded module: cryptd 2021-01-07 15:58:22 Loaded module: drm 2021-01-07 15:58:22 Loaded module: drm_kms_helper 2021-01-07 15:58:22 Loaded module: e1000 2021-01-07 15:58:22 Loaded module: fb_sys_fops 2021-01-07 15:58:22 Loaded module: fjes 2021-01-07 15:58:22 Loaded module: gameport 2021-01-07 15:58:22 Loaded module: gf128mul 2021-01-07 15:58:22 Loaded module: ghash_clmulni_intel 2021-01-07 15:58:22 Loaded module: glue_helper 2021-01-07 15:58:22 Loaded module: hfs 2021-01-07 15:58:22 Loaded module: hfsplus 2021-01-07 15:58:22 Loaded module: hid 2021-01-07 15:58:22 Loaded module: hid_generic 2021-01-07 15:58:22 Loaded module: i2c_piix4 2021-01-07 15:58:22 Loaded module: inet_diag 2021-01-07 15:58:22 Loaded module: input_leds 2021-01-07 15:58:22 Loaded module: ip_tables 2021-01-07 15:58:22 Loaded module: iptable_filter 2021-01-07 15:58:22 Loaded module: iptable_nat 2021-01-07 15:58:22 Loaded module: jfs 2021-01-07 15:58:22 Loaded module: joydev 2021-01-07 15:58:22 Loaded module: libahci 2021-01-07 15:58:22 Loaded module: libcrc32c 2021-01-07 15:58:22 Loaded module: lp 2021-01-07 15:58:22 Loaded module: lrw 2021-01-07 15:58:22 Loaded module: mac_hid 2021-01-07 15:58:22 Loaded module: minix 2021-01-07 15:58:22 Loaded module: mptbase 2021-01-07 15:58:22 Loaded module: mptscsih 2021-01-07 15:58:22 Loaded module: mptspi 2021-01-07 15:58:22 Loaded module: msdos 2021-01-07 15:58:22 Loaded module: nf_conntrack 2021-01-07 15:58:22 Loaded module: nf_conntrack_ipv4 2021-01-07 15:58:22 Loaded module: nf_defrag_ipv4 2021-01-07 15:58:22 Loaded module: nf_nat 2021-01-07 15:58:22 Loaded module: nf_nat_ipv4 2021-01-07 15:58:22 Loaded module: ntfs 2021-01-07 15:58:22 Loaded module: parport 2021-01-07 15:58:22 Loaded module: pata_acpi 2021-01-07 15:58:22 Loaded module: psmouse 2021-01-07 15:58:22 Loaded module: qnx4 2021-01-07 15:58:22 Loaded module: raid6_pq 2021-01-07 15:58:22 Loaded module: scsi_transport_spi 2021-01-07 15:58:22 Loaded module: serio_raw 2021-01-07 15:58:22 Loaded module: shpchp 2021-01-07 15:58:22 Loaded module: snd 2021-01-07 15:58:22 Loaded module: snd_ac97_codec 2021-01-07 15:58:22 Loaded module: snd_ens1371 2021-01-07 15:58:22 Loaded module: snd_pcm 2021-01-07 15:58:22 Loaded module: snd_rawmidi 2021-01-07 15:58:22 Loaded module: snd_seq_device 2021-01-07 15:58:22 Loaded module: snd_timer 2021-01-07 15:58:22 Loaded module: soundcore 2021-01-07 15:58:22 Loaded module: syscopyarea 2021-01-07 15:58:22 Loaded module: sysfillrect 2021-01-07 15:58:22 Loaded module: sysimgblt 2021-01-07 15:58:22 Loaded module: tcp_diag 2021-01-07 15:58:22 Loaded module: ttm 2021-01-07 15:58:22 Loaded module: udp_diag 2021-01-07 15:58:22 Loaded module: ufs 2021-01-07 15:58:22 Loaded module: usbhid 2021-01-07 15:58:22 Loaded module: vmw_balloon 2021-01-07 15:58:22 Loaded module: vmw_vmci 2021-01-07 15:58:22 Loaded module: vmw_vsock_vmci_transport 2021-01-07 15:58:22 Loaded module: vmwgfx 2021-01-07 15:58:22 Loaded module: vsock 2021-01-07 15:58:22 Loaded module: x_tables 2021-01-07 15:58:22 Loaded module: xfs 2021-01-07 15:58:22 Loaded module: xor 2021-01-07 15:58:22 Loaded module: xt_multiport 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5728 (Checking Linux kernel config) 2021-01-07 15:58:22 Result: found config (/boot/config-4.4.0-142-generic) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5730 (Checking disk I/O kernel scheduler) 2021-01-07 15:58:22 Test: Checking the default I/O kernel scheduler 2021-01-07 15:58:22 Result: found IO scheduler 'deadline' 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test KRNL-5745 (Checking FreeBSD loaded kernel modules) 2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test KRNL-5831 (Checking DragonFly loaded kernel modules) 2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (DragonFly only) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test KRNL-5770 (Checking active kernel modules) 2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5788 (Checking availability new Linux kernel) 2021-01-07 15:58:22 Test: Searching apt-cache, to determine if a newer kernel is available 2021-01-07 15:58:22 Result: found /usr/bin/apt-cache 2021-01-07 15:58:22 Test: checking presence of /vmlinuz or /boot/vmlinuz 2021-01-07 15:58:22 Result: found /vmlinuz 2021-01-07 15:58:22 Test: checking readlink location of /vmlinuz 2021-01-07 15:58:22 Output: readlink reported file /boot/vmlinuz-4.4.0-148-generic 2021-01-07 15:58:22 Test: checking package from dpkg -S 2021-01-07 15:58:22 Output: dpkg -S reported package linux-image-4.4.0-148-generic 2021-01-07 15:58:22 Test: Using apt-cache policy to determine if there is an update available 2021-01-07 15:58:22 Kernel installed: 4.4.0-148.174~14.04.1 2021-01-07 15:58:22 Kernel candidate: 4.4.0-148.174~14.04.1 2021-01-07 15:58:22 Result: no kernel update available 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5820 (Checking core dumps configuration) 2021-01-07 15:58:22 Test: Checking presence of systemd 2021-01-07 15:58:22 Test: Checking presence /etc/profile 2021-01-07 15:58:22 Test: Checking if 'ulimit -c 0' exists in /etc/profile or /etc/profile.d/*.sh 2021-01-07 15:58:22 Result: core dumps are not disabled in /etc/profile or /etc/profile.d/*.sh config files. Didn't find setting 'ulimit -c 0' 2021-01-07 15:58:22 Hardening: assigned partial number of hardening points (0 of 1). Currently having 3 points (out of 6) 2021-01-07 15:58:22 Test: Checking presence /etc/security/limits.conf 2021-01-07 15:58:22 Result: file /etc/security/limits.conf exists 2021-01-07 15:58:22 Test: Checking if core dumps are disabled in /etc/security/limits.conf and /etc/security/limits.d/* 2021-01-07 15:58:22 Result: core dumps are hard disabled 2021-01-07 15:58:22 Hardening: assigned maximum number of hardening points for this item (3). Currently having 6 points (out of 9) 2021-01-07 15:58:22 Test: Checking sysctl value of fs.suid_dumpable 2021-01-07 15:58:22 Result: value 0 found 2021-01-07 15:58:22 Result: found default option (0), no execute only program or program with changed privilege levels can dump 2021-01-07 15:58:22 Hardening: assigned maximum number of hardening points for this item (1). Currently having 7 points (out of 10) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID KRNL-5830 (Checking if system is running on the latest installed kernel) 2021-01-07 15:58:22 Test: Checking presence /var/run/reboot-required.pkgs 2021-01-07 15:58:22 Result: file /var/run/reboot-required.pkgs exists 2021-01-07 15:58:22 Result: reboot is needed, related to 2 packages 2021-01-07 15:58:22 Package: 2 2021-01-07 15:58:22 Result: /boot exists, performing more tests from here 2021-01-07 15:58:22 Result: found /boot/vmlinuz-4.4.0-148-generic 2021-01-07 15:58:22 Result: version derived from file name is '4.4.0-148-generic' 2021-01-07 15:58:22 Result: found version 4.4.0-148-generic 2021-01-07 15:58:22 Result: active kernel version 4.4.0-142-generic 2021-01-07 15:58:22 Result: reboot needed, as there is a difference between active kernel and the one on disk 2021-01-07 15:58:22 Result: /var/cache/apt/archives/ does not exist 2021-01-07 15:58:22 Warning: Reboot of system is most likely needed [test:KRNL-5830] [details:] [solution:text:reboot] 2021-01-07 15:58:22 Hardening: assigned partial number of hardening points (0 of 5). Currently having 7 points (out of 15) 2021-01-07 15:58:22 Security check: file is normal 2021-01-07 15:58:22 Checking permissions of /root/scans/lynis/include/tests_memory_processes 2021-01-07 15:58:22 File permissions are OK 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Action: Performing tests from category: Memory and Processes 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID PROC-3602 (Checking /proc/meminfo for memory details) 2021-01-07 15:58:22 Result: found /proc/meminfo 2021-01-07 15:58:22 Result: Found 4028204 kB memory 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Skipped test PROC-3604 (Query prtconf for memory details) 2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID PROC-3612 (Check dead or zombie processes) 2021-01-07 15:58:22 Result: no zombie processes found 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID PROC-3614 (Check heavy IO waiting based processes) 2021-01-07 15:58:22 Result: No processes were waiting for IO requests to be handled first 2021-01-07 15:58:22 ==== 2021-01-07 15:58:22 Performing test ID PROC-3802 (Check presence of prelink tooling) 2021-01-07 15:58:23 Result: prelink package is NOT installed 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 10 points (out of 18) 2021-01-07 15:58:23 Security check: file is normal 2021-01-07 15:58:23 Checking permissions of /root/scans/lynis/include/tests_authentication 2021-01-07 15:58:23 File permissions are OK 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Action: Performing tests from category: Users, Groups and Authentication 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9204 (Check users with an UID of zero) 2021-01-07 15:58:23 Test: Searching accounts with UID 0 2021-01-07 15:58:23 Result: No accounts found with UID 0 other than root. 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9208 (Check non-unique accounts in passwd file) 2021-01-07 15:58:23 Test: Checking for non-unique accounts 2021-01-07 15:58:23 Result: all accounts found in /etc/passwd are unique 2021-01-07 15:58:23 Remarks: Non unique UIDs can be a risk for the system or part of a configuration mistake 2021-01-07 15:58:23 Prerequisite test: /usr/sbin/chkgrp 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9212 (Test group file) 2021-01-07 15:58:23 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9216 (Check group and shadow group files) 2021-01-07 15:58:23 Test: Checking for grpck binary output 2021-01-07 15:58:23 Result: grpck binary didn't find any errors in the group files 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9218 (Check login shells for passwordless accounts) 2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (DragonFly FreeBSD NetBSD OpenBSD only) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9222 (Check unique groups (IDs)) 2021-01-07 15:58:23 Test: Checking for non unique group ID's in /etc/group 2021-01-07 15:58:23 Result: All group ID's are unique 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9226 (Check unique group names) 2021-01-07 15:58:23 Test: Checking for non unique group names in /etc/group 2021-01-07 15:58:23 Result: All group names are unique 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9228 (Check password file consistency with pwck) 2021-01-07 15:58:23 Test: Checking password file consistency (pwck) 2021-01-07 15:58:23 Result: pwck check didn't find any problems 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (2). Currently having 12 points (out of 20) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9229 (Check password hashing methods) 2021-01-07 15:58:23 Test: Checking password hashing methods 2021-01-07 15:58:23 Result: poor password hashing methods found: sha256crypt/sha512crypt(default<=5000rounds) 2021-01-07 15:58:23 Suggestion: Check PAM configuration, add rounds if applicable and expire passwords to encrypt with new values [test:AUTH-9229] [details:-] [solution:-] 2021-01-07 15:58:23 Hardening: assigned partial number of hardening points (0 of 2). Currently having 12 points (out of 22) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9230 (Check password hashing rounds) 2021-01-07 15:58:23 Test: Checking SHA_CRYPT_{MIN,MAX}_ROUNDS option in /etc/login.defs 2021-01-07 15:58:23 Result: number of password hashing rounds is not configured 2021-01-07 15:58:23 Suggestion: Configure password hashing rounds in /etc/login.defs [test:AUTH-9230] [details:-] [solution:-] 2021-01-07 15:58:23 Hardening: assigned partial number of hardening points (0 of 2). Currently having 12 points (out of 24) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9234 (Query user accounts) 2021-01-07 15:58:23 Test: Read system users (including root user) from password database (e.g. /etc/passwd) 2021-01-07 15:58:23 Result: found minimal user id specified: 1000 2021-01-07 15:58:23 Linux real users output (ID = 0, or 1000+, but not 65534): 2021-01-07 15:58:23 Real user: root,0 2021-01-07 15:58:23 Real user: ll,1000 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9240 (Query NIS+ authentication support) 2021-01-07 15:58:23 Result: NIS+ authentication not enabled 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9242 (Query NIS authentication support) 2021-01-07 15:58:23 Result: NIS authentication not enabled 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9250 (Checking sudoers file) 2021-01-07 15:58:23 Test: checking presence /etc/sudoers 2021-01-07 15:58:23 Result: found file (/etc/sudoers) 2021-01-07 15:58:23 Test: checking presence /usr/local/etc/sudoers 2021-01-07 15:58:23 Result: file /usr/local/etc/sudoers not found 2021-01-07 15:58:23 Test: checking presence /usr/pkg/etc/sudoers 2021-01-07 15:58:23 Result: file /usr/pkg/etc/sudoers not found 2021-01-07 15:58:23 Result: sudoers file found (/etc/sudoers) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9252 (Check ownership and permissions for sudo configuration files) 2021-01-07 15:58:23 Test: checking drop-in directory (/etc/sudoers.d) 2021-01-07 15:58:23 Result: Found directory permissions: rwxr-xr-x and owner UID GID: 00 2021-01-07 15:58:23 Result: directory /etc/sudoers.d has possibly unsafe permissions 2021-01-07 15:58:23 Result: directory /etc/sudoers.d ownership OK 2021-01-07 15:58:23 Test: checking file (/etc/sudoers) 2021-01-07 15:58:23 Result: Found file permissions: r--r----- and owner UID GID: 00 2021-01-07 15:58:23 Result: file /etc/sudoers permissions OK 2021-01-07 15:58:23 Result: file /etc/sudoers ownership OK 2021-01-07 15:58:23 Test: checking file (/etc/sudoers.d/README) 2021-01-07 15:58:23 Result: Found file permissions: r--r----- and owner UID GID: 00 2021-01-07 15:58:23 Result: file /etc/sudoers.d/README permissions OK 2021-01-07 15:58:23 Result: file /etc/sudoers.d/README ownership OK 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9254 (Solaris passwordless accounts) 2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9262 (Checking presence password strength testing tools (PAM)) 2021-01-07 15:58:23 Searching PAM password testing modules (cracklib, passwdqc, pwquality) 2021-01-07 15:58:23 Result: found pam_cracklib.so (crack library PAM) in /lib/x86_64-linux-gnu/security 2021-01-07 15:58:23 Result: pam_cracklib.so found 2021-01-07 15:58:23 Result: pam_passwdqc.so NOT found (passwd quality control PAM) 2021-01-07 15:58:23 Result: pam_pwquality.so NOT found (pwquality control PAM) 2021-01-07 15:58:23 Result: found at least one PAM module for password strength testing 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 15 points (out of 27) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9264 (Checking presence pam.conf) 2021-01-07 15:58:23 Test: Checking file /etc/pam.conf 2021-01-07 15:58:23 Result: file /etc/pam.conf exists 2021-01-07 15:58:23 Test: searching PAM configuration files 2021-01-07 15:58:23 Result: File has no configuration options defined (empty, or only filled with comments and empty lines) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9266 (Checking presence pam.d files) 2021-01-07 15:58:23 Test: Checking directory /etc/pam.d 2021-01-07 15:58:23 Result: directory /etc/pam.d exists 2021-01-07 15:58:23 Test: searching PAM configuration files 2021-01-07 15:58:23 Found file: /etc/pam.d/accountsservice 2021-01-07 15:58:23 Found file: /etc/pam.d/chfn 2021-01-07 15:58:23 Found file: /etc/pam.d/chpasswd 2021-01-07 15:58:23 Found file: /etc/pam.d/chsh 2021-01-07 15:58:23 Found file: /etc/pam.d/common-account 2021-01-07 15:58:23 Found file: /etc/pam.d/common-auth 2021-01-07 15:58:23 Found file: /etc/pam.d/common-password 2021-01-07 15:58:23 Found file: /etc/pam.d/common-session 2021-01-07 15:58:23 Found file: /etc/pam.d/common-session-noninteractive 2021-01-07 15:58:23 Found file: /etc/pam.d/cron 2021-01-07 15:58:23 Found file: /etc/pam.d/login 2021-01-07 15:58:23 Found file: /etc/pam.d/newusers 2021-01-07 15:58:23 Found file: /etc/pam.d/other 2021-01-07 15:58:23 Found file: /etc/pam.d/passwd 2021-01-07 15:58:23 Found file: /etc/pam.d/polkit-1 2021-01-07 15:58:23 Found file: /etc/pam.d/ppp 2021-01-07 15:58:23 Found file: /etc/pam.d/smtp 2021-01-07 15:58:23 Found file: /etc/pam.d/sshd 2021-01-07 15:58:23 Found file: /etc/pam.d/su 2021-01-07 15:58:23 Found file: /etc/pam.d/sudo 2021-01-07 15:58:23 Found file: /etc/pam.d/vmtoolsd 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9268 (Checking presence pam.d files) 2021-01-07 15:58:23 Test: Searching pam modules 2021-01-07 15:58:23 Test: Checking /lib/arm-linux-gnueabihf/security 2021-01-07 15:58:23 Result: directory /lib/arm-linux-gnueabihf/security could not be found or is a symlink to another directory 2021-01-07 15:58:23 Test: Checking /lib/i386-linux-gnu/security 2021-01-07 15:58:23 Result: directory /lib/i386-linux-gnu/security could not be found or is a symlink to another directory 2021-01-07 15:58:23 Test: Checking /lib/security 2021-01-07 15:58:23 Result: directory /lib/security could not be found or is a symlink to another directory 2021-01-07 15:58:23 Test: Checking /lib/x86_64-linux-gnu/security 2021-01-07 15:58:23 Result: directory /lib/x86_64-linux-gnu/security exists 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_access.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_cap.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_cracklib.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_debug.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_deny.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_echo.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_env.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_exec.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_faildelay.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_filter.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_ftp.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_group.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_issue.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_keyinit.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_lastlog.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_limits.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_listfile.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_localuser.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_loginuid.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_mail.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_mkhomedir.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_motd.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_namespace.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_nologin.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_permit.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_pwhistory.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_rhosts.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_rootok.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_securetty.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_selinux.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_sepermit.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_shells.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_stress.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_succeed_if.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_systemd.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_tally.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_tally2.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_time.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_timestamp.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_tty_audit.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_umask.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_unix.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_userdb.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_warn.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_wheel.so 2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_xauth.so 2021-01-07 15:58:23 Test: Checking /lib64/security 2021-01-07 15:58:23 Result: directory /lib64/security could not be found or is a symlink to another directory 2021-01-07 15:58:23 Test: Checking /usr/lib 2021-01-07 15:58:23 Result: directory /usr/lib exists 2021-01-07 15:58:23 Test: Checking /usr/lib/security 2021-01-07 15:58:23 Result: directory /usr/lib/security could not be found or is a symlink to another directory 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9278 (Determine LDAP support in PAM files) 2021-01-07 15:58:23 Test: checking presence /etc/pam.d/common-auth 2021-01-07 15:58:23 Result: file /etc/pam.d/common-auth exists 2021-01-07 15:58:23 Test: checking presence LDAP module 2021-01-07 15:58:23 Result: LDAP module not found 2021-01-07 15:58:23 Test: checking presence /etc/pam.d/system-auth 2021-01-07 15:58:23 Result: file /etc/pam.d/system-auth not found, skipping test 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9282 (Checking password protected account without expire date) 2021-01-07 15:58:23 Test: Checking Linux version and password expire date status 2021-01-07 15:58:23 Result: found one or more accounts without expire date set 2021-01-07 15:58:23 Account without expire date: ll 2021-01-07 15:58:23 Suggestion: When possible set expire dates for all password protected accounts [test:AUTH-9282] [details:-] [solution:-] 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9283 (Checking accounts without password) 2021-01-07 15:58:23 Test: Checking passwordless accounts 2021-01-07 15:58:23 Result: all accounts seem to have a password 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9284 (Check locked user accounts in /etc/passwd) 2021-01-07 15:58:23 Test: Checking locked accounts 2021-01-07 15:58:23 Result: all accounts seem to be unlocked 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9286 (Checking user password aging) 2021-01-07 15:58:23 Test: Checking PASS_MIN_DAYS option in /etc/login.defs 2021-01-07 15:58:23 Result: password needs to be at least 7 days old 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 18 points (out of 30) 2021-01-07 15:58:23 Test: Checking PASS_MAX_DAYS option in /etc/login.defs 2021-01-07 15:58:23 Result: max password age is 90 days 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 21 points (out of 33) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9288 (Checking for expired passwords) 2021-01-07 15:58:23 Test: check if we can access /etc/shadow (escaped: /etc/shadow) 2021-01-07 15:58:23 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:23 Result: file /etc/shadow is readable (or directory accessible). 2021-01-07 15:58:23 Data: Days since epoch is 18634 2021-01-07 15:58:23 Test: collecting accounts which have an expired password (last day changed + maximum change time) 2021-01-07 15:58:23 Result: good, no passwords have been expired 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (10). Currently having 31 points (out of 43) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9304 (Check single user login configuration) 2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9306 (Check single boot authentication) 2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (HP-UX only) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9308 (Check single user login configuration) 2021-01-07 15:58:23 Test: Searching /etc/inittab 2021-01-07 15:58:23 Result: file /etc/inittab does not exist 2021-01-07 15:58:23 Test: Searching /etc/sysconfig/init 2021-01-07 15:58:23 Result: file /etc/sysconfig/init does not exist 2021-01-07 15:58:23 Test: going to check several systemd targets now 2021-01-07 15:58:23 Test: checking if target console-shell.service is available (/lib/systemd/system/console-shell.service) 2021-01-07 15:58:23 Result: target console-shell.service not found 2021-01-07 15:58:23 Test: checking if target emergency.service is available (/lib/systemd/system/emergency.service) 2021-01-07 15:58:23 Result: target emergency.service not found 2021-01-07 15:58:23 Test: checking if target rescue.service is available (/lib/systemd/system/rescue.service) 2021-01-07 15:58:23 Result: target rescue.service not found 2021-01-07 15:58:23 Result: no tests performed 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9328 (Default umask values) 2021-01-07 15:58:23 Test: Checking /etc/profile.d directory 2021-01-07 15:58:23 Result: found /etc/profile.d, with one or more files in it 2021-01-07 15:58:23 Test: Checking /etc/profile 2021-01-07 15:58:23 Result: file /etc/profile exists 2021-01-07 15:58:23 Test: Checking umask value in /etc/profile 2021-01-07 15:58:23 Result: did not find umask in /etc/profile 2021-01-07 15:58:23 Result: found no umask. Please check if this is correct 2021-01-07 15:58:23 Test: Checking umask entries in /etc/passwd (pam_umask) 2021-01-07 15:58:23 Result: file /etc/passwd exists 2021-01-07 15:58:23 Test: Checking umask value in /etc/passwd 2021-01-07 15:58:23 Manual: one or more manual actions are required for further testing of this control/plugin 2021-01-07 15:58:23 Test: Checking /etc/login.defs 2021-01-07 15:58:23 Result: file /etc/login.defs exists 2021-01-07 15:58:23 Test: Checking umask value in /etc/login.defs 2021-01-07 15:58:23 Result: umask is 027, which is fine 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (2). Currently having 33 points (out of 45) 2021-01-07 15:58:23 Test: Checking /etc/init.d/functions 2021-01-07 15:58:23 Result: file /etc/init.d/functions does not exist 2021-01-07 15:58:23 Test: Checking /etc/init.d/rc 2021-01-07 15:58:23 Result: file /etc/init.d/rc exists 2021-01-07 15:58:23 Test: Checking UMASK value in /etc/init.d/rc 2021-01-07 15:58:23 Result: umask is 027, which is fine 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (2). Currently having 35 points (out of 47) 2021-01-07 15:58:23 Test: Checking /etc/init.d/rcS 2021-01-07 15:58:23 Result: file /etc/init.d/rcS exists 2021-01-07 15:58:23 Test: Checking if script runs another script. 2021-01-07 15:58:23 Result: exec line present in file, setting of umask not needed in this script 2021-01-07 15:58:23 Output: /etc/init.d/rc 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9340 (Solaris account locking) 2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9402 (Query LDAP authentication support) 2021-01-07 15:58:23 Result: LDAP authentication not enabled 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9406 (Query LDAP servers in client configuration) 2021-01-07 15:58:23 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Performing test ID AUTH-9408 (Logging of failed login attempts) 2021-01-07 15:58:23 Result: did not find /var/log/tallylog on disk or its file size is zero bytes 2021-01-07 15:58:23 Result: found pam_tally2 module on disk 2021-01-07 15:58:23 Outcome: it looks like pam_tally2 is not configured to log failed login attempts 2021-01-07 15:58:23 Test: Checking FAILLOG_ENAB option in /etc/login.defs 2021-01-07 15:58:23 Result: FAILLOG_ENAB is set to 'yes' 2021-01-07 15:58:23 Outcome: failed login attempts are logged in /var/log/faillog 2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 38 points (out of 50) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:23 Skipped test AUTH-9409 (Checking /etc/doas.conf file) 2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (OpenBSD only) 2021-01-07 15:58:23 ==== 2021-01-07 15:58:24 Skipped test AUTH-9410 (Check /etc/doas.conf file permissions) 2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (OpenBSD only) 2021-01-07 15:58:24 Security check: file is normal 2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_shells 2021-01-07 15:58:24 File permissions are OK 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Action: Performing tests from category: Shells 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test SHLL-6202 (Check console TTYs) 2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID SHLL-6211 (Available and valid shells) 2021-01-07 15:58:24 Test: Searching for /etc/shells 2021-01-07 15:58:24 Result: Found /etc/shells file 2021-01-07 15:58:24 Test: Reading available shells from /etc/shells 2021-01-07 15:58:24 Found installed shell: /bin/sh 2021-01-07 15:58:24 Found installed shell: /bin/dash 2021-01-07 15:58:24 Found installed shell: /bin/bash 2021-01-07 15:58:24 Found installed shell: /bin/rbash 2021-01-07 15:58:24 Found installed shell: /usr/bin/tmux 2021-01-07 15:58:24 Found installed shell: /usr/bin/screen 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID SHLL-6220 (Idle session killing tools or settings) 2021-01-07 15:58:24 Test: Search for session timeout tools or settings in shell 2021-01-07 15:58:24 Performing pgrep scan without uid 2021-01-07 15:58:24 IsRunning: process 'timeoutd' not found 2021-01-07 15:58:24 Performing pgrep scan without uid 2021-01-07 15:58:24 IsRunning: process 'autolog' not found 2021-01-07 15:58:24 Result: could not find TMOUT setting in /etc/profile 2021-01-07 15:58:24 Result: could not find export, readonly or typeset -r in /etc/profile 2021-01-07 15:58:24 Result: could not find TMOUT setting in /etc/profile.d/*.sh 2021-01-07 15:58:24 Result: could not find export, readonly or typeset -r in /etc/profile 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (1 of 3). Currently having 39 points (out of 53) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID SHLL-6230 (Perform umask check for shell configurations) 2021-01-07 15:58:24 Result: file /etc/bashrc not found 2021-01-07 15:58:24 Result: file /etc/bash.bashrc exists 2021-01-07 15:58:24 Result: did not find umask configured in /etc/bash.bashrc 2021-01-07 15:58:24 Result: file /etc/bash.bashrc.local not found 2021-01-07 15:58:24 Result: file /etc/csh.cshrc not found 2021-01-07 15:58:24 Result: file /etc/profile exists 2021-01-07 15:58:24 Result: did not find umask configured in /etc/profile 2021-01-07 15:58:24 Security check: file is normal 2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_filesystems 2021-01-07 15:58:24 File permissions are OK 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Action: Performing tests from category: File systems 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6310 (Checking /tmp, /home and /var directory) 2021-01-07 15:58:24 Test: Checking if /home is mounted separately or mounted on / file system 2021-01-07 15:58:24 Result: directory /home exists 2021-01-07 15:58:24 Result: /home not found in mount list. Directory most likely stored on / file system 2021-01-07 15:58:24 Suggestion: To decrease the impact of a full /home file system, place /home on a separate partition [test:FILE-6310] [details:-] [solution:-] 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (9 of 10). Currently having 48 points (out of 63) 2021-01-07 15:58:24 Test: Checking if /tmp is mounted separately or mounted on / file system 2021-01-07 15:58:24 Result: directory /tmp exists 2021-01-07 15:58:24 Result: found /tmp as a separated mount point 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (10). Currently having 58 points (out of 73) 2021-01-07 15:58:24 Test: Checking if /var is mounted separately or mounted on / file system 2021-01-07 15:58:24 Result: directory /var exists 2021-01-07 15:58:24 Result: /var not found in mount list. Directory most likely stored on / file system 2021-01-07 15:58:24 Suggestion: To decrease the impact of a full /var file system, place /var on a separate partition [test:FILE-6310] [details:-] [solution:-] 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (9 of 10). Currently having 67 points (out of 83) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test FILE-6311 (Checking LVM volume groups) 2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test FILE-6312 (Checking LVM volumes) 2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6323 (Checking EXT file systems) 2021-01-07 15:58:24 Test: Checking for Linux EXT file systems 2021-01-07 15:58:24 Result: found one or more EXT file systems 2021-01-07 15:58:24 File system: / (type: ext4) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6324 (Checking XFS file systems) 2021-01-07 15:58:24 Test: Checking for Linux XFS file systems 2021-01-07 15:58:24 Result: no XFS file systems found 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6329 (Checking FFS/UFS file systems) 2021-01-07 15:58:24 Test: Query /etc/fstab for available FFS/UFS mount points 2021-01-07 15:58:24 Result: unable to find any single mount point (FFS/UFS) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test FILE-6330 (Checking ZFS file systems) 2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test FILE-6439 (Checking HAMMER PFS mounts) 2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (DragonFly only) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6332 (Checking swap partitions) 2021-01-07 15:58:24 Test: query swap partitions from /etc/fstab file 2021-01-07 15:58:24 Swap partition found: UUID=43e4066c-3702-46ff-8e97-fa2d6b0e2bc8 2021-01-07 15:58:24 Result: Using 43e4066c-3702-46ff-8e97-fa2d6b0e2bc8 as UUID 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6336 (Checking swap mount options) 2021-01-07 15:58:24 Test: check swap partitions with incorrect mount options 2021-01-07 15:58:24 Result: all swap partitions have correct options (sw or swap) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6344 (Checking proc mount options) 2021-01-07 15:58:24 Test: check proc mount with incorrect mount options 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (0 of 3). Currently having 67 points (out of 86) 2021-01-07 15:58:24 Result: /proc filesystem is not mounted with option hidepid=1 or hidepid=2 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6354 (Searching for old files in /tmp) 2021-01-07 15:58:24 Test: Searching for old files in /tmp 2021-01-07 15:58:24 Result: no files found in /tmp which are older than 3 months 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6362 (Checking /tmp sticky bit) 2021-01-07 15:58:24 Result: sticky bit found on /tmp directory 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 70 points (out of 89) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6363 (Checking /var/tmp sticky bit) 2021-01-07 15:58:24 Result: sticky bit found on /var/tmp directory 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 73 points (out of 92) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6368 (Checking ACL support on root file system) 2021-01-07 15:58:24 Test: Checking acl option on ext[2-4] root file system 2021-01-07 15:58:24 Result: mount point probably mounted with defaults 2021-01-07 15:58:24 Test: Checking device which holds root file system 2021-01-07 15:58:24 Result: found /dev/sda1 2021-01-07 15:58:24 Test: Checking default options on /dev/sda1 2021-01-07 15:58:24 Result: found ACL option in default mount options 2021-01-07 15:58:24 Test: Checking acl option on xfs root file system 2021-01-07 15:58:24 Result: ACL option enabled on root file system 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 76 points (out of 95) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6372 (Checking / mount options) 2021-01-07 15:58:24 Result: mount system / is configured with options: errors=remount-ro 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6374 (Linux mount options) 2021-01-07 15:58:24 Result: file system /boot not found in /etc/fstab 2021-01-07 15:58:24 File system: /dev 2021-01-07 15:58:24 Expected flags: noexec nosuid 2021-01-07 15:58:24 Found flags: (rw mode=0755) 2021-01-07 15:58:24 Result: Could not find mount option noexec on file system /dev 2021-01-07 15:58:24 Result: Could not find mount option nosuid on file system /dev 2021-01-07 15:58:24 Result: marked /dev options as non-default (unclear about hardening) 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (4 of 5). Currently having 80 points (out of 100) 2021-01-07 15:58:24 Result: file system /dev/shm not found in /etc/fstab 2021-01-07 15:58:24 Result: file system /home not found in /etc/fstab 2021-01-07 15:58:24 File system: /run 2021-01-07 15:58:24 Expected flags: nodev nosuid 2021-01-07 15:58:24 Found flags: (rw noexec nosuid size=10% mode=0755) 2021-01-07 15:58:24 Result: Could not find mount option nodev on file system /run 2021-01-07 15:58:24 Result: GOOD, found mount option nosuid on file system /run 2021-01-07 15:58:24 Result: marked /run as partially hardened 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (4 of 5). Currently having 84 points (out of 105) 2021-01-07 15:58:24 File system: /tmp 2021-01-07 15:58:24 Expected flags: nodev noexec nosuid 2021-01-07 15:58:24 Found flags: loop nosuid nodev noexec rw 2021-01-07 15:58:24 Result: GOOD, found mount option nodev on file system /tmp 2021-01-07 15:58:24 Result: GOOD, found mount option noexec on file system /tmp 2021-01-07 15:58:24 Result: GOOD, found mount option nosuid on file system /tmp 2021-01-07 15:58:24 Result: marked /tmp as fully hardened 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (5). Currently having 89 points (out of 110) 2021-01-07 15:58:24 Result: file system /var not found in /etc/fstab 2021-01-07 15:58:24 Result: file system /var/log not found in /etc/fstab 2021-01-07 15:58:24 Result: file system /var/log/audit not found in /etc/fstab 2021-01-07 15:58:24 Result: file system /var/tmp not found in /etc/fstab 2021-01-07 15:58:24 Result: Total without nodev:9 noexec:10 nosuid:7 ro or noexec (W^X): 10, of total 18 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6376 (Determine if /var/tmp is bound to /tmp) 2021-01-07 15:58:24 Result: no mount point /var/tmp or expected options found 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6394 (Determine level of swappiness.) 2021-01-07 15:58:24 Test: checking level of vm.swappiness: 60 2021-01-07 15:58:24 Result: vm.swappiness=60 which is the standard level of swappiness and works well for desktop systems. 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6410 (Checking Locate database) 2021-01-07 15:58:24 Test: Checking locate database 2021-01-07 15:58:24 Result: locate database found (/var/lib/mlocate/mlocate.db) 2021-01-07 15:58:24 Result: file /var/lib/locate/locatedb not found 2021-01-07 15:58:24 Result: file /var/lib/locatedb not found 2021-01-07 15:58:24 Result: file /var/lib/slocate/slocate.db not found 2021-01-07 15:58:24 Result: file /var/cache/locate/locatedb not found 2021-01-07 15:58:24 Result: file /var/db/locate.database not found 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID FILE-6430 (Disable mounting of some filesystems) 2021-01-07 15:58:24 Result: found cramfs support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/cramfs/cramfs.ko ) 2021-01-07 15:58:24 Test: Checking if cramfs is active 2021-01-07 15:58:24 Result: module cramfs is currently not loaded in the kernel. 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 91 points (out of 113) 2021-01-07 15:58:24 Result: found freevxfs support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/freevxfs/freevxfs.ko ) 2021-01-07 15:58:24 Test: Checking if freevxfs is active 2021-01-07 15:58:24 Result: module freevxfs is currently not loaded in the kernel. 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 93 points (out of 116) 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 96 points (out of 119) 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 99 points (out of 122) 2021-01-07 15:58:24 Result: found jffs2 support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/jffs2/jffs2.ko ) 2021-01-07 15:58:24 Test: Checking if jffs2 is active 2021-01-07 15:58:24 Result: module jffs2 is currently not loaded in the kernel. 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 101 points (out of 125) 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 104 points (out of 128) 2021-01-07 15:58:24 Result: found udf support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/udf/udf.ko ) 2021-01-07 15:58:24 Test: Checking if udf is active 2021-01-07 15:58:24 Result: module udf is currently not loaded in the kernel. 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 106 points (out of 131) 2021-01-07 15:58:24 Suggestion: Consider disabling unused kernel modules [test:FILE-6430] [details:/etc/modprobe.d/blacklist.conf] [solution:Add 'install MODULENAME /bin/true' (without quotes)] 2021-01-07 15:58:24 Security check: file is normal 2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_usb 2021-01-07 15:58:24 File permissions are OK 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Action: Performing tests from category: USB Devices 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID USB-1000 (Check if USB storage is disabled) 2021-01-07 15:58:24 Test: Checking USB storage driver in directory /etc/modprobe.d and configuration file /etc/modprobe.conf 2021-01-07 15:58:24 Result: found usb-storage driver in disabled state (blacklisted) 2021-01-07 15:58:24 Result: usb-storage driver is disabled 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 109 points (out of 134) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID USB-2000 (Check USB authorizations) 2021-01-07 15:58:24 Test: checking presence of USB devices path (/sys/bus/usb/devices) 2021-01-07 15:58:24 Test: Checking USB devices authorization to connect to the system 2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb1 is authorized by default (authorized_default=1) 2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb1 is authorized currently (authorized=1) 2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb2 is authorized by default (authorized_default=1) 2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb2 is authorized currently (authorized=1) 2021-01-07 15:58:24 Result: Some USB devices are authorized by default (or temporary) to connect to the system 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (0 of 3). Currently having 109 points (out of 137) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID USB-3000 (Check for presence of USBGuard) 2021-01-07 15:58:24 Result: USBGuard not found 2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (0 of 8). Currently having 109 points (out of 145) 2021-01-07 15:58:24 Security check: file is normal 2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_storage 2021-01-07 15:58:24 File permissions are OK 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Action: Performing tests from category: Storage 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID STRG-1846 (Check if firewire storage is disabled) 2021-01-07 15:58:24 Test: Checking firewire storage driver in directory /etc/modprobe.d and configuration file /etc/modprobe.conf 2021-01-07 15:58:24 Result: found firewire ohci driver in disabled state 2021-01-07 15:58:24 Result: firewire ohci driver is disabled 2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 112 points (out of 148) 2021-01-07 15:58:24 Security check: file is normal 2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_storage_nfs 2021-01-07 15:58:24 File permissions are OK 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Action: Performing tests from category: NFS 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test STRG-1902 (Check rpcinfo registered programs) 2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test STRG-1904 (Check nfs rpc) 2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test STRG-1906 (Check nfs rpc) 2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Performing test ID STRG-1920 (Checking NFS daemon) 2021-01-07 15:58:24 Test: Checking running NFS daemon 2021-01-07 15:58:24 Output: NFS daemon is not running 2021-01-07 15:58:24 ==== 2021-01-07 15:58:24 Skipped test STRG-1926 (Checking NFS exports) 2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test STRG-1928 (Checking empty /etc/exports) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test STRG-1930 (Check client access to nfs share) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 Security check: file is normal 2021-01-07 15:58:25 Checking permissions of /root/scans/lynis/include/tests_nameservices 2021-01-07 15:58:25 File permissions are OK 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Action: Performing tests from category: Name services 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4016 (Check /etc/resolv.conf default domain) 2021-01-07 15:58:25 Test: check /etc/resolv.conf for default domain 2021-01-07 15:58:25 Result: /etc/resolv.conf found 2021-01-07 15:58:25 Result: no default domain found 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4018 (Check /etc/resolv.conf search domains) 2021-01-07 15:58:25 Test: check /etc/resolv.conf for search domains 2021-01-07 15:58:25 Result: /etc/resolv.conf found 2021-01-07 15:58:25 Found search domain: localdomain 2021-01-07 15:58:25 Result: Found 1 search domains 2021-01-07 15:58:25 Result: found 1 line(s) with a search statement (expecting less than 2 lines) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4020 (Check non default options) 2021-01-07 15:58:25 Test: check /etc/resolv.conf for non default options 2021-01-07 15:58:25 Result: /etc/resolv.conf found 2021-01-07 15:58:25 Result: no specific other options configured in /etc/resolv.conf 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4024 (Solaris uname -n output) 2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4026 (Check /etc/nodename) 2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4028 (Check domain name) 2021-01-07 15:58:25 Test: Checking if dnsdomainname command is available 2021-01-07 15:58:25 Result: dnsdomainname command returned no value 2021-01-07 15:58:25 Result: using domain name from FQDN hostname (ubuntu1404) 2021-01-07 15:58:25 Suggestion: Check DNS configuration for the dns domain name [test:NAME-4028] [details:-] [solution:-] 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4032 (Check nscd status) 2021-01-07 15:58:25 Test: checking nscd status 2021-01-07 15:58:25 Performing pgrep scan without uid 2021-01-07 15:58:25 IsRunning: process 'nscd' not found 2021-01-07 15:58:25 Result: nscd is not running 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4034 (Check Unbound status) 2021-01-07 15:58:25 Test: checking Unbound (unbound) status 2021-01-07 15:58:25 Performing pgrep scan without uid 2021-01-07 15:58:25 IsRunning: process 'unbound' not found 2021-01-07 15:58:25 Result: Unbound daemon is not running 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4036 (Check Unbound configuration file) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4202 (Check BIND status) 2021-01-07 15:58:25 Test: Checking for running BIND instance 2021-01-07 15:58:25 Performing pgrep scan without uid 2021-01-07 15:58:25 IsRunning: process 'named' not found 2021-01-07 15:58:25 Result: BIND not running 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4204 (Search BIND configuration file) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4206 (Check BIND configuration consistency) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4210 (Check DNS banner) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4230 (Check PowerDNS status) 2021-01-07 15:58:25 Test: Checking for running PowerDNS instance 2021-01-07 15:58:25 Performing pgrep scan without uid 2021-01-07 15:58:25 IsRunning: process 'pdns_server' not found 2021-01-07 15:58:25 Result: PowerDNS not running 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4232 (Search PowerDNS configuration file) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4236 (Check PowerDNS backends) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4238 (Check PowerDNS authoritative status) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4304 (Check NIS ypbind status) 2021-01-07 15:58:25 Test: Checking status of ypbind daemon 2021-01-07 15:58:25 Performing pgrep scan without uid 2021-01-07 15:58:25 IsRunning: process 'ypbind' not found 2021-01-07 15:58:25 Result: ypbind is not active 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test NAME-4306 (Check NIS domain) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4402 (Check duplicate line in /etc/hosts) 2021-01-07 15:58:25 Test: check duplicate line in /etc/hosts 2021-01-07 15:58:25 Result: OK, no duplicate lines found 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4404 (Check /etc/hosts contains an entry for this server name) 2021-01-07 15:58:25 Test: Check /etc/hosts contains an entry for this server name 2021-01-07 15:58:25 Result: Found entry for ubuntu1404 in /etc/hosts 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4406 (Check server hostname mapping) 2021-01-07 15:58:25 Test: Check server hostname not locally mapped in /etc/hosts 2021-01-07 15:58:25 Result: this server hostname is not mapped to a local address 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID NAME-4408 (Check localhost entry) 2021-01-07 15:58:25 Test: Check server hostname not locally mapped in /etc/hosts 2021-01-07 15:58:25 Result: localhost mapped to ::1 2021-01-07 15:58:25 Security check: file is normal 2021-01-07 15:58:25 Checking permissions of /root/scans/lynis/include/tests_dns 2021-01-07 15:58:25 File permissions are OK 2021-01-07 15:58:25 Security check: file is normal 2021-01-07 15:58:25 Checking permissions of /root/scans/lynis/include/tests_ports_packages 2021-01-07 15:58:25 File permissions are OK 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Action: Performing tests from category: Ports and packages 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7301 (Query FreeBSD pkg) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7302 (Query FreeBSD/NetBSD pkg_info) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7303 (Query brew package manager) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 Result: brew can NOT be found on this system 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7304 (Querying Gentoo packages) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 Result: emerge can NOT be found on this system 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7306 (Querying Solaris packages) 2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:25 Result: pkginfo can NOT be found on this system 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7308 (Checking package list with RPM) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 Result: RPM binary NOT found on this system, test skipped 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7310 (Checking package list with pacman) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7312 (Checking available updates for pacman based system) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 Result: pacman binary NOT found on this system, test skipped 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7314 (Checking pacman configuration options) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7320 (Checking for arch-audit tooling) 2021-01-07 15:58:25 Reason to skip: Test only applies to Arch Linux 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7322 (Discover vulnerable packages with arch-audit) 2021-01-07 15:58:25 Reason to skip: arch-audit not found 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7328 (Querying Zypper for installed packages) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7330 (Querying Zypper for vulnerable packages) 2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7332 (Query macOS ports) 2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (macOS only) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Skipped test PKGS-7334 (Query port for port upgrades) 2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (macOS only) 2021-01-07 15:58:25 ==== 2021-01-07 15:58:25 Performing test ID PKGS-7345 (Querying dpkg) 2021-01-07 15:58:25 Result: Found dpkg binary 2021-01-07 15:58:25 Test: Querying dpkg -l to get package list 2021-01-07 15:58:25 Output: 2021-01-07 15:58:25 Found package: accountsservice (version: 0.6.35-0ubuntu7.3) 2021-01-07 15:58:25 Found package: acct (version: 6.5.5-1ubuntu5) 2021-01-07 15:58:25 Found package: acpid (version: 1:2.0.21-1ubuntu2) 2021-01-07 15:58:25 Found package: adduser (version: 3.113+nmu3ubuntu3) 2021-01-07 15:58:25 Found package: amd64-microcode (version: 3.20180524.1~ubuntu0.14.04.2+really20130710.1ubuntu1) 2021-01-07 15:58:25 Found package: apparmor (version: 2.10.95-0ubuntu2.6~14.04.4) 2021-01-07 15:58:25 Found package: apport (version: 2.14.1-0ubuntu3.29) 2021-01-07 15:58:25 Found package: apport-symptoms (version: 0.20) 2021-01-07 15:58:25 Found package: apt (version: 1.0.1ubuntu2.24) 2021-01-07 15:58:25 Found package: apt-transport-https (version: 1.0.1ubuntu2.24) 2021-01-07 15:58:25 Found package: apt-utils (version: 1.0.1ubuntu2.24) 2021-01-07 15:58:25 Found package: apt-xapian-index (version: 0.45ubuntu4) 2021-01-07 15:58:25 Found package: aptitude (version: 0.6.8.2-1ubuntu4) 2021-01-07 15:58:25 Found package: aptitude-common (version: 0.6.8.2-1ubuntu4) 2021-01-07 15:58:25 Found package: base-files (version: 7.2ubuntu5.6) 2021-01-07 15:58:25 Found package: base-passwd (version: 3.5.33) 2021-01-07 15:58:25 Found package: bash (version: 4.3-7ubuntu1.7) 2021-01-07 15:58:25 Found package: bash-completion (version: 1:2.1-4ubuntu0.2) 2021-01-07 15:58:25 Found package: bc (version: 1.06.95-8ubuntu1) 2021-01-07 15:58:25 Found package: bind9-host (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:25 Found package: binutils (version: 2.24-5ubuntu14.2) 2021-01-07 15:58:25 Found package: biosdevname (version: 0.4.1-0ubuntu6.3) 2021-01-07 15:58:25 Found package: bsdmainutils (version: 9.0.5ubuntu1) 2021-01-07 15:58:25 Found package: bsdutils (version: 1:2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:25 Found package: busybox-initramfs (version: 1:1.21.0-1ubuntu1.4) 2021-01-07 15:58:25 Found package: busybox-static (version: 1:1.21.0-1ubuntu1.4) 2021-01-07 15:58:25 Found package: byobu (version: 5.77-0ubuntu1.2) 2021-01-07 15:58:25 Found package: bzip2 (version: 1.0.6-5) 2021-01-07 15:58:25 Found package: ca-certificates (version: 20170717~14.04.2) 2021-01-07 15:58:25 Found package: chkrootkit (version: 0.49-4.1ubuntu1.14.04.1) 2021-01-07 15:58:25 Found package: command-not-found (version: 0.3ubuntu12) 2021-01-07 15:58:25 Found package: command-not-found-data (version: 0.3ubuntu12) 2021-01-07 15:58:25 Found package: console-setup (version: 1.70ubuntu8) 2021-01-07 15:58:25 Found package: coreutils (version: 8.21-1ubuntu5.4) 2021-01-07 15:58:25 Found package: cpio (version: 2.11+dfsg-1ubuntu1.2) 2021-01-07 15:58:25 Found package: cracklib-runtime (version: 2.9.1-1build1) 2021-01-07 15:58:25 Found package: crda (version: 1.1.2-1ubuntu2) 2021-01-07 15:58:25 Found package: cron (version: 3.0pl1-124ubuntu2) 2021-01-07 15:58:25 Found package: curl (version: 7.35.0-1ubuntu2.20) 2021-01-07 15:58:25 Found package: dash (version: 0.5.7-4ubuntu1) 2021-01-07 15:58:25 Found package: dbus (version: 1.6.18-0ubuntu4.5) 2021-01-07 15:58:25 Found package: debconf (version: 1.5.51ubuntu2) 2021-01-07 15:58:25 Found package: debconf-i18n (version: 1.5.51ubuntu2) 2021-01-07 15:58:25 Found package: debianutils (version: 4.4) 2021-01-07 15:58:25 Found package: dh-python (version: 1.20140128-1ubuntu8.2) 2021-01-07 15:58:25 Found package: diffutils (version: 1:3.3-1) 2021-01-07 15:58:25 Found package: dmidecode (version: 2.12-2) 2021-01-07 15:58:25 Found package: dmsetup (version: 2:1.02.77-6ubuntu2) 2021-01-07 15:58:25 Found package: dnsutils (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:25 Found package: dosfstools (version: 3.0.26-1ubuntu0.1) 2021-01-07 15:58:25 Found package: dpkg (version: 1.17.5ubuntu5.8) 2021-01-07 15:58:25 Found package: e2fslibs:amd64 (version: 1.42.9-3ubuntu1.3) 2021-01-07 15:58:25 Found package: e2fsprogs (version: 1.42.9-3ubuntu1.3) 2021-01-07 15:58:25 Found package: ed (version: 1.9-2) 2021-01-07 15:58:25 Found package: eject (version: 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1) 2021-01-07 15:58:25 Found package: ethtool (version: 1:3.13-1) 2021-01-07 15:58:25 Found package: fail2ban (version: 0.8.11-1) 2021-01-07 15:58:25 Found package: file (version: 1:5.14-2ubuntu3.4) 2021-01-07 15:58:25 Found package: findutils (version: 4.4.2-7) 2021-01-07 15:58:25 Found package: fonts-ubuntu-font-family-console (version: 0.80-0ubuntu6) 2021-01-07 15:58:25 Found package: friendly-recovery (version: 0.2.25) 2021-01-07 15:58:25 Found package: ftp (version: 0.17-28) 2021-01-07 15:58:25 Found package: fuse (version: 2.9.2-4ubuntu4.14.04.1) 2021-01-07 15:58:25 Found package: gawk (version: 1:4.0.1+dfsg-2.1ubuntu2) 2021-01-07 15:58:25 Found package: gcc-4.8-base:amd64 (version: 4.8.4-2ubuntu1~14.04.4) 2021-01-07 15:58:25 Found package: gcc-4.9-base:amd64 (version: 4.9.3-0ubuntu4) 2021-01-07 15:58:25 Found package: geoip-database (version: 20140313-1) 2021-01-07 15:58:25 Found package: gettext-base (version: 0.18.3.1-1ubuntu3.1) 2021-01-07 15:58:25 Found package: gir1.2-glib-2.0 (version: 1.40.0-1ubuntu0.2) 2021-01-07 15:58:25 Found package: git (version: 1:1.9.1-1ubuntu0.10) 2021-01-07 15:58:25 Found package: git-man (version: 1:1.9.1-1ubuntu0.10) 2021-01-07 15:58:25 Found package: gnupg (version: 1.4.16-1ubuntu2.6) 2021-01-07 15:58:25 Found package: gpgv (version: 1.4.16-1ubuntu2.6) 2021-01-07 15:58:25 Found package: grep (version: 2.16-1) 2021-01-07 15:58:25 Found package: groff-base (version: 1.22.2-5) 2021-01-07 15:58:25 Found package: grub-common (version: 2.02~beta2-9ubuntu1.17) 2021-01-07 15:58:25 Found package: grub-gfxpayload-lists (version: 0.6) 2021-01-07 15:58:25 Found package: grub-pc (version: 2.02~beta2-9ubuntu1.17) 2021-01-07 15:58:25 Found package: grub-pc-bin (version: 2.02~beta2-9ubuntu1.17) 2021-01-07 15:58:25 Found package: grub2-common (version: 2.02~beta2-9ubuntu1.17) 2021-01-07 15:58:25 Found package: gzip (version: 1.6-3ubuntu1) 2021-01-07 15:58:25 Found package: hdparm (version: 9.43-1ubuntu3) 2021-01-07 15:58:25 Found package: hostname (version: 3.15ubuntu1) 2021-01-07 15:58:25 Found package: ifupdown (version: 0.7.47.2ubuntu4.5) 2021-01-07 15:58:25 Found package: info (version: 5.2.0.dfsg.1-2) 2021-01-07 15:58:25 Found package: init-system-helpers (version: 1.14ubuntu1) 2021-01-07 15:58:25 Found package: initramfs-tools (version: 0.103ubuntu4.11) 2021-01-07 15:58:25 Found package: initramfs-tools-bin (version: 0.103ubuntu4.11) 2021-01-07 15:58:25 Found package: initscripts (version: 2.88dsf-41ubuntu6.3) 2021-01-07 15:58:25 Found package: insserv (version: 1.14.0-5ubuntu2) 2021-01-07 15:58:25 Found package: install-info (version: 5.2.0.dfsg.1-2) 2021-01-07 15:58:25 Found package: installation-report (version: 2.54ubuntu1) 2021-01-07 15:58:25 Found package: intel-microcode (version: 3.20190618.0ubuntu0.14.04.1) 2021-01-07 15:58:25 Found package: iproute2 (version: 3.12.0-2ubuntu1.2) 2021-01-07 15:58:25 Found package: iptables (version: 1.4.21-1ubuntu1) 2021-01-07 15:58:25 Found package: iputils-ping (version: 3:20121221-4ubuntu1.1) 2021-01-07 15:58:25 Found package: iputils-tracepath (version: 3:20121221-4ubuntu1.1) 2021-01-07 15:58:25 Found package: irqbalance (version: 1.0.6-2ubuntu0.14.04.4) 2021-01-07 15:58:25 Found package: isc-dhcp-client (version: 4.2.4-7ubuntu12.13) 2021-01-07 15:58:25 Found package: isc-dhcp-common (version: 4.2.4-7ubuntu12.13) 2021-01-07 15:58:25 Found package: iso-codes (version: 3.52-1) 2021-01-07 15:58:25 Found package: iucode-tool (version: 1.0.1-1) 2021-01-07 15:58:26 Found package: john (version: 1.8.0-1) 2021-01-07 15:58:26 Found package: john-data (version: 1.8.0-1) 2021-01-07 15:58:26 Found package: kbd (version: 1.15.5-1ubuntu1) 2021-01-07 15:58:26 Found package: keyboard-configuration (version: 1.70ubuntu8) 2021-01-07 15:58:26 Found package: klibc-utils (version: 2.0.3-0ubuntu1.14.04.3) 2021-01-07 15:58:26 Found package: kmod (version: 15-0ubuntu7) 2021-01-07 15:58:26 Found package: krb5-locales (version: 1.12+dfsg-2ubuntu5.4) 2021-01-07 15:58:26 Found package: landscape-common (version: 14.12-0ubuntu6.14.04.4) 2021-01-07 15:58:26 Found package: language-pack-en (version: 1:14.04+20160720) 2021-01-07 15:58:26 Found package: language-pack-en-base (version: 1:14.04+20160720) 2021-01-07 15:58:26 Found package: language-selector-common (version: 0.129.3) 2021-01-07 15:58:26 Found package: laptop-detect (version: 0.13.7ubuntu2) 2021-01-07 15:58:26 Found package: less (version: 458-2) 2021-01-07 15:58:26 Found package: libaccountsservice0:amd64 (version: 0.6.35-0ubuntu7.3) 2021-01-07 15:58:26 Found package: libacl1:amd64 (version: 2.2.52-1) 2021-01-07 15:58:26 Found package: libapparmor-perl (version: 2.10.95-0ubuntu2.6~14.04.4) 2021-01-07 15:58:26 Found package: libapparmor1:amd64 (version: 2.10.95-0ubuntu2.6~14.04.4) 2021-01-07 15:58:26 Found package: libapt-inst1.5:amd64 (version: 1.0.1ubuntu2.24) 2021-01-07 15:58:26 Found package: libapt-pkg4.12:amd64 (version: 1.0.1ubuntu2.24) 2021-01-07 15:58:26 Found package: libarchive-extract-perl (version: 0.70-1) 2021-01-07 15:58:26 Found package: libasn1-8-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libasprintf0c2:amd64 (version: 0.18.3.1-1ubuntu3.1) 2021-01-07 15:58:26 Found package: libattr1:amd64 (version: 1:2.4.47-1ubuntu1) 2021-01-07 15:58:26 Found package: libaudit-common (version: 1:2.3.2-2ubuntu1) 2021-01-07 15:58:26 Found package: libaudit1:amd64 (version: 1:2.3.2-2ubuntu1) 2021-01-07 15:58:26 Found package: libbind9-90 (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:26 Found package: libblkid1:amd64 (version: 2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:26 Found package: libboost-iostreams1.54.0:amd64 (version: 1.54.0-4ubuntu3.1) 2021-01-07 15:58:26 Found package: libbsd0:amd64 (version: 0.6.0-2ubuntu1) 2021-01-07 15:58:26 Found package: libbz2-1.0:amd64 (version: 1.0.6-5) 2021-01-07 15:58:26 Found package: libc-bin (version: 2.19-0ubuntu6.15) 2021-01-07 15:58:26 Found package: libc6:amd64 (version: 2.19-0ubuntu6.15) 2021-01-07 15:58:26 Found package: libcap-ng0 (version: 0.7.3-1ubuntu2) 2021-01-07 15:58:26 Found package: libcap2-bin (version: 1:2.24-0ubuntu2) 2021-01-07 15:58:26 Found package: libcap2:amd64 (version: 1:2.24-0ubuntu2) 2021-01-07 15:58:26 Found package: libcgmanager0:amd64 (version: 0.24-0ubuntu7.5) 2021-01-07 15:58:26 Found package: libck-connector0:amd64 (version: 0.4.5-3.1ubuntu2) 2021-01-07 15:58:26 Found package: libclass-accessor-perl (version: 0.34-1) 2021-01-07 15:58:26 Found package: libcomerr2:amd64 (version: 1.42.9-3ubuntu1.3) 2021-01-07 15:58:26 Found package: libcrack2:amd64 (version: 2.9.1-1build1) 2021-01-07 15:58:26 Found package: libcurl3-gnutls:amd64 (version: 7.35.0-1ubuntu2.20) 2021-01-07 15:58:26 Found package: libcurl3:amd64 (version: 7.35.0-1ubuntu2.20) 2021-01-07 15:58:26 Found package: libcurses-perl (version: 1.28-1build3) 2021-01-07 15:58:26 Found package: libcurses-ui-perl (version: 0.9609-1) 2021-01-07 15:58:26 Found package: libcwidget3 (version: 0.5.16-3.5ubuntu1) 2021-01-07 15:58:26 Found package: libdb5.3:amd64 (version: 5.3.28-3ubuntu3.1) 2021-01-07 15:58:26 Found package: libdbus-1-3:amd64 (version: 1.6.18-0ubuntu4.5) 2021-01-07 15:58:26 Found package: libdbus-glib-1-2:amd64 (version: 0.100.2-1) 2021-01-07 15:58:26 Found package: libdebconfclient0:amd64 (version: 0.187ubuntu1) 2021-01-07 15:58:26 Found package: libdevmapper1.02.1:amd64 (version: 2:1.02.77-6ubuntu2) 2021-01-07 15:58:26 Found package: libdns100 (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:26 Found package: libdrm2:amd64 (version: 2.4.67-1ubuntu0.14.04.2) 2021-01-07 15:58:26 Found package: libedit2:amd64 (version: 3.1-20130712-2) 2021-01-07 15:58:26 Found package: libelf1:amd64 (version: 0.158-0ubuntu5.3) 2021-01-07 15:58:26 Found package: libept1.4.12:amd64 (version: 1.0.12) 2021-01-07 15:58:26 Found package: liberror-perl (version: 0.17-1.1) 2021-01-07 15:58:26 Found package: libestr0 (version: 0.1.9-0ubuntu2) 2021-01-07 15:58:26 Found package: libevent-2.0-5:amd64 (version: 2.0.21-stable-1ubuntu1.14.04.2) 2021-01-07 15:58:26 Found package: libexpat1:amd64 (version: 2.1.0-4ubuntu1.4) 2021-01-07 15:58:26 Found package: libffi6:amd64 (version: 3.1~rc1+r3.0.13-12ubuntu0.2) 2021-01-07 15:58:26 Found package: libfreetype6:amd64 (version: 2.5.2-1ubuntu2.8) 2021-01-07 15:58:26 Found package: libfribidi0:amd64 (version: 0.19.6-1) 2021-01-07 15:58:26 Found package: libfuse2:amd64 (version: 2.9.2-4ubuntu4.14.04.1) 2021-01-07 15:58:26 Found package: libgc1c2:amd64 (version: 1:7.2d-5ubuntu2.1) 2021-01-07 15:58:26 Found package: libgcc1:amd64 (version: 1:4.9.3-0ubuntu4) 2021-01-07 15:58:26 Found package: libgck-1-0:amd64 (version: 3.10.1-1) 2021-01-07 15:58:26 Found package: libgcr-3-common (version: 3.10.1-1) 2021-01-07 15:58:26 Found package: libgcr-base-3-1:amd64 (version: 3.10.1-1) 2021-01-07 15:58:26 Found package: libgcrypt11:amd64 (version: 1.5.3-2ubuntu4.6) 2021-01-07 15:58:26 Found package: libgdbm3:amd64 (version: 1.8.3-12build1) 2021-01-07 15:58:26 Found package: libgeoip1:amd64 (version: 1.6.0-1) 2021-01-07 15:58:26 Found package: libgirepository-1.0-1 (version: 1.40.0-1ubuntu0.2) 2021-01-07 15:58:26 Found package: libglib2.0-0:amd64 (version: 2.40.2-0ubuntu1.1) 2021-01-07 15:58:26 Found package: libglib2.0-data (version: 2.40.2-0ubuntu1.1) 2021-01-07 15:58:26 Found package: libgnutls-openssl27:amd64 (version: 2.12.23-12ubuntu2.8) 2021-01-07 15:58:26 Found package: libgnutls26:amd64 (version: 2.12.23-12ubuntu2.8) 2021-01-07 15:58:26 Found package: libgpg-error0:amd64 (version: 1.12-0.2ubuntu1) 2021-01-07 15:58:26 Found package: libgpm2:amd64 (version: 1.20.4-6.1) 2021-01-07 15:58:26 Found package: libgssapi-krb5-2:amd64 (version: 1.12+dfsg-2ubuntu5.4) 2021-01-07 15:58:26 Found package: libgssapi3-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libhcrypto4-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libheimbase1-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libheimntlm0-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libhx509-5-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libidn11:amd64 (version: 1.28-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libio-string-perl (version: 1.08-3) 2021-01-07 15:58:26 Found package: libisc95 (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:26 Found package: libisccc90 (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:26 Found package: libisccfg90 (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:26 Found package: libiw30:amd64 (version: 30~pre9-8ubuntu1) 2021-01-07 15:58:26 Found package: libjson-c2:amd64 (version: 0.11-3ubuntu1.2) 2021-01-07 15:58:26 Found package: libjson0:amd64 (version: 0.11-3ubuntu1.2) 2021-01-07 15:58:26 Found package: libk5crypto3:amd64 (version: 1.12+dfsg-2ubuntu5.4) 2021-01-07 15:58:26 Found package: libkeyutils1:amd64 (version: 1.5.6-1) 2021-01-07 15:58:26 Found package: libklibc (version: 2.0.3-0ubuntu1.14.04.3) 2021-01-07 15:58:26 Found package: libkmod2:amd64 (version: 15-0ubuntu7) 2021-01-07 15:58:26 Found package: libkrb5-26-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libkrb5-3:amd64 (version: 1.12+dfsg-2ubuntu5.4) 2021-01-07 15:58:26 Found package: libkrb5support0:amd64 (version: 1.12+dfsg-2ubuntu5.4) 2021-01-07 15:58:26 Found package: libldap-2.4-2:amd64 (version: 2.4.31-1+nmu2ubuntu8.5) 2021-01-07 15:58:26 Found package: liblocale-gettext-perl (version: 1.05-7build3) 2021-01-07 15:58:26 Found package: liblockfile-bin (version: 1.09-6ubuntu1) 2021-01-07 15:58:26 Found package: liblockfile1:amd64 (version: 1.09-6ubuntu1) 2021-01-07 15:58:26 Found package: liblog-message-simple-perl (version: 0.10-1) 2021-01-07 15:58:26 Found package: liblwres90 (version: 1:9.9.5.dfsg-3ubuntu0.19) 2021-01-07 15:58:26 Found package: liblzma5:amd64 (version: 5.1.1alpha+20120614-2ubuntu2) 2021-01-07 15:58:26 Found package: libmagic1:amd64 (version: 1:5.14-2ubuntu3.4) 2021-01-07 15:58:26 Found package: libmodule-pluggable-perl (version: 5.1-1) 2021-01-07 15:58:26 Found package: libmount1:amd64 (version: 2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:26 Found package: libmpdec2:amd64 (version: 2.4.0-6) 2021-01-07 15:58:26 Found package: libncurses5:amd64 (version: 5.9+20140118-1ubuntu1) 2021-01-07 15:58:26 Found package: libncursesw5:amd64 (version: 5.9+20140118-1ubuntu1) 2021-01-07 15:58:26 Found package: libnewt0.52:amd64 (version: 0.52.15-2ubuntu5) 2021-01-07 15:58:26 Found package: libnfnetlink0:amd64 (version: 1.0.1-2) 2021-01-07 15:58:26 Found package: libnih-dbus1:amd64 (version: 1.0.3-4ubuntu25) 2021-01-07 15:58:26 Found package: libnih1:amd64 (version: 1.0.3-4ubuntu25) 2021-01-07 15:58:26 Found package: libnl-3-200:amd64 (version: 3.2.21-1ubuntu4.1) 2021-01-07 15:58:26 Found package: libnl-genl-3-200:amd64 (version: 3.2.21-1ubuntu4.1) 2021-01-07 15:58:26 Found package: libnuma1:amd64 (version: 2.0.9~rc5-1ubuntu3.14.04.2) 2021-01-07 15:58:26 Found package: libp11-kit0:amd64 (version: 0.20.2-2ubuntu2) 2021-01-07 15:58:26 Found package: libpam-cap:amd64 (version: 1:2.24-0ubuntu2) 2021-01-07 15:58:26 Found package: libpam-cracklib:amd64 (version: 1.1.8-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libpam-modules-bin (version: 1.1.8-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libpam-modules:amd64 (version: 1.1.8-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libpam-runtime (version: 1.1.8-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libpam-systemd:amd64 (version: 204-5ubuntu20.31) 2021-01-07 15:58:26 Found package: libpam0g:amd64 (version: 1.1.8-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libparse-debianchangelog-perl (version: 1.2.0-1ubuntu1) 2021-01-07 15:58:26 Found package: libparted0debian1:amd64 (version: 2.3-19ubuntu1.14.04.1) 2021-01-07 15:58:26 Found package: libpcap0.8:amd64 (version: 1.5.3-2) 2021-01-07 15:58:26 Found package: libpci3:amd64 (version: 1:3.2.1-1ubuntu5.1) 2021-01-07 15:58:26 Found package: libpcre3:amd64 (version: 1:8.31-2ubuntu2.3) 2021-01-07 15:58:26 Found package: libpcsclite1:amd64 (version: 1.8.10-1ubuntu1.1) 2021-01-07 15:58:26 Found package: libpipeline1:amd64 (version: 1.3.0-1) 2021-01-07 15:58:26 Found package: libplymouth2:amd64 (version: 0.8.8-0ubuntu17.2) 2021-01-07 15:58:26 Found package: libpng12-0:amd64 (version: 1.2.50-1ubuntu2.14.04.3) 2021-01-07 15:58:26 Found package: libpod-latex-perl (version: 0.61-1) 2021-01-07 15:58:26 Found package: libpolkit-agent-1-0:amd64 (version: 0.105-4ubuntu3.14.04.6) 2021-01-07 15:58:26 Found package: libpolkit-backend-1-0:amd64 (version: 0.105-4ubuntu3.14.04.6) 2021-01-07 15:58:26 Found package: libpolkit-gobject-1-0:amd64 (version: 0.105-4ubuntu3.14.04.6) 2021-01-07 15:58:26 Found package: libpopt0:amd64 (version: 1.16-8ubuntu1) 2021-01-07 15:58:26 Found package: libprocps3:amd64 (version: 1:3.3.9-1ubuntu2.3) 2021-01-07 15:58:26 Found package: libpython-stdlib:amd64 (version: 2.7.5-5ubuntu3) 2021-01-07 15:58:26 Found package: libpython2.7-minimal:amd64 (version: 2.7.6-8ubuntu0.5) 2021-01-07 15:58:26 Found package: libpython2.7-stdlib:amd64 (version: 2.7.6-8ubuntu0.5) 2021-01-07 15:58:26 Found package: libpython2.7:amd64 (version: 2.7.6-8ubuntu0.5) 2021-01-07 15:58:26 Found package: libpython3-stdlib:amd64 (version: 3.4.0-0ubuntu2) 2021-01-07 15:58:26 Found package: libpython3.4-minimal:amd64 (version: 3.4.3-1ubuntu1~14.04.7) 2021-01-07 15:58:26 Found package: libpython3.4-stdlib:amd64 (version: 3.4.3-1ubuntu1~14.04.7) 2021-01-07 15:58:26 Found package: libreadline5:amd64 (version: 5.2+dfsg-2) 2021-01-07 15:58:26 Found package: libreadline6:amd64 (version: 6.3-4ubuntu2) 2021-01-07 15:58:26 Found package: libroken18-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: librtmp0:amd64 (version: 2.4+20121230.gitdf6c518-1ubuntu0.1) 2021-01-07 15:58:26 Found package: libsasl2-2:amd64 (version: 2.1.25.dfsg1-17build1) 2021-01-07 15:58:26 Found package: libsasl2-modules-db:amd64 (version: 2.1.25.dfsg1-17build1) 2021-01-07 15:58:26 Found package: libsasl2-modules:amd64 (version: 2.1.25.dfsg1-17build1) 2021-01-07 15:58:26 Found package: libselinux1:amd64 (version: 2.2.2-1ubuntu0.1) 2021-01-07 15:58:26 Found package: libsemanage-common (version: 2.2-1) 2021-01-07 15:58:26 Found package: libsemanage1:amd64 (version: 2.2-1) 2021-01-07 15:58:26 Found package: libsepol1:amd64 (version: 2.2-1ubuntu0.1) 2021-01-07 15:58:26 Found package: libsigc++-2.0-0c2a:amd64 (version: 2.2.10-0.2ubuntu2) 2021-01-07 15:58:26 Found package: libsigsegv2:amd64 (version: 2.10-2) 2021-01-07 15:58:26 Found package: libslang2:amd64 (version: 2.2.4-15ubuntu1) 2021-01-07 15:58:26 Found package: libsqlite3-0:amd64 (version: 3.8.2-1ubuntu2.2) 2021-01-07 15:58:26 Found package: libss2:amd64 (version: 1.42.9-3ubuntu1.3) 2021-01-07 15:58:26 Found package: libssl1.0.0:amd64 (version: 1.0.1f-1ubuntu2.27) 2021-01-07 15:58:26 Found package: libstdc++6:amd64 (version: 4.8.4-2ubuntu1~14.04.4) 2021-01-07 15:58:26 Found package: libsub-name-perl (version: 0.05-1build4) 2021-01-07 15:58:26 Found package: libsystemd-daemon0:amd64 (version: 204-5ubuntu20.31) 2021-01-07 15:58:26 Found package: libsystemd-login0:amd64 (version: 204-5ubuntu20.31) 2021-01-07 15:58:26 Found package: libtasn1-6:amd64 (version: 3.4-3ubuntu0.6) 2021-01-07 15:58:26 Found package: libterm-readkey-perl (version: 2.31-1) 2021-01-07 15:58:26 Found package: libterm-ui-perl (version: 0.42-1) 2021-01-07 15:58:26 Found package: libtext-charwidth-perl (version: 0.04-7build3) 2021-01-07 15:58:26 Found package: libtext-iconv-perl (version: 1.7-5build2) 2021-01-07 15:58:26 Found package: libtext-soundex-perl (version: 3.4-1build1) 2021-01-07 15:58:26 Found package: libtext-wrapi18n-perl (version: 0.06-7) 2021-01-07 15:58:26 Found package: libtimedate-perl (version: 2.3000-1) 2021-01-07 15:58:26 Found package: libtinfo5:amd64 (version: 5.9+20140118-1ubuntu1) 2021-01-07 15:58:26 Found package: libudev1:amd64 (version: 204-5ubuntu20.31) 2021-01-07 15:58:26 Found package: libusb-0.1-4:amd64 (version: 2:0.1.12-23.3ubuntu1) 2021-01-07 15:58:26 Found package: libusb-1.0-0:amd64 (version: 2:1.0.17-1ubuntu2) 2021-01-07 15:58:26 Found package: libustr-1.0-1:amd64 (version: 1.0.4-3ubuntu2) 2021-01-07 15:58:26 Found package: libuuid1:amd64 (version: 2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:26 Found package: libwind0-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2) 2021-01-07 15:58:26 Found package: libwrap0:amd64 (version: 7.6.q-25) 2021-01-07 15:58:26 Found package: libx11-6:amd64 (version: 2:1.6.2-1ubuntu2.1) 2021-01-07 15:58:26 Found package: libx11-data (version: 2:1.6.2-1ubuntu2.1) 2021-01-07 15:58:26 Found package: libxapian22 (version: 1.2.16-2ubuntu1) 2021-01-07 15:58:26 Found package: libxau6:amd64 (version: 1:1.0.8-1) 2021-01-07 15:58:26 Found package: libxcb1:amd64 (version: 1.10-2ubuntu1) 2021-01-07 15:58:26 Found package: libxdmcp6:amd64 (version: 1:1.1.1-1) 2021-01-07 15:58:26 Found package: libxext6:amd64 (version: 2:1.3.2-1ubuntu0.0.14.04.1) 2021-01-07 15:58:26 Found package: libxml2:amd64 (version: 2.9.1+dfsg1-3ubuntu4.13) 2021-01-07 15:58:26 Found package: libxmuu1:amd64 (version: 2:1.1.1-1) 2021-01-07 15:58:26 Found package: libxtables10 (version: 1.4.21-1ubuntu1) 2021-01-07 15:58:26 Found package: libyaml-0-2:amd64 (version: 0.1.4-3ubuntu3.1) 2021-01-07 15:58:26 Found package: linux-base (version: 4.5ubuntu1~14.04.1) 2021-01-07 15:58:26 Found package: linux-firmware (version: 1.127.24) 2021-01-07 15:58:26 Found package: linux-generic-lts-xenial (version: 4.4.0.148.130) 2021-01-07 15:58:26 Found package: linux-headers-4.4.0-142 (version: 4.4.0-142.168~14.04.1) 2021-01-07 15:58:26 Found package: linux-headers-4.4.0-142-generic (version: 4.4.0-142.168~14.04.1) 2021-01-07 15:58:26 Found package: linux-headers-4.4.0-148 (version: 4.4.0-148.174~14.04.1) 2021-01-07 15:58:26 Found package: linux-headers-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1) 2021-01-07 15:58:26 Found package: linux-headers-generic-lts-xenial (version: 4.4.0.148.130) 2021-01-07 15:58:26 Found package: linux-image-4.4.0-142-generic (version: 4.4.0-142.168~14.04.1) 2021-01-07 15:58:26 Found package: linux-image-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1) 2021-01-07 15:58:26 Found package: linux-image-extra-4.4.0-142-generic (version: 4.4.0-142.168~14.04.1) 2021-01-07 15:58:26 Found package: linux-image-generic-lts-xenial (version: 4.4.0.148.130) 2021-01-07 15:58:26 Found package: linux-modules-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1) 2021-01-07 15:58:26 Found package: linux-modules-extra-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1) 2021-01-07 15:58:26 Found package: locales (version: 2.13+git20120306-12.1) 2021-01-07 15:58:26 Found package: lockfile-progs (version: 0.1.17) 2021-01-07 15:58:26 Found package: login (version: 1:4.1.5.1-1ubuntu9.5) 2021-01-07 15:58:26 Found package: logrotate (version: 3.8.7-1ubuntu1.2) 2021-01-07 15:58:26 Found package: lsb-base (version: 4.1+Debian11ubuntu6.2) 2021-01-07 15:58:26 Found package: lsb-release (version: 4.1+Debian11ubuntu6.2) 2021-01-07 15:58:26 Found package: lshw (version: 02.16-2ubuntu1.4) 2021-01-07 15:58:26 Found package: lsof (version: 4.86+dfsg-1ubuntu2) 2021-01-07 15:58:26 Found package: ltrace (version: 0.7.3-4ubuntu5.1) 2021-01-07 15:58:26 Found package: m4 (version: 1.4.17-2ubuntu1) 2021-01-07 15:58:26 Found package: make (version: 3.81-8.2ubuntu3) 2021-01-07 15:58:26 Found package: makedev (version: 2.3.1-93ubuntu2~ubuntu14.04.1) 2021-01-07 15:58:26 Found package: man-db (version: 2.6.7.1-1ubuntu1) 2021-01-07 15:58:26 Found package: manpages (version: 3.54-1ubuntu1) 2021-01-07 15:58:26 Found package: mawk (version: 1.3.3-17ubuntu2) 2021-01-07 15:58:26 Found package: memtest86+ (version: 4.20-1.1ubuntu8) 2021-01-07 15:58:26 Found package: mime-support (version: 3.54ubuntu1.1) 2021-01-07 15:58:26 Found package: mlocate (version: 0.26-1ubuntu1) 2021-01-07 15:58:26 Found package: module-init-tools (version: 15-0ubuntu7) 2021-01-07 15:58:26 Found package: mount (version: 2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:26 Found package: mountall (version: 2.53ubuntu1) 2021-01-07 15:58:26 Found package: mtr-tiny (version: 0.85-2) 2021-01-07 15:58:26 Found package: multiarch-support (version: 2.19-0ubuntu6.15) 2021-01-07 15:58:26 Found package: nano (version: 2.2.6-1ubuntu1) 2021-01-07 15:58:26 Found package: ncurses-base (version: 5.9+20140118-1ubuntu1) 2021-01-07 15:58:26 Found package: ncurses-bin (version: 5.9+20140118-1ubuntu1) 2021-01-07 15:58:26 Found package: ncurses-term (version: 5.9+20140118-1ubuntu1) 2021-01-07 15:58:27 Found package: net-tools (version: 1.60-25ubuntu2.1) 2021-01-07 15:58:27 Found package: netbase (version: 5.2) 2021-01-07 15:58:27 Found package: netcat-openbsd (version: 1.105-7ubuntu1) 2021-01-07 15:58:27 Found package: ntfs-3g (version: 1:2013.1.13AR.1-2ubuntu2) 2021-01-07 15:58:27 Found package: ntpdate (version: 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13) 2021-01-07 15:58:27 Found package: openssh-client (version: 1:6.6p1-2ubuntu2.13) 2021-01-07 15:58:27 Found package: openssh-server (version: 1:6.6p1-2ubuntu2.13) 2021-01-07 15:58:27 Found package: openssh-sftp-server (version: 1:6.6p1-2ubuntu2.13) 2021-01-07 15:58:27 Found package: openssl (version: 1.0.1f-1ubuntu2.27) 2021-01-07 15:58:27 Found package: os-prober (version: 1.63ubuntu1.1) 2021-01-07 15:58:27 Found package: parted (version: 2.3-19ubuntu1.14.04.1) 2021-01-07 15:58:27 Found package: passwd (version: 1:4.1.5.1-1ubuntu9.5) 2021-01-07 15:58:27 Found package: patch (version: 2.7.1-4ubuntu2.4) 2021-01-07 15:58:27 Found package: pciutils (version: 1:3.2.1-1ubuntu5.1) 2021-01-07 15:58:27 Found package: perl (version: 5.18.2-2ubuntu1.7) 2021-01-07 15:58:27 Found package: perl-base (version: 5.18.2-2ubuntu1.7) 2021-01-07 15:58:27 Found package: perl-modules (version: 5.18.2-2ubuntu1.7) 2021-01-07 15:58:27 Found package: plymouth (version: 0.8.8-0ubuntu17.2) 2021-01-07 15:58:27 Found package: plymouth-theme-ubuntu-text (version: 0.8.8-0ubuntu17.2) 2021-01-07 15:58:27 Found package: policykit-1 (version: 0.105-4ubuntu3.14.04.6) 2021-01-07 15:58:27 Found package: popularity-contest (version: 1.57ubuntu1) 2021-01-07 15:58:27 Found package: portsentry (version: 1.2-13) 2021-01-07 15:58:27 Found package: powermgmt-base (version: 1.31build1) 2021-01-07 15:58:27 Found package: ppp (version: 2.4.5-5.1ubuntu2.3) 2021-01-07 15:58:27 Found package: pppconfig (version: 2.3.19ubuntu1) 2021-01-07 15:58:27 Found package: pppoeconf (version: 1.20ubuntu1) 2021-01-07 15:58:27 Found package: procmail (version: 3.22-21ubuntu0.2) 2021-01-07 15:58:27 Found package: procps (version: 1:3.3.9-1ubuntu2.3) 2021-01-07 15:58:27 Found package: psmisc (version: 22.20-1ubuntu2) 2021-01-07 15:58:27 Found package: python (version: 2.7.5-5ubuntu3) 2021-01-07 15:58:27 Found package: python-apt (version: 0.9.3.5ubuntu3) 2021-01-07 15:58:27 Found package: python-apt-common (version: 0.9.3.5ubuntu3) 2021-01-07 15:58:27 Found package: python-chardet (version: 2.0.1-2build2) 2021-01-07 15:58:27 Found package: python-configobj (version: 4.7.2+ds-5build1) 2021-01-07 15:58:27 Found package: python-debian (version: 0.1.21+nmu2ubuntu2) 2021-01-07 15:58:27 Found package: python-gdbm (version: 2.7.5-1ubuntu1) 2021-01-07 15:58:27 Found package: python-minimal (version: 2.7.5-5ubuntu3) 2021-01-07 15:58:27 Found package: python-openssl (version: 0.13-2ubuntu6) 2021-01-07 15:58:27 Found package: python-pam (version: 0.4.2-13.1ubuntu3) 2021-01-07 15:58:27 Found package: python-pkg-resources (version: 3.3-1ubuntu2) 2021-01-07 15:58:27 Found package: python-pyinotify (version: 0.9.4-1build1) 2021-01-07 15:58:27 Found package: python-requests (version: 2.2.1-1ubuntu0.4) 2021-01-07 15:58:27 Found package: python-serial (version: 2.6-1build1) 2021-01-07 15:58:27 Found package: python-six (version: 1.5.2-1ubuntu1.1) 2021-01-07 15:58:27 Found package: python-twisted-bin (version: 13.2.0-1ubuntu1.2) 2021-01-07 15:58:27 Found package: python-twisted-core (version: 13.2.0-1ubuntu1.2) 2021-01-07 15:58:27 Found package: python-urllib3 (version: 1.7.1-1ubuntu4.1) 2021-01-07 15:58:27 Found package: python-xapian (version: 1.2.16-2ubuntu1) 2021-01-07 15:58:27 Found package: python-zope.interface (version: 4.0.5-1ubuntu4) 2021-01-07 15:58:27 Found package: python2.7 (version: 2.7.6-8ubuntu0.5) 2021-01-07 15:58:27 Found package: python2.7-minimal (version: 2.7.6-8ubuntu0.5) 2021-01-07 15:58:27 Found package: python3 (version: 3.4.0-0ubuntu2) 2021-01-07 15:58:27 Found package: python3-apport (version: 2.14.1-0ubuntu3.29) 2021-01-07 15:58:27 Found package: python3-apt (version: 0.9.3.5ubuntu3) 2021-01-07 15:58:27 Found package: python3-commandnotfound (version: 0.3ubuntu12) 2021-01-07 15:58:27 Found package: python3-dbus (version: 1.2.0-2build2) 2021-01-07 15:58:27 Found package: python3-distupgrade (version: 1:0.220.11) 2021-01-07 15:58:27 Found package: python3-gdbm:amd64 (version: 3.4.3-1~14.04.2) 2021-01-07 15:58:27 Found package: python3-gi (version: 3.12.0-1ubuntu1) 2021-01-07 15:58:27 Found package: python3-minimal (version: 3.4.0-0ubuntu2) 2021-01-07 15:58:27 Found package: python3-newt (version: 0.52.15-2ubuntu5) 2021-01-07 15:58:27 Found package: python3-pkg-resources (version: 3.3-1ubuntu2) 2021-01-07 15:58:27 Found package: python3-problem-report (version: 2.14.1-0ubuntu3.29) 2021-01-07 15:58:27 Found package: python3-pycurl (version: 7.19.3-0ubuntu3) 2021-01-07 15:58:27 Found package: python3-software-properties (version: 0.92.37.8) 2021-01-07 15:58:27 Found package: python3-update-manager (version: 1:0.196.25) 2021-01-07 15:58:27 Found package: python3-yaml (version: 3.10-4ubuntu0.1) 2021-01-07 15:58:27 Found package: python3.4 (version: 3.4.3-1ubuntu1~14.04.7) 2021-01-07 15:58:27 Found package: python3.4-minimal (version: 3.4.3-1ubuntu1~14.04.7) 2021-01-07 15:58:27 Found package: readline-common (version: 6.3-4ubuntu2) 2021-01-07 15:58:27 Found package: resolvconf (version: 1.69ubuntu1.4) 2021-01-07 15:58:27 Found package: rsync (version: 3.1.0-2ubuntu0.4) 2021-01-07 15:58:27 Found package: rsyslog (version: 7.4.4-1ubuntu2.7) 2021-01-07 15:58:27 Found package: run-one (version: 1.17-0ubuntu1) 2021-01-07 15:58:27 Found package: screen (version: 4.1.0~20120320gitdb59704-9) 2021-01-07 15:58:27 Found package: sed (version: 4.2.2-4ubuntu1) 2021-01-07 15:58:27 Found package: sendmail (version: 8.14.4-4.1ubuntu1.1) 2021-01-07 15:58:27 Found package: sendmail-base (version: 8.14.4-4.1ubuntu1.1) 2021-01-07 15:58:27 Found package: sendmail-bin (version: 8.14.4-4.1ubuntu1.1) 2021-01-07 15:58:27 Found package: sendmail-cf (version: 8.14.4-4.1ubuntu1.1) 2021-01-07 15:58:27 Found package: sensible-mda (version: 8.14.4-4.1ubuntu1.1) 2021-01-07 15:58:27 Found package: sensible-utils (version: 0.0.9ubuntu0.14.04.1) 2021-01-07 15:58:27 Found package: sgml-base (version: 1.26+nmu4ubuntu1) 2021-01-07 15:58:27 Found package: shared-mime-info (version: 1.2-0ubuntu3) 2021-01-07 15:58:27 Found package: software-properties-common (version: 0.92.37.8) 2021-01-07 15:58:27 Found package: ssh-import-id (version: 3.21-0ubuntu1) 2021-01-07 15:58:27 Found package: strace (version: 4.8-1ubuntu5) 2021-01-07 15:58:27 Found package: sudo (version: 1.8.9p5-1ubuntu1.4) 2021-01-07 15:58:27 Found package: systemd-services (version: 204-5ubuntu20.31) 2021-01-07 15:58:27 Found package: systemd-shim (version: 6-2bzr1) 2021-01-07 15:58:27 Found package: sysv-rc (version: 2.88dsf-41ubuntu6.3) 2021-01-07 15:58:27 Found package: sysv-rc-conf (version: 0.99-7) 2021-01-07 15:58:27 Found package: sysvinit-utils (version: 2.88dsf-41ubuntu6.3) 2021-01-07 15:58:27 Found package: tar (version: 1.27.1-1ubuntu0.1) 2021-01-07 15:58:27 Found package: tasksel (version: 2.88ubuntu15) 2021-01-07 15:58:27 Found package: tasksel-data (version: 2.88ubuntu15) 2021-01-07 15:58:27 Found package: tcpd (version: 7.6.q-25) 2021-01-07 15:58:27 Found package: tcpdump (version: 4.9.2-0ubuntu0.14.04.1) 2021-01-07 15:58:27 Found package: telnet (version: 0.17-36build2) 2021-01-07 15:58:27 Found package: tiger (version: 1:3.2.3-12) 2021-01-07 15:58:27 Found package: time (version: 1.7-24) 2021-01-07 15:58:27 Found package: tmux (version: 1.8-5) 2021-01-07 15:58:27 Found package: tripwire (version: 2.4.2.2-3) 2021-01-07 15:58:27 Found package: tzdata (version: 2019a-0ubuntu0.14.04) 2021-01-07 15:58:27 Found package: ubuntu-advantage-tools (version: 19.6~ubuntu14.04.4) 2021-01-07 15:58:27 Found package: ubuntu-keyring (version: 2012.05.19) 2021-01-07 15:58:27 Found package: ubuntu-minimal (version: 1.325.1) 2021-01-07 15:58:27 Found package: ubuntu-release-upgrader-core (version: 1:0.220.11) 2021-01-07 15:58:27 Found package: ubuntu-standard (version: 1.325.1) 2021-01-07 15:58:27 Found package: ucf (version: 3.0027+nmu1) 2021-01-07 15:58:27 Found package: udev (version: 204-5ubuntu20.31) 2021-01-07 15:58:27 Found package: ufw (version: 0.34~rc-0ubuntu2) 2021-01-07 15:58:27 Found package: unattended-upgrades (version: 0.82.1ubuntu2.5) 2021-01-07 15:58:27 Found package: unhide (version: 20121229-1) 2021-01-07 15:58:27 Found package: update-manager-core (version: 1:0.196.25) 2021-01-07 15:58:27 Found package: update-notifier-common (version: 0.154.1ubuntu8) 2021-01-07 15:58:27 Found package: upstart (version: 1.12.1-0ubuntu4.2) 2021-01-07 15:58:27 Found package: ureadahead (version: 0.100.0-16) 2021-01-07 15:58:27 Found package: usbutils (version: 1:007-2ubuntu1.1) 2021-01-07 15:58:27 Found package: util-linux (version: 2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:27 Found package: uuid-runtime (version: 2.20.1-5.1ubuntu20.9) 2021-01-07 15:58:27 Found package: vim (version: 2:7.4.052-1ubuntu3.1) 2021-01-07 15:58:27 Found package: vim-common (version: 2:7.4.052-1ubuntu3.1) 2021-01-07 15:58:27 Found package: vim-runtime (version: 2:7.4.052-1ubuntu3.1) 2021-01-07 15:58:27 Found package: vim-tiny (version: 2:7.4.052-1ubuntu3.1) 2021-01-07 15:58:27 Found package: w3m (version: 0.5.3-15ubuntu0.2) 2021-01-07 15:58:27 Found package: wamerican (version: 7.1-1) 2021-01-07 15:58:27 Found package: wget (version: 1.15-1ubuntu1.14.04.5) 2021-01-07 15:58:27 Found package: whiptail (version: 0.52.15-2ubuntu5) 2021-01-07 15:58:27 Found package: whois (version: 5.1.1) 2021-01-07 15:58:27 Found package: wireless-regdb (version: 2013.02.13-1ubuntu1) 2021-01-07 15:58:27 Found package: wireless-tools (version: 30~pre9-8ubuntu1) 2021-01-07 15:58:27 Found package: wpasupplicant (version: 2.1-0ubuntu1.7) 2021-01-07 15:58:27 Found package: xauth (version: 1:1.0.7-1ubuntu1) 2021-01-07 15:58:27 Found package: xkb-data (version: 2.10.1-1ubuntu1) 2021-01-07 15:58:27 Found package: xml-core (version: 0.13+nmu2) 2021-01-07 15:58:27 Found package: xz-utils (version: 5.1.1alpha+20120614-2ubuntu2) 2021-01-07 15:58:27 Found package: zlib1g:amd64 (version: 1:1.2.8.dfsg-1ubuntu1.1) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Performing test ID PKGS-7346 (Search unpurged packages on system) 2021-01-07 15:58:27 Test: Querying dpkg -l to get unpurged packages 2021-01-07 15:58:27 Result: no packages found with left overs 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7348 (Check for old distfiles) 2021-01-07 15:58:27 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7350 (Checking for installed packages with DNF utility) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7352 (Checking for security updates with DNF utility) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7354 (Checking package database integrity) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7366 (Checking for debsecan utility) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Performing test ID PKGS-7370 (Checking for debsums utility) 2021-01-07 15:58:27 Result: debsums utility is not installed. 2021-01-07 15:58:27 Hardening: assigned partial number of hardening points (0 of 2). Currently having 112 points (out of 150) 2021-01-07 15:58:27 Suggestion: Install debsums utility for the verification of packages with known good database. [test:PKGS-7370] [details:-] [solution:-] 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7378 (Query portmaster for port upgrades) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7380 (Check for vulnerable NetBSD packages) 2021-01-07 15:58:27 Reason to skip: Incorrect guest OS (NetBSD only) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7381 (Check for vulnerable FreeBSD packages with pkg) 2021-01-07 15:58:27 Reason to skip: pkg tool not available 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7382 (Check for vulnerable FreeBSD packages with portaudit) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7383 (Check for YUM package update management) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7384 (Check for YUM utils package) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7386 (Check for YUM security package) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Skipped test PKGS-7387 (Check for GPG signing in YUM security package) 2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Performing test ID PKGS-7388 (Check security repository in apt sources.list file) 2021-01-07 15:58:27 Searching for security.debian.org/security.ubuntu.com or security repositories in /etc/apt/sources.list file 2021-01-07 15:58:27 Result: Found security repository in /etc/apt/sources.list 2021-01-07 15:58:27 Output: deb http://security.ubuntu.com/ubuntu trusty-security main restricted 2021-01-07 15:58:27 Output: deb-src http://security.ubuntu.com/ubuntu trusty-security main restricted 2021-01-07 15:58:27 Output: deb http://security.ubuntu.com/ubuntu trusty-security universe 2021-01-07 15:58:27 Output: deb-src http://security.ubuntu.com/ubuntu trusty-security universe 2021-01-07 15:58:27 Output: deb http://security.ubuntu.com/ubuntu trusty-security multiverse 2021-01-07 15:58:27 Output: deb-src http://security.ubuntu.com/ubuntu trusty-security multiverse 2021-01-07 15:58:27 Searching for security.debian.org/security.ubuntu.com or security repositories in /etc/apt/sources.list.d directory 2021-01-07 15:58:27 Result: Found security repository in one or more files in directory /etc/apt/sources.list.d 2021-01-07 15:58:27 Output: /etc/apt/sources.list.d/ubuntu-esm-infra-trusty.list:deb https://esm.ubuntu.com/ubuntu trusty-infra-security main 2021-01-07 15:58:27 Result: security repository was found 2021-01-07 15:58:27 Hardening: assigned maximum number of hardening points for this item (3). Currently having 115 points (out of 153) 2021-01-07 15:58:27 ==== 2021-01-07 15:58:27 Performing test ID PKGS-7390 (Check Ubuntu database consistency) 2021-01-07 15:58:27 Test: Package database consistency by running apt-get check 2021-01-07 15:58:28 Result: package database seems to be consistent. 2021-01-07 15:58:28 ==== 2021-01-07 15:58:28 Performing test ID PKGS-7392 (Check for Debian/Ubuntu security updates) 2021-01-07 15:58:28 Action: updating package repository with apt-get 2021-01-07 15:58:34 Result: apt-get finished 2021-01-07 15:58:34 Test: Checking if /usr/lib/update-notifier/apt-check exists 2021-01-07 15:58:34 Result: found /usr/lib/update-notifier/apt-check 2021-01-07 15:58:34 Test: checking if any of the updates contain security updates 2021-01-07 15:58:36 Result: no vulnerable packages found via apt-check 2021-01-07 15:58:36 Result: no vulnerable packages found 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Skipped test PKGS-7393 (Check for Gentoo vulnerable packages) 2021-01-07 15:58:36 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Performing test ID PKGS-7394 (Check for Ubuntu updates) 2021-01-07 15:58:36 Test: checking /usr/bin/apt-show-versions 2021-01-07 15:58:36 Result: /usr/bin/apt-show-versions not found 2021-01-07 15:58:36 Suggestion: Install package apt-show-versions for patch management purposes [test:PKGS-7394] [details:-] [solution:-] 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Performing test ID PKGS-7398 (Check for package audit tool) 2021-01-07 15:58:36 Test: checking for package audit tool 2021-01-07 15:58:36 Result: found package audit tool: apt-check 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Performing test ID PKGS-7410 (Count installed kernel packages) 2021-01-07 15:58:36 Test: Checking how many kernel packages are installed 2021-01-07 15:58:36 Result: found 2 kernel packages on the system, which is fine 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Performing test ID PKGS-7420 (Detect toolkit to automatically download and apply upgrades) 2021-01-07 15:58:36 Result: found unattended-upgrade 2021-01-07 15:58:36 Hardening: assigned maximum number of hardening points for this item (5). Currently having 120 points (out of 158) 2021-01-07 15:58:36 Security check: file is normal 2021-01-07 15:58:36 Checking permissions of /root/scans/lynis/include/tests_networking 2021-01-07 15:58:36 File permissions are OK 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Action: Performing tests from category: Networking 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Performing test ID NETW-2400 (Hostname length and value check) 2021-01-07 15:58:36 Result: FQDN is defined and not longer than 253 characters (10 characters) 2021-01-07 15:58:36 Result: hostnamed is defined and not longer than 63 characters 2021-01-07 15:58:36 Result: good, no unexpected characters discovered in hostname 2021-01-07 15:58:36 ==== 2021-01-07 15:58:36 Performing test ID NETW-2600 (Checking IPv6 configuration) 2021-01-07 15:58:37 Result: IPV6 mode is auto 2021-01-07 15:58:37 Result: IPv6 only configuration: NO 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-2704 (Basic nameserver configuration tests) 2021-01-07 15:58:37 Test: Checking /etc/resolv.conf file 2021-01-07 15:58:37 Result: Found /etc/resolv.conf file 2021-01-07 15:58:37 Test: Querying nameservers 2021-01-07 15:58:37 Found nameserver: 192.168.37.2 2021-01-07 15:58:37 Nameserver 192.168.37.2 seems to respond to queries from this host. 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-2705 (Check availability two nameservers) 2021-01-07 15:58:37 Result: less than 2 responsive nameservers found 2021-01-07 15:58:37 Warning: Couldn't find 2 responsive nameservers [test:NETW-2705] [details:-] [solution:-] 2021-01-07 15:58:37 Note: Non responsive nameservers can give problems for your system(s). Like the lack of recursive lookups, bad connectivity to update servers etc. 2021-01-07 15:58:37 Suggestion: Check your resolv.conf file and fill in a backup nameserver if possible [test:NETW-2705] [details:-] [solution:-] 2021-01-07 15:58:37 Hardening: assigned partial number of hardening points (1 of 2). Currently having 121 points (out of 160) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test NETW-2706 (Check systemd-resolved and upstream DNSSEC status) 2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:37 Result: Test most likely skipped due to not having resolvectl 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3001 (Find default gateway (route)) 2021-01-07 15:58:37 Test: Searching default gateway(s) 2021-01-07 15:58:37 Result: Found default gateway 192.168.37.2 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3004 (Search for available network interfaces) 2021-01-07 15:58:37 Found network interface: lo 2021-01-07 15:58:37 Found network interface: eth0 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3006 (Get network MAC addresses) 2021-01-07 15:58:37 Found MAC address: 00:0c:29:d7:de:37 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3008 (Get network IP addresses) 2021-01-07 15:58:37 Found IPv4 address: 192.168.37.132 2021-01-07 15:58:37 Found IPv4 address: 127.0.0.1 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3012 (Check listening ports) 2021-01-07 15:58:37 Test: Retrieving ss information to find listening ports 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test NETW-3014 (Checking promiscuous interfaces (BSD)) 2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3015 (Checking promiscuous interfaces (Linux)) 2021-01-07 15:58:37 Test: Using ip binary to retrieve network interfaces 2021-01-07 15:58:37 Test: Checking all interfaces to discover any with promiscuous mode enabled 2021-01-07 15:58:37 Result: No promiscuous interfaces found 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3028 (Checking connections in WAIT state) 2021-01-07 15:58:37 Test: Using netstat for check for connections in WAIT state 2021-01-07 15:58:37 Result: currently 2 connections are in a waiting state (max configured: 5000). 2021-01-07 15:58:37 Result: 2 connections are in WAIT state 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3030 (Checking DHCP client status) 2021-01-07 15:58:37 Performing pgrep scan without uid 2021-01-07 15:58:37 IsRunning: process 'dhclient' found (1277 ) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3032 (Checking for ARP monitoring software) 2021-01-07 15:58:37 Performing pgrep scan without uid 2021-01-07 15:58:37 IsRunning: process 'addrwatch' not found 2021-01-07 15:58:37 Performing pgrep scan without uid 2021-01-07 15:58:37 IsRunning: process 'arpwatch' not found 2021-01-07 15:58:37 Performing pgrep scan without uid 2021-01-07 15:58:37 IsRunning: process 'arpon' not found 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID NETW-3200 (Determine available network protocols) 2021-01-07 15:58:37 Test: checking the status of some network protocols that typically are not used 2021-01-07 15:58:37 Test: now checking module 'dccp' 2021-01-07 15:58:37 Suggestion: Determine if protocol 'dccp' is really needed on this system [test:NETW-3200] [details:-] [solution:-] 2021-01-07 15:58:37 Test: now checking module 'sctp' 2021-01-07 15:58:37 Suggestion: Determine if protocol 'sctp' is really needed on this system [test:NETW-3200] [details:-] [solution:-] 2021-01-07 15:58:37 Test: now checking module 'rds' 2021-01-07 15:58:37 Suggestion: Determine if protocol 'rds' is really needed on this system [test:NETW-3200] [details:-] [solution:-] 2021-01-07 15:58:37 Test: now checking module 'tipc' 2021-01-07 15:58:37 Suggestion: Determine if protocol 'tipc' is really needed on this system [test:NETW-3200] [details:-] [solution:-] 2021-01-07 15:58:37 Security check: file is normal 2021-01-07 15:58:37 Checking permissions of /root/scans/lynis/include/tests_printers_spoolers 2021-01-07 15:58:37 File permissions are OK 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Action: Performing tests from category: Printers and Spools 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2302 (Check for printcap consistency) 2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID PRNT-2304 (Check cupsd status) 2021-01-07 15:58:37 Test: Checking cupsd status 2021-01-07 15:58:37 Performing pgrep scan without uid 2021-01-07 15:58:37 IsRunning: process 'cupsd' not found 2021-01-07 15:58:37 Result: cups daemon not running, cups daemon tests skipped 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2306 (Check CUPSd configuration file) 2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2307 (Check CUPSd configuration file permissions) 2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2308 (Check CUPSd network configuration) 2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Performing test ID PRNT-2314 (Check lpd status) 2021-01-07 15:58:37 Test: Checking lpd status 2021-01-07 15:58:37 Performing pgrep scan without uid 2021-01-07 15:58:37 IsRunning: process 'lpd' not found 2021-01-07 15:58:37 Result: lp daemon not running 2021-01-07 15:58:37 Hardening: assigned maximum number of hardening points for this item (4). Currently having 125 points (out of 164) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2316 (Checking /etc/qconfig file) 2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (AIX only) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2418 (Checking qdaemon printer spooler status) 2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (AIX only) 2021-01-07 15:58:37 ==== 2021-01-07 15:58:37 Skipped test PRNT-2420 (Checking old print jobs) 2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (AIX only) 2021-01-07 15:58:37 Security check: file is normal 2021-01-07 15:58:37 Checking permissions of /root/scans/lynis/include/tests_mail_messaging 2021-01-07 15:58:38 File permissions are OK 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Action: Performing tests from category: Software: e-mail and messaging 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID MAIL-8802 (Check Exim status) 2021-01-07 15:58:38 Test: check Exim status 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'exim4' not found 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'exim' not found 2021-01-07 15:58:38 Result: no running Exim processes found 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test MAIL-8804 (Exim configuration options) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID MAIL-8814 (Check postfix process status) 2021-01-07 15:58:38 Test: check Postfix status 2021-01-07 15:58:38 Result: no running Postfix processes found 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test MAIL-8816 (Check Postfix configuration) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test MAIL-8817 (Check Postfix configuration errors) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test MAIL-8818 (Check Postfix configuration: banner) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID MAIL-8820 (Postfix configuration scan) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID MAIL-8838 (Check dovecot process) 2021-01-07 15:58:38 Test: check dovecot status 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'dovecot' not found 2021-01-07 15:58:38 Result: dovecot not found 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID MAIL-8860 (Check Qmail status) 2021-01-07 15:58:38 Test: check Qmail status 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'qmail-smtpd' not found 2021-01-07 15:58:38 Result: no running Qmail processes found 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID MAIL-8880 (Check Sendmail status) 2021-01-07 15:58:38 Test: check sendmail status 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'sendmail' not found 2021-01-07 15:58:38 Result: no running Sendmail processes found 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test MAIL-8920 (Check OpenSMTPD status) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 Security check: file is normal 2021-01-07 15:58:38 Checking permissions of /root/scans/lynis/include/tests_firewalls 2021-01-07 15:58:38 File permissions are OK 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Action: Performing tests from category: Software: firewalls 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4502 (Check iptables kernel module) 2021-01-07 15:58:38 Result: Found iptables in loaded kernel modules 2021-01-07 15:58:38 Found module: ip_tables 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4508 (Check used policies of iptables chains) 2021-01-07 15:58:38 Test: gathering information from table filter 2021-01-07 15:58:38 Result: iptables -- policy is . 2021-01-07 15:58:38 Result: 2021-01-07 15:58:38 Result: iptables filter -- INPUT policy is ACCEPT. 2021-01-07 15:58:38 Result: ACCEPT 2021-01-07 15:58:38 Result: Found ACCEPT for INPUT (table: filter) 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 126 points (out of 167) 2021-01-07 15:58:38 Result: iptables filter -- FORWARD policy is ACCEPT. 2021-01-07 15:58:38 Result: ACCEPT 2021-01-07 15:58:38 Result: iptables filter -- OUTPUT policy is ACCEPT. 2021-01-07 15:58:38 Result: ACCEPT 2021-01-07 15:58:38 Result: iptables filter -- RETURN policy is . 2021-01-07 15:58:38 Result: 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4512 (Check iptables for empty ruleset) 2021-01-07 15:58:38 Result: iptables ruleset seems to be empty (found 2 rules) 2021-01-07 15:58:38 Warning: iptables module(s) loaded, but no rules active [test:FIRE-4512] [details:-] [solution:-] 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4513 (Check iptables for unused rules) 2021-01-07 15:58:38 Result: Found one or more possible unused rules 2021-01-07 15:58:38 Description: Unused rules can be a sign that the firewall rules aren't optimized or up-to-date 2021-01-07 15:58:38 Note: Sometimes rules aren't triggered but still in use. Keep this in mind before cleaning up rules. 2021-01-07 15:58:38 Output: iptables rule numbers: 1 1 2021-01-07 15:58:38 Suggestion: Check iptables rules to see which rules are currently not used [test:FIRE-4513] [details:-] [solution:-] 2021-01-07 15:58:38 Tip: iptables --list --numeric --line-numbers --verbose 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4518 (Check pf firewall components) 2021-01-07 15:58:38 Reason to skip: No /dev/pf device 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4520 (Check pf configuration consistency) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4524 (Check for CSF presence) 2021-01-07 15:58:38 Test: check /etc/csf/csf.conf 2021-01-07 15:58:38 Result: /etc/csf/csf.conf does NOT exist 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4526 (Check ipf status) 2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4530 (Check IPFW status) 2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4532 (Check macOS application firewall) 2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (macOS only) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4534 (Check for presence of outbound firewalls on macOS) 2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (macOS only) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4536 (Check nftables status) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4538 (Check nftables basic configuration) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test FIRE-4540 (Check for empty nftables configuration) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4586 (Check firewall logging) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4590 (Check firewall status) 2021-01-07 15:58:38 Result: host based firewall or packet filter is active 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (5). Currently having 130 points (out of 169) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID FIRE-4594 (Check for APF presence) 2021-01-07 15:58:38 Test: check /etc/apf/conf.apf 2021-01-07 15:58:38 Result: /etc/apf/conf.apf does NOT exist 2021-01-07 15:58:38 Security check: file is normal 2021-01-07 15:58:38 Checking permissions of /root/scans/lynis/include/tests_webservers 2021-01-07 15:58:38 File permissions are OK 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Action: Performing tests from category: Software: webserver 2021-01-07 15:58:38 Action: created temporary file /tmp/lynis.MDp0DxOuKJ 2021-01-07 15:58:38 Action: created temporary file /tmp/lynis.poIeU4RToD 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID HTTP-6622 (Checking Apache presence) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6624 (Testing main Apache configuration file) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6626 (Testing other Apache configuration file) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6632 (Determining all available Apache modules) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6640 (Determining existence of specific Apache modules) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6641 (Determining existence of specific Apache modules) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6643 (Determining existence of specific Apache modules) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID HTTP-6702 (Check nginx process) 2021-01-07 15:58:38 Test: searching running nginx process 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'nginx' not found 2021-01-07 15:58:38 Result: no running nginx process found 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6704 (Check nginx configuration file) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6706 (Check for additional nginx configuration files) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6708 (Check discovered nginx configuration settings) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6710 (Check nginx SSL configuration settings) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6712 (Check nginx access logging) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6714 (Check for missing error logs in nginx) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6716 (Check for debug mode on error log in nginx) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Skipped test HTTP-6720 (Check Nginx log files) 2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:38 Security check: file is normal 2021-01-07 15:58:38 Checking permissions of /root/scans/lynis/include/tests_ssh 2021-01-07 15:58:38 File permissions are OK 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Action: Performing tests from category: SSH Support 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID SSH-7402 (Check for running SSH daemon) 2021-01-07 15:58:38 Test: Searching for a SSH daemon 2021-01-07 15:58:38 Performing pgrep scan without uid 2021-01-07 15:58:38 IsRunning: process 'sshd' found (1341 ) 2021-01-07 15:58:38 Action: created temporary file /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID SSH-7404 (Check SSH daemon file location) 2021-01-07 15:58:38 Test: searching for sshd_config file 2021-01-07 15:58:38 Result: /etc/ssh/sshd_config exists 2021-01-07 15:58:38 Test: check if we can access /etc/ssh/sshd_config (escaped: /etc/ssh/sshd_config) 2021-01-07 15:58:38 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:38 Result: file /etc/ssh/sshd_config is readable (or directory accessible). 2021-01-07 15:58:38 Result: using last found configuration file: /etc/ssh/sshd_config 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID SSH-7406 (Determine OpenSSH version) 2021-01-07 15:58:38 Result: discovered OpenSSH version is 6.6.1 2021-01-07 15:58:38 Result: OpenSSH major version: 6 2021-01-07 15:58:38 Result: OpenSSH minor version: 6 2021-01-07 15:58:38 ==== 2021-01-07 15:58:38 Performing test ID SSH-7408 (Check SSH specific defined options) 2021-01-07 15:58:38 Test: Checking specific defined options in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: added additional options for OpenSSH 6.x and lower 2021-01-07 15:58:38 Test: Checking AllowTcpForwarding in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option AllowTcpForwarding found 2021-01-07 15:58:38 Result: Option AllowTcpForwarding value is YES 2021-01-07 15:58:38 Result: OpenSSH option AllowTcpForwarding is in a weak configuration state and should be fixed 2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:AllowTcpForwarding (set YES to NO)] [solution:-] 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (0 of 3). Currently having 130 points (out of 172) 2021-01-07 15:58:38 Test: Checking ClientAliveCountMax in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option ClientAliveCountMax found 2021-01-07 15:58:38 Result: Option ClientAliveCountMax value is 3 2021-01-07 15:58:38 Result: OpenSSH option ClientAliveCountMax is configured reasonably 2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:ClientAliveCountMax (set 3 to 2)] [solution:-] 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 131 points (out of 175) 2021-01-07 15:58:38 Test: Checking ClientAliveInterval in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option ClientAliveInterval found 2021-01-07 15:58:38 Result: Option ClientAliveInterval value is 0 2021-01-07 15:58:38 Result: OpenSSH option ClientAliveInterval is configured very well 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 134 points (out of 178) 2021-01-07 15:58:38 Test: Checking Compression in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option Compression found 2021-01-07 15:58:38 Result: Option Compression value is YES 2021-01-07 15:58:38 Result: OpenSSH option Compression is in a weak configuration state and should be fixed 2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:Compression (set YES to NO)] [solution:-] 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (0 of 3). Currently having 134 points (out of 181) 2021-01-07 15:58:38 Test: Checking FingerprintHash in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option FingerprintHash not found in output 2021-01-07 15:58:38 Test: Checking GatewayPorts in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option GatewayPorts found 2021-01-07 15:58:38 Result: Option GatewayPorts value is NO 2021-01-07 15:58:38 Result: OpenSSH option GatewayPorts is configured very well 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 137 points (out of 184) 2021-01-07 15:58:38 Test: Checking IgnoreRhosts in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option IgnoreRhosts found 2021-01-07 15:58:38 Result: Option IgnoreRhosts value is YES 2021-01-07 15:58:38 Result: OpenSSH option IgnoreRhosts is configured very well 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 140 points (out of 187) 2021-01-07 15:58:38 Test: Checking LoginGraceTime in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option LoginGraceTime found 2021-01-07 15:58:38 Result: Option LoginGraceTime value is 120 2021-01-07 15:58:38 Result: OpenSSH option LoginGraceTime is configured very well 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 143 points (out of 190) 2021-01-07 15:58:38 Test: Checking LogLevel in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option LogLevel found 2021-01-07 15:58:38 Result: Option LogLevel value is INFO 2021-01-07 15:58:38 Result: OpenSSH option LogLevel is configured reasonably 2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:LogLevel (set INFO to VERBOSE)] [solution:-] 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 144 points (out of 193) 2021-01-07 15:58:38 Test: Checking MaxAuthTries in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option MaxAuthTries found 2021-01-07 15:58:38 Result: Option MaxAuthTries value is 6 2021-01-07 15:58:38 Result: OpenSSH option MaxAuthTries is configured reasonably 2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:MaxAuthTries (set 6 to 3)] [solution:-] 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 145 points (out of 196) 2021-01-07 15:58:38 Test: Checking MaxSessions in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option MaxSessions found 2021-01-07 15:58:38 Result: Option MaxSessions value is 10 2021-01-07 15:58:38 Result: OpenSSH option MaxSessions is in a weak configuration state and should be fixed 2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:MaxSessions (set 10 to 2)] [solution:-] 2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (0 of 3). Currently having 145 points (out of 199) 2021-01-07 15:58:38 Test: Checking PermitRootLogin in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option PermitRootLogin found 2021-01-07 15:58:38 Result: Option PermitRootLogin value is WITHOUT-PASSWORD 2021-01-07 15:58:38 Expected value has multiple values, testing if active value is in list ((FORCED-COMMANDS-ONLY|NO|PROHIBIT-PASSWORD|WITHOUT-PASSWORD)) 2021-01-07 15:58:38 Result: found 2021-01-07 15:58:38 Result: OpenSSH option PermitRootLogin is configured very well 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 148 points (out of 202) 2021-01-07 15:58:38 Test: Checking PermitUserEnvironment in /tmp/lynis.xSEx85yike 2021-01-07 15:58:38 Result: Option PermitUserEnvironment found 2021-01-07 15:58:38 Result: Option PermitUserEnvironment value is NO 2021-01-07 15:58:38 Result: OpenSSH option PermitUserEnvironment is configured very well 2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 151 points (out of 205) 2021-01-07 15:58:39 Test: Checking PermitTunnel in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option PermitTunnel found 2021-01-07 15:58:39 Result: Option PermitTunnel value is NO 2021-01-07 15:58:39 Result: OpenSSH option PermitTunnel is configured very well 2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 154 points (out of 208) 2021-01-07 15:58:39 Test: Checking Port in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option Port found 2021-01-07 15:58:39 Result: Option Port value is 22 2021-01-07 15:58:39 Result: OpenSSH option Port is in a weak configuration state and should be fixed 2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:Port (set 22 to )] [solution:-] 2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 154 points (out of 211) 2021-01-07 15:58:39 Test: Checking PrintLastLog in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option PrintLastLog found 2021-01-07 15:58:39 Result: Option PrintLastLog value is YES 2021-01-07 15:58:39 Result: OpenSSH option PrintLastLog is configured very well 2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 157 points (out of 214) 2021-01-07 15:58:39 Test: Checking StrictModes in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option StrictModes found 2021-01-07 15:58:39 Result: Option StrictModes value is YES 2021-01-07 15:58:39 Result: OpenSSH option StrictModes is configured very well 2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 160 points (out of 217) 2021-01-07 15:58:39 Test: Checking TCPKeepAlive in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option TCPKeepAlive found 2021-01-07 15:58:39 Result: Option TCPKeepAlive value is YES 2021-01-07 15:58:39 Result: OpenSSH option TCPKeepAlive is in a weak configuration state and should be fixed 2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:TCPKeepAlive (set YES to NO)] [solution:-] 2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 160 points (out of 220) 2021-01-07 15:58:39 Test: Checking UseDNS in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option UseDNS found 2021-01-07 15:58:39 Result: Option UseDNS value is YES 2021-01-07 15:58:39 Result: OpenSSH option UseDNS is in a weak configuration state and should be fixed 2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:UseDNS (set YES to NO)] [solution:-] 2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 160 points (out of 223) 2021-01-07 15:58:39 Test: Checking X11Forwarding in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option X11Forwarding found 2021-01-07 15:58:39 Result: Option X11Forwarding value is YES 2021-01-07 15:58:39 Result: OpenSSH option X11Forwarding is in a weak configuration state and should be fixed 2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:X11Forwarding (set YES to NO)] [solution:-] 2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 160 points (out of 226) 2021-01-07 15:58:39 Test: Checking AllowAgentForwarding in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option AllowAgentForwarding not found in output 2021-01-07 15:58:39 Test: Checking UsePrivilegeSeparation in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option UsePrivilegeSeparation found 2021-01-07 15:58:39 Result: Option UsePrivilegeSeparation value is YES 2021-01-07 15:58:39 Result: OpenSSH option UsePrivilegeSeparation is configured reasonably 2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:UsePrivilegeSeparation (set YES to SANDBOX)] [solution:-] 2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (1 of 3). Currently having 161 points (out of 229) 2021-01-07 15:58:39 Test: Checking Protocol in /tmp/lynis.xSEx85yike 2021-01-07 15:58:39 Result: Option Protocol found 2021-01-07 15:58:39 Result: Option Protocol value is 2 2021-01-07 15:58:39 Result: OpenSSH option Protocol is configured very well 2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 164 points (out of 232) 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups) 2021-01-07 15:58:39 Result: AllowUsers is not set 2021-01-07 15:58:39 Result: AllowGroups is not set 2021-01-07 15:58:39 Result: SSH has no specific user or group limitation. Most likely all valid users can SSH to this machine. 2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 1). Currently having 164 points (out of 233) 2021-01-07 15:58:39 Security check: file is normal 2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_snmp 2021-01-07 15:58:39 File permissions are OK 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Action: Performing tests from category: SNMP Support 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID SNMP-3302 (Check for running SNMP daemon) 2021-01-07 15:58:39 Test: Searching for a SNMP daemon 2021-01-07 15:58:39 Performing pgrep scan without uid 2021-01-07 15:58:39 IsRunning: process 'snmpd' not found 2021-01-07 15:58:39 Result: No running SNMP daemon found 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test SNMP-3304 (Check SNMP daemon file location) 2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test SNMP-3306 (Check SNMP communities) 2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:39 Security check: file is normal 2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_databases 2021-01-07 15:58:39 File permissions are OK 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Action: Performing tests from category: Databases 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1804 (Checking active MySQL process) 2021-01-07 15:58:39 Result: MySQL process not active 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test DBS-1816 (Checking MySQL root password) 2021-01-07 15:58:39 Reason to skip: MySQL not installed, or not running 2021-01-07 15:58:39 Test skipped, MySQL daemon not running or no MySQL client available 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1818 (Check status of MongoDB server) 2021-01-07 15:58:39 Performing pgrep scan without uid 2021-01-07 15:58:39 IsRunning: process 'mongod' not found 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1820 (Check for authorization in MongoDB) 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1826 (Checking active PostgreSQL processes) 2021-01-07 15:58:39 Performing pgrep scan without uid 2021-01-07 15:58:39 IsRunning: process 'postgres:' not found 2021-01-07 15:58:39 Result: PostgreSQL process not active 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test DBS-1828 (Test PostgreSQL configuration) 2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1840 (Checking active Oracle processes) 2021-01-07 15:58:39 Result: Oracle process(es) not active 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1860 (Checking active DB2 instances) 2021-01-07 15:58:39 Performing pgrep scan without uid 2021-01-07 15:58:39 IsRunning: process 'db2sysc' not found 2021-01-07 15:58:39 Result: No DB2 instances are running 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID DBS-1880 (Check for active Redis server) 2021-01-07 15:58:39 Performing pgrep scan without uid 2021-01-07 15:58:39 IsRunning: process 'redis-server' not found 2021-01-07 15:58:39 Result: No Redis processes are running 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test DBS-1882 (Redis configuration file) 2021-01-07 15:58:39 Reason to skip: Redis not running 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test DBS-1884 (Redis: requirepass option configured) 2021-01-07 15:58:39 Reason to skip: Redis not running, or no configuration file found 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test DBS-1886 (Redis: rename-command CONFIG used) 2021-01-07 15:58:39 Reason to skip: Redis not running, or no configuration found 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test DBS-1888 (Redis: bind on localhost) 2021-01-07 15:58:39 Reason to skip: Redis not running, or no configuration found 2021-01-07 15:58:39 Security check: file is normal 2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_ldap 2021-01-07 15:58:39 File permissions are OK 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Action: Performing tests from category: LDAP Services 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID LDAP-2219 (Check running OpenLDAP instance) 2021-01-07 15:58:39 Performing pgrep scan without uid 2021-01-07 15:58:39 IsRunning: process 'slapd' not found 2021-01-07 15:58:39 Result: No running slapd process found. 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Skipped test LDAP-2224 (Check presence slapd.conf) 2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:39 Security check: file is normal 2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_php 2021-01-07 15:58:39 File permissions are OK 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Action: Performing tests from category: PHP 2021-01-07 15:58:39 ==== 2021-01-07 15:58:39 Performing test ID PHP-2211 (Check php.ini presence) 2021-01-07 15:58:39 Test: Checking for presence php.ini 2021-01-07 15:58:39 Test: checking presence /etc/php.ini 2021-01-07 15:58:39 Result: file /etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php.ini.default 2021-01-07 15:58:39 Result: file /etc/php.ini.default not found 2021-01-07 15:58:39 Test: checking presence /etc/php/php.ini 2021-01-07 15:58:39 Result: file /etc/php/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php7.0/php.ini 2021-01-07 15:58:39 Result: file /etc/php7.0/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php7.1/php.ini 2021-01-07 15:58:39 Result: file /etc/php7.1/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php7.2/php.ini 2021-01-07 15:58:39 Result: file /etc/php7.2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php7.3/php.ini 2021-01-07 15:58:39 Result: file /etc/php7.3/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php7.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php7.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.0/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.0/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.1/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.1/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.3/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.3/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.0/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.0/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.1/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.1/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.3/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.3/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.0/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php7.0/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.1/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php7.1/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php7.2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.3/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php7.3/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php/cli-php7.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.0/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php7.0/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.1/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php7.1/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php7.2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.3/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php7.3/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php/embed-php7.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.3/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.3/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.1/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.1/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.0/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.0/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php/fpm-php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/cgi/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/cgi/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/cli/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/cli/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/cli-php5.4/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/cli-php5.4/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/cli-php5.5/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/cli-php5.5/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/cli-php5.6/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/cli-php5.6/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/apache2/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/apache2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php5/fpm/php.ini 2021-01-07 15:58:39 Result: file /etc/php5/fpm/php.ini not found 2021-01-07 15:58:39 Test: checking presence /private/etc/php.ini 2021-01-07 15:58:39 Result: file /private/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.0/apache2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.0/apache2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.1/apache2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.1/apache2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.2/apache2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.2/apache2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.3/apache2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.3/apache2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.4/apache2/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.4/apache2/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.0/cli/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.0/cli/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.0/fpm/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.0/fpm/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.1/cli/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.1/cli/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.1/fpm/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.1/fpm/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.2/cli/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.2/cli/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.2/fpm/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.2/fpm/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.3/cli/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.3/cli/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.3/fpm/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.3/fpm/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.4/cli/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.4/cli/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php/7.4/fpm/php.ini 2021-01-07 15:58:39 Result: file /etc/php/7.4/fpm/php.ini not found 2021-01-07 15:58:39 Test: checking presence /var/www/conf/php.ini 2021-01-07 15:58:39 Result: file /var/www/conf/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/etc/php.ini 2021-01-07 15:58:39 Result: file /usr/local/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/etc/php5/cgi/php.ini 2021-01-07 15:58:39 Result: file /usr/local/etc/php5/cgi/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php54/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php54/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php56/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php56/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php70/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php70/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php71/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php71/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php72/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php72/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php73/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php73/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/php74/lib/php.ini 2021-01-07 15:58:39 Result: file /usr/local/php74/lib/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/local/zend/etc/php.ini 2021-01-07 15:58:39 Result: file /usr/local/zend/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /usr/pkg/etc/php.ini 2021-01-07 15:58:39 Result: file /usr/pkg/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php54/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php54/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php55/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php55/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php56/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php56/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php70/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php70/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php71/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php71/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php72/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php72/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php73/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php73/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php74/root/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php74/root/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php44/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php44/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php51/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php51/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php52/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php52/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php53/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php53/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php54/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php54/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php55/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php55/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php56/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php56/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php70/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php70/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php71/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php71/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php72/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php72/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php73/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php73/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /opt/alt/php74/etc/php.ini 2021-01-07 15:58:39 Result: file /opt/alt/php74/etc/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php56/php.ini 2021-01-07 15:58:39 Result: file /etc/opt/remi/php56/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php70/php.ini 2021-01-07 15:58:39 Result: file /etc/opt/remi/php70/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php71/php.ini 2021-01-07 15:58:39 Result: file /etc/opt/remi/php71/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php72/php.ini 2021-01-07 15:58:39 Result: file /etc/opt/remi/php72/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php73/php.ini 2021-01-07 15:58:39 Result: file /etc/opt/remi/php73/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php74/php.ini 2021-01-07 15:58:39 Result: file /etc/opt/remi/php74/php.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php-5.6.ini 2021-01-07 15:58:39 Result: file /etc/php-5.6.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php-7.0.ini 2021-01-07 15:58:39 Result: file /etc/php-7.0.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php-7.1.ini 2021-01-07 15:58:39 Result: file /etc/php-7.1.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php-7.2.ini 2021-01-07 15:58:39 Result: file /etc/php-7.2.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php-7.3.ini 2021-01-07 15:58:39 Result: file /etc/php-7.3.ini not found 2021-01-07 15:58:39 Test: checking presence /etc/php-7.4.ini 2021-01-07 15:58:39 Result: file /etc/php-7.4.ini not found 2021-01-07 15:58:39 Result: no files found for /etc/php5/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.0/cli/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.1/cli/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.2/cli/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.3/cli/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.4/cli/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.0/fpm/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.1/fpm/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.2/fpm/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.3/fpm/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php/7.4/fpm/conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php54/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php55/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php56/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php70/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php71/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php72/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php73/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php74/root/etc/php.d 2021-01-07 15:58:39 Result: no files found for /opt/alt/php44/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php51/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php52/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php53/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php54/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php55/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php56/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php70/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php71/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php72/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php73/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /opt/alt/php74/etc/php.d.all 2021-01-07 15:58:39 Result: no files found for /usr/local/lib/php.conf.d 2021-01-07 15:58:39 Result: no files found for /usr/local/php70/lib/php.conf.d 2021-01-07 15:58:39 Result: no files found for /usr/local/php71/lib/php.conf.d 2021-01-07 15:58:39 Result: no files found for /usr/local/php72/lib/php.conf.d 2021-01-07 15:58:39 Result: no files found for /usr/local/php73/lib/php.conf.d 2021-01-07 15:58:39 Result: no files found for /usr/local/php74/lib/php.conf.d 2021-01-07 15:58:39 Result: no files found for /etc/php-5.6 2021-01-07 15:58:39 Result: no files found for /etc/php-7.0 2021-01-07 15:58:39 Result: no files found for /etc/php-7.1 2021-01-07 15:58:39 Result: no files found for /etc/php-7.2 2021-01-07 15:58:39 Result: no files found for /etc/php-7.3 2021-01-07 15:58:39 Result: no files found for /etc/php-7.4 2021-01-07 15:58:40 Result: no php.ini file found 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2320 (Check PHP disabled functions) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2368 (Check PHP register_globals option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2372 (Check PHP expose_php option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2374 (Check PHP enable_dl option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2376 (Check PHP allow_url_fopen option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2378 (Check PHP allow_url_include option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test PHP-2382 (Check PHP expose_php option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 Security check: file is normal 2021-01-07 15:58:40 Checking permissions of /root/scans/lynis/include/tests_squid 2021-01-07 15:58:40 File permissions are OK 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Action: Performing tests from category: Squid Support 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID SQD-3602 (Check for running Squid daemon) 2021-01-07 15:58:40 Test: Searching for a Squid daemon 2021-01-07 15:58:40 Result: No running Squid daemon found 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3604 (Check Squid daemon file location) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3606 (Check Squid version) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3610 (Gather Squid settings) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3613 (Check Squid file permissions) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3614 (Check Squid authentication methods) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3616 (Check external Squid authentication) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3620 (Check Squid access control lists) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3624 (Check Squid safe ports) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3630 (Check Squid reply_body_max_size option) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test SQD-3680 (Check Squid version suppression) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 Security check: file is normal 2021-01-07 15:58:40 Checking permissions of /root/scans/lynis/include/tests_logging 2021-01-07 15:58:40 File permissions are OK 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Action: Performing tests from category: Logging and files 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2130 (Check for running syslog daemon) 2021-01-07 15:58:40 Test: Searching for a logging daemon 2021-01-07 15:58:40 Result: Found a logging daemon 2021-01-07 15:58:40 Hardening: assigned maximum number of hardening points for this item (3). Currently having 167 points (out of 236) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2132 (Check for running syslog-ng daemon) 2021-01-07 15:58:40 Test: Searching for syslog-ng daemon in process list 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'syslog-ng' not found 2021-01-07 15:58:40 Result: Syslog-ng NOT found in process list 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test LOGG-2134 (Checking Syslog-NG configuration file consistency) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2136 (Check for running systemd journal daemon) 2021-01-07 15:58:40 Test: Searching for systemd journal daemon in process list 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'systemd-journal' not found 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2210 (Check for running metalog daemon) 2021-01-07 15:58:40 Test: Searching for metalog daemon in process list 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'metalog' not found 2021-01-07 15:58:40 Result: metalog NOT found in process list 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2230 (Check for running RSyslog daemon) 2021-01-07 15:58:40 Test: Searching for RSyslog daemon in process list 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'rsyslogd' found (497 ) 2021-01-07 15:58:40 Result: Found rsyslogd in process list 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2240 (Check for running RFC 3195 compliant daemon) 2021-01-07 15:58:40 Test: Searching for RFC 3195 daemon (alias syslog reliable) in process list 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'rfc3195d' not found 2021-01-07 15:58:40 Result: rfc3195d NOT found in process list 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2138 (Checking kernel logger daemon on Linux) 2021-01-07 15:58:40 Test: Searching kernel logger daemon (klogd) 2021-01-07 15:58:40 Result: test skipped, because other facility is being used to log kernel messages 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2142 (Checking minilog daemon) 2021-01-07 15:58:40 Result: Checking for unkilled minilogd instances 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'minilogd' not found 2021-01-07 15:58:40 Result: No minilogd is running 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2146 (Checking logrotate.conf and logrotate.d) 2021-01-07 15:58:40 Test: Checking for /etc/logrotate.conf 2021-01-07 15:58:40 Result: /etc/logrotate.conf found (file) 2021-01-07 15:58:40 Test: Checking for /etc/logrotate.d (directory) 2021-01-07 15:58:40 Result: /etc/logrotate.d found 2021-01-07 15:58:40 Result: logrotate configuration found 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2148 (Checking logrotated files) 2021-01-07 15:58:40 Test: Checking which files are rotated with logrotate and if they exist 2021-01-07 15:58:40 Result: found one or more files which are rotated via logrotate 2021-01-07 15:58:40 Output: File:/var/log/apport.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/aptitude:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/cron.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/daemon.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/debug:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/lpr.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/mail.info:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/mail.warn:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/messages:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/ppp-connect-errors:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/ufw.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/unattended-upgrades/unattended-upgrades.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/user.log:does_not_exist 2021-01-07 15:58:40 Output: File:/var/log/alternatives.log:exists 2021-01-07 15:58:40 Output: File:/var/log/apport.log:exists 2021-01-07 15:58:40 Output: File:/var/log/apt/history.log:exists 2021-01-07 15:58:40 Output: File:/var/log/apt/term.log:exists 2021-01-07 15:58:40 Output: File:/var/log/aptitude:exists 2021-01-07 15:58:40 Output: File:/var/log/auth.log:exists 2021-01-07 15:58:40 Output: File:/var/log/btmp:exists 2021-01-07 15:58:40 Output: File:/var/log/cron.log:exists 2021-01-07 15:58:40 Output: File:/var/log/daemon.log:exists 2021-01-07 15:58:40 Output: File:/var/log/debug:exists 2021-01-07 15:58:40 Output: File:/var/log/dpkg.log:exists 2021-01-07 15:58:40 Output: File:/var/log/fail2ban.log:exists 2021-01-07 15:58:40 Output: File:/var/log/kern.log:exists 2021-01-07 15:58:40 Output: File:/var/log/lpr.log:exists 2021-01-07 15:58:40 Output: File:/var/log/mail.err:exists 2021-01-07 15:58:40 Output: File:/var/log/mail.info:exists 2021-01-07 15:58:40 Output: File:/var/log/mail.log:exists 2021-01-07 15:58:40 Output: File:/var/log/mail.warn:exists 2021-01-07 15:58:40 Output: File:/var/log/messages:exists 2021-01-07 15:58:40 Output: File:/var/log/ppp-connect-errors:exists 2021-01-07 15:58:40 Output: File:/var/log/syslog:exists 2021-01-07 15:58:40 Output: File:/var/log/ubuntu-advantage.log:exists 2021-01-07 15:58:40 Output: File:/var/log/ufw.log:exists 2021-01-07 15:58:40 Output: File:/var/log/unattended-upgrades/unattended-upgrades-shutdown.log:exists 2021-01-07 15:58:40 Output: File:/var/log/unattended-upgrades/unattended-upgrades.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/console-setup.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/container-detect.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/kmod.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/mountall.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/network-interface-eth0.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/networking.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/procps-static-network-up.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/procps-virtual-filesystems.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/rsyslog.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/systemd-logind.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/ureadahead.log:exists 2021-01-07 15:58:40 Output: File:/var/log/upstart/vmware-tools.log:exists 2021-01-07 15:58:40 Output: File:/var/log/user.log:exists 2021-01-07 15:58:40 Output: File:/var/log/wtmp:exists 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2150 (Checking directories in logrotate configuration) 2021-01-07 15:58:40 Test: Checking which directories can be found in logrotate configuration 2021-01-07 15:58:40 Result: found one or more directories (via logrotate configuration) 2021-01-07 15:58:40 Directory found: /var/log 2021-01-07 15:58:40 Directory found: /var/log/apt 2021-01-07 15:58:40 Directory found: /var/log/unattended-upgrades 2021-01-07 15:58:40 Directory found: /var/log/upstart 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test LOGG-2152 (Checking loghost) 2021-01-07 15:58:40 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test LOGG-2153 (Checking loghost is localhost) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2154 (Checking syslog configuration file) 2021-01-07 15:58:40 Test: analyzing file /etc/rsyslog.conf for remote target 2021-01-07 15:58:40 Result: no remote target found 2021-01-07 15:58:40 Test: analyzing file /etc/rsyslog.d/20-ufw.conf for remote target 2021-01-07 15:58:40 Result: no remote target found 2021-01-07 15:58:40 Test: analyzing file /etc/rsyslog.d/50-default.conf for remote target 2021-01-07 15:58:40 Result: no remote target found 2021-01-07 15:58:40 Result: no remote logging found 2021-01-07 15:58:40 Suggestion: Enable logging to an external logging host for archiving purposes and additional protection [test:LOGG-2154] [details:-] [solution:-] 2021-01-07 15:58:40 Hardening: assigned partial number of hardening points (1 of 3). Currently having 168 points (out of 239) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test LOGG-2160 (Checking /etc/newsyslog.conf) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test LOGG-2162 (Checking directories in /etc/newsyslog.conf) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test LOGG-2164 (Checking files specified /etc/newsyslog.conf) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2170 (Checking log paths) 2021-01-07 15:58:40 Test: Searching log paths 2021-01-07 15:58:40 Result: directory /var/log exists 2021-01-07 15:58:40 Result: directory /var/adm can't be found 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2180 (Checking open log files) 2021-01-07 15:58:40 Test: checking open log files with lsof 2021-01-07 15:58:40 Found logfile: /root/scans/outputs/lynis-console-3.log 2021-01-07 15:58:40 Found logfile: /var/log/auth.log 2021-01-07 15:58:40 Found logfile: /var/log/fail2ban.log 2021-01-07 15:58:40 Found logfile: /var/log/kern.log 2021-01-07 15:58:40 Found logfile: /var/log/mail.log 2021-01-07 15:58:40 Found logfile: /var/log/syslog 2021-01-07 15:58:40 Found logfile: /var/log/upstart/systemd-logind.log 2021-01-07 15:58:40 Found logfile: /var/log/vmware-vmsvc.log 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2190 (Checking for deleted files in use) 2021-01-07 15:58:40 Test: checking deleted files that are still in use 2021-01-07 15:58:40 Result: found one or more files which are deleted, but still in use 2021-01-07 15:58:40 Found deleted file: /lib/systemd/systemd-logind(systemd-l) 2021-01-07 15:58:40 Suggestion: Check what deleted files are still in use and why. [test:LOGG-2190] [details:-] [solution:-] 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID LOGG-2192 (Checking for open log files that are empty) 2021-01-07 15:58:40 Result: all opened log files are bigger than zero bytes in size 2021-01-07 15:58:40 Security check: file is normal 2021-01-07 15:58:40 Checking permissions of /root/scans/lynis/include/tests_insecure_services 2021-01-07 15:58:40 File permissions are OK 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Action: Performing tests from category: Insecure services 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8000 (Installed inetd package) 2021-01-07 15:58:40 Test: Checking if inetd is installed 2021-01-07 15:58:40 Result: inetd is NOT installed 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8002 (Check for enabled inet daemon) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8004 (Presence of inetd configuration file) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8006 (Check configuration of inetd when disabled) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8016 (Check for telnet via inetd) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8100 (Check for installed xinetd daemon) 2021-01-07 15:58:40 Test: Checking for installed xinetd daemon 2021-01-07 15:58:40 Result: xinetd is NOT installed 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8102 (Check for active xinet daemon) 2021-01-07 15:58:40 Test: Searching for active extended internet services daemon (xinetd) 2021-01-07 15:58:40 Performing pgrep scan without uid 2021-01-07 15:58:40 IsRunning: process 'xinetd' not found 2021-01-07 15:58:40 Result: xinetd is NOT running 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8104 (Check for enabled xinet daemon) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8106 (Check configuration of xinetd when disabled) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8116 (Insecure services enabled via xinetd) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Skipped test INSE-8200 (Check if tcp_wrappers is installed when inetd/xinetd is active) 2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8300 (Check if rsh client is installed) 2021-01-07 15:58:40 Test: Checking if rsh client is installed 2021-01-07 15:58:40 Result: rsh client is NOT installed 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8304 (Check if rsh server is installed) 2021-01-07 15:58:40 Test: Checking if rsh server is installed 2021-01-07 15:58:40 Result: rsh server is NOT installed 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8310 (Check if telnet client is installed) 2021-01-07 15:58:40 Test: Checking if telnet client is installed 2021-01-07 15:58:40 Result: telnet client is NOT installed 2021-01-07 15:58:40 ==== 2021-01-07 15:58:40 Performing test ID INSE-8322 (Check if telnet server is installed) 2021-01-07 15:58:40 Test: Checking if telnet server is installed 2021-01-07 15:58:41 Result: telnet server is NOT installed 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID INSE-8314 (Check if NIS client is installed) 2021-01-07 15:58:41 Test: Checking if NIS client is installed 2021-01-07 15:58:41 Result: NIS client is NOT installed 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID INSE-8316 (Check if NIS server is installed) 2021-01-07 15:58:41 Test: Checking if NIS server is installed 2021-01-07 15:58:41 Result: NIS server is NOT installed 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID INSE-8318 (Check if TFTP client is installed) 2021-01-07 15:58:41 Test: Checking if TFTP client is installed 2021-01-07 15:58:41 Result: TFTP client is NOT installed 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID INSE-8320 (Check if TFTP server is installed) 2021-01-07 15:58:41 Test: Checking if TFTP server is installed 2021-01-07 15:58:41 Result: TFTP server is NOT installed 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test INSE-8050 (Check for insecure services on macOS) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (macOS only) 2021-01-07 15:58:41 Security check: file is normal 2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_banners 2021-01-07 15:58:41 File permissions are OK 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Action: Performing tests from category: Banners and identification 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test BANN-7113 (Check COPYRIGHT banner file) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID BANN-7124 (Check issue banner file) 2021-01-07 15:58:41 Test: Checking file /etc/issue 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID BANN-7126 (Check issue banner file contents) 2021-01-07 15:58:41 Test: Checking file /etc/issue contents for legal key words 2021-01-07 15:58:41 Result: Found only 0 key words (5 or more suggested), to warn unauthorized users and could be increased 2021-01-07 15:58:41 Suggestion: Add a legal banner to /etc/issue, to warn unauthorized users [test:BANN-7126] [details:-] [solution:-] 2021-01-07 15:58:41 Hardening: assigned partial number of hardening points (0 of 1). Currently having 168 points (out of 240) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID BANN-7128 (Check issue.net banner file) 2021-01-07 15:58:41 Test: Checking file /etc/issue.net 2021-01-07 15:58:41 Result: file /etc/issue.net exists 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID BANN-7130 (Check issue.net banner file contents) 2021-01-07 15:58:41 Test: Checking file /etc/issue.net contents for legal key words 2021-01-07 15:58:41 Result: Found only 0 key words, to warn unauthorized users and could be increased 2021-01-07 15:58:41 Suggestion: Add legal banner to /etc/issue.net, to warn unauthorized users [test:BANN-7130] [details:-] [solution:-] 2021-01-07 15:58:41 Hardening: assigned partial number of hardening points (0 of 1). Currently having 168 points (out of 241) 2021-01-07 15:58:41 Security check: file is normal 2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_scheduling 2021-01-07 15:58:41 File permissions are OK 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Action: Performing tests from category: Scheduled tasks 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID SCHD-7702 (Check status of cron daemon) 2021-01-07 15:58:41 Result: cron daemon running 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID SCHD-7704 (Check crontab/cronjobs) 2021-01-07 15:58:41 Found cronjob (/etc/crontab): 17,*,*,*,*,root,cd,/,&&,run-parts,--report,/etc/cron.hourly 2021-01-07 15:58:41 Found cronjob (/etc/crontab): 25,6,*,*,*,root,test,-x,/usr/sbin/anacron,||,(,cd,/,&&,run-parts,--report,/etc/cron.daily,) 2021-01-07 15:58:41 Found cronjob (/etc/crontab): 47,6,*,*,7,root,test,-x,/usr/sbin/anacron,||,(,cd,/,&&,run-parts,--report,/etc/cron.weekly,) 2021-01-07 15:58:41 Found cronjob (/etc/crontab): 52,6,1,*,*,root,test,-x,/usr/sbin/anacron,||,(,cd,/,&&,run-parts,--report,/etc/cron.monthly,) 2021-01-07 15:58:41 Test: checking directory /etc/cron.d 2021-01-07 15:58:41 Test: check if we can access /etc/cron.d (escaped: /etc/cron.d) 2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:41 Result: file /etc/cron.d is readable (or directory accessible). 2021-01-07 15:58:41 Result: found directory /etc/cron.d 2021-01-07 15:58:41 Test: searching files in /etc/cron.d 2021-01-07 15:58:41 Result: found one or more files in /etc/cron.d. Analyzing files.. 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.d/tiger): 0,*,*,*,*,root,test,-x,/usr/sbin/tigercron,&&,{,[,-r,"$DEFAULT",],&&,.,"$DEFAULT",;,nice,-n$NICETIGER,/usr/sbin/tigercron,-q,;,} 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.d/sendmail): */20,*,*,*,*,smmsp,test,-x,/etc/init.d/sendmail,&&,/usr/share/sendmail/sendmail,cron-msp 2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.d 2021-01-07 15:58:41 Test: checking directory /etc/cron.hourly 2021-01-07 15:58:41 Result: found directory /etc/cron.hourly 2021-01-07 15:58:41 Test: check if we can access /etc/cron.hourly (escaped: /etc/cron.hourly) 2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:41 Result: file /etc/cron.hourly is readable (or directory accessible). 2021-01-07 15:58:41 Test: searching files in /etc/cron.hourly 2021-01-07 15:58:41 Result: no files found in /etc/cron.hourly 2021-01-07 15:58:41 Test: checking directory /etc/cron.daily 2021-01-07 15:58:41 Result: found directory /etc/cron.daily 2021-01-07 15:58:41 Test: check if we can access /etc/cron.daily (escaped: /etc/cron.daily) 2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:41 Result: file /etc/cron.daily is readable (or directory accessible). 2021-01-07 15:58:41 Test: searching files in /etc/cron.daily 2021-01-07 15:58:41 Result: found one or more files in /etc/cron.daily. Analyzing files.. 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/passwd 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/apt 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/aptitude 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/cracklib-runtime 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/acct 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/logrotate 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/upstart 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/update-notifier-common 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/sendmail 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/man-db 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/apport 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/dpkg 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/chkrootkit 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/tripwire 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/bsdmainutils 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/mlocate 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/popularity-contest 2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.daily 2021-01-07 15:58:41 Test: checking directory /etc/cron.weekly 2021-01-07 15:58:41 Result: found directory /etc/cron.weekly 2021-01-07 15:58:41 Test: check if we can access /etc/cron.weekly (escaped: /etc/cron.weekly) 2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:41 Result: file /etc/cron.weekly is readable (or directory accessible). 2021-01-07 15:58:41 Test: searching files in /etc/cron.weekly 2021-01-07 15:58:41 Result: found one or more files in /etc/cron.weekly. Analyzing files.. 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/apt-xapian-index 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/update-notifier-common 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/man-db 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/fstrim 2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.weekly 2021-01-07 15:58:41 Test: checking directory /etc/cron.monthly 2021-01-07 15:58:41 Result: found directory /etc/cron.monthly 2021-01-07 15:58:41 Test: check if we can access /etc/cron.monthly (escaped: /etc/cron.monthly) 2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:41 Result: file /etc/cron.monthly is readable (or directory accessible). 2021-01-07 15:58:41 Test: searching files in /etc/cron.monthly 2021-01-07 15:58:41 Result: found one or more files in /etc/cron.monthly. Analyzing files.. 2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.monthly): /etc/cron.monthly/acct 2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.monthly 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID SCHD-7718 (Check at users) 2021-01-07 15:58:41 Test: Checking atd status 2021-01-07 15:58:41 Result: at daemon not active 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test SCHD-7720 (Check at users) 2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test SCHD-7724 (Check at jobs) 2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:41 Result: no scheduled Lynis execution found (e.g. crontab, cronjob) 2021-01-07 15:58:41 Security check: file is normal 2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_accounting 2021-01-07 15:58:41 File permissions are OK 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Action: Performing tests from category: Accounting 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-2754 (Check for available FreeBSD accounting information) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (FreeBSD only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-2760 (Check for available OpenBSD accounting information) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (OpenBSD only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID ACCT-9622 (Check for available Linux accounting information) 2021-01-07 15:58:41 Test: Check accounting information 2021-01-07 15:58:41 Result: /var/log/account/pacct available 2021-01-07 15:58:41 Hardening: assigned maximum number of hardening points for this item (3). Currently having 171 points (out of 244) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID ACCT-9626 (Check for sysstat accounting data) 2021-01-07 15:58:41 Test: check /etc/default/sysstat presence 2021-01-07 15:58:41 Result: sysstat not found via /etc/default/sysstat or /etc/cron.d/sysstat or as a systemd unit 2021-01-07 15:58:41 Suggestion: Enable sysstat to collect accounting (no results) [test:ACCT-9626] [details:-] [solution:-] 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID ACCT-9628 (Check for auditd) 2021-01-07 15:58:41 Test: Check auditd status 2021-01-07 15:58:41 Performing pgrep scan without uid 2021-01-07 15:58:41 IsRunning: process 'auditd' not found 2021-01-07 15:58:41 Result: auditd not active 2021-01-07 15:58:41 Suggestion: Enable auditd to collect audit information [test:ACCT-9628] [details:-] [solution:-] 2021-01-07 15:58:41 Hardening: assigned partial number of hardening points (0 of 1). Currently having 171 points (out of 245) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9630 (Check for auditd rules) 2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9632 (Check for auditd configuration file) 2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9634 (Check for auditd log file) 2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID ACCT-9636 (Check for Snoopy wrapper and logger) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9650 (Check Solaris audit daemon) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9652 (Check auditd SMF status) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9654 (Check BSM auditing in /etc/system) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9656 (Check BSM auditing in module list) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9660 (Check location of audit events) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Skipped test ACCT-9662 (Check Solaris auditing stats) 2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:41 Security check: file is normal 2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_time 2021-01-07 15:58:41 File permissions are OK 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Action: Performing tests from category: Time and Synchronization 2021-01-07 15:58:41 ==== 2021-01-07 15:58:41 Performing test ID TIME-3104 (Check for running NTP daemon or client) 2021-01-07 15:58:41 Test: Searching for a running NTP daemon or available client 2021-01-07 15:58:41 Result: no chrony configuration found 2021-01-07 15:58:41 Performing pgrep scan without uid 2021-01-07 15:58:41 IsRunning: process 'dntpd' not found 2021-01-07 15:58:41 Performing pgrep scan without uid 2021-01-07 15:58:41 IsRunning: process 'timed' not found 2021-01-07 15:58:41 Result: crontab file /etc/anacrontab not found 2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in crontab file /etc/crontab 2021-01-07 15:58:41 Result: no ntpdate, rdate, sntp or ntpdig reference found in crontab file /etc/crontab 2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.d/john 2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.d/sendmail 2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.d/tiger 2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/acct 2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/apport 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/apt 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/aptitude 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/bsdmainutils 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/chkrootkit 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/cracklib-runtime 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/dpkg 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/logrotate 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/man-db 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/mlocate 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/passwd 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/popularity-contest 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/sendmail 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/tripwire 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/update-notifier-common 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/upstart 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/apt-xapian-index 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/fstrim 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/man-db 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/update-notifier-common 2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.monthly/acct 2021-01-07 15:58:42 Result: no ntpdate or rdate found in cron directories 2021-01-07 15:58:42 Test: checking for file /etc/network/if-up.d/ntpdate 2021-01-07 15:58:42 Result: found ntpdate action when network interface comes up 2021-01-07 15:58:42 Result: Found a time syncing daemon/client. 2021-01-07 15:58:42 Hardening: assigned maximum number of hardening points for this item (3). Currently having 174 points (out of 248) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3106 (Check systemd NTP time synchronization status) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3112 (Check active NTP associations ID's) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3116 (Check peers with stratum value of 16) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3120 (Check unreliable NTP peers) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3124 (Check selected time source) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3128 (Check preferred time source) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3132 (Check NTP falsetickers) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3136 (Check NTP protocol version) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Performing test ID TIME-3148 (Check TZ variable) 2021-01-07 15:58:42 Test: testing for TZ variable 2021-01-07 15:58:42 Result: found TZ variable with value notset 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3160 (Check empty NTP step-tickers) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Performing test ID TIME-3170 (Check configuration files) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3180 (Report if ntpctl cannot communicate with OpenNTPD) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3181 (Check status of OpenNTPD time synchronisation) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3182 (Check OpenNTPD has working peers) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Skipped test TIME-3185 (Check systemd-timesyncd synchronized time) 2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:42 Security check: file is normal 2021-01-07 15:58:42 Checking permissions of /root/scans/lynis/include/tests_crypto 2021-01-07 15:58:42 File permissions are OK 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Action: Performing tests from category: Cryptography 2021-01-07 15:58:42 ==== 2021-01-07 15:58:42 Performing test ID CRYP-7902 (Check expire date of SSL certificates) 2021-01-07 15:58:42 Paths to scan: /etc/apache2 /etc/dovecot /etc/httpd /etc/letsencrypt /etc/pki /etc/postfix /etc/refind.d/keys /etc/ssl /opt/psa/var/certificates /usr/local/psa/var/certificates /usr/local/share/ca-certificates /usr/share/ca-certificates /usr/share/gnupg /var/www /srv/www 2021-01-07 15:58:42 Paths to ignore: /etc/letsencrypt/archive 2021-01-07 15:58:42 Result: SSL path /etc/apache2 does not exist 2021-01-07 15:58:42 Result: SSL path /etc/dovecot does not exist 2021-01-07 15:58:42 Result: SSL path /etc/httpd does not exist 2021-01-07 15:58:42 Result: SSL path /etc/letsencrypt does not exist 2021-01-07 15:58:42 Result: SSL path /etc/pki does not exist 2021-01-07 15:58:42 Result: SSL path /etc/postfix does not exist 2021-01-07 15:58:42 Result: SSL path /etc/refind.d/keys does not exist 2021-01-07 15:58:42 Test: check if we can access /etc/ssl (escaped: /etc/ssl) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /etc/ssl is readable (or directory accessible). 2021-01-07 15:58:42 Result: found directory /etc/ssl 2021-01-07 15:58:42 Test: check if we can access /etc/ssl/certs/ca-certificates.crt (escaped: /etc/ssl/certs/ca-certificates.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /etc/ssl/certs/ca-certificates.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/etc/ssl/certs/ca-certificates.crt' does most likely not belong to a package 2021-01-07 15:58:42 Result: file is a certificate file 2021-01-07 15:58:42 Result: certificate /etc/ssl/certs/ca-certificates.crt seems to be correct and still valid 2021-01-07 15:58:42 Result: found 1 certificates in /etc/ssl 2021-01-07 15:58:42 Result: SSL path /opt/psa/var/certificates does not exist 2021-01-07 15:58:42 Result: SSL path /usr/local/psa/var/certificates does not exist 2021-01-07 15:58:42 Test: check if we can access /usr/local/share/ca-certificates (escaped: /usr/local/share/ca-certificates) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/local/share/ca-certificates is readable (or directory accessible). 2021-01-07 15:58:42 Result: found directory /usr/local/share/ca-certificates 2021-01-07 15:58:42 Result: found 0 certificates in /usr/local/share/ca-certificates 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates (escaped: /usr/share/ca-certificates) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates is readable (or directory accessible). 2021-01-07 15:58:42 Result: found directory /usr/share/ca-certificates 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt (escaped: /usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt (escaped: /usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt (escaped: /usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt' belongs to package (ca-certificates) 2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt) 2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt is readable (or directory accessible). 2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt (escaped: /usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt (escaped: /usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt (escaped: /usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt (escaped: /usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt (escaped: /usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt (escaped: /usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Certigna.crt (escaped: /usr/share/ca-certificates/mozilla/Certigna.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Certigna.crt is readable (or directory accessible). 2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Certigna.crt' belongs to package (ca-certificates) 2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt (escaped: /usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt) 2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt (escaped: /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certum_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt (escaped: /usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt (escaped: /usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt (escaped: /usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt (escaped: /usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt (escaped: /usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt (escaped: /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt (escaped: /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt (escaped: /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt (escaped: /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt) 2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/EC-ACC.crt (escaped: /usr/share/ca-certificates/mozilla/EC-ACC.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/EC-ACC.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/EC-ACC.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt is readable (or directory accessible). 2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt) 2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt (escaped: /usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt (escaped: /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt (escaped: /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt (escaped: /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt (escaped: /usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Izenpe.com.crt (escaped: /usr/share/ca-certificates/mozilla/Izenpe.com.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Izenpe.com.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Izenpe.com.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt (escaped: /usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt (escaped: /usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt is readable (or directory accessible). 2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt' belongs to package (ca-certificates) 2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt (escaped: /usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt) 2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt (escaped: /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt (escaped: /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt (escaped: /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt (escaped: /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt (escaped: /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/PSCProcert.crt (escaped: /usr/share/ca-certificates/mozilla/PSCProcert.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/PSCProcert.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/PSCProcert.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt (escaped: /usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt (escaped: /usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/SecureTrust_CA.crt (escaped: /usr/share/ca-certificates/mozilla/SecureTrust_CA.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/SecureTrust_CA.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/SecureTrust_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Secure_Global_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Secure_Global_CA.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Secure_Global_CA.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Secure_Global_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt (escaped: /usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt (escaped: /usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt is readable (or directory accessible). 2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt) 2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt (escaped: /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt (escaped: /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt (escaped: /usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt (escaped: /usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt (escaped: /usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt is readable (or directory accessible). 2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt (escaped: /usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt) 2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt (escaped: /usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt (escaped: /usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt (escaped: /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt (escaped: /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt (escaped: /usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt (escaped: /usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt is readable (or directory accessible). 2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt' belongs to package (ca-certificates) 2021-01-07 15:58:49 Result: found 148 certificates in /usr/share/ca-certificates 2021-01-07 15:58:49 Test: check if we can access /usr/share/gnupg (escaped: /usr/share/gnupg) 2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable 2021-01-07 15:58:49 Result: file /usr/share/gnupg is readable (or directory accessible). 2021-01-07 15:58:49 Result: found directory /usr/share/gnupg 2021-01-07 15:58:49 Result: found 0 certificates in /usr/share/gnupg 2021-01-07 15:58:49 Result: SSL path /var/www does not exist 2021-01-07 15:58:49 Result: SSL path /srv/www does not exist 2021-01-07 15:58:49 Result: found a total of 149 certificates 2021-01-07 15:58:49 ==== 2021-01-07 15:58:49 Performing test ID CRYP-7930 (Determine if system uses LUKS block device encryption) 2021-01-07 15:58:49 ==== 2021-01-07 15:58:49 Skipped test CRYP-7931 (Determine if system uses encrypted swap) 2021-01-07 15:58:49 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:49 ==== 2021-01-07 15:58:49 Performing test ID CRYP-8002 (Gather available kernel entropy) 2021-01-07 15:58:49 Result: found kernel entropy value of 795 2021-01-07 15:58:49 ==== 2021-01-07 15:58:49 Performing test ID CRYP-8004 (Presence of hardware random number generators) 2021-01-07 15:58:49 Test: looking for /sys/class/misc/hw_random/rng_current 2021-01-07 15:58:49 Result: no HW RNG available 2021-01-07 15:58:49 ==== 2021-01-07 15:58:49 Performing test ID CRYP-8005 (Presence of software pseudo random number generators) 2021-01-07 15:58:49 Test: looking for software pseudo random number generators 2021-01-07 15:58:49 Performing pgrep scan without uid 2021-01-07 15:58:49 IsRunning: process 'audio-entropyd' not found 2021-01-07 15:58:49 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'haveged' not found 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'jitterentropy-rngd' not found 2021-01-07 15:58:50 Security check: file is normal 2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_virtualization 2021-01-07 15:58:50 File permissions are OK 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Action: Performing tests from category: Virtualization 2021-01-07 15:58:50 Security check: file is normal 2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_containers 2021-01-07 15:58:50 File permissions are OK 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Action: Performing tests from category: Containers 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test CONT-8004 (Query running Solaris zones) 2021-01-07 15:58:50 Reason to skip: Incorrect guest OS (Solaris only) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID CONT-8102 (Checking Docker status and information) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'dockerd' not found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test CONT-8104 (Checking Docker info for any warnings) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test CONT-8106 (Gather basic stats from Docker) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test CONT-8107 (Check number of Docker containers) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test CONT-8108 (Check file permissions for Docker files) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 Security check: file is normal 2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_mac_frameworks 2021-01-07 15:58:50 File permissions are OK 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Action: Performing tests from category: Security frameworks 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MACF-6204 (Check AppArmor presence) 2021-01-07 15:58:50 Result: aa-status binary found, AppArmor is installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MACF-6208 (Check if AppArmor is enabled) 2021-01-07 15:58:50 Result: file /sys/kernel/security/apparmor/profiles is available and readable 2021-01-07 15:58:50 Result: AppArmor is enabled and a policy is loaded 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (3). Currently having 177 points (out of 251) 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1:init 2021-01-07 15:58:50 Result: Unconfined process: unconfined:2:kthreadd 2021-01-07 15:58:50 Result: Unconfined process: unconfined:489:dbus-daemon 2021-01-07 15:58:50 Result: Unconfined process: unconfined:497:rsyslogd 2021-01-07 15:58:50 Result: Unconfined process: unconfined:508:systemd-logind 2021-01-07 15:58:50 Result: Unconfined process: unconfined:880:getty 2021-01-07 15:58:50 Result: Unconfined process: unconfined:884:getty 2021-01-07 15:58:50 Result: Unconfined process: unconfined:889:getty 2021-01-07 15:58:50 Result: Unconfined process: unconfined:890:getty 2021-01-07 15:58:50 Result: Unconfined process: unconfined:892:getty 2021-01-07 15:58:50 Result: Unconfined process: unconfined:954:cron 2021-01-07 15:58:50 Result: Unconfined process: unconfined:970:irqbalance 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1016:acpid 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1033:login 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1154:vmware-vmblock- 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1175:vmtoolsd 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1209:VGAuthService 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1341:sshd 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1464:bash 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1478:sudo 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1479:su 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1480:bash 2021-01-07 15:58:50 Result: Unconfined process: unconfined:1512:vmhgfs-fuse 2021-01-07 15:58:50 Result: Unconfined process: unconfined:11409:sendmail-mta 2021-01-07 15:58:50 Result: Unconfined process: unconfined:11898:fail2ban-server 2021-01-07 15:58:50 Result: Unconfined process: unconfined:25150:portsentry 2021-01-07 15:58:50 Result: Unconfined process: unconfined:25154:portsentry 2021-01-07 15:58:50 Result: Unconfined process: unconfined:33644:scanner.js 2021-01-07 15:58:50 Result: Unconfined process: unconfined:33646:lynis 2021-01-07 15:58:50 Result: Unconfined process: unconfined:33647:tee 2021-01-07 15:58:50 Result: Unconfined process: unconfined:63059:lynis 2021-01-07 15:58:50 Result: Unconfined process: unconfined:63060:ps 2021-01-07 15:58:50 Result: Unconfined process: unconfined:63061:grep 2021-01-07 15:58:50 Result: Unconfined process: unconfined:63062:tr 2021-01-07 15:58:50 Result: Unconfined process: unconfined:63723:upstart-file-br 2021-01-07 15:58:50 Result: Unconfined process: unconfined:63726:upstart-socket- 2021-01-07 15:58:50 Result: Unconfined process: unconfined:65709:upstart-udev-br 2021-01-07 15:58:50 Result: Unconfined process: unconfined:65712:systemd-udevd 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MACF-6232 (Check SELINUX presence) 2021-01-07 15:58:50 Test: checking if we have sestatus binary 2021-01-07 15:58:50 Result: sestatus binary NOT found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test MACF-6234 (Check SELINUX status) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MACF-6240 (Check TOMOYO Linux presence) 2021-01-07 15:58:50 Test: checking if we have tomoyo-init binary 2021-01-07 15:58:50 Result: tomoyo-init binary not found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test MACF-6242 (Check TOMOYO Linux status) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID RBAC-6272 (Check grsecurity presence) 2021-01-07 15:58:50 Result: no grsecurity found in kernel config 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MACF-6290 (Check for implemented MAC framework) 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (3). Currently having 180 points (out of 254) 2021-01-07 15:58:50 Result: found implemented MAC framework 2021-01-07 15:58:50 Security check: file is normal 2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_file_integrity 2021-01-07 15:58:50 File permissions are OK 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Action: Performing tests from category: Software: file integrity 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4310 (AFICK availability) 2021-01-07 15:58:50 Test: Checking AFICK binary 2021-01-07 15:58:50 Result: AFICK is not installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4314 (AIDE availability) 2021-01-07 15:58:50 Test: Checking AIDE binary 2021-01-07 15:58:50 Result: AIDE is not installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4315 (Check AIDE configuration file) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4316 (Presence of AIDE database and size check) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4318 (Osiris availability) 2021-01-07 15:58:50 Test: Checking Osiris binary 2021-01-07 15:58:50 Result: Osiris is not installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4322 (Samhain availability) 2021-01-07 15:58:50 Test: Checking Samhain binary 2021-01-07 15:58:50 Result: Samhain is not installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4326 (Tripwire availability) 2021-01-07 15:58:50 Test: Checking Tripwire binary 2021-01-07 15:58:50 Result: Tripwire is installed (/usr/sbin/tripwire) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4328 (OSSEC syscheck daemon running) 2021-01-07 15:58:50 Test: Checking if OSSEC syscheck daemon is running 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'ossec-syscheckd' not found 2021-01-07 15:58:50 Result: syscheck (OSSEC) is not active 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4330 (mtree availability) 2021-01-07 15:58:50 Test: Checking mtree binary 2021-01-07 15:58:50 Result: mtree is not installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4334 (Check lfd daemon status) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4336 (Check lfd configuration status) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4338 (osqueryd syscheck daemon running) 2021-01-07 15:58:50 Test: Checking if osqueryd syscheck daemon is running 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'osqueryd' not found 2021-01-07 15:58:50 Result: syscheck (osquery) not installed 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4339 (Check IMA/EVM status) 2021-01-07 15:58:50 Reason to skip: No evmctl binary found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4340 (Check dm-integrity status) 2021-01-07 15:58:50 Reason to skip: No integritysetup binary found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4341 (Check dm-verity status) 2021-01-07 15:58:50 Reason to skip: No veritysetup binary found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Skipped test FINT-4402 (AIDE configuration: Checksums (SHA256 or SHA512)) 2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID FINT-4350 (File integrity software installed) 2021-01-07 15:58:50 Test: Check if at least on file integrity tool is available/installed 2021-01-07 15:58:50 Result: found at least one file integrity tool 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (5). Currently having 185 points (out of 259) 2021-01-07 15:58:50 Security check: file is normal 2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_tooling 2021-01-07 15:58:50 File permissions are OK 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Action: Performing tests from category: Software: System tooling 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5002 (Checking for automation tools) 2021-01-07 15:58:50 Test: checking if directory /root/.ansible exists 2021-01-07 15:58:50 Result: directory /root/.ansible NOT found 2021-01-07 15:58:50 Test: checking if directory /etc/ansible exists 2021-01-07 15:58:50 Result: directory /etc/ansible NOT found 2021-01-07 15:58:50 Test: checking if directory /root/.ansible exists 2021-01-07 15:58:50 Result: directory /root/.ansible NOT found 2021-01-07 15:58:50 Test: checking if directory /tmp/.ansible exists 2021-01-07 15:58:50 Result: directory /tmp/.ansible NOT found 2021-01-07 15:58:50 Test: checking if file /var/log/ansible.log exists 2021-01-07 15:58:50 Result: file /var/log/ansible.log NOT found 2021-01-07 15:58:50 Test: checking if file ~/.ansible-retry exists 2021-01-07 15:58:50 Result: file ~/.ansible-retry NOT found 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'puppet master' not found 2021-01-07 15:58:50 Suggestion: Determine if automation tools are present for system management [test:TOOL-5002] [details:-] [solution:-] 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5102 (Check for presence of Fail2ban) 2021-01-07 15:58:50 Result: Fail2ban is installed (/usr/bin/fail2ban-server) 2021-01-07 15:58:50 Checking Fail2ban configuration file 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5104 (Enabled tests in Fail2ban) 2021-01-07 15:58:50 Result: service 'sshd' enabled 2021-01-07 15:58:50 Result: found at least one enabled jail 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (3). Currently having 188 points (out of 262) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5120 (Check for presence of Snort) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'snort' not found 2021-01-07 15:58:50 Result: Snort not present (Snort not running) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5122 (Check Snort configuration file) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5130 (Check for active Suricata daemon) 2021-01-07 15:58:50 Result: Suricata not installed (suricata not found) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5126 (Check for active OSSEC daemon) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'ossec-analysisd' not found 2021-01-07 15:58:50 Result: OSSEC analysis daemon not active 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'ossec-agentd' not found 2021-01-07 15:58:50 Result: OSSEC agent daemon not active 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID TOOL-5190 (Check presence of IDS/IPS tool) 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (2). Currently having 190 points (out of 264) 2021-01-07 15:58:50 Security check: file is normal 2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_malware 2021-01-07 15:58:50 File permissions are OK 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Action: Performing tests from category: Software: Malware 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MALW-3275 (Check for chkrootkit) 2021-01-07 15:58:50 Test: checking presence chkrootkit 2021-01-07 15:58:50 Result: Found /usr/sbin/chkrootkit 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (2). Currently having 192 points (out of 266) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MALW-3276 (Check for Rootkit Hunter) 2021-01-07 15:58:50 Test: checking presence Rootkit Hunter 2021-01-07 15:58:50 Result: Found /usr/bin/rkhunter 2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (2). Currently having 194 points (out of 268) 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MALW-3278 (Check for LMD) 2021-01-07 15:58:50 Test: checking presence LMD 2021-01-07 15:58:50 Result: LMD not found 2021-01-07 15:58:50 ==== 2021-01-07 15:58:50 Performing test ID MALW-3280 (Check if anti-virus tool is installed) 2021-01-07 15:58:50 Test: checking process com.avast.daemon 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'com.avast.daemon' not found 2021-01-07 15:58:50 Test: checking process Avira daemon 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'avqmd' not found 2021-01-07 15:58:50 Test: checking process epagd 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'bdagentd' not found 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'epagd' not found 2021-01-07 15:58:50 Test: checking process falcon-sensor (CrowdStrike) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'falcon-sensor' not found 2021-01-07 15:58:50 Test: checking process CylanceSvc 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'CylanceSvc' not found 2021-01-07 15:58:50 Test: checking process esets_daemon 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'esets_daemon' not found 2021-01-07 15:58:50 Test: checking process wdserver or klnagent (Kaspersky) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'klnagent' not found 2021-01-07 15:58:50 Test: checking process cma or cmdagent (McAfee) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'cmdagent' not found 2021-01-07 15:58:50 Test: checking process savscand 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'savscand' not found 2021-01-07 15:58:50 Test: checking process SophosScanD 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'SophosScanD' not found 2021-01-07 15:58:50 Test: checking process rtvscand 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'rtvscand' not found 2021-01-07 15:58:50 Test: checking process Symantec management client service 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'smcd' not found 2021-01-07 15:58:50 Test: checking process Symantec Endpoint Protection configuration service 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'symcfgd' not found 2021-01-07 15:58:50 Test: checking process synoavd 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:50 IsRunning: process 'synoavd' not found 2021-01-07 15:58:50 Test: checking process TmccMac to test for Trend Micro anti-virus (macOS) 2021-01-07 15:58:50 Performing pgrep scan without uid 2021-01-07 15:58:51 IsRunning: process 'TmccMac' not found 2021-01-07 15:58:51 Result: no commercial anti-virus tools found 2021-01-07 15:58:51 Hardening: assigned partial number of hardening points (0 of 3). Currently having 194 points (out of 271) 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID MALW-3282 (Check for clamscan) 2021-01-07 15:58:51 Test: checking presence clamscan 2021-01-07 15:58:51 Result: clamscan couldn't be found 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID MALW-3284 (Check for clamd) 2021-01-07 15:58:51 Test: checking running ClamAV daemon (clamd) 2021-01-07 15:58:51 Performing pgrep scan without uid 2021-01-07 15:58:51 IsRunning: process 'clamd' not found 2021-01-07 15:58:51 Result: clamd not running 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Skipped test MALW-3286 (Check for freshclam) 2021-01-07 15:58:51 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Skipped test MALW-3288 (Check for ClamXav) 2021-01-07 15:58:51 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution) 2021-01-07 15:58:51 Security check: file is normal 2021-01-07 15:58:51 Checking permissions of /root/scans/lynis/include/tests_file_permissions 2021-01-07 15:58:51 File permissions are OK 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Action: Performing tests from category: File Permissions 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID FILE-7524 (Perform file permissions check) 2021-01-07 15:58:51 Test: Checking file permissions 2021-01-07 15:58:51 Using profile /root/scans/lynis/default.prf for baseline. 2021-01-07 15:58:51 Test: checking file/directory /boot/grub/grub.cfg 2021-01-07 15:58:51 Test: checking if file /boot/grub/grub.cfg has the permissions set to 600 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (600) 2021-01-07 15:58:51 Test: checking file/directory /boot/grub2/grub.cfg 2021-01-07 15:58:51 Skipping file/directory /boot/grub2/grub.cfg as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /boot/grub2/user.cfg 2021-01-07 15:58:51 Skipping file/directory /boot/grub2/user.cfg as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /etc/at.allow 2021-01-07 15:58:51 Skipping file/directory /etc/at.allow as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /etc/at.deny 2021-01-07 15:58:51 Skipping file/directory /etc/at.deny as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.allow 2021-01-07 15:58:51 Test: checking if file /etc/cron.allow has the permissions set to 600 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (600) 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.deny 2021-01-07 15:58:51 Test: checking if file /etc/cron.deny has the permissions set to 600 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.deny are not matching expected value (644 != rw-------) 2021-01-07 15:58:51 Test: checking file/directory /etc/crontab 2021-01-07 15:58:51 Test: checking if file /etc/crontab has the permissions set to 600 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/crontab are not matching expected value (644 != rw-------) 2021-01-07 15:58:51 Test: checking file/directory /etc/group 2021-01-07 15:58:51 Test: checking if file /etc/group has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (644) 2021-01-07 15:58:51 Test: checking file/directory /etc/group- 2021-01-07 15:58:51 Test: checking if file /etc/group- has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (600) 2021-01-07 15:58:51 Test: checking file/directory /etc/hosts.allow 2021-01-07 15:58:51 Test: checking if file /etc/hosts.allow has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (644) 2021-01-07 15:58:51 Test: checking file/directory /etc/hosts.deny 2021-01-07 15:58:51 Test: checking if file /etc/hosts.deny has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (644) 2021-01-07 15:58:51 Test: checking file/directory /etc/issue 2021-01-07 15:58:51 Test: checking if file /etc/issue has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (644) 2021-01-07 15:58:51 Test: checking file/directory /etc/issue.net 2021-01-07 15:58:51 Test: checking if file /etc/issue.net has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (644) 2021-01-07 15:58:51 Test: checking file/directory /etc/lilo.conf 2021-01-07 15:58:51 Skipping file/directory /etc/lilo.conf as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /etc/motd 2021-01-07 15:58:51 Skipping file/directory /etc/motd as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /etc/passwd 2021-01-07 15:58:51 Test: checking if file /etc/passwd has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (644) 2021-01-07 15:58:51 Test: checking file/directory /etc/passwd- 2021-01-07 15:58:51 Test: checking if file /etc/passwd- has the permissions set to 644 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (600) 2021-01-07 15:58:51 Test: checking file/directory /etc/ssh/sshd_config 2021-01-07 15:58:51 Test: checking if file /etc/ssh/sshd_config has the permissions set to 600 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/ssh/sshd_config are not matching expected value (644 != rw-------) 2021-01-07 15:58:51 Test: checking file/directory /etc/hosts.equiv 2021-01-07 15:58:51 Skipping file/directory /etc/hosts.equiv as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /etc/shosts.equiv 2021-01-07 15:58:51 Skipping file/directory /etc/shosts.equiv as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /root/.rhosts 2021-01-07 15:58:51 Skipping file/directory /root/.rhosts as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /root/.rlogin 2021-01-07 15:58:51 Skipping file/directory /root/.rlogin as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /root/.shosts 2021-01-07 15:58:51 Skipping file/directory /root/.shosts as it does not exist on this system 2021-01-07 15:58:51 Test: checking file/directory /root/.ssh 2021-01-07 15:58:51 Test: checking if file /root/.ssh has the permissions set to 700 or more restrictive 2021-01-07 15:58:51 Outcome: correct permissions (700) 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.d 2021-01-07 15:58:51 Test: checking if file /etc/cron.d has the permissions set to 700 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.d are not matching expected value (755 != rwx------) 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.daily 2021-01-07 15:58:51 Test: checking if file /etc/cron.daily has the permissions set to 700 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.daily are not matching expected value (755 != rwx------) 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.hourly 2021-01-07 15:58:51 Test: checking if file /etc/cron.hourly has the permissions set to 700 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.hourly are not matching expected value (755 != rwx------) 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.weekly 2021-01-07 15:58:51 Test: checking if file /etc/cron.weekly has the permissions set to 700 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.weekly are not matching expected value (755 != rwx------) 2021-01-07 15:58:51 Test: checking file/directory /etc/cron.monthly 2021-01-07 15:58:51 Test: checking if file /etc/cron.monthly has the permissions set to 700 or more restrictive 2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.monthly are not matching expected value (755 != rwx------) 2021-01-07 15:58:51 Suggestion: Consider restricting file permissions [test:FILE-7524] [details:See screen output or log file] [solution:text:Use chmod to change file permissions] 2021-01-07 15:58:51 Security check: file is normal 2021-01-07 15:58:51 Checking permissions of /root/scans/lynis/include/tests_homedirs 2021-01-07 15:58:51 File permissions are OK 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Action: Performing tests from category: Home directories 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID HOME-9302 (Create list with home directories) 2021-01-07 15:58:51 Test: query /etc/passwd to obtain home directories 2021-01-07 15:58:51 Result: found home directory: /bin (directory exists) 2021-01-07 15:58:51 Result: found home directory: /dev (directory exists) 2021-01-07 15:58:51 Result: found home directory: /home/ll (directory exists) 2021-01-07 15:58:51 Result: found home directory: /home/syslog (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /nonexistent (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /root (directory exists) 2021-01-07 15:58:51 Result: found home directory: /usr/games (directory exists) 2021-01-07 15:58:51 Result: found home directory: /usr/sbin (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/backups (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/cache/man (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/lib/gnats (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /var/lib/landscape (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/lib/libuuid (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/lib/sendmail (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/list (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /var/mail (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/run/dbus (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/run/ircd (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /var/run/sshd (directory exists) 2021-01-07 15:58:51 Result: found home directory: /var/spool/lpd (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /var/spool/news (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /var/spool/uucp (directory does not exist) 2021-01-07 15:58:51 Result: found home directory: /var/www (directory does not exist) 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID HOME-9304 (Check if users' home directories permissions are 750 or more restrictive) 2021-01-07 15:58:51 Test: checking directory '/var/lib/libuuid' for user 'libuuid' 2021-01-07 15:58:51 Result: permissions of home directory /var/lib/libuuid of user libuuid are not strict enough. Should be 750 or more restrictive. Change with: chmod 750 /var/lib/libuuid 2021-01-07 15:58:51 Test: checking directory '/home/ll' for user 'll' 2021-01-07 15:58:51 Result: permissions of home directory /home/ll of user ll are not strict enough. Should be 750 or more restrictive. Change with: chmod 750 /home/ll 2021-01-07 15:58:51 Suggestion: Double check the permissions of home directories as some might be not strict enough. [test:HOME-9304] [details:-] [solution:-] 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID HOME-9306 (Check if users own their home directories) 2021-01-07 15:58:51 Test: checking directory '/var/lib/libuuid' for user 'libuuid' 2021-01-07 15:58:51 Result: ownership of home directory /var/lib/libuuid for user libuuid looks to be correct 2021-01-07 15:58:51 Test: checking directory '/home/ll' for user 'll' 2021-01-07 15:58:51 Result: ownership of home directory /home/ll for user ll looks to be correct 2021-01-07 15:58:51 Result: OK, all users own their home directories 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID HOME-9310 (Checking for suspicious shell history files) 2021-01-07 15:58:51 Result: Ok, history files are type 'file'. 2021-01-07 15:58:51 Remark: History files are normally of the type 'file'. Symbolic links and other types are suspicious. 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID HOME-9350 (Collecting information from home directories) 2021-01-07 15:58:51 Result: IGNORE_HOME_DIRS empty, no paths excluded 2021-01-07 15:58:51 Security check: file is normal 2021-01-07 15:58:51 Checking permissions of /root/scans/lynis/include/tests_kernel_hardening 2021-01-07 15:58:51 File permissions are OK 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Action: Performing tests from category: Kernel Hardening 2021-01-07 15:58:51 ==== 2021-01-07 15:58:51 Performing test ID KRNL-6000 (Check sysctl key pairs in scan profile) 2021-01-07 15:58:51 Result: key dev.tty.ldisc_autoload does not exist on this machine 2021-01-07 15:58:51 Result: sysctl key fs.protected_fifos has a different value than expected in scan profile. Expected=2, Real=0 2021-01-07 15:58:51 Hardening: assigned partial number of hardening points (0 of 1). Currently having 194 points (out of 272) 2021-01-07 15:58:51 Result: sysctl key fs.protected_hardlinks contains equal expected and current value (1) 2021-01-07 15:58:51 Hardening: assigned maximum number of hardening points for this item (1). Currently having 195 points (out of 273) 2021-01-07 15:58:52 Result: sysctl key fs.protected_regular has a different value than expected in scan profile. Expected=2, Real=0 2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 195 points (out of 274) 2021-01-07 15:58:52 Result: sysctl key fs.protected_symlinks contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 196 points (out of 275) 2021-01-07 15:58:52 Result: sysctl key fs.suid_dumpable contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 197 points (out of 276) 2021-01-07 15:58:52 Result: key hw.kbd.keymap_restrict_change does not exist on this machine 2021-01-07 15:58:52 Result: key kern.sugid_coredump does not exist on this machine 2021-01-07 15:58:52 Result: key kernel.core_setuid_ok does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key kernel.core_uses_pid contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 198 points (out of 277) 2021-01-07 15:58:52 Result: sysctl key kernel.ctrl-alt-del contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 199 points (out of 278) 2021-01-07 15:58:52 Result: sysctl key kernel.dmesg_restrict contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 200 points (out of 279) 2021-01-07 15:58:52 Result: key kernel.exec-shield-randomize does not exist on this machine 2021-01-07 15:58:52 Result: key kernel.exec-shield does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key kernel.kptr_restrict contains equal expected and current value (2) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 201 points (out of 280) 2021-01-07 15:58:52 Result: key kernel.maps_protect does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key kernel.modules_disabled has a different value than expected in scan profile. Expected=1, Real=0 2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 201 points (out of 281) 2021-01-07 15:58:52 Result: sysctl key kernel.perf_event_paranoid has a different value than expected in scan profile. Expected=3, Real=1 2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 201 points (out of 282) 2021-01-07 15:58:52 Result: sysctl key kernel.randomize_va_space contains equal expected and current value (2) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 202 points (out of 283) 2021-01-07 15:58:52 Result: key kernel.suid_dumpable does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key kernel.sysrq contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 203 points (out of 284) 2021-01-07 15:58:52 Result: sysctl key kernel.unprivileged_bpf_disabled has a different value than expected in scan profile. Expected=1, Real=0 2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 203 points (out of 285) 2021-01-07 15:58:52 Result: key kernel.use-nx does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key kernel.yama.ptrace_scope contains equal expected and current value (1 2 3) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 204 points (out of 286) 2021-01-07 15:58:52 Result: sysctl key net.core.bpf_jit_harden has a different value than expected in scan profile. Expected=2, Real=0 2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 204 points (out of 287) 2021-01-07 15:58:52 Result: key net.inet.icmp.bmcastecho does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.icmp.drop_redirect does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.icmp.rediraccept does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.icmp.timestamp does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.accept_sourceroute does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.check_interface does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.forwarding does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.linklocal.in.allowbadttl does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.process_options does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.random_id does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.redirect does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip.sourceroute does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.ip6.redirect does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.tcp.always_keepalive does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.tcp.blackhole does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.tcp.drop_synfin does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.tcp.icmp_may_rst does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.tcp.nolocaltimewait does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.tcp.path_mtu_discovery does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet.udp.blackhole does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet6.icmp6.rediraccept does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet6.ip6.forwarding does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet6.ip6.fw.enable does not exist on this machine 2021-01-07 15:58:52 Result: key net.inet6.ip6.redirect does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.accept_redirects contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 205 points (out of 288) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.accept_source_route contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 206 points (out of 289) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.bootp_relay contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 207 points (out of 290) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.forwarding contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 208 points (out of 291) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.log_martians contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 209 points (out of 292) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.mc_forwarding contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 210 points (out of 293) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.proxy_arp contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 211 points (out of 294) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.rp_filter contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 212 points (out of 295) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.send_redirects contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 213 points (out of 296) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.default.accept_redirects contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 214 points (out of 297) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.default.accept_source_route contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 215 points (out of 298) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.default.log_martians contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 216 points (out of 299) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.icmp_echo_ignore_broadcasts contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 217 points (out of 300) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.icmp_ignore_bogus_error_responses contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 218 points (out of 301) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.tcp_syncookies contains equal expected and current value (1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 219 points (out of 302) 2021-01-07 15:58:52 Result: sysctl key net.ipv4.tcp_timestamps contains equal expected and current value (0 1) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 220 points (out of 303) 2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.all.accept_redirects contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 221 points (out of 304) 2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.all.accept_source_route contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 222 points (out of 305) 2021-01-07 15:58:52 Result: key net.ipv6.conf.all.send_redirects does not exist on this machine 2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.default.accept_redirects contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 223 points (out of 306) 2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.default.accept_source_route contains equal expected and current value (0) 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 224 points (out of 307) 2021-01-07 15:58:52 Result: key security.bsd.hardlink_check_gid does not exist on this machine 2021-01-07 15:58:52 Result: key security.bsd.hardlink_check_uid does not exist on this machine 2021-01-07 15:58:52 Result: key security.bsd.see_other_gids does not exist on this machine 2021-01-07 15:58:52 Result: key security.bsd.see_other_uids does not exist on this machine 2021-01-07 15:58:52 Result: key security.bsd.stack_guard_page does not exist on this machine 2021-01-07 15:58:52 Result: key security.bsd.unprivileged_proc_debug does not exist on this machine 2021-01-07 15:58:52 Result: key security.bsd.unprivileged_read_msgbuf does not exist on this machine 2021-01-07 15:58:52 Result: found 6 keys that can use tuning, according scan profile 2021-01-07 15:58:52 Suggestion: One or more sysctl values differ from the scan profile and could be tweaked [test:KRNL-6000] [details:] [solution:Change sysctl value or disable test (skip-test=KRNL-6000:)] 2021-01-07 15:58:52 Security check: file is normal 2021-01-07 15:58:52 Checking permissions of /root/scans/lynis/include/tests_hardening 2021-01-07 15:58:52 File permissions are OK 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Action: Performing tests from category: Hardening 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Performing test ID HRDN-7220 (Check if one or more compilers are installed) 2021-01-07 15:58:52 Test: Check if one or more compilers can be found on the system 2021-01-07 15:58:52 Result: found installed compiler. See top of logfile which compilers have been found or use /bin/grep to filter on 'compiler' 2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (1 of 3). Currently having 225 points (out of 310) 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Performing test ID HRDN-7222 (Check compiler permissions) 2021-01-07 15:58:52 Test: Check if one or more compilers can be found on the system 2021-01-07 15:58:52 Test: Check file permissions for /usr/bin/as 2021-01-07 15:58:52 Action: checking symlink for file /usr/bin/as 2021-01-07 15:58:52 Result: file /usr/bin/as is not a symlink 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (3). Currently having 228 points (out of 313) 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Performing test ID HRDN-7230 (Check for malware scanner) 2021-01-07 15:58:52 Test: Check if a malware scanner is installed 2021-01-07 15:58:52 Result: found at least one malware scanner 2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (3). Currently having 231 points (out of 316) 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Performing test ID HRDN-7231 (Check for registered non-native binary formats) 2021-01-07 15:58:52 Test: Check for registered non-native binary formats 2021-01-07 15:58:52 Result: no non-native binary formats found 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Action: Performing tests from category: Custom tests 2021-01-07 15:58:52 Test: Checking for tests_custom file 2021-01-07 15:58:52 ==== 2021-01-07 15:58:52 Action: Performing plugin tests 2021-01-07 15:58:53 Result: Found 2 plugins of which 2 are enabled 2021-01-07 15:58:53 Result: Plugins phase 2 finished 2021-01-07 15:58:53 Checking permissions of /root/scans/lynis/include/report 2021-01-07 15:58:53 File permissions are OK 2021-01-07 15:58:53 Hardening index : [73] [############## ] 2021-01-07 15:58:53 Hardening strength: System has been hardened, but could use additional hardening 2021-01-07 15:58:53 ==== 2021-01-07 15:58:54 Checking permissions of /root/scans/lynis/include/tool_tips 2021-01-07 15:58:54 File permissions are OK 2021-01-07 15:58:54 Tool tips: enabled 2021-01-07 15:58:54 ================================================================================ 2021-01-07 15:58:54 Tests performed: 240 2021-01-07 15:58:54 Total tests: 455 2021-01-07 15:58:54 Active plugins: 2 2021-01-07 15:58:54 Total plugins: 2 2021-01-07 15:58:54 ================================================================================ 2021-01-07 15:58:54 Lynis 3.0.3 2021-01-07 15:58:54 2007-2021, CISOfy - https://cisofy.com/lynis/ 2021-01-07 15:58:54 Enterprise support available (compliance, plugins, interface and tools) 2021-01-07 15:58:54 Program ended successfully 2021-01-07 15:58:54 ================================================================================ 2021-01-07 15:58:54 PID file removed (/var/run/lynis.pid) 2021-01-07 15:58:54 Temporary files: /tmp/lynis.6YdHvjlCxY /tmp/lynis.MDp0DxOuKJ /tmp/lynis.poIeU4RToD /tmp/lynis.xSEx85yike 2021-01-07 15:58:54 Action: removing temporary file /tmp/lynis.6YdHvjlCxY 2021-01-07 15:58:54 Info: temporary file /tmp/lynis.MDp0DxOuKJ was already removed 2021-01-07 15:58:54 Info: temporary file /tmp/lynis.poIeU4RToD was already removed 2021-01-07 15:58:54 Action: removing temporary file /tmp/lynis.xSEx85yike 2021-01-07 15:58:54 Lynis ended successfully.