it-security-2-deep-thought/raw_scans/15_vmware_ubuntu_14.04/lynis-log-3.log

4899 lines
386 KiB
Plaintext
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

2021-01-07 15:58:16 Starting Lynis 3.0.3 with PID 33646, build date 2021-01-07
2021-01-07 15:58:16 ====
2021-01-07 15:58:16 ### 2007-2021, CISOfy - https://cisofy.com/lynis/ ###
2021-01-07 15:58:16 Checking permissions of /root/scans/lynis/include/profiles
2021-01-07 15:58:16 File permissions are OK
2021-01-07 15:58:16 Reading profile/configuration /root/scans/lynis/default.prf
2021-01-07 15:58:16 Action: created temporary file /tmp/lynis.6YdHvjlCxY
2021-01-07 15:58:16 Language set via profile to ''
2021-01-07 15:58:16 Plugin 'authentication' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'compliance' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'configuration' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'control-panels' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'crypto' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'dns' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'docker' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'file-integrity' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'file-systems' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'firewalls' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'forensics' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'hardware' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'intrusion-detection' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'intrusion-prevention' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'kernel' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'malware' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'memory' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'nginx' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'pam' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'processes' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'security-modules' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'software' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'system-integrity' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'systemd' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:16 Plugin 'users' enabled according profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:17 Set option to default value: NTPD_ROLE --> client
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 EOL check: 1
2021-01-07 15:58:17 Warning: This version 14.04 is marked end-of-life as of 2019-05-01 [test:GEN-0010] [details:-] [solution:-]
2021-01-07 15:58:17 Program version: 3.0.3
2021-01-07 15:58:17 Operating system: Linux
2021-01-07 15:58:17 Operating system name: Ubuntu
2021-01-07 15:58:17 Operating system version: 14.04
2021-01-07 15:58:17 Kernel version: 4.4.0
2021-01-07 15:58:17 Kernel version (full): 4.4.0-142-generic
2021-01-07 15:58:17 Hardware platform: x86_64
2021-01-07 15:58:17 -----------------------------------------------------
2021-01-07 15:58:17 Hostname: ubuntu1404
2021-01-07 15:58:17 Auditor: [Not Specified]
2021-01-07 15:58:17 Profiles: /root/scans/lynis/default.prf
2021-01-07 15:58:17 Work directory: /root/scans/lynis
2021-01-07 15:58:17 Include directory: /root/scans/lynis/include
2021-01-07 15:58:17 Plugin directory: ./plugins
2021-01-07 15:58:17 -----------------------------------------------------
2021-01-07 15:58:17 Log file: /var/log/lynis.log
2021-01-07 15:58:17 Report file: /var/log/lynis-report.dat
2021-01-07 15:58:17 Report version: 1.0
2021-01-07 15:58:17 -----------------------------------------------------
2021-01-07 15:58:17 Test category: all
2021-01-07 15:58:17 Test group: all
2021-01-07 15:58:17 BusyBox used: 0
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Test: Checking for program update...
2021-01-07 15:58:17 Current installed version : 303
2021-01-07 15:58:17 Latest stable version : 303
2021-01-07 15:58:17 No Lynis update available.
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Checking permissions of /root/scans/lynis/include/binaries
2021-01-07 15:58:17 File permissions are OK
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Action: Performing tests from category: System tools
2021-01-07 15:58:17 Start scanning for available audit binaries and tools...
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Performing test ID CORE-1000 (Check all system binaries)
2021-01-07 15:58:17 Status: Starting binary scan...
2021-01-07 15:58:17 Test: Checking binaries in directory /usr/local/games
2021-01-07 15:58:17 Directory /usr/local/games exists. Starting directory scanning...
2021-01-07 15:58:17 Test: Checking binaries in directory /usr/games
2021-01-07 15:58:17 Directory /usr/games exists. Starting directory scanning...
2021-01-07 15:58:17 Test: Checking binaries in directory /bin
2021-01-07 15:58:17 Directory /bin exists. Starting directory scanning...
2021-01-07 15:58:17 Found known binary: cat (generic file handling) - /bin/cat
2021-01-07 15:58:17 Found known binary: dnsdomainname (DNS domain) - /bin/dnsdomainname
2021-01-07 15:58:17 Found known binary: domainname (NIS domain) - /bin/domainname
2021-01-07 15:58:17 Found known binary: egrep (text search) - /bin/egrep
2021-01-07 15:58:17 Found known binary: grep (text search) - /bin/grep
2021-01-07 15:58:17 Found known binary: gzip (compressing utility) - /bin/gzip
2021-01-07 15:58:17 Found known binary: ip (IP configuration) - /bin/ip
2021-01-07 15:58:17 Found known binary: ls (file listing) - /bin/ls
2021-01-07 15:58:17 Found known binary: lsblk (block devices) - /bin/lsblk
2021-01-07 15:58:17 Found known binary: lsmod (kernel modules) - /bin/lsmod
2021-01-07 15:58:17 Found known binary: mount (disk utility) - /bin/mount
2021-01-07 15:58:17 Found known binary: netstat (network statistics) - /bin/netstat
2021-01-07 15:58:17 Found known binary: ps (process listing) - /bin/ps
2021-01-07 15:58:17 Found known binary: readlink (follows symlinks) - /bin/readlink
2021-01-07 15:58:17 Found known binary: sed (text stream editor) - /bin/sed
2021-01-07 15:58:17 Found known binary: ss (show sockets) - /bin/ss
2021-01-07 15:58:17 Found known binary: uname (operating system details) - /bin/uname
2021-01-07 15:58:17 Found known binary: zgrep (text search for compressed files) - /bin/zgrep
2021-01-07 15:58:17 Test: Checking binaries in directory /sbin
2021-01-07 15:58:17 Directory /sbin exists. Starting directory scanning...
2021-01-07 15:58:17 Found known binary: blkid (information about block devices) - /sbin/blkid
2021-01-07 15:58:17 Found known binary: getcap (kernel capabilities) - /sbin/getcap
2021-01-07 15:58:17 Found known binary: ipconfig (IP configuration) - /sbin/ifconfig
2021-01-07 15:58:17 Found known binary: initctl (client to upstart init) - /sbin/initctl
2021-01-07 15:58:17 Found known binary: ip (IP configuration) - /sbin/ip
2021-01-07 15:58:17 Found known binary: iptables (firewall) - /sbin/iptables
2021-01-07 15:58:17 Found known binary: iptables-save (firewall) - /sbin/iptables-save
2021-01-07 15:58:17 Found known binary: lsmod (kernel modules) - /sbin/lsmod
2021-01-07 15:58:17 Found known binary: modprobe (kernel modules) - /sbin/modprobe
2021-01-07 15:58:17 Found known binary: runlevel (system utility) - /sbin/runlevel
2021-01-07 15:58:17 Found known binary: swapon (swap device tool) - /sbin/swapon
2021-01-07 15:58:17 Found known binary: sysctl (kernel parameters) - /sbin/sysctl
2021-01-07 15:58:17 Found known binary: tune2fs (file system tool) - /sbin/tune2fs
2021-01-07 15:58:17 Test: Checking binaries in directory /usr/bin
2021-01-07 15:58:17 Directory /usr/bin exists. Starting directory scanning...
2021-01-07 15:58:17 Found known binary: apt (package manager) - /usr/bin/apt
2021-01-07 15:58:17 Found known binary: as (compiler) - /usr/bin/as
2021-01-07 15:58:17 Found known binary: awk (string tool) - /usr/bin/awk
2021-01-07 15:58:17 Found known binary: base64 (encoding tool) - /usr/bin/base64
2021-01-07 15:58:17 Found known binary: comm (file compare) - /usr/bin/comm
2021-01-07 15:58:17 Found known binary: curl (browser, download utility) - /usr/bin/curl
2021-01-07 15:58:17 Found known binary: cut (text stream editor) - /usr/bin/cut
2021-01-07 15:58:17 Found known binary: dig (network/dns tool) - /usr/bin/dig
2021-01-07 15:58:17 Found known binary: dpkg (package management) - /usr/bin/dpkg
2021-01-07 15:58:17 Found known binary: fail2ban (IPS tool) - /usr/bin/fail2ban-server
2021-01-07 15:58:17 Found known binary: file (file type detection) - /usr/bin/file
2021-01-07 15:58:17 Found known binary: find (search tool) - /usr/bin/find
2021-01-07 15:58:17 Found known binary: getent (query tool for name service switch libraries) - /usr/bin/getent
2021-01-07 15:58:17 Found known binary: head (text filter) - /usr/bin/head
2021-01-07 15:58:17 Found known binary: locate (file database) - /usr/bin/locate
2021-01-07 15:58:17 Found known binary: lsattr (file attributes) - /usr/bin/lsattr
2021-01-07 15:58:17 Found known binary: lsof (open files) - /usr/bin/lsof
2021-01-07 15:58:17 Found known binary: md5sum (hash tool) - /usr/bin/md5sum
2021-01-07 15:58:17 Found /usr/bin/openssl (version 1.0.1f)
2021-01-07 15:58:17 Found /usr/bin/perl (version 5.18.2)
2021-01-07 15:58:17 Found known binary: pgrep (search in process list) - /usr/bin/pgrep
2021-01-07 15:58:17 Found known binary: python (programming language interpreter) - /usr/bin/python (version 2.7.6)
2021-01-07 15:58:17 Found known binary: python2 (programming language interpreter) - /usr/bin/python2 (version 2.7.6)
2021-01-07 15:58:17 Found known binary: python3 (programming language interpreter) - /usr/bin/python3 (version 3.4.3)
2021-01-07 15:58:17 Found known binary: rkhunter (malware scanner) - /usr/bin/rkhunter
2021-01-07 15:58:17 Found known binary: service (system services) - /usr/bin/service
2021-01-07 15:58:17 Found known binary: sha1/sha1sum/shasum (crypto hashing) - /usr/bin/sha1sum
2021-01-07 15:58:17 Found known binary: sha256/sha256sum (crypto hashing) - /usr/bin/sha256sum
2021-01-07 15:58:17 Found known binary: sha1/sha1sum/shasum (crypto hashing) - /usr/bin/shasum
2021-01-07 15:58:17 Found known binary: sort (sort data streams) - /usr/bin/sort
2021-01-07 15:58:17 Found known binary: ssh-keyscan (scanner for SSH keys) - /usr/bin/ssh-keyscan
2021-01-07 15:58:17 Found known binary: stat (file information) - /usr/bin/stat
2021-01-07 15:58:17 Found known binary: strings (text strings search) - /usr/bin/strings
2021-01-07 15:58:17 Found known binary: tail (text filter) - /usr/bin/tail
2021-01-07 15:58:17 Found known binary: timedatectl (timedate client) - /usr/bin/timedatectl
2021-01-07 15:58:17 Found known binary: tr (text transformation) - /usr/bin/tr
2021-01-07 15:58:17 Found known binary: uniq (text manipulation utility) - /usr/bin/uniq
2021-01-07 15:58:17 Found known binary: wc (word count) - /usr/bin/wc
2021-01-07 15:58:17 Found /usr/bin/wget (version 1.15)
2021-01-07 15:58:17 Found known binary: xargs (command output redirection) - /usr/bin/xargs
2021-01-07 15:58:17 Test: Checking binaries in directory /usr/sbin
2021-01-07 15:58:17 Directory /usr/sbin exists. Starting directory scanning...
2021-01-07 15:58:17 Found known binary: aa-status (apparmor component) - /usr/sbin/aa-status
2021-01-07 15:58:17 Found known binary: chkrootkit (malware scanner) - /usr/sbin/chkrootkit
2021-01-07 15:58:17 Found known binary: dmidecode (hardware collector tool) - /usr/sbin/dmidecode
2021-01-07 15:58:17 Found known binary: grpck (consistency checker) - /usr/sbin/grpck
2021-01-07 15:58:17 Found known binary: logrotate (log rotation tool) - /usr/sbin/logrotate
2021-01-07 15:58:17 Found known binary: service (system services) - /usr/sbin/service
2021-01-07 15:58:17 Found /usr/sbin/sshd (version 6.6.1)
2021-01-07 15:58:17 Found known binary: tripwire (file integrity) - /usr/sbin/tripwire
2021-01-07 15:58:17 Found known binary: vmtoolsd (VMWare tools) - /usr/sbin/vmtoolsd
2021-01-07 15:58:17 Test: Checking binaries in directory /usr/local/bin
2021-01-07 15:58:17 Directory /usr/local/bin exists. Starting directory scanning...
2021-01-07 15:58:17 Test: Checking binaries in directory /usr/local/sbin
2021-01-07 15:58:17 Directory /usr/local/sbin exists. Starting directory scanning...
2021-01-07 15:58:17 Discovered directories: /usr/local/games,/usr/games,/bin,/sbin,/usr/bin,/usr/sbin,/usr/local/bin,/usr/local/sbin
2021-01-07 15:58:17 Result: found 1193 binaries including 23 set-uid and 23 set-gid
2021-01-07 15:58:17 Result: set-uid binaries: /bin/fusermount /bin/mount /bin/ping /bin/ping6 /bin/su /bin/umount /usr/bin/chfn /usr/bin/chsh /usr/bin/gpasswd /usr/bin/mtr /usr/bin/newgrp /usr/bin/passwd /usr/bin/pkexec /usr/bin/procmail /usr/bin/sg /usr/bin/sudo /usr/bin/sudoedit /usr/bin/traceroute6 /usr/bin/traceroute6.iputils /usr/bin/vmware-user /usr/sbin/pppd /usr/sbin/sensible-mda /usr/sbin/uuidd
2021-01-07 15:58:17 Result: set-gid binaries: /sbin/unix_chkpwd /usr/bin/bsd-write /usr/bin/chage /usr/bin/crontab /usr/bin/dotlockfile /usr/bin/expiry /usr/bin/locate /usr/bin/lockfile /usr/bin/mail-lock /usr/bin/mail-touchlock /usr/bin/mail-unlock /usr/bin/mlocate /usr/bin/procmail /usr/bin/screen /usr/bin/ssh-agent /usr/bin/wall /usr/bin/write /usr/sbin/hoststat /usr/sbin/purgestat /usr/sbin/sendmail /usr/sbin/sendmail-msp /usr/sbin/sendmail-mta /usr/sbin/uuidd
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Informational: package manager is used
2021-01-07 15:58:17 Test: Determine if this system is a virtual machine
2021-01-07 15:58:17 Result: facter utility not found
2021-01-07 15:58:17 Result: systemd-detect-virt not found
2021-01-07 15:58:17 Test: trying to guess virtualization with lscpu
2021-01-07 15:58:17 Result: found VMware
2021-01-07 15:58:17 Result: skipped dmidecode test, as we already found machine type
2021-01-07 15:58:17 Result: skipped processes test, as we already found platform
2021-01-07 15:58:17 Result: skipped Amazon EC2 test, as we already found platform
2021-01-07 15:58:17 Result: skipped sysctl test, as we already found platform
2021-01-07 15:58:17 Result: skipped lshw test, as we already found machine type
2021-01-07 15:58:17 Result: found virtual machine (type: vmware, VMware product)
2021-01-07 15:58:17 Result: Lynis is not running in container
2021-01-07 15:58:17 Result: systemd not found
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Action: Performing plugin tests
2021-01-07 15:58:17 Searching plugins...
2021-01-07 15:58:17 Found plugin file: ./plugins/plugin_pam_phase1
2021-01-07 15:58:17 Action: checking plugin status in profile: /root/scans/lynis/default.prf
2021-01-07 15:58:17 Result: plugin enabled in profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:17 Result: plugin pam is enabled
2021-01-07 15:58:17 Checking permissions of ./plugins/plugin_pam_phase1
2021-01-07 15:58:17 File permissions are OK
2021-01-07 15:58:17 Including plugin file: ./plugins/plugin_pam_phase1 (version: 1.0.5)
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Skipped test PLGN-0008 (Check PAM configuration (pwquality.conf))
2021-01-07 15:58:17 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:17 ====
2021-01-07 15:58:17 Performing test ID PLGN-0010 (Check PAM configuration)
2021-01-07 15:58:17 Result: /etc/pam.d exists
2021-01-07 15:58:17 Now checking PAM file /etc/pam.d/newusers
2021-01-07 15:58:17 Now checking PAM file /etc/pam.d/passwd
2021-01-07 15:58:17 Now checking PAM file /etc/pam.d/sshd
2021-01-07 15:58:17 Result: using module pam_nologin.so (required) without options configured
2021-01-07 15:58:17 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad
2021-01-07 15:58:17 Result: brackets used, ignoring control flags
2021-01-07 15:58:17 Result: using module pam_selinux.so (other) with options close
2021-01-07 15:58:17 Result: using module pam_loginuid.so (required) without options configured
2021-01-07 15:58:17 Result: using module pam_keyinit.so (optional) with options force revoke
2021-01-07 15:58:17 Result: using module pam_motd.so (optional) with options motd=/run/motd.dynamic noupdate
2021-01-07 15:58:18 Result: using module pam_motd.so (optional) without options configured
2021-01-07 15:58:18 Result: using module pam_mail.so (optional) with options standard noenv
2021-01-07 15:58:18 Result: using module pam_limits.so (required) without options configured
2021-01-07 15:58:18 Result: using module pam_env.so (required) without options configured
2021-01-07 15:58:18 Result: using module pam_env.so (required) with options user_readenv=1 envfile=/etc/default/locale
2021-01-07 15:58:18 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad
2021-01-07 15:58:18 Result: brackets used, ignoring control flags
2021-01-07 15:58:18 Result: using module pam_selinux.so (other) with options open
2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/common-auth
2021-01-07 15:58:18 Result: Found brackets in line, indicating multiple options for control flags: success=1 default=ignore
2021-01-07 15:58:18 Result: brackets used, ignoring control flags
2021-01-07 15:58:18 Result: using module pam_unix.so (other) with options nullok_secure
2021-01-07 15:58:18 Result: found pam_unix.so module (generic)
2021-01-07 15:58:18 Result: using module pam_deny.so (requisite) without options configured
2021-01-07 15:58:18 Result: using module pam_permit.so (required) without options configured
2021-01-07 15:58:18 Result: using module pam_cap.so (optional) without options configured
2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/polkit-1
2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 user_readenv=0
2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale user_readenv=0
2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/cron
2021-01-07 15:58:18 Result: using module pam_env.so (required) without options configured
2021-01-07 15:58:18 Result: using module pam_env.so (required) with options envfile=/etc/default/locale
2021-01-07 15:58:18 Result: using module pam_limits.so (required) without options configured
2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/other
2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/chsh
2021-01-07 15:58:18 Result: using module pam_shells.so (required) without options configured
2021-01-07 15:58:18 Result: using module pam_rootok.so (sufficient) without options configured
2021-01-07 15:58:18 Now checking PAM file /etc/pam.d/su
2021-01-07 15:58:18 Result: using module pam_rootok.so (sufficient) without options configured
2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1
2021-01-07 15:58:18 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale
2021-01-07 15:58:19 Result: using module pam_mail.so (optional) with options nopen
2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-password
2021-01-07 15:58:19 Result: using module pam_cracklib.so (requisite) with options retry=3 minlen=8 difok=3
2021-01-07 15:58:19 Result: found module pam_cracklib.so for password strength testing
2021-01-07 15:58:19 Result: Max password Retry configured
2021-01-07 15:58:19 Value is now: 3
2021-01-07 15:58:19 Returning value: 3
2021-01-07 15:58:19 Result: minlen configured
2021-01-07 15:58:19 Value is now: 8
2021-01-07 15:58:19 Returning value: 8
2021-01-07 15:58:19 Result: unknown option found: difok with value 3
2021-01-07 15:58:19 Result: Found brackets in line, indicating multiple options for control flags: success=1 default=ignore
2021-01-07 15:58:19 Result: brackets used, ignoring control flags
2021-01-07 15:58:19 Result: using module pam_unix.so (other) with options obscure use_authtok try_first_pass sha512
2021-01-07 15:58:19 Result: found pam_unix.so module (generic)
2021-01-07 15:58:19 Result: using module pam_deny.so (requisite) without options configured
2021-01-07 15:58:19 Result: using module pam_permit.so (required) without options configured
2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-session-noninteractive
2021-01-07 15:58:19 Result: Found brackets in line, indicating multiple options for control flags: default=1
2021-01-07 15:58:19 Result: brackets used, ignoring control flags
2021-01-07 15:58:19 Result: using module pam_permit.so (other) without options configured
2021-01-07 15:58:19 Result: using module pam_deny.so (requisite) without options configured
2021-01-07 15:58:19 Result: using module pam_permit.so (required) without options configured
2021-01-07 15:58:19 Result: using module pam_umask.so (optional) without options configured
2021-01-07 15:58:19 Result: using module pam_unix.so (required) without options configured
2021-01-07 15:58:19 Result: found pam_unix.so module (generic)
2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/vmtoolsd
2021-01-07 15:58:19 Result: using module pam_shells.so (required) without options configured
2021-01-07 15:58:19 Result: using module pam_unix.so (sufficient) with options shadow
2021-01-07 15:58:19 Result: found pam_unix.so module (generic)
2021-01-07 15:58:19 Result: using module pam_unix_auth.so (required) with options shadow
2021-01-07 15:58:19 Result: using module pam_shells.so (required) without options configured
2021-01-07 15:58:19 Result: using module pam_unix.so (sufficient) without options configured
2021-01-07 15:58:19 Result: found pam_unix.so module (generic)
2021-01-07 15:58:19 Result: using module pam_unix_acct.so (required) without options configured
2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/smtp
2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-session
2021-01-07 15:58:19 Result: Found brackets in line, indicating multiple options for control flags: default=1
2021-01-07 15:58:19 Result: brackets used, ignoring control flags
2021-01-07 15:58:19 Result: using module pam_permit.so (other) without options configured
2021-01-07 15:58:19 Result: using module pam_deny.so (requisite) without options configured
2021-01-07 15:58:19 Result: using module pam_permit.so (required) without options configured
2021-01-07 15:58:19 Result: using module pam_umask.so (optional) without options configured
2021-01-07 15:58:19 Result: using module pam_unix.so (required) without options configured
2021-01-07 15:58:19 Result: found pam_unix.so module (generic)
2021-01-07 15:58:19 Result: using module pam_systemd.so (optional) without options configured
2021-01-07 15:58:19 Now checking PAM file /etc/pam.d/common-account
2021-01-07 15:58:20 Result: Found brackets in line, indicating multiple options for control flags: success=1 new_authtok_reqd=done default=ignore
2021-01-07 15:58:20 Result: brackets used, ignoring control flags
2021-01-07 15:58:20 Result: using module pam_unix.so (other) without options configured
2021-01-07 15:58:20 Result: found pam_unix.so module (generic)
2021-01-07 15:58:20 Result: using module pam_deny.so (requisite) without options configured
2021-01-07 15:58:20 Result: using module pam_permit.so (required) without options configured
2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/sudo
2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 user_readenv=0
2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale user_readenv=0
2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/ppp
2021-01-07 15:58:20 Result: using module pam_nologin.so (required) without options configured
2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/chfn
2021-01-07 15:58:20 Result: using module pam_rootok.so (sufficient) without options configured
2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/accountsservice
2021-01-07 15:58:20 Unknown control flag found (substack)
2021-01-07 15:58:20 Result: using module common-password (substack) without options configured
2021-01-07 15:58:20 Result: found pluggable authentication module common-password, which is unknown
2021-01-07 15:58:20 Result: using module pam_pin.so (optional) without options configured
2021-01-07 15:58:20 Result: found pluggable authentication module pam_pin.so, which is unknown
2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/chpasswd
2021-01-07 15:58:20 Now checking PAM file /etc/pam.d/login
2021-01-07 15:58:20 Result: using module pam_faildelay.so (optional) with options delay=3000000
2021-01-07 15:58:20 Result: Found brackets in line, indicating multiple options for control flags: success=ok new_authtok_reqd=ok ignore=ignore user_unknown=bad default=die
2021-01-07 15:58:20 Result: brackets used, ignoring control flags
2021-01-07 15:58:20 Result: using module pam_securetty.so (other) without options configured
2021-01-07 15:58:20 Result: using module pam_nologin.so (requisite) without options configured
2021-01-07 15:58:20 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad
2021-01-07 15:58:20 Result: brackets used, ignoring control flags
2021-01-07 15:58:20 Result: using module pam_selinux.so (other) with options close
2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1
2021-01-07 15:58:20 Result: using module pam_env.so (required) with options readenv=1 envfile=/etc/default/locale
2021-01-07 15:58:20 Result: using module pam_group.so (optional) without options configured
2021-01-07 15:58:20 Result: using module pam_limits.so (required) without options configured
2021-01-07 15:58:20 Result: using module pam_lastlog.so (optional) without options configured
2021-01-07 15:58:20 Result: using module pam_motd.so (optional) with options motd=/run/motd.dynamic noupdate
2021-01-07 15:58:21 Result: using module pam_motd.so (optional) without options configured
2021-01-07 15:58:21 Result: using module pam_mail.so (optional) with options standard
2021-01-07 15:58:21 Result: Found brackets in line, indicating multiple options for control flags: success=ok ignore=ignore module_unknown=ignore default=bad
2021-01-07 15:58:21 Result: brackets used, ignoring control flags
2021-01-07 15:58:21 Result: using module pam_selinux.so (other) with options open
2021-01-07 15:58:21 [PAM] PAM 2F authentication enabled: 0
2021-01-07 15:58:21 [PAM] PAM 2F authentication required: 0
2021-01-07 15:58:21 [PAM] Authentication unlock time: not configured
2021-01-07 15:58:21 [PAM] Password brute force protection: 0
2021-01-07 15:58:21 [PAM] Minimum password length: 8
2021-01-07 15:58:21 [PAM] Password strength testing enabled: 1
2021-01-07 15:58:21 [PAM] Minimum password class out of 4: 0
2021-01-07 15:58:21 [PAM] Maximum credit for Digital characters: 1
2021-01-07 15:58:21 [PAM] Maximum credit for Lowercase characters: 1
2021-01-07 15:58:21 [PAM] Maximum credit for Other characters: 1
2021-01-07 15:58:21 [PAM] Maximum credit for Uppercase characters: 1
2021-01-07 15:58:21 [PAM] Password maximum retry: 3
2021-01-07 15:58:21 [PAM] Password history with pam_pwhistory IS NOT enabled
2021-01-07 15:58:21 [PAM] Password history with pam_unix IS NOT enabled
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Result: pam plugin (phase 1) finished
2021-01-07 15:58:21 --
2021-01-07 15:58:21 Found plugin file: ./plugins/plugin_systemd_phase1
2021-01-07 15:58:21 Action: checking plugin status in profile: /root/scans/lynis/default.prf
2021-01-07 15:58:21 Result: plugin enabled in profile (/root/scans/lynis/default.prf)
2021-01-07 15:58:21 Result: plugin systemd is enabled
2021-01-07 15:58:21 Checking permissions of ./plugins/plugin_systemd_phase1
2021-01-07 15:58:21 File permissions are OK
2021-01-07 15:58:21 Including plugin file: ./plugins/plugin_systemd_phase1 (version: 1.0.4)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3800 (Gather systemctl exit code)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3802 (Query systemd version and options)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3804 (Gather systemd unit files and their status)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3806 (Gather failed systemd units)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3808 (Gather systemd machine ID)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3810 (Query main systemd binaries)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3812 (Query journal for boot related information)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3814 (Verify journal integrity)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3816 (Query journal for boot related information)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3818 (Query journal meta data)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3820 (Check for journal FSS configuration)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3830 (Query systemd status)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3832 (Query systemd status for processes which can not be found)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3834 (Collect service units which can not be found in systemd)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3856 (Check if systemd-coredump is used)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test PLGN-3860 (Query coredumps from journals since Yesterday)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Result: systemd plugin (phase 1) finished
2021-01-07 15:58:21 --
2021-01-07 15:58:21 Result: Found 2 plugins of which 2 are enabled
2021-01-07 15:58:21 Result: Plugins phase 1 finished
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Info: using hardware address 00:0c:29:d7:de:37 to create ID
2021-01-07 15:58:21 Result: Found HostID: 605d4ca91000f6389fbf4706cb904caab69b2b15
2021-01-07 15:58:21 Info: creating a HostID (version 2)
2021-01-07 15:58:21 Result: found file ssh_host_ed25519_key.pub in /etc/ssh, using that to create host identifier
2021-01-07 15:58:21 Using SSH public key to create the second host identifier
2021-01-07 15:58:21 Hash (hostname): c72655fc467dee3c64ab04fd46a37dc5ec1bf9769ada12cce421fda8b581f281
2021-01-07 15:58:21 Hash (ssh or machineid): 9e032cc594257ab07ca76d51fb5bccee42dbceab2614a1f9ff1ae03970922b8f
2021-01-07 15:58:21 Info: found valid HostID 605d4ca91000f6389fbf4706cb904caab69b2b15
2021-01-07 15:58:21 Info: no machine ID found
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Info: perform tests from all categories
2021-01-07 15:58:21 Security check: file is normal
2021-01-07 15:58:21 Checking permissions of /root/scans/lynis/include/tests_boot_services
2021-01-07 15:58:21 File permissions are OK
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Action: Performing tests from category: Boot and services
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5102 (Check for AIX boot device)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (AIX only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5104 (Determine service manager)
2021-01-07 15:58:21 Result: cmdline found = /sbin/init
2021-01-07 15:58:21 Result: file on disk = /sbin/init
2021-01-07 15:58:21 Found: init
2021-01-07 15:58:21 Result: service manager found = upstart
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5106 (Check EFI boot file on Mac OS X/macOS)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (macOS only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5108 (Check Syslinux as bootloader)
2021-01-07 15:58:21 Test: checking if file /boot/syslinux/syslinux.cfg exists
2021-01-07 15:58:21 Result: file /boot/syslinux/syslinux.cfg NOT found
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5109 (Check rEFInd as bootloader)
2021-01-07 15:58:21 Test: checking if file /boot/refind_linux.conf exists
2021-01-07 15:58:21 Result: file /boot/refind_linux.conf NOT found
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5116 (Check if system is booted in UEFI mode)
2021-01-07 15:58:21 Test: checking if UEFI is used
2021-01-07 15:58:21 Result: UEFI not used, can't find /sys/firmware/efi directory
2021-01-07 15:58:21 Test: determine if Secure Boot is used
2021-01-07 15:58:21 Result: system not booted with Secure Boot (no SecureBoot file found)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5117 (Check for systemd-boot bootloader presence)
2021-01-07 15:58:21 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5121 (Check for GRUB boot loader presence)
2021-01-07 15:58:21 Test: Checking for presence GRUB conf file (/boot/grub/grub.conf or /boot/grub/menu.lst)
2021-01-07 15:58:21 Result: found GRUB2 configuration file (/boot/grub/grub.cfg)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5122 (Check for GRUB boot password)
2021-01-07 15:58:21 Found file /boot/grub/grub.cfg, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /boot/grub/grub.cfg (escaped: /boot/grub/grub.cfg)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /boot/grub/grub.cfg is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Result: File '/boot/grub/custom.cfg' does not exist
2021-01-07 15:58:21 Found file /etc/grub.d/30_os-prober, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/30_os-prober (escaped: /etc/grub.d/30_os-prober)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/30_os-prober is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/30_uefi-firmware, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/30_uefi-firmware (escaped: /etc/grub.d/30_uefi-firmware)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/30_uefi-firmware is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/20_memtest86+, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/20_memtest86+ (escaped: /etc/grub.d/20_memtest86+)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/20_memtest86+ is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/40_custom, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/40_custom (escaped: /etc/grub.d/40_custom)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/40_custom is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/10_linux, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/10_linux (escaped: /etc/grub.d/10_linux)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/10_linux is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/41_custom, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/41_custom (escaped: /etc/grub.d/41_custom)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/41_custom is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/05_debian_theme, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/05_debian_theme (escaped: /etc/grub.d/05_debian_theme)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/05_debian_theme is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/20_linux_xen, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/20_linux_xen (escaped: /etc/grub.d/20_linux_xen)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/20_linux_xen is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Found file /etc/grub.d/00_header, proceeding with tests.
2021-01-07 15:58:21 Test: check if we can access /etc/grub.d/00_header (escaped: /etc/grub.d/00_header)
2021-01-07 15:58:21 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:21 Result: file /etc/grub.d/00_header is readable (or directory accessible).
2021-01-07 15:58:21 Result: did not find hashed password line in this file
2021-01-07 15:58:21 Result: Didn't find hashed password line in GRUB configuration
2021-01-07 15:58:21 Suggestion: Set a password on GRUB boot loader to prevent altering boot configuration (e.g. boot in single user mode without password) [test:BOOT-5122] [details:-] [solution:-]
2021-01-07 15:58:21 Hardening: assigned partial number of hardening points (0 of 2). Currently having 0 points (out of 2)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5124 (Check for FreeBSD boot loader presence)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5261 (Check for DragonFly boot loader presence)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (DragonFly only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5126 (Check for NetBSD boot loader presence)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (NetBSD only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5139 (Check for LILO boot loader presence)
2021-01-07 15:58:21 Test: checking for presence LILO configuration file
2021-01-07 15:58:21 Result: LILO configuration file not found
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5142 (Check SPARC Improved boot loader (SILO))
2021-01-07 15:58:21 Result: no SILO configuration file found.
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5155 (Check for YABOOT boot loader configuration file)
2021-01-07 15:58:21 Test: Check for /etc/yaboot.conf
2021-01-07 15:58:21 Result: no YABOOT configuration file found.
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5159 (Check for OpenBSD boot loader presence)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (OpenBSD only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5165 (Check for FreeBSD boot services)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Skipped test BOOT-5170 (Check for Solaris boot daemons)
2021-01-07 15:58:21 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5177 (Check for Linux boot and running services)
2021-01-07 15:58:21 Test: checking presence systemctl binary
2021-01-07 15:58:21 Result: systemctl binary not found, checking chkconfig binary
2021-01-07 15:58:21 Result: both systemctl and chkconfig not found. Skipping this test
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5180 (Check for Linux boot services (Debian style))
2021-01-07 15:58:21 Result: found runlevel 2
2021-01-07 15:58:21 Result: performing find in /etc/rc2.d as runlevel 2 is found
2021-01-07 15:58:21 Found service (at boot, runlevel 2): acct
2021-01-07 15:58:21 Found service (at boot, runlevel 2): dns-clean
2021-01-07 15:58:21 Found service (at boot, runlevel 2): fail2ban
2021-01-07 15:58:21 Found service (at boot, runlevel 2): grub-common
2021-01-07 15:58:21 Found service (at boot, runlevel 2): ondemand
2021-01-07 15:58:21 Found service (at boot, runlevel 2): portsentry
2021-01-07 15:58:21 Found service (at boot, runlevel 2): pppd-dns
2021-01-07 15:58:21 Found service (at boot, runlevel 2): rc.local
2021-01-07 15:58:21 Found service (at boot, runlevel 2): rsync
2021-01-07 15:58:21 Found service (at boot, runlevel 2): screen-cleanup
2021-01-07 15:58:21 Found service (at boot, runlevel 2): sendmail
2021-01-07 15:58:21 Result: found 11 services
2021-01-07 15:58:21 ====
2021-01-07 15:58:21 Performing test ID BOOT-5184 (Check permissions for boot files/scripts)
2021-01-07 15:58:21 Result: checking /etc/init.d scripts for writable bit
2021-01-07 15:58:21 Test: checking if directory /etc/init.d exists
2021-01-07 15:58:21 Result: directory /etc/init.d found
2021-01-07 15:58:21 Test: checking for available files in directory
2021-01-07 15:58:21 Result: found files in directory, checking permissions now
2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/.legacy-bootordering
2021-01-07 15:58:21 Result: good, file /etc/init.d/.legacy-bootordering not world writable
2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/README
2021-01-07 15:58:21 Result: good, file /etc/init.d/README not world writable
2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/acct
2021-01-07 15:58:21 Result: good, file /etc/init.d/acct not world writable
2021-01-07 15:58:21 Test: checking permissions of file /etc/init.d/acpid
2021-01-07 15:58:22 Result: good, file /etc/init.d/acpid not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/apparmor
2021-01-07 15:58:22 Result: good, file /etc/init.d/apparmor not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/apport
2021-01-07 15:58:22 Result: good, file /etc/init.d/apport not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/console-setup
2021-01-07 15:58:22 Result: good, file /etc/init.d/console-setup not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/dbus
2021-01-07 15:58:22 Result: good, file /etc/init.d/dbus not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/dns-clean
2021-01-07 15:58:22 Result: good, file /etc/init.d/dns-clean not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/fail2ban
2021-01-07 15:58:22 Result: good, file /etc/init.d/fail2ban not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/grub-common
2021-01-07 15:58:22 Result: good, file /etc/init.d/grub-common not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/halt
2021-01-07 15:58:22 Result: good, file /etc/init.d/halt not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/irqbalance
2021-01-07 15:58:22 Result: good, file /etc/init.d/irqbalance not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/killprocs
2021-01-07 15:58:22 Result: good, file /etc/init.d/killprocs not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/kmod
2021-01-07 15:58:22 Result: good, file /etc/init.d/kmod not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/networking
2021-01-07 15:58:22 Result: good, file /etc/init.d/networking not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/ondemand
2021-01-07 15:58:22 Result: good, file /etc/init.d/ondemand not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/portsentry
2021-01-07 15:58:22 Result: good, file /etc/init.d/portsentry not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/pppd-dns
2021-01-07 15:58:22 Result: good, file /etc/init.d/pppd-dns not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/procps
2021-01-07 15:58:22 Result: good, file /etc/init.d/procps not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rc
2021-01-07 15:58:22 Result: good, file /etc/init.d/rc not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rc.local
2021-01-07 15:58:22 Result: good, file /etc/init.d/rc.local not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rcS
2021-01-07 15:58:22 Result: good, file /etc/init.d/rcS not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/reboot
2021-01-07 15:58:22 Result: good, file /etc/init.d/reboot not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/resolvconf
2021-01-07 15:58:22 Result: good, file /etc/init.d/resolvconf not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rsync
2021-01-07 15:58:22 Result: good, file /etc/init.d/rsync not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/rsyslog
2021-01-07 15:58:22 Result: good, file /etc/init.d/rsyslog not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/screen-cleanup
2021-01-07 15:58:22 Result: good, file /etc/init.d/screen-cleanup not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/sendmail
2021-01-07 15:58:22 Result: good, file /etc/init.d/sendmail not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/sendsigs
2021-01-07 15:58:22 Result: good, file /etc/init.d/sendsigs not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/single
2021-01-07 15:58:22 Result: good, file /etc/init.d/single not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/skeleton
2021-01-07 15:58:22 Result: good, file /etc/init.d/skeleton not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/ssh
2021-01-07 15:58:22 Result: good, file /etc/init.d/ssh not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/sudo
2021-01-07 15:58:22 Result: good, file /etc/init.d/sudo not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/udev
2021-01-07 15:58:22 Result: good, file /etc/init.d/udev not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/umountfs
2021-01-07 15:58:22 Result: good, file /etc/init.d/umountfs not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/umountnfs.sh
2021-01-07 15:58:22 Result: good, file /etc/init.d/umountnfs.sh not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/umountroot
2021-01-07 15:58:22 Result: good, file /etc/init.d/umountroot not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/unattended-upgrades
2021-01-07 15:58:22 Result: good, file /etc/init.d/unattended-upgrades not world writable
2021-01-07 15:58:22 Test: checking permissions of file /etc/init.d/urandom
2021-01-07 15:58:22 Result: good, file /etc/init.d/urandom not world writable
2021-01-07 15:58:22 Test: checking if directory /etc/rc.d exists
2021-01-07 15:58:22 Result: directory /etc/rc.d not found. Skipping..
2021-01-07 15:58:22 Test: checking if directory /etc/rcS.d exists
2021-01-07 15:58:22 Result: directory /etc/rcS.d found
2021-01-07 15:58:22 Test: checking for available files in directory
2021-01-07 15:58:22 Result: found files in directory, checking permissions now
2021-01-07 15:58:22 Test: checking permissions of file /etc/rcS.d/README
2021-01-07 15:58:22 Result: good, file /etc/rcS.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc0.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc0.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc1.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc1.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc2.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc2.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc3.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc3.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc4.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc4.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc5.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc5.d/README not world writable
2021-01-07 15:58:22 Test: Checking /etc/rc6.d scripts for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc6.d/README not world writable
2021-01-07 15:58:22 Action: checking symlink for file /etc/rc.local
2021-01-07 15:58:22 Result: file /etc/rc.local is not a symlink
2021-01-07 15:58:22 Test: Checking /etc/rc.local file for writable bit
2021-01-07 15:58:22 Result: good, file /etc/rc.local not world writable
2021-01-07 15:58:22 Hardening: assigned maximum number of hardening points for this item (3). Currently having 3 points (out of 5)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID BOOT-5202 (Check uptime of system)
2021-01-07 15:58:22 Uptime (in seconds): 4335
2021-01-07 15:58:22 Uptime (in days): 0
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID BOOT-5260 (Check single user mode for systemd)
2021-01-07 15:58:22 Test: Searching /usr/lib/systemd/system/rescue.service
2021-01-07 15:58:22 Result: file /usr/lib/systemd/system/rescue.service does not exist
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test BOOT-5262 (Check for OpenBSD boot daemons)
2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (OpenBSD only)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test BOOT-5263 (Check permissions for boot files/scripts)
2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (OpenBSD only)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test BOOT-5264 (Run systemd-analyze security)
2021-01-07 15:58:22 Reason to skip: systemd-analyze not available
2021-01-07 15:58:22 Security check: file is normal
2021-01-07 15:58:22 Checking permissions of /root/scans/lynis/include/tests_kernel
2021-01-07 15:58:22 File permissions are OK
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Action: Performing tests from category: Kernel
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5622 (Determine Linux default run level)
2021-01-07 15:58:22 Test: Checking for systemd default.target
2021-01-07 15:58:22 Result: no systemd found, so trying inittab
2021-01-07 15:58:22 Test: Checking /etc/inittab
2021-01-07 15:58:22 Result: file /etc/inittab not found
2021-01-07 15:58:22 Test: Checking run level with who -r, for Debian based systems
2021-01-07 15:58:22 Result: Found default run level '2'
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5677 (Check CPU options and support)
2021-01-07 15:58:22 Test: Checking /proc/cpuinfo
2021-01-07 15:58:22 Result: found /proc/cpuinfo
2021-01-07 15:58:22 Test: Checking CPU options (XD/NX/PAE)
2021-01-07 15:58:22 PAE: Yes
2021-01-07 15:58:22 NX: Yes
2021-01-07 15:58:22 Result: PAE or No eXecute option(s) both found
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5695 (Determine Linux kernel version and release number)
2021-01-07 15:58:22 Result: found kernel release 4.4.0-142-generic
2021-01-07 15:58:22 Result: found kernel version #168~14.04.1-Ubuntu SMP Sat Jan 19 11:26:28 UTC 2019
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5723 (Determining if Linux kernel is monolithic)
2021-01-07 15:58:22 Test: checking if kernel is monolithic or modular
2021-01-07 15:58:22 Result: Found modular kernel
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5726 (Checking Linux loaded kernel modules)
2021-01-07 15:58:22 Loaded modules according lsmod:
2021-01-07 15:58:22 Loaded module: 8250_fintek
2021-01-07 15:58:22 Loaded module: ablk_helper
2021-01-07 15:58:22 Loaded module: ac97_bus
2021-01-07 15:58:22 Loaded module: aes_x86_64
2021-01-07 15:58:22 Loaded module: aesni_intel
2021-01-07 15:58:22 Loaded module: ahci
2021-01-07 15:58:22 Loaded module: btrfs
2021-01-07 15:58:22 Loaded module: cpuid
2021-01-07 15:58:22 Loaded module: crc32_pclmul
2021-01-07 15:58:22 Loaded module: crct10dif_pclmul
2021-01-07 15:58:22 Loaded module: cryptd
2021-01-07 15:58:22 Loaded module: drm
2021-01-07 15:58:22 Loaded module: drm_kms_helper
2021-01-07 15:58:22 Loaded module: e1000
2021-01-07 15:58:22 Loaded module: fb_sys_fops
2021-01-07 15:58:22 Loaded module: fjes
2021-01-07 15:58:22 Loaded module: gameport
2021-01-07 15:58:22 Loaded module: gf128mul
2021-01-07 15:58:22 Loaded module: ghash_clmulni_intel
2021-01-07 15:58:22 Loaded module: glue_helper
2021-01-07 15:58:22 Loaded module: hfs
2021-01-07 15:58:22 Loaded module: hfsplus
2021-01-07 15:58:22 Loaded module: hid
2021-01-07 15:58:22 Loaded module: hid_generic
2021-01-07 15:58:22 Loaded module: i2c_piix4
2021-01-07 15:58:22 Loaded module: inet_diag
2021-01-07 15:58:22 Loaded module: input_leds
2021-01-07 15:58:22 Loaded module: ip_tables
2021-01-07 15:58:22 Loaded module: iptable_filter
2021-01-07 15:58:22 Loaded module: iptable_nat
2021-01-07 15:58:22 Loaded module: jfs
2021-01-07 15:58:22 Loaded module: joydev
2021-01-07 15:58:22 Loaded module: libahci
2021-01-07 15:58:22 Loaded module: libcrc32c
2021-01-07 15:58:22 Loaded module: lp
2021-01-07 15:58:22 Loaded module: lrw
2021-01-07 15:58:22 Loaded module: mac_hid
2021-01-07 15:58:22 Loaded module: minix
2021-01-07 15:58:22 Loaded module: mptbase
2021-01-07 15:58:22 Loaded module: mptscsih
2021-01-07 15:58:22 Loaded module: mptspi
2021-01-07 15:58:22 Loaded module: msdos
2021-01-07 15:58:22 Loaded module: nf_conntrack
2021-01-07 15:58:22 Loaded module: nf_conntrack_ipv4
2021-01-07 15:58:22 Loaded module: nf_defrag_ipv4
2021-01-07 15:58:22 Loaded module: nf_nat
2021-01-07 15:58:22 Loaded module: nf_nat_ipv4
2021-01-07 15:58:22 Loaded module: ntfs
2021-01-07 15:58:22 Loaded module: parport
2021-01-07 15:58:22 Loaded module: pata_acpi
2021-01-07 15:58:22 Loaded module: psmouse
2021-01-07 15:58:22 Loaded module: qnx4
2021-01-07 15:58:22 Loaded module: raid6_pq
2021-01-07 15:58:22 Loaded module: scsi_transport_spi
2021-01-07 15:58:22 Loaded module: serio_raw
2021-01-07 15:58:22 Loaded module: shpchp
2021-01-07 15:58:22 Loaded module: snd
2021-01-07 15:58:22 Loaded module: snd_ac97_codec
2021-01-07 15:58:22 Loaded module: snd_ens1371
2021-01-07 15:58:22 Loaded module: snd_pcm
2021-01-07 15:58:22 Loaded module: snd_rawmidi
2021-01-07 15:58:22 Loaded module: snd_seq_device
2021-01-07 15:58:22 Loaded module: snd_timer
2021-01-07 15:58:22 Loaded module: soundcore
2021-01-07 15:58:22 Loaded module: syscopyarea
2021-01-07 15:58:22 Loaded module: sysfillrect
2021-01-07 15:58:22 Loaded module: sysimgblt
2021-01-07 15:58:22 Loaded module: tcp_diag
2021-01-07 15:58:22 Loaded module: ttm
2021-01-07 15:58:22 Loaded module: udp_diag
2021-01-07 15:58:22 Loaded module: ufs
2021-01-07 15:58:22 Loaded module: usbhid
2021-01-07 15:58:22 Loaded module: vmw_balloon
2021-01-07 15:58:22 Loaded module: vmw_vmci
2021-01-07 15:58:22 Loaded module: vmw_vsock_vmci_transport
2021-01-07 15:58:22 Loaded module: vmwgfx
2021-01-07 15:58:22 Loaded module: vsock
2021-01-07 15:58:22 Loaded module: x_tables
2021-01-07 15:58:22 Loaded module: xfs
2021-01-07 15:58:22 Loaded module: xor
2021-01-07 15:58:22 Loaded module: xt_multiport
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5728 (Checking Linux kernel config)
2021-01-07 15:58:22 Result: found config (/boot/config-4.4.0-142-generic)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5730 (Checking disk I/O kernel scheduler)
2021-01-07 15:58:22 Test: Checking the default I/O kernel scheduler
2021-01-07 15:58:22 Result: found IO scheduler 'deadline'
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test KRNL-5745 (Checking FreeBSD loaded kernel modules)
2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test KRNL-5831 (Checking DragonFly loaded kernel modules)
2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (DragonFly only)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test KRNL-5770 (Checking active kernel modules)
2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5788 (Checking availability new Linux kernel)
2021-01-07 15:58:22 Test: Searching apt-cache, to determine if a newer kernel is available
2021-01-07 15:58:22 Result: found /usr/bin/apt-cache
2021-01-07 15:58:22 Test: checking presence of /vmlinuz or /boot/vmlinuz
2021-01-07 15:58:22 Result: found /vmlinuz
2021-01-07 15:58:22 Test: checking readlink location of /vmlinuz
2021-01-07 15:58:22 Output: readlink reported file /boot/vmlinuz-4.4.0-148-generic
2021-01-07 15:58:22 Test: checking package from dpkg -S
2021-01-07 15:58:22 Output: dpkg -S reported package linux-image-4.4.0-148-generic
2021-01-07 15:58:22 Test: Using apt-cache policy to determine if there is an update available
2021-01-07 15:58:22 Kernel installed: 4.4.0-148.174~14.04.1
2021-01-07 15:58:22 Kernel candidate: 4.4.0-148.174~14.04.1
2021-01-07 15:58:22 Result: no kernel update available
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5820 (Checking core dumps configuration)
2021-01-07 15:58:22 Test: Checking presence of systemd
2021-01-07 15:58:22 Test: Checking presence /etc/profile
2021-01-07 15:58:22 Test: Checking if 'ulimit -c 0' exists in /etc/profile or /etc/profile.d/*.sh
2021-01-07 15:58:22 Result: core dumps are not disabled in /etc/profile or /etc/profile.d/*.sh config files. Didn't find setting 'ulimit -c 0'
2021-01-07 15:58:22 Hardening: assigned partial number of hardening points (0 of 1). Currently having 3 points (out of 6)
2021-01-07 15:58:22 Test: Checking presence /etc/security/limits.conf
2021-01-07 15:58:22 Result: file /etc/security/limits.conf exists
2021-01-07 15:58:22 Test: Checking if core dumps are disabled in /etc/security/limits.conf and /etc/security/limits.d/*
2021-01-07 15:58:22 Result: core dumps are hard disabled
2021-01-07 15:58:22 Hardening: assigned maximum number of hardening points for this item (3). Currently having 6 points (out of 9)
2021-01-07 15:58:22 Test: Checking sysctl value of fs.suid_dumpable
2021-01-07 15:58:22 Result: value 0 found
2021-01-07 15:58:22 Result: found default option (0), no execute only program or program with changed privilege levels can dump
2021-01-07 15:58:22 Hardening: assigned maximum number of hardening points for this item (1). Currently having 7 points (out of 10)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID KRNL-5830 (Checking if system is running on the latest installed kernel)
2021-01-07 15:58:22 Test: Checking presence /var/run/reboot-required.pkgs
2021-01-07 15:58:22 Result: file /var/run/reboot-required.pkgs exists
2021-01-07 15:58:22 Result: reboot is needed, related to 2 packages
2021-01-07 15:58:22 Package: 2
2021-01-07 15:58:22 Result: /boot exists, performing more tests from here
2021-01-07 15:58:22 Result: found /boot/vmlinuz-4.4.0-148-generic
2021-01-07 15:58:22 Result: version derived from file name is '4.4.0-148-generic'
2021-01-07 15:58:22 Result: found version 4.4.0-148-generic
2021-01-07 15:58:22 Result: active kernel version 4.4.0-142-generic
2021-01-07 15:58:22 Result: reboot needed, as there is a difference between active kernel and the one on disk
2021-01-07 15:58:22 Result: /var/cache/apt/archives/ does not exist
2021-01-07 15:58:22 Warning: Reboot of system is most likely needed [test:KRNL-5830] [details:] [solution:text:reboot]
2021-01-07 15:58:22 Hardening: assigned partial number of hardening points (0 of 5). Currently having 7 points (out of 15)
2021-01-07 15:58:22 Security check: file is normal
2021-01-07 15:58:22 Checking permissions of /root/scans/lynis/include/tests_memory_processes
2021-01-07 15:58:22 File permissions are OK
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Action: Performing tests from category: Memory and Processes
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID PROC-3602 (Checking /proc/meminfo for memory details)
2021-01-07 15:58:22 Result: found /proc/meminfo
2021-01-07 15:58:22 Result: Found 4028204 kB memory
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Skipped test PROC-3604 (Query prtconf for memory details)
2021-01-07 15:58:22 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID PROC-3612 (Check dead or zombie processes)
2021-01-07 15:58:22 Result: no zombie processes found
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID PROC-3614 (Check heavy IO waiting based processes)
2021-01-07 15:58:22 Result: No processes were waiting for IO requests to be handled first
2021-01-07 15:58:22 ====
2021-01-07 15:58:22 Performing test ID PROC-3802 (Check presence of prelink tooling)
2021-01-07 15:58:23 Result: prelink package is NOT installed
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 10 points (out of 18)
2021-01-07 15:58:23 Security check: file is normal
2021-01-07 15:58:23 Checking permissions of /root/scans/lynis/include/tests_authentication
2021-01-07 15:58:23 File permissions are OK
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Action: Performing tests from category: Users, Groups and Authentication
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9204 (Check users with an UID of zero)
2021-01-07 15:58:23 Test: Searching accounts with UID 0
2021-01-07 15:58:23 Result: No accounts found with UID 0 other than root.
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9208 (Check non-unique accounts in passwd file)
2021-01-07 15:58:23 Test: Checking for non-unique accounts
2021-01-07 15:58:23 Result: all accounts found in /etc/passwd are unique
2021-01-07 15:58:23 Remarks: Non unique UIDs can be a risk for the system or part of a configuration mistake
2021-01-07 15:58:23 Prerequisite test: /usr/sbin/chkgrp
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9212 (Test group file)
2021-01-07 15:58:23 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9216 (Check group and shadow group files)
2021-01-07 15:58:23 Test: Checking for grpck binary output
2021-01-07 15:58:23 Result: grpck binary didn't find any errors in the group files
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9218 (Check login shells for passwordless accounts)
2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (DragonFly FreeBSD NetBSD OpenBSD only)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9222 (Check unique groups (IDs))
2021-01-07 15:58:23 Test: Checking for non unique group ID's in /etc/group
2021-01-07 15:58:23 Result: All group ID's are unique
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9226 (Check unique group names)
2021-01-07 15:58:23 Test: Checking for non unique group names in /etc/group
2021-01-07 15:58:23 Result: All group names are unique
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9228 (Check password file consistency with pwck)
2021-01-07 15:58:23 Test: Checking password file consistency (pwck)
2021-01-07 15:58:23 Result: pwck check didn't find any problems
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (2). Currently having 12 points (out of 20)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9229 (Check password hashing methods)
2021-01-07 15:58:23 Test: Checking password hashing methods
2021-01-07 15:58:23 Result: poor password hashing methods found: sha256crypt/sha512crypt(default<=5000rounds)
2021-01-07 15:58:23 Suggestion: Check PAM configuration, add rounds if applicable and expire passwords to encrypt with new values [test:AUTH-9229] [details:-] [solution:-]
2021-01-07 15:58:23 Hardening: assigned partial number of hardening points (0 of 2). Currently having 12 points (out of 22)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9230 (Check password hashing rounds)
2021-01-07 15:58:23 Test: Checking SHA_CRYPT_{MIN,MAX}_ROUNDS option in /etc/login.defs
2021-01-07 15:58:23 Result: number of password hashing rounds is not configured
2021-01-07 15:58:23 Suggestion: Configure password hashing rounds in /etc/login.defs [test:AUTH-9230] [details:-] [solution:-]
2021-01-07 15:58:23 Hardening: assigned partial number of hardening points (0 of 2). Currently having 12 points (out of 24)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9234 (Query user accounts)
2021-01-07 15:58:23 Test: Read system users (including root user) from password database (e.g. /etc/passwd)
2021-01-07 15:58:23 Result: found minimal user id specified: 1000
2021-01-07 15:58:23 Linux real users output (ID = 0, or 1000+, but not 65534):
2021-01-07 15:58:23 Real user: root,0
2021-01-07 15:58:23 Real user: ll,1000
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9240 (Query NIS+ authentication support)
2021-01-07 15:58:23 Result: NIS+ authentication not enabled
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9242 (Query NIS authentication support)
2021-01-07 15:58:23 Result: NIS authentication not enabled
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9250 (Checking sudoers file)
2021-01-07 15:58:23 Test: checking presence /etc/sudoers
2021-01-07 15:58:23 Result: found file (/etc/sudoers)
2021-01-07 15:58:23 Test: checking presence /usr/local/etc/sudoers
2021-01-07 15:58:23 Result: file /usr/local/etc/sudoers not found
2021-01-07 15:58:23 Test: checking presence /usr/pkg/etc/sudoers
2021-01-07 15:58:23 Result: file /usr/pkg/etc/sudoers not found
2021-01-07 15:58:23 Result: sudoers file found (/etc/sudoers)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9252 (Check ownership and permissions for sudo configuration files)
2021-01-07 15:58:23 Test: checking drop-in directory (/etc/sudoers.d)
2021-01-07 15:58:23 Result: Found directory permissions: rwxr-xr-x and owner UID GID: 00
2021-01-07 15:58:23 Result: directory /etc/sudoers.d has possibly unsafe permissions
2021-01-07 15:58:23 Result: directory /etc/sudoers.d ownership OK
2021-01-07 15:58:23 Test: checking file (/etc/sudoers)
2021-01-07 15:58:23 Result: Found file permissions: r--r----- and owner UID GID: 00
2021-01-07 15:58:23 Result: file /etc/sudoers permissions OK
2021-01-07 15:58:23 Result: file /etc/sudoers ownership OK
2021-01-07 15:58:23 Test: checking file (/etc/sudoers.d/README)
2021-01-07 15:58:23 Result: Found file permissions: r--r----- and owner UID GID: 00
2021-01-07 15:58:23 Result: file /etc/sudoers.d/README permissions OK
2021-01-07 15:58:23 Result: file /etc/sudoers.d/README ownership OK
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9254 (Solaris passwordless accounts)
2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9262 (Checking presence password strength testing tools (PAM))
2021-01-07 15:58:23 Searching PAM password testing modules (cracklib, passwdqc, pwquality)
2021-01-07 15:58:23 Result: found pam_cracklib.so (crack library PAM) in /lib/x86_64-linux-gnu/security
2021-01-07 15:58:23 Result: pam_cracklib.so found
2021-01-07 15:58:23 Result: pam_passwdqc.so NOT found (passwd quality control PAM)
2021-01-07 15:58:23 Result: pam_pwquality.so NOT found (pwquality control PAM)
2021-01-07 15:58:23 Result: found at least one PAM module for password strength testing
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 15 points (out of 27)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9264 (Checking presence pam.conf)
2021-01-07 15:58:23 Test: Checking file /etc/pam.conf
2021-01-07 15:58:23 Result: file /etc/pam.conf exists
2021-01-07 15:58:23 Test: searching PAM configuration files
2021-01-07 15:58:23 Result: File has no configuration options defined (empty, or only filled with comments and empty lines)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9266 (Checking presence pam.d files)
2021-01-07 15:58:23 Test: Checking directory /etc/pam.d
2021-01-07 15:58:23 Result: directory /etc/pam.d exists
2021-01-07 15:58:23 Test: searching PAM configuration files
2021-01-07 15:58:23 Found file: /etc/pam.d/accountsservice
2021-01-07 15:58:23 Found file: /etc/pam.d/chfn
2021-01-07 15:58:23 Found file: /etc/pam.d/chpasswd
2021-01-07 15:58:23 Found file: /etc/pam.d/chsh
2021-01-07 15:58:23 Found file: /etc/pam.d/common-account
2021-01-07 15:58:23 Found file: /etc/pam.d/common-auth
2021-01-07 15:58:23 Found file: /etc/pam.d/common-password
2021-01-07 15:58:23 Found file: /etc/pam.d/common-session
2021-01-07 15:58:23 Found file: /etc/pam.d/common-session-noninteractive
2021-01-07 15:58:23 Found file: /etc/pam.d/cron
2021-01-07 15:58:23 Found file: /etc/pam.d/login
2021-01-07 15:58:23 Found file: /etc/pam.d/newusers
2021-01-07 15:58:23 Found file: /etc/pam.d/other
2021-01-07 15:58:23 Found file: /etc/pam.d/passwd
2021-01-07 15:58:23 Found file: /etc/pam.d/polkit-1
2021-01-07 15:58:23 Found file: /etc/pam.d/ppp
2021-01-07 15:58:23 Found file: /etc/pam.d/smtp
2021-01-07 15:58:23 Found file: /etc/pam.d/sshd
2021-01-07 15:58:23 Found file: /etc/pam.d/su
2021-01-07 15:58:23 Found file: /etc/pam.d/sudo
2021-01-07 15:58:23 Found file: /etc/pam.d/vmtoolsd
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9268 (Checking presence pam.d files)
2021-01-07 15:58:23 Test: Searching pam modules
2021-01-07 15:58:23 Test: Checking /lib/arm-linux-gnueabihf/security
2021-01-07 15:58:23 Result: directory /lib/arm-linux-gnueabihf/security could not be found or is a symlink to another directory
2021-01-07 15:58:23 Test: Checking /lib/i386-linux-gnu/security
2021-01-07 15:58:23 Result: directory /lib/i386-linux-gnu/security could not be found or is a symlink to another directory
2021-01-07 15:58:23 Test: Checking /lib/security
2021-01-07 15:58:23 Result: directory /lib/security could not be found or is a symlink to another directory
2021-01-07 15:58:23 Test: Checking /lib/x86_64-linux-gnu/security
2021-01-07 15:58:23 Result: directory /lib/x86_64-linux-gnu/security exists
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_access.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_cap.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_cracklib.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_debug.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_deny.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_echo.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_env.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_exec.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_faildelay.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_filter.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_ftp.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_group.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_issue.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_keyinit.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_lastlog.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_limits.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_listfile.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_localuser.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_loginuid.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_mail.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_mkhomedir.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_motd.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_namespace.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_nologin.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_permit.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_pwhistory.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_rhosts.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_rootok.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_securetty.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_selinux.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_sepermit.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_shells.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_stress.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_succeed_if.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_systemd.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_tally.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_tally2.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_time.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_timestamp.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_tty_audit.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_umask.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_unix.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_userdb.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_warn.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_wheel.so
2021-01-07 15:58:23 Found file: /lib/x86_64-linux-gnu/security/pam_xauth.so
2021-01-07 15:58:23 Test: Checking /lib64/security
2021-01-07 15:58:23 Result: directory /lib64/security could not be found or is a symlink to another directory
2021-01-07 15:58:23 Test: Checking /usr/lib
2021-01-07 15:58:23 Result: directory /usr/lib exists
2021-01-07 15:58:23 Test: Checking /usr/lib/security
2021-01-07 15:58:23 Result: directory /usr/lib/security could not be found or is a symlink to another directory
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9278 (Determine LDAP support in PAM files)
2021-01-07 15:58:23 Test: checking presence /etc/pam.d/common-auth
2021-01-07 15:58:23 Result: file /etc/pam.d/common-auth exists
2021-01-07 15:58:23 Test: checking presence LDAP module
2021-01-07 15:58:23 Result: LDAP module not found
2021-01-07 15:58:23 Test: checking presence /etc/pam.d/system-auth
2021-01-07 15:58:23 Result: file /etc/pam.d/system-auth not found, skipping test
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9282 (Checking password protected account without expire date)
2021-01-07 15:58:23 Test: Checking Linux version and password expire date status
2021-01-07 15:58:23 Result: found one or more accounts without expire date set
2021-01-07 15:58:23 Account without expire date: ll
2021-01-07 15:58:23 Suggestion: When possible set expire dates for all password protected accounts [test:AUTH-9282] [details:-] [solution:-]
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9283 (Checking accounts without password)
2021-01-07 15:58:23 Test: Checking passwordless accounts
2021-01-07 15:58:23 Result: all accounts seem to have a password
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9284 (Check locked user accounts in /etc/passwd)
2021-01-07 15:58:23 Test: Checking locked accounts
2021-01-07 15:58:23 Result: all accounts seem to be unlocked
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9286 (Checking user password aging)
2021-01-07 15:58:23 Test: Checking PASS_MIN_DAYS option in /etc/login.defs
2021-01-07 15:58:23 Result: password needs to be at least 7 days old
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 18 points (out of 30)
2021-01-07 15:58:23 Test: Checking PASS_MAX_DAYS option in /etc/login.defs
2021-01-07 15:58:23 Result: max password age is 90 days
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 21 points (out of 33)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9288 (Checking for expired passwords)
2021-01-07 15:58:23 Test: check if we can access /etc/shadow (escaped: /etc/shadow)
2021-01-07 15:58:23 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:23 Result: file /etc/shadow is readable (or directory accessible).
2021-01-07 15:58:23 Data: Days since epoch is 18634
2021-01-07 15:58:23 Test: collecting accounts which have an expired password (last day changed + maximum change time)
2021-01-07 15:58:23 Result: good, no passwords have been expired
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (10). Currently having 31 points (out of 43)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9304 (Check single user login configuration)
2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9306 (Check single boot authentication)
2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (HP-UX only)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9308 (Check single user login configuration)
2021-01-07 15:58:23 Test: Searching /etc/inittab
2021-01-07 15:58:23 Result: file /etc/inittab does not exist
2021-01-07 15:58:23 Test: Searching /etc/sysconfig/init
2021-01-07 15:58:23 Result: file /etc/sysconfig/init does not exist
2021-01-07 15:58:23 Test: going to check several systemd targets now
2021-01-07 15:58:23 Test: checking if target console-shell.service is available (/lib/systemd/system/console-shell.service)
2021-01-07 15:58:23 Result: target console-shell.service not found
2021-01-07 15:58:23 Test: checking if target emergency.service is available (/lib/systemd/system/emergency.service)
2021-01-07 15:58:23 Result: target emergency.service not found
2021-01-07 15:58:23 Test: checking if target rescue.service is available (/lib/systemd/system/rescue.service)
2021-01-07 15:58:23 Result: target rescue.service not found
2021-01-07 15:58:23 Result: no tests performed
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9328 (Default umask values)
2021-01-07 15:58:23 Test: Checking /etc/profile.d directory
2021-01-07 15:58:23 Result: found /etc/profile.d, with one or more files in it
2021-01-07 15:58:23 Test: Checking /etc/profile
2021-01-07 15:58:23 Result: file /etc/profile exists
2021-01-07 15:58:23 Test: Checking umask value in /etc/profile
2021-01-07 15:58:23 Result: did not find umask in /etc/profile
2021-01-07 15:58:23 Result: found no umask. Please check if this is correct
2021-01-07 15:58:23 Test: Checking umask entries in /etc/passwd (pam_umask)
2021-01-07 15:58:23 Result: file /etc/passwd exists
2021-01-07 15:58:23 Test: Checking umask value in /etc/passwd
2021-01-07 15:58:23 Manual: one or more manual actions are required for further testing of this control/plugin
2021-01-07 15:58:23 Test: Checking /etc/login.defs
2021-01-07 15:58:23 Result: file /etc/login.defs exists
2021-01-07 15:58:23 Test: Checking umask value in /etc/login.defs
2021-01-07 15:58:23 Result: umask is 027, which is fine
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (2). Currently having 33 points (out of 45)
2021-01-07 15:58:23 Test: Checking /etc/init.d/functions
2021-01-07 15:58:23 Result: file /etc/init.d/functions does not exist
2021-01-07 15:58:23 Test: Checking /etc/init.d/rc
2021-01-07 15:58:23 Result: file /etc/init.d/rc exists
2021-01-07 15:58:23 Test: Checking UMASK value in /etc/init.d/rc
2021-01-07 15:58:23 Result: umask is 027, which is fine
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (2). Currently having 35 points (out of 47)
2021-01-07 15:58:23 Test: Checking /etc/init.d/rcS
2021-01-07 15:58:23 Result: file /etc/init.d/rcS exists
2021-01-07 15:58:23 Test: Checking if script runs another script.
2021-01-07 15:58:23 Result: exec line present in file, setting of umask not needed in this script
2021-01-07 15:58:23 Output: /etc/init.d/rc
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9340 (Solaris account locking)
2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9402 (Query LDAP authentication support)
2021-01-07 15:58:23 Result: LDAP authentication not enabled
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9406 (Query LDAP servers in client configuration)
2021-01-07 15:58:23 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Performing test ID AUTH-9408 (Logging of failed login attempts)
2021-01-07 15:58:23 Result: did not find /var/log/tallylog on disk or its file size is zero bytes
2021-01-07 15:58:23 Result: found pam_tally2 module on disk
2021-01-07 15:58:23 Outcome: it looks like pam_tally2 is not configured to log failed login attempts
2021-01-07 15:58:23 Test: Checking FAILLOG_ENAB option in /etc/login.defs
2021-01-07 15:58:23 Result: FAILLOG_ENAB is set to 'yes'
2021-01-07 15:58:23 Outcome: failed login attempts are logged in /var/log/faillog
2021-01-07 15:58:23 Hardening: assigned maximum number of hardening points for this item (3). Currently having 38 points (out of 50)
2021-01-07 15:58:23 ====
2021-01-07 15:58:23 Skipped test AUTH-9409 (Checking /etc/doas.conf file)
2021-01-07 15:58:23 Reason to skip: Incorrect guest OS (OpenBSD only)
2021-01-07 15:58:23 ====
2021-01-07 15:58:24 Skipped test AUTH-9410 (Check /etc/doas.conf file permissions)
2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (OpenBSD only)
2021-01-07 15:58:24 Security check: file is normal
2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_shells
2021-01-07 15:58:24 File permissions are OK
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Action: Performing tests from category: Shells
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test SHLL-6202 (Check console TTYs)
2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID SHLL-6211 (Available and valid shells)
2021-01-07 15:58:24 Test: Searching for /etc/shells
2021-01-07 15:58:24 Result: Found /etc/shells file
2021-01-07 15:58:24 Test: Reading available shells from /etc/shells
2021-01-07 15:58:24 Found installed shell: /bin/sh
2021-01-07 15:58:24 Found installed shell: /bin/dash
2021-01-07 15:58:24 Found installed shell: /bin/bash
2021-01-07 15:58:24 Found installed shell: /bin/rbash
2021-01-07 15:58:24 Found installed shell: /usr/bin/tmux
2021-01-07 15:58:24 Found installed shell: /usr/bin/screen
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID SHLL-6220 (Idle session killing tools or settings)
2021-01-07 15:58:24 Test: Search for session timeout tools or settings in shell
2021-01-07 15:58:24 Performing pgrep scan without uid
2021-01-07 15:58:24 IsRunning: process 'timeoutd' not found
2021-01-07 15:58:24 Performing pgrep scan without uid
2021-01-07 15:58:24 IsRunning: process 'autolog' not found
2021-01-07 15:58:24 Result: could not find TMOUT setting in /etc/profile
2021-01-07 15:58:24 Result: could not find export, readonly or typeset -r in /etc/profile
2021-01-07 15:58:24 Result: could not find TMOUT setting in /etc/profile.d/*.sh
2021-01-07 15:58:24 Result: could not find export, readonly or typeset -r in /etc/profile
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (1 of 3). Currently having 39 points (out of 53)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID SHLL-6230 (Perform umask check for shell configurations)
2021-01-07 15:58:24 Result: file /etc/bashrc not found
2021-01-07 15:58:24 Result: file /etc/bash.bashrc exists
2021-01-07 15:58:24 Result: did not find umask configured in /etc/bash.bashrc
2021-01-07 15:58:24 Result: file /etc/bash.bashrc.local not found
2021-01-07 15:58:24 Result: file /etc/csh.cshrc not found
2021-01-07 15:58:24 Result: file /etc/profile exists
2021-01-07 15:58:24 Result: did not find umask configured in /etc/profile
2021-01-07 15:58:24 Security check: file is normal
2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_filesystems
2021-01-07 15:58:24 File permissions are OK
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Action: Performing tests from category: File systems
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6310 (Checking /tmp, /home and /var directory)
2021-01-07 15:58:24 Test: Checking if /home is mounted separately or mounted on / file system
2021-01-07 15:58:24 Result: directory /home exists
2021-01-07 15:58:24 Result: /home not found in mount list. Directory most likely stored on / file system
2021-01-07 15:58:24 Suggestion: To decrease the impact of a full /home file system, place /home on a separate partition [test:FILE-6310] [details:-] [solution:-]
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (9 of 10). Currently having 48 points (out of 63)
2021-01-07 15:58:24 Test: Checking if /tmp is mounted separately or mounted on / file system
2021-01-07 15:58:24 Result: directory /tmp exists
2021-01-07 15:58:24 Result: found /tmp as a separated mount point
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (10). Currently having 58 points (out of 73)
2021-01-07 15:58:24 Test: Checking if /var is mounted separately or mounted on / file system
2021-01-07 15:58:24 Result: directory /var exists
2021-01-07 15:58:24 Result: /var not found in mount list. Directory most likely stored on / file system
2021-01-07 15:58:24 Suggestion: To decrease the impact of a full /var file system, place /var on a separate partition [test:FILE-6310] [details:-] [solution:-]
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (9 of 10). Currently having 67 points (out of 83)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test FILE-6311 (Checking LVM volume groups)
2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test FILE-6312 (Checking LVM volumes)
2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6323 (Checking EXT file systems)
2021-01-07 15:58:24 Test: Checking for Linux EXT file systems
2021-01-07 15:58:24 Result: found one or more EXT file systems
2021-01-07 15:58:24 File system: / (type: ext4)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6324 (Checking XFS file systems)
2021-01-07 15:58:24 Test: Checking for Linux XFS file systems
2021-01-07 15:58:24 Result: no XFS file systems found
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6329 (Checking FFS/UFS file systems)
2021-01-07 15:58:24 Test: Query /etc/fstab for available FFS/UFS mount points
2021-01-07 15:58:24 Result: unable to find any single mount point (FFS/UFS)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test FILE-6330 (Checking ZFS file systems)
2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test FILE-6439 (Checking HAMMER PFS mounts)
2021-01-07 15:58:24 Reason to skip: Incorrect guest OS (DragonFly only)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6332 (Checking swap partitions)
2021-01-07 15:58:24 Test: query swap partitions from /etc/fstab file
2021-01-07 15:58:24 Swap partition found: UUID=43e4066c-3702-46ff-8e97-fa2d6b0e2bc8
2021-01-07 15:58:24 Result: Using 43e4066c-3702-46ff-8e97-fa2d6b0e2bc8 as UUID
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6336 (Checking swap mount options)
2021-01-07 15:58:24 Test: check swap partitions with incorrect mount options
2021-01-07 15:58:24 Result: all swap partitions have correct options (sw or swap)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6344 (Checking proc mount options)
2021-01-07 15:58:24 Test: check proc mount with incorrect mount options
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (0 of 3). Currently having 67 points (out of 86)
2021-01-07 15:58:24 Result: /proc filesystem is not mounted with option hidepid=1 or hidepid=2
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6354 (Searching for old files in /tmp)
2021-01-07 15:58:24 Test: Searching for old files in /tmp
2021-01-07 15:58:24 Result: no files found in /tmp which are older than 3 months
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6362 (Checking /tmp sticky bit)
2021-01-07 15:58:24 Result: sticky bit found on /tmp directory
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 70 points (out of 89)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6363 (Checking /var/tmp sticky bit)
2021-01-07 15:58:24 Result: sticky bit found on /var/tmp directory
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 73 points (out of 92)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6368 (Checking ACL support on root file system)
2021-01-07 15:58:24 Test: Checking acl option on ext[2-4] root file system
2021-01-07 15:58:24 Result: mount point probably mounted with defaults
2021-01-07 15:58:24 Test: Checking device which holds root file system
2021-01-07 15:58:24 Result: found /dev/sda1
2021-01-07 15:58:24 Test: Checking default options on /dev/sda1
2021-01-07 15:58:24 Result: found ACL option in default mount options
2021-01-07 15:58:24 Test: Checking acl option on xfs root file system
2021-01-07 15:58:24 Result: ACL option enabled on root file system
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 76 points (out of 95)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6372 (Checking / mount options)
2021-01-07 15:58:24 Result: mount system / is configured with options: errors=remount-ro
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6374 (Linux mount options)
2021-01-07 15:58:24 Result: file system /boot not found in /etc/fstab
2021-01-07 15:58:24 File system: /dev
2021-01-07 15:58:24 Expected flags: noexec nosuid
2021-01-07 15:58:24 Found flags: (rw mode=0755)
2021-01-07 15:58:24 Result: Could not find mount option noexec on file system /dev
2021-01-07 15:58:24 Result: Could not find mount option nosuid on file system /dev
2021-01-07 15:58:24 Result: marked /dev options as non-default (unclear about hardening)
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (4 of 5). Currently having 80 points (out of 100)
2021-01-07 15:58:24 Result: file system /dev/shm not found in /etc/fstab
2021-01-07 15:58:24 Result: file system /home not found in /etc/fstab
2021-01-07 15:58:24 File system: /run
2021-01-07 15:58:24 Expected flags: nodev nosuid
2021-01-07 15:58:24 Found flags: (rw noexec nosuid size=10% mode=0755)
2021-01-07 15:58:24 Result: Could not find mount option nodev on file system /run
2021-01-07 15:58:24 Result: GOOD, found mount option nosuid on file system /run
2021-01-07 15:58:24 Result: marked /run as partially hardened
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (4 of 5). Currently having 84 points (out of 105)
2021-01-07 15:58:24 File system: /tmp
2021-01-07 15:58:24 Expected flags: nodev noexec nosuid
2021-01-07 15:58:24 Found flags: loop nosuid nodev noexec rw
2021-01-07 15:58:24 Result: GOOD, found mount option nodev on file system /tmp
2021-01-07 15:58:24 Result: GOOD, found mount option noexec on file system /tmp
2021-01-07 15:58:24 Result: GOOD, found mount option nosuid on file system /tmp
2021-01-07 15:58:24 Result: marked /tmp as fully hardened
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (5). Currently having 89 points (out of 110)
2021-01-07 15:58:24 Result: file system /var not found in /etc/fstab
2021-01-07 15:58:24 Result: file system /var/log not found in /etc/fstab
2021-01-07 15:58:24 Result: file system /var/log/audit not found in /etc/fstab
2021-01-07 15:58:24 Result: file system /var/tmp not found in /etc/fstab
2021-01-07 15:58:24 Result: Total without nodev:9 noexec:10 nosuid:7 ro or noexec (W^X): 10, of total 18
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6376 (Determine if /var/tmp is bound to /tmp)
2021-01-07 15:58:24 Result: no mount point /var/tmp or expected options found
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6394 (Determine level of swappiness.)
2021-01-07 15:58:24 Test: checking level of vm.swappiness: 60
2021-01-07 15:58:24 Result: vm.swappiness=60 which is the standard level of swappiness and works well for desktop systems.
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6410 (Checking Locate database)
2021-01-07 15:58:24 Test: Checking locate database
2021-01-07 15:58:24 Result: locate database found (/var/lib/mlocate/mlocate.db)
2021-01-07 15:58:24 Result: file /var/lib/locate/locatedb not found
2021-01-07 15:58:24 Result: file /var/lib/locatedb not found
2021-01-07 15:58:24 Result: file /var/lib/slocate/slocate.db not found
2021-01-07 15:58:24 Result: file /var/cache/locate/locatedb not found
2021-01-07 15:58:24 Result: file /var/db/locate.database not found
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID FILE-6430 (Disable mounting of some filesystems)
2021-01-07 15:58:24 Result: found cramfs support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/cramfs/cramfs.ko )
2021-01-07 15:58:24 Test: Checking if cramfs is active
2021-01-07 15:58:24 Result: module cramfs is currently not loaded in the kernel.
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 91 points (out of 113)
2021-01-07 15:58:24 Result: found freevxfs support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/freevxfs/freevxfs.ko )
2021-01-07 15:58:24 Test: Checking if freevxfs is active
2021-01-07 15:58:24 Result: module freevxfs is currently not loaded in the kernel.
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 93 points (out of 116)
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 96 points (out of 119)
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 99 points (out of 122)
2021-01-07 15:58:24 Result: found jffs2 support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/jffs2/jffs2.ko )
2021-01-07 15:58:24 Test: Checking if jffs2 is active
2021-01-07 15:58:24 Result: module jffs2 is currently not loaded in the kernel.
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 101 points (out of 125)
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 104 points (out of 128)
2021-01-07 15:58:24 Result: found udf support in the kernel (output = insmod /lib/modules/4.4.0-142-generic/kernel/fs/udf/udf.ko )
2021-01-07 15:58:24 Test: Checking if udf is active
2021-01-07 15:58:24 Result: module udf is currently not loaded in the kernel.
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (2 of 3). Currently having 106 points (out of 131)
2021-01-07 15:58:24 Suggestion: Consider disabling unused kernel modules [test:FILE-6430] [details:/etc/modprobe.d/blacklist.conf] [solution:Add 'install MODULENAME /bin/true' (without quotes)]
2021-01-07 15:58:24 Security check: file is normal
2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_usb
2021-01-07 15:58:24 File permissions are OK
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Action: Performing tests from category: USB Devices
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID USB-1000 (Check if USB storage is disabled)
2021-01-07 15:58:24 Test: Checking USB storage driver in directory /etc/modprobe.d and configuration file /etc/modprobe.conf
2021-01-07 15:58:24 Result: found usb-storage driver in disabled state (blacklisted)
2021-01-07 15:58:24 Result: usb-storage driver is disabled
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 109 points (out of 134)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID USB-2000 (Check USB authorizations)
2021-01-07 15:58:24 Test: checking presence of USB devices path (/sys/bus/usb/devices)
2021-01-07 15:58:24 Test: Checking USB devices authorization to connect to the system
2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb1 is authorized by default (authorized_default=1)
2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb1 is authorized currently (authorized=1)
2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb2 is authorized by default (authorized_default=1)
2021-01-07 15:58:24 Test: /sys/bus/usb/devices/usb2 is authorized currently (authorized=1)
2021-01-07 15:58:24 Result: Some USB devices are authorized by default (or temporary) to connect to the system
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (0 of 3). Currently having 109 points (out of 137)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID USB-3000 (Check for presence of USBGuard)
2021-01-07 15:58:24 Result: USBGuard not found
2021-01-07 15:58:24 Hardening: assigned partial number of hardening points (0 of 8). Currently having 109 points (out of 145)
2021-01-07 15:58:24 Security check: file is normal
2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_storage
2021-01-07 15:58:24 File permissions are OK
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Action: Performing tests from category: Storage
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID STRG-1846 (Check if firewire storage is disabled)
2021-01-07 15:58:24 Test: Checking firewire storage driver in directory /etc/modprobe.d and configuration file /etc/modprobe.conf
2021-01-07 15:58:24 Result: found firewire ohci driver in disabled state
2021-01-07 15:58:24 Result: firewire ohci driver is disabled
2021-01-07 15:58:24 Hardening: assigned maximum number of hardening points for this item (3). Currently having 112 points (out of 148)
2021-01-07 15:58:24 Security check: file is normal
2021-01-07 15:58:24 Checking permissions of /root/scans/lynis/include/tests_storage_nfs
2021-01-07 15:58:24 File permissions are OK
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Action: Performing tests from category: NFS
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test STRG-1902 (Check rpcinfo registered programs)
2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test STRG-1904 (Check nfs rpc)
2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test STRG-1906 (Check nfs rpc)
2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Performing test ID STRG-1920 (Checking NFS daemon)
2021-01-07 15:58:24 Test: Checking running NFS daemon
2021-01-07 15:58:24 Output: NFS daemon is not running
2021-01-07 15:58:24 ====
2021-01-07 15:58:24 Skipped test STRG-1926 (Checking NFS exports)
2021-01-07 15:58:24 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test STRG-1928 (Checking empty /etc/exports)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test STRG-1930 (Check client access to nfs share)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 Security check: file is normal
2021-01-07 15:58:25 Checking permissions of /root/scans/lynis/include/tests_nameservices
2021-01-07 15:58:25 File permissions are OK
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Action: Performing tests from category: Name services
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4016 (Check /etc/resolv.conf default domain)
2021-01-07 15:58:25 Test: check /etc/resolv.conf for default domain
2021-01-07 15:58:25 Result: /etc/resolv.conf found
2021-01-07 15:58:25 Result: no default domain found
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4018 (Check /etc/resolv.conf search domains)
2021-01-07 15:58:25 Test: check /etc/resolv.conf for search domains
2021-01-07 15:58:25 Result: /etc/resolv.conf found
2021-01-07 15:58:25 Found search domain: localdomain
2021-01-07 15:58:25 Result: Found 1 search domains
2021-01-07 15:58:25 Result: found 1 line(s) with a search statement (expecting less than 2 lines)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4020 (Check non default options)
2021-01-07 15:58:25 Test: check /etc/resolv.conf for non default options
2021-01-07 15:58:25 Result: /etc/resolv.conf found
2021-01-07 15:58:25 Result: no specific other options configured in /etc/resolv.conf
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4024 (Solaris uname -n output)
2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4026 (Check /etc/nodename)
2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4028 (Check domain name)
2021-01-07 15:58:25 Test: Checking if dnsdomainname command is available
2021-01-07 15:58:25 Result: dnsdomainname command returned no value
2021-01-07 15:58:25 Result: using domain name from FQDN hostname (ubuntu1404)
2021-01-07 15:58:25 Suggestion: Check DNS configuration for the dns domain name [test:NAME-4028] [details:-] [solution:-]
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4032 (Check nscd status)
2021-01-07 15:58:25 Test: checking nscd status
2021-01-07 15:58:25 Performing pgrep scan without uid
2021-01-07 15:58:25 IsRunning: process 'nscd' not found
2021-01-07 15:58:25 Result: nscd is not running
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4034 (Check Unbound status)
2021-01-07 15:58:25 Test: checking Unbound (unbound) status
2021-01-07 15:58:25 Performing pgrep scan without uid
2021-01-07 15:58:25 IsRunning: process 'unbound' not found
2021-01-07 15:58:25 Result: Unbound daemon is not running
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4036 (Check Unbound configuration file)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4202 (Check BIND status)
2021-01-07 15:58:25 Test: Checking for running BIND instance
2021-01-07 15:58:25 Performing pgrep scan without uid
2021-01-07 15:58:25 IsRunning: process 'named' not found
2021-01-07 15:58:25 Result: BIND not running
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4204 (Search BIND configuration file)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4206 (Check BIND configuration consistency)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4210 (Check DNS banner)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4230 (Check PowerDNS status)
2021-01-07 15:58:25 Test: Checking for running PowerDNS instance
2021-01-07 15:58:25 Performing pgrep scan without uid
2021-01-07 15:58:25 IsRunning: process 'pdns_server' not found
2021-01-07 15:58:25 Result: PowerDNS not running
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4232 (Search PowerDNS configuration file)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4236 (Check PowerDNS backends)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4238 (Check PowerDNS authoritative status)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4304 (Check NIS ypbind status)
2021-01-07 15:58:25 Test: Checking status of ypbind daemon
2021-01-07 15:58:25 Performing pgrep scan without uid
2021-01-07 15:58:25 IsRunning: process 'ypbind' not found
2021-01-07 15:58:25 Result: ypbind is not active
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test NAME-4306 (Check NIS domain)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4402 (Check duplicate line in /etc/hosts)
2021-01-07 15:58:25 Test: check duplicate line in /etc/hosts
2021-01-07 15:58:25 Result: OK, no duplicate lines found
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4404 (Check /etc/hosts contains an entry for this server name)
2021-01-07 15:58:25 Test: Check /etc/hosts contains an entry for this server name
2021-01-07 15:58:25 Result: Found entry for ubuntu1404 in /etc/hosts
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4406 (Check server hostname mapping)
2021-01-07 15:58:25 Test: Check server hostname not locally mapped in /etc/hosts
2021-01-07 15:58:25 Result: this server hostname is not mapped to a local address
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID NAME-4408 (Check localhost entry)
2021-01-07 15:58:25 Test: Check server hostname not locally mapped in /etc/hosts
2021-01-07 15:58:25 Result: localhost mapped to ::1
2021-01-07 15:58:25 Security check: file is normal
2021-01-07 15:58:25 Checking permissions of /root/scans/lynis/include/tests_dns
2021-01-07 15:58:25 File permissions are OK
2021-01-07 15:58:25 Security check: file is normal
2021-01-07 15:58:25 Checking permissions of /root/scans/lynis/include/tests_ports_packages
2021-01-07 15:58:25 File permissions are OK
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Action: Performing tests from category: Ports and packages
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7301 (Query FreeBSD pkg)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7302 (Query FreeBSD/NetBSD pkg_info)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7303 (Query brew package manager)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 Result: brew can NOT be found on this system
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7304 (Querying Gentoo packages)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 Result: emerge can NOT be found on this system
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7306 (Querying Solaris packages)
2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:25 Result: pkginfo can NOT be found on this system
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7308 (Checking package list with RPM)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 Result: RPM binary NOT found on this system, test skipped
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7310 (Checking package list with pacman)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7312 (Checking available updates for pacman based system)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 Result: pacman binary NOT found on this system, test skipped
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7314 (Checking pacman configuration options)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7320 (Checking for arch-audit tooling)
2021-01-07 15:58:25 Reason to skip: Test only applies to Arch Linux
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7322 (Discover vulnerable packages with arch-audit)
2021-01-07 15:58:25 Reason to skip: arch-audit not found
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7328 (Querying Zypper for installed packages)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7330 (Querying Zypper for vulnerable packages)
2021-01-07 15:58:25 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7332 (Query macOS ports)
2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (macOS only)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Skipped test PKGS-7334 (Query port for port upgrades)
2021-01-07 15:58:25 Reason to skip: Incorrect guest OS (macOS only)
2021-01-07 15:58:25 ====
2021-01-07 15:58:25 Performing test ID PKGS-7345 (Querying dpkg)
2021-01-07 15:58:25 Result: Found dpkg binary
2021-01-07 15:58:25 Test: Querying dpkg -l to get package list
2021-01-07 15:58:25 Output:
2021-01-07 15:58:25 Found package: accountsservice (version: 0.6.35-0ubuntu7.3)
2021-01-07 15:58:25 Found package: acct (version: 6.5.5-1ubuntu5)
2021-01-07 15:58:25 Found package: acpid (version: 1:2.0.21-1ubuntu2)
2021-01-07 15:58:25 Found package: adduser (version: 3.113+nmu3ubuntu3)
2021-01-07 15:58:25 Found package: amd64-microcode (version: 3.20180524.1~ubuntu0.14.04.2+really20130710.1ubuntu1)
2021-01-07 15:58:25 Found package: apparmor (version: 2.10.95-0ubuntu2.6~14.04.4)
2021-01-07 15:58:25 Found package: apport (version: 2.14.1-0ubuntu3.29)
2021-01-07 15:58:25 Found package: apport-symptoms (version: 0.20)
2021-01-07 15:58:25 Found package: apt (version: 1.0.1ubuntu2.24)
2021-01-07 15:58:25 Found package: apt-transport-https (version: 1.0.1ubuntu2.24)
2021-01-07 15:58:25 Found package: apt-utils (version: 1.0.1ubuntu2.24)
2021-01-07 15:58:25 Found package: apt-xapian-index (version: 0.45ubuntu4)
2021-01-07 15:58:25 Found package: aptitude (version: 0.6.8.2-1ubuntu4)
2021-01-07 15:58:25 Found package: aptitude-common (version: 0.6.8.2-1ubuntu4)
2021-01-07 15:58:25 Found package: base-files (version: 7.2ubuntu5.6)
2021-01-07 15:58:25 Found package: base-passwd (version: 3.5.33)
2021-01-07 15:58:25 Found package: bash (version: 4.3-7ubuntu1.7)
2021-01-07 15:58:25 Found package: bash-completion (version: 1:2.1-4ubuntu0.2)
2021-01-07 15:58:25 Found package: bc (version: 1.06.95-8ubuntu1)
2021-01-07 15:58:25 Found package: bind9-host (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:25 Found package: binutils (version: 2.24-5ubuntu14.2)
2021-01-07 15:58:25 Found package: biosdevname (version: 0.4.1-0ubuntu6.3)
2021-01-07 15:58:25 Found package: bsdmainutils (version: 9.0.5ubuntu1)
2021-01-07 15:58:25 Found package: bsdutils (version: 1:2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:25 Found package: busybox-initramfs (version: 1:1.21.0-1ubuntu1.4)
2021-01-07 15:58:25 Found package: busybox-static (version: 1:1.21.0-1ubuntu1.4)
2021-01-07 15:58:25 Found package: byobu (version: 5.77-0ubuntu1.2)
2021-01-07 15:58:25 Found package: bzip2 (version: 1.0.6-5)
2021-01-07 15:58:25 Found package: ca-certificates (version: 20170717~14.04.2)
2021-01-07 15:58:25 Found package: chkrootkit (version: 0.49-4.1ubuntu1.14.04.1)
2021-01-07 15:58:25 Found package: command-not-found (version: 0.3ubuntu12)
2021-01-07 15:58:25 Found package: command-not-found-data (version: 0.3ubuntu12)
2021-01-07 15:58:25 Found package: console-setup (version: 1.70ubuntu8)
2021-01-07 15:58:25 Found package: coreutils (version: 8.21-1ubuntu5.4)
2021-01-07 15:58:25 Found package: cpio (version: 2.11+dfsg-1ubuntu1.2)
2021-01-07 15:58:25 Found package: cracklib-runtime (version: 2.9.1-1build1)
2021-01-07 15:58:25 Found package: crda (version: 1.1.2-1ubuntu2)
2021-01-07 15:58:25 Found package: cron (version: 3.0pl1-124ubuntu2)
2021-01-07 15:58:25 Found package: curl (version: 7.35.0-1ubuntu2.20)
2021-01-07 15:58:25 Found package: dash (version: 0.5.7-4ubuntu1)
2021-01-07 15:58:25 Found package: dbus (version: 1.6.18-0ubuntu4.5)
2021-01-07 15:58:25 Found package: debconf (version: 1.5.51ubuntu2)
2021-01-07 15:58:25 Found package: debconf-i18n (version: 1.5.51ubuntu2)
2021-01-07 15:58:25 Found package: debianutils (version: 4.4)
2021-01-07 15:58:25 Found package: dh-python (version: 1.20140128-1ubuntu8.2)
2021-01-07 15:58:25 Found package: diffutils (version: 1:3.3-1)
2021-01-07 15:58:25 Found package: dmidecode (version: 2.12-2)
2021-01-07 15:58:25 Found package: dmsetup (version: 2:1.02.77-6ubuntu2)
2021-01-07 15:58:25 Found package: dnsutils (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:25 Found package: dosfstools (version: 3.0.26-1ubuntu0.1)
2021-01-07 15:58:25 Found package: dpkg (version: 1.17.5ubuntu5.8)
2021-01-07 15:58:25 Found package: e2fslibs:amd64 (version: 1.42.9-3ubuntu1.3)
2021-01-07 15:58:25 Found package: e2fsprogs (version: 1.42.9-3ubuntu1.3)
2021-01-07 15:58:25 Found package: ed (version: 1.9-2)
2021-01-07 15:58:25 Found package: eject (version: 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1)
2021-01-07 15:58:25 Found package: ethtool (version: 1:3.13-1)
2021-01-07 15:58:25 Found package: fail2ban (version: 0.8.11-1)
2021-01-07 15:58:25 Found package: file (version: 1:5.14-2ubuntu3.4)
2021-01-07 15:58:25 Found package: findutils (version: 4.4.2-7)
2021-01-07 15:58:25 Found package: fonts-ubuntu-font-family-console (version: 0.80-0ubuntu6)
2021-01-07 15:58:25 Found package: friendly-recovery (version: 0.2.25)
2021-01-07 15:58:25 Found package: ftp (version: 0.17-28)
2021-01-07 15:58:25 Found package: fuse (version: 2.9.2-4ubuntu4.14.04.1)
2021-01-07 15:58:25 Found package: gawk (version: 1:4.0.1+dfsg-2.1ubuntu2)
2021-01-07 15:58:25 Found package: gcc-4.8-base:amd64 (version: 4.8.4-2ubuntu1~14.04.4)
2021-01-07 15:58:25 Found package: gcc-4.9-base:amd64 (version: 4.9.3-0ubuntu4)
2021-01-07 15:58:25 Found package: geoip-database (version: 20140313-1)
2021-01-07 15:58:25 Found package: gettext-base (version: 0.18.3.1-1ubuntu3.1)
2021-01-07 15:58:25 Found package: gir1.2-glib-2.0 (version: 1.40.0-1ubuntu0.2)
2021-01-07 15:58:25 Found package: git (version: 1:1.9.1-1ubuntu0.10)
2021-01-07 15:58:25 Found package: git-man (version: 1:1.9.1-1ubuntu0.10)
2021-01-07 15:58:25 Found package: gnupg (version: 1.4.16-1ubuntu2.6)
2021-01-07 15:58:25 Found package: gpgv (version: 1.4.16-1ubuntu2.6)
2021-01-07 15:58:25 Found package: grep (version: 2.16-1)
2021-01-07 15:58:25 Found package: groff-base (version: 1.22.2-5)
2021-01-07 15:58:25 Found package: grub-common (version: 2.02~beta2-9ubuntu1.17)
2021-01-07 15:58:25 Found package: grub-gfxpayload-lists (version: 0.6)
2021-01-07 15:58:25 Found package: grub-pc (version: 2.02~beta2-9ubuntu1.17)
2021-01-07 15:58:25 Found package: grub-pc-bin (version: 2.02~beta2-9ubuntu1.17)
2021-01-07 15:58:25 Found package: grub2-common (version: 2.02~beta2-9ubuntu1.17)
2021-01-07 15:58:25 Found package: gzip (version: 1.6-3ubuntu1)
2021-01-07 15:58:25 Found package: hdparm (version: 9.43-1ubuntu3)
2021-01-07 15:58:25 Found package: hostname (version: 3.15ubuntu1)
2021-01-07 15:58:25 Found package: ifupdown (version: 0.7.47.2ubuntu4.5)
2021-01-07 15:58:25 Found package: info (version: 5.2.0.dfsg.1-2)
2021-01-07 15:58:25 Found package: init-system-helpers (version: 1.14ubuntu1)
2021-01-07 15:58:25 Found package: initramfs-tools (version: 0.103ubuntu4.11)
2021-01-07 15:58:25 Found package: initramfs-tools-bin (version: 0.103ubuntu4.11)
2021-01-07 15:58:25 Found package: initscripts (version: 2.88dsf-41ubuntu6.3)
2021-01-07 15:58:25 Found package: insserv (version: 1.14.0-5ubuntu2)
2021-01-07 15:58:25 Found package: install-info (version: 5.2.0.dfsg.1-2)
2021-01-07 15:58:25 Found package: installation-report (version: 2.54ubuntu1)
2021-01-07 15:58:25 Found package: intel-microcode (version: 3.20190618.0ubuntu0.14.04.1)
2021-01-07 15:58:25 Found package: iproute2 (version: 3.12.0-2ubuntu1.2)
2021-01-07 15:58:25 Found package: iptables (version: 1.4.21-1ubuntu1)
2021-01-07 15:58:25 Found package: iputils-ping (version: 3:20121221-4ubuntu1.1)
2021-01-07 15:58:25 Found package: iputils-tracepath (version: 3:20121221-4ubuntu1.1)
2021-01-07 15:58:25 Found package: irqbalance (version: 1.0.6-2ubuntu0.14.04.4)
2021-01-07 15:58:25 Found package: isc-dhcp-client (version: 4.2.4-7ubuntu12.13)
2021-01-07 15:58:25 Found package: isc-dhcp-common (version: 4.2.4-7ubuntu12.13)
2021-01-07 15:58:25 Found package: iso-codes (version: 3.52-1)
2021-01-07 15:58:25 Found package: iucode-tool (version: 1.0.1-1)
2021-01-07 15:58:26 Found package: john (version: 1.8.0-1)
2021-01-07 15:58:26 Found package: john-data (version: 1.8.0-1)
2021-01-07 15:58:26 Found package: kbd (version: 1.15.5-1ubuntu1)
2021-01-07 15:58:26 Found package: keyboard-configuration (version: 1.70ubuntu8)
2021-01-07 15:58:26 Found package: klibc-utils (version: 2.0.3-0ubuntu1.14.04.3)
2021-01-07 15:58:26 Found package: kmod (version: 15-0ubuntu7)
2021-01-07 15:58:26 Found package: krb5-locales (version: 1.12+dfsg-2ubuntu5.4)
2021-01-07 15:58:26 Found package: landscape-common (version: 14.12-0ubuntu6.14.04.4)
2021-01-07 15:58:26 Found package: language-pack-en (version: 1:14.04+20160720)
2021-01-07 15:58:26 Found package: language-pack-en-base (version: 1:14.04+20160720)
2021-01-07 15:58:26 Found package: language-selector-common (version: 0.129.3)
2021-01-07 15:58:26 Found package: laptop-detect (version: 0.13.7ubuntu2)
2021-01-07 15:58:26 Found package: less (version: 458-2)
2021-01-07 15:58:26 Found package: libaccountsservice0:amd64 (version: 0.6.35-0ubuntu7.3)
2021-01-07 15:58:26 Found package: libacl1:amd64 (version: 2.2.52-1)
2021-01-07 15:58:26 Found package: libapparmor-perl (version: 2.10.95-0ubuntu2.6~14.04.4)
2021-01-07 15:58:26 Found package: libapparmor1:amd64 (version: 2.10.95-0ubuntu2.6~14.04.4)
2021-01-07 15:58:26 Found package: libapt-inst1.5:amd64 (version: 1.0.1ubuntu2.24)
2021-01-07 15:58:26 Found package: libapt-pkg4.12:amd64 (version: 1.0.1ubuntu2.24)
2021-01-07 15:58:26 Found package: libarchive-extract-perl (version: 0.70-1)
2021-01-07 15:58:26 Found package: libasn1-8-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libasprintf0c2:amd64 (version: 0.18.3.1-1ubuntu3.1)
2021-01-07 15:58:26 Found package: libattr1:amd64 (version: 1:2.4.47-1ubuntu1)
2021-01-07 15:58:26 Found package: libaudit-common (version: 1:2.3.2-2ubuntu1)
2021-01-07 15:58:26 Found package: libaudit1:amd64 (version: 1:2.3.2-2ubuntu1)
2021-01-07 15:58:26 Found package: libbind9-90 (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:26 Found package: libblkid1:amd64 (version: 2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:26 Found package: libboost-iostreams1.54.0:amd64 (version: 1.54.0-4ubuntu3.1)
2021-01-07 15:58:26 Found package: libbsd0:amd64 (version: 0.6.0-2ubuntu1)
2021-01-07 15:58:26 Found package: libbz2-1.0:amd64 (version: 1.0.6-5)
2021-01-07 15:58:26 Found package: libc-bin (version: 2.19-0ubuntu6.15)
2021-01-07 15:58:26 Found package: libc6:amd64 (version: 2.19-0ubuntu6.15)
2021-01-07 15:58:26 Found package: libcap-ng0 (version: 0.7.3-1ubuntu2)
2021-01-07 15:58:26 Found package: libcap2-bin (version: 1:2.24-0ubuntu2)
2021-01-07 15:58:26 Found package: libcap2:amd64 (version: 1:2.24-0ubuntu2)
2021-01-07 15:58:26 Found package: libcgmanager0:amd64 (version: 0.24-0ubuntu7.5)
2021-01-07 15:58:26 Found package: libck-connector0:amd64 (version: 0.4.5-3.1ubuntu2)
2021-01-07 15:58:26 Found package: libclass-accessor-perl (version: 0.34-1)
2021-01-07 15:58:26 Found package: libcomerr2:amd64 (version: 1.42.9-3ubuntu1.3)
2021-01-07 15:58:26 Found package: libcrack2:amd64 (version: 2.9.1-1build1)
2021-01-07 15:58:26 Found package: libcurl3-gnutls:amd64 (version: 7.35.0-1ubuntu2.20)
2021-01-07 15:58:26 Found package: libcurl3:amd64 (version: 7.35.0-1ubuntu2.20)
2021-01-07 15:58:26 Found package: libcurses-perl (version: 1.28-1build3)
2021-01-07 15:58:26 Found package: libcurses-ui-perl (version: 0.9609-1)
2021-01-07 15:58:26 Found package: libcwidget3 (version: 0.5.16-3.5ubuntu1)
2021-01-07 15:58:26 Found package: libdb5.3:amd64 (version: 5.3.28-3ubuntu3.1)
2021-01-07 15:58:26 Found package: libdbus-1-3:amd64 (version: 1.6.18-0ubuntu4.5)
2021-01-07 15:58:26 Found package: libdbus-glib-1-2:amd64 (version: 0.100.2-1)
2021-01-07 15:58:26 Found package: libdebconfclient0:amd64 (version: 0.187ubuntu1)
2021-01-07 15:58:26 Found package: libdevmapper1.02.1:amd64 (version: 2:1.02.77-6ubuntu2)
2021-01-07 15:58:26 Found package: libdns100 (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:26 Found package: libdrm2:amd64 (version: 2.4.67-1ubuntu0.14.04.2)
2021-01-07 15:58:26 Found package: libedit2:amd64 (version: 3.1-20130712-2)
2021-01-07 15:58:26 Found package: libelf1:amd64 (version: 0.158-0ubuntu5.3)
2021-01-07 15:58:26 Found package: libept1.4.12:amd64 (version: 1.0.12)
2021-01-07 15:58:26 Found package: liberror-perl (version: 0.17-1.1)
2021-01-07 15:58:26 Found package: libestr0 (version: 0.1.9-0ubuntu2)
2021-01-07 15:58:26 Found package: libevent-2.0-5:amd64 (version: 2.0.21-stable-1ubuntu1.14.04.2)
2021-01-07 15:58:26 Found package: libexpat1:amd64 (version: 2.1.0-4ubuntu1.4)
2021-01-07 15:58:26 Found package: libffi6:amd64 (version: 3.1~rc1+r3.0.13-12ubuntu0.2)
2021-01-07 15:58:26 Found package: libfreetype6:amd64 (version: 2.5.2-1ubuntu2.8)
2021-01-07 15:58:26 Found package: libfribidi0:amd64 (version: 0.19.6-1)
2021-01-07 15:58:26 Found package: libfuse2:amd64 (version: 2.9.2-4ubuntu4.14.04.1)
2021-01-07 15:58:26 Found package: libgc1c2:amd64 (version: 1:7.2d-5ubuntu2.1)
2021-01-07 15:58:26 Found package: libgcc1:amd64 (version: 1:4.9.3-0ubuntu4)
2021-01-07 15:58:26 Found package: libgck-1-0:amd64 (version: 3.10.1-1)
2021-01-07 15:58:26 Found package: libgcr-3-common (version: 3.10.1-1)
2021-01-07 15:58:26 Found package: libgcr-base-3-1:amd64 (version: 3.10.1-1)
2021-01-07 15:58:26 Found package: libgcrypt11:amd64 (version: 1.5.3-2ubuntu4.6)
2021-01-07 15:58:26 Found package: libgdbm3:amd64 (version: 1.8.3-12build1)
2021-01-07 15:58:26 Found package: libgeoip1:amd64 (version: 1.6.0-1)
2021-01-07 15:58:26 Found package: libgirepository-1.0-1 (version: 1.40.0-1ubuntu0.2)
2021-01-07 15:58:26 Found package: libglib2.0-0:amd64 (version: 2.40.2-0ubuntu1.1)
2021-01-07 15:58:26 Found package: libglib2.0-data (version: 2.40.2-0ubuntu1.1)
2021-01-07 15:58:26 Found package: libgnutls-openssl27:amd64 (version: 2.12.23-12ubuntu2.8)
2021-01-07 15:58:26 Found package: libgnutls26:amd64 (version: 2.12.23-12ubuntu2.8)
2021-01-07 15:58:26 Found package: libgpg-error0:amd64 (version: 1.12-0.2ubuntu1)
2021-01-07 15:58:26 Found package: libgpm2:amd64 (version: 1.20.4-6.1)
2021-01-07 15:58:26 Found package: libgssapi-krb5-2:amd64 (version: 1.12+dfsg-2ubuntu5.4)
2021-01-07 15:58:26 Found package: libgssapi3-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libhcrypto4-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libheimbase1-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libheimntlm0-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libhx509-5-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libidn11:amd64 (version: 1.28-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libio-string-perl (version: 1.08-3)
2021-01-07 15:58:26 Found package: libisc95 (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:26 Found package: libisccc90 (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:26 Found package: libisccfg90 (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:26 Found package: libiw30:amd64 (version: 30~pre9-8ubuntu1)
2021-01-07 15:58:26 Found package: libjson-c2:amd64 (version: 0.11-3ubuntu1.2)
2021-01-07 15:58:26 Found package: libjson0:amd64 (version: 0.11-3ubuntu1.2)
2021-01-07 15:58:26 Found package: libk5crypto3:amd64 (version: 1.12+dfsg-2ubuntu5.4)
2021-01-07 15:58:26 Found package: libkeyutils1:amd64 (version: 1.5.6-1)
2021-01-07 15:58:26 Found package: libklibc (version: 2.0.3-0ubuntu1.14.04.3)
2021-01-07 15:58:26 Found package: libkmod2:amd64 (version: 15-0ubuntu7)
2021-01-07 15:58:26 Found package: libkrb5-26-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libkrb5-3:amd64 (version: 1.12+dfsg-2ubuntu5.4)
2021-01-07 15:58:26 Found package: libkrb5support0:amd64 (version: 1.12+dfsg-2ubuntu5.4)
2021-01-07 15:58:26 Found package: libldap-2.4-2:amd64 (version: 2.4.31-1+nmu2ubuntu8.5)
2021-01-07 15:58:26 Found package: liblocale-gettext-perl (version: 1.05-7build3)
2021-01-07 15:58:26 Found package: liblockfile-bin (version: 1.09-6ubuntu1)
2021-01-07 15:58:26 Found package: liblockfile1:amd64 (version: 1.09-6ubuntu1)
2021-01-07 15:58:26 Found package: liblog-message-simple-perl (version: 0.10-1)
2021-01-07 15:58:26 Found package: liblwres90 (version: 1:9.9.5.dfsg-3ubuntu0.19)
2021-01-07 15:58:26 Found package: liblzma5:amd64 (version: 5.1.1alpha+20120614-2ubuntu2)
2021-01-07 15:58:26 Found package: libmagic1:amd64 (version: 1:5.14-2ubuntu3.4)
2021-01-07 15:58:26 Found package: libmodule-pluggable-perl (version: 5.1-1)
2021-01-07 15:58:26 Found package: libmount1:amd64 (version: 2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:26 Found package: libmpdec2:amd64 (version: 2.4.0-6)
2021-01-07 15:58:26 Found package: libncurses5:amd64 (version: 5.9+20140118-1ubuntu1)
2021-01-07 15:58:26 Found package: libncursesw5:amd64 (version: 5.9+20140118-1ubuntu1)
2021-01-07 15:58:26 Found package: libnewt0.52:amd64 (version: 0.52.15-2ubuntu5)
2021-01-07 15:58:26 Found package: libnfnetlink0:amd64 (version: 1.0.1-2)
2021-01-07 15:58:26 Found package: libnih-dbus1:amd64 (version: 1.0.3-4ubuntu25)
2021-01-07 15:58:26 Found package: libnih1:amd64 (version: 1.0.3-4ubuntu25)
2021-01-07 15:58:26 Found package: libnl-3-200:amd64 (version: 3.2.21-1ubuntu4.1)
2021-01-07 15:58:26 Found package: libnl-genl-3-200:amd64 (version: 3.2.21-1ubuntu4.1)
2021-01-07 15:58:26 Found package: libnuma1:amd64 (version: 2.0.9~rc5-1ubuntu3.14.04.2)
2021-01-07 15:58:26 Found package: libp11-kit0:amd64 (version: 0.20.2-2ubuntu2)
2021-01-07 15:58:26 Found package: libpam-cap:amd64 (version: 1:2.24-0ubuntu2)
2021-01-07 15:58:26 Found package: libpam-cracklib:amd64 (version: 1.1.8-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libpam-modules-bin (version: 1.1.8-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libpam-modules:amd64 (version: 1.1.8-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libpam-runtime (version: 1.1.8-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libpam-systemd:amd64 (version: 204-5ubuntu20.31)
2021-01-07 15:58:26 Found package: libpam0g:amd64 (version: 1.1.8-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libparse-debianchangelog-perl (version: 1.2.0-1ubuntu1)
2021-01-07 15:58:26 Found package: libparted0debian1:amd64 (version: 2.3-19ubuntu1.14.04.1)
2021-01-07 15:58:26 Found package: libpcap0.8:amd64 (version: 1.5.3-2)
2021-01-07 15:58:26 Found package: libpci3:amd64 (version: 1:3.2.1-1ubuntu5.1)
2021-01-07 15:58:26 Found package: libpcre3:amd64 (version: 1:8.31-2ubuntu2.3)
2021-01-07 15:58:26 Found package: libpcsclite1:amd64 (version: 1.8.10-1ubuntu1.1)
2021-01-07 15:58:26 Found package: libpipeline1:amd64 (version: 1.3.0-1)
2021-01-07 15:58:26 Found package: libplymouth2:amd64 (version: 0.8.8-0ubuntu17.2)
2021-01-07 15:58:26 Found package: libpng12-0:amd64 (version: 1.2.50-1ubuntu2.14.04.3)
2021-01-07 15:58:26 Found package: libpod-latex-perl (version: 0.61-1)
2021-01-07 15:58:26 Found package: libpolkit-agent-1-0:amd64 (version: 0.105-4ubuntu3.14.04.6)
2021-01-07 15:58:26 Found package: libpolkit-backend-1-0:amd64 (version: 0.105-4ubuntu3.14.04.6)
2021-01-07 15:58:26 Found package: libpolkit-gobject-1-0:amd64 (version: 0.105-4ubuntu3.14.04.6)
2021-01-07 15:58:26 Found package: libpopt0:amd64 (version: 1.16-8ubuntu1)
2021-01-07 15:58:26 Found package: libprocps3:amd64 (version: 1:3.3.9-1ubuntu2.3)
2021-01-07 15:58:26 Found package: libpython-stdlib:amd64 (version: 2.7.5-5ubuntu3)
2021-01-07 15:58:26 Found package: libpython2.7-minimal:amd64 (version: 2.7.6-8ubuntu0.5)
2021-01-07 15:58:26 Found package: libpython2.7-stdlib:amd64 (version: 2.7.6-8ubuntu0.5)
2021-01-07 15:58:26 Found package: libpython2.7:amd64 (version: 2.7.6-8ubuntu0.5)
2021-01-07 15:58:26 Found package: libpython3-stdlib:amd64 (version: 3.4.0-0ubuntu2)
2021-01-07 15:58:26 Found package: libpython3.4-minimal:amd64 (version: 3.4.3-1ubuntu1~14.04.7)
2021-01-07 15:58:26 Found package: libpython3.4-stdlib:amd64 (version: 3.4.3-1ubuntu1~14.04.7)
2021-01-07 15:58:26 Found package: libreadline5:amd64 (version: 5.2+dfsg-2)
2021-01-07 15:58:26 Found package: libreadline6:amd64 (version: 6.3-4ubuntu2)
2021-01-07 15:58:26 Found package: libroken18-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: librtmp0:amd64 (version: 2.4+20121230.gitdf6c518-1ubuntu0.1)
2021-01-07 15:58:26 Found package: libsasl2-2:amd64 (version: 2.1.25.dfsg1-17build1)
2021-01-07 15:58:26 Found package: libsasl2-modules-db:amd64 (version: 2.1.25.dfsg1-17build1)
2021-01-07 15:58:26 Found package: libsasl2-modules:amd64 (version: 2.1.25.dfsg1-17build1)
2021-01-07 15:58:26 Found package: libselinux1:amd64 (version: 2.2.2-1ubuntu0.1)
2021-01-07 15:58:26 Found package: libsemanage-common (version: 2.2-1)
2021-01-07 15:58:26 Found package: libsemanage1:amd64 (version: 2.2-1)
2021-01-07 15:58:26 Found package: libsepol1:amd64 (version: 2.2-1ubuntu0.1)
2021-01-07 15:58:26 Found package: libsigc++-2.0-0c2a:amd64 (version: 2.2.10-0.2ubuntu2)
2021-01-07 15:58:26 Found package: libsigsegv2:amd64 (version: 2.10-2)
2021-01-07 15:58:26 Found package: libslang2:amd64 (version: 2.2.4-15ubuntu1)
2021-01-07 15:58:26 Found package: libsqlite3-0:amd64 (version: 3.8.2-1ubuntu2.2)
2021-01-07 15:58:26 Found package: libss2:amd64 (version: 1.42.9-3ubuntu1.3)
2021-01-07 15:58:26 Found package: libssl1.0.0:amd64 (version: 1.0.1f-1ubuntu2.27)
2021-01-07 15:58:26 Found package: libstdc++6:amd64 (version: 4.8.4-2ubuntu1~14.04.4)
2021-01-07 15:58:26 Found package: libsub-name-perl (version: 0.05-1build4)
2021-01-07 15:58:26 Found package: libsystemd-daemon0:amd64 (version: 204-5ubuntu20.31)
2021-01-07 15:58:26 Found package: libsystemd-login0:amd64 (version: 204-5ubuntu20.31)
2021-01-07 15:58:26 Found package: libtasn1-6:amd64 (version: 3.4-3ubuntu0.6)
2021-01-07 15:58:26 Found package: libterm-readkey-perl (version: 2.31-1)
2021-01-07 15:58:26 Found package: libterm-ui-perl (version: 0.42-1)
2021-01-07 15:58:26 Found package: libtext-charwidth-perl (version: 0.04-7build3)
2021-01-07 15:58:26 Found package: libtext-iconv-perl (version: 1.7-5build2)
2021-01-07 15:58:26 Found package: libtext-soundex-perl (version: 3.4-1build1)
2021-01-07 15:58:26 Found package: libtext-wrapi18n-perl (version: 0.06-7)
2021-01-07 15:58:26 Found package: libtimedate-perl (version: 2.3000-1)
2021-01-07 15:58:26 Found package: libtinfo5:amd64 (version: 5.9+20140118-1ubuntu1)
2021-01-07 15:58:26 Found package: libudev1:amd64 (version: 204-5ubuntu20.31)
2021-01-07 15:58:26 Found package: libusb-0.1-4:amd64 (version: 2:0.1.12-23.3ubuntu1)
2021-01-07 15:58:26 Found package: libusb-1.0-0:amd64 (version: 2:1.0.17-1ubuntu2)
2021-01-07 15:58:26 Found package: libustr-1.0-1:amd64 (version: 1.0.4-3ubuntu2)
2021-01-07 15:58:26 Found package: libuuid1:amd64 (version: 2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:26 Found package: libwind0-heimdal:amd64 (version: 1.6~git20131207+dfsg-1ubuntu1.2)
2021-01-07 15:58:26 Found package: libwrap0:amd64 (version: 7.6.q-25)
2021-01-07 15:58:26 Found package: libx11-6:amd64 (version: 2:1.6.2-1ubuntu2.1)
2021-01-07 15:58:26 Found package: libx11-data (version: 2:1.6.2-1ubuntu2.1)
2021-01-07 15:58:26 Found package: libxapian22 (version: 1.2.16-2ubuntu1)
2021-01-07 15:58:26 Found package: libxau6:amd64 (version: 1:1.0.8-1)
2021-01-07 15:58:26 Found package: libxcb1:amd64 (version: 1.10-2ubuntu1)
2021-01-07 15:58:26 Found package: libxdmcp6:amd64 (version: 1:1.1.1-1)
2021-01-07 15:58:26 Found package: libxext6:amd64 (version: 2:1.3.2-1ubuntu0.0.14.04.1)
2021-01-07 15:58:26 Found package: libxml2:amd64 (version: 2.9.1+dfsg1-3ubuntu4.13)
2021-01-07 15:58:26 Found package: libxmuu1:amd64 (version: 2:1.1.1-1)
2021-01-07 15:58:26 Found package: libxtables10 (version: 1.4.21-1ubuntu1)
2021-01-07 15:58:26 Found package: libyaml-0-2:amd64 (version: 0.1.4-3ubuntu3.1)
2021-01-07 15:58:26 Found package: linux-base (version: 4.5ubuntu1~14.04.1)
2021-01-07 15:58:26 Found package: linux-firmware (version: 1.127.24)
2021-01-07 15:58:26 Found package: linux-generic-lts-xenial (version: 4.4.0.148.130)
2021-01-07 15:58:26 Found package: linux-headers-4.4.0-142 (version: 4.4.0-142.168~14.04.1)
2021-01-07 15:58:26 Found package: linux-headers-4.4.0-142-generic (version: 4.4.0-142.168~14.04.1)
2021-01-07 15:58:26 Found package: linux-headers-4.4.0-148 (version: 4.4.0-148.174~14.04.1)
2021-01-07 15:58:26 Found package: linux-headers-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1)
2021-01-07 15:58:26 Found package: linux-headers-generic-lts-xenial (version: 4.4.0.148.130)
2021-01-07 15:58:26 Found package: linux-image-4.4.0-142-generic (version: 4.4.0-142.168~14.04.1)
2021-01-07 15:58:26 Found package: linux-image-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1)
2021-01-07 15:58:26 Found package: linux-image-extra-4.4.0-142-generic (version: 4.4.0-142.168~14.04.1)
2021-01-07 15:58:26 Found package: linux-image-generic-lts-xenial (version: 4.4.0.148.130)
2021-01-07 15:58:26 Found package: linux-modules-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1)
2021-01-07 15:58:26 Found package: linux-modules-extra-4.4.0-148-generic (version: 4.4.0-148.174~14.04.1)
2021-01-07 15:58:26 Found package: locales (version: 2.13+git20120306-12.1)
2021-01-07 15:58:26 Found package: lockfile-progs (version: 0.1.17)
2021-01-07 15:58:26 Found package: login (version: 1:4.1.5.1-1ubuntu9.5)
2021-01-07 15:58:26 Found package: logrotate (version: 3.8.7-1ubuntu1.2)
2021-01-07 15:58:26 Found package: lsb-base (version: 4.1+Debian11ubuntu6.2)
2021-01-07 15:58:26 Found package: lsb-release (version: 4.1+Debian11ubuntu6.2)
2021-01-07 15:58:26 Found package: lshw (version: 02.16-2ubuntu1.4)
2021-01-07 15:58:26 Found package: lsof (version: 4.86+dfsg-1ubuntu2)
2021-01-07 15:58:26 Found package: ltrace (version: 0.7.3-4ubuntu5.1)
2021-01-07 15:58:26 Found package: m4 (version: 1.4.17-2ubuntu1)
2021-01-07 15:58:26 Found package: make (version: 3.81-8.2ubuntu3)
2021-01-07 15:58:26 Found package: makedev (version: 2.3.1-93ubuntu2~ubuntu14.04.1)
2021-01-07 15:58:26 Found package: man-db (version: 2.6.7.1-1ubuntu1)
2021-01-07 15:58:26 Found package: manpages (version: 3.54-1ubuntu1)
2021-01-07 15:58:26 Found package: mawk (version: 1.3.3-17ubuntu2)
2021-01-07 15:58:26 Found package: memtest86+ (version: 4.20-1.1ubuntu8)
2021-01-07 15:58:26 Found package: mime-support (version: 3.54ubuntu1.1)
2021-01-07 15:58:26 Found package: mlocate (version: 0.26-1ubuntu1)
2021-01-07 15:58:26 Found package: module-init-tools (version: 15-0ubuntu7)
2021-01-07 15:58:26 Found package: mount (version: 2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:26 Found package: mountall (version: 2.53ubuntu1)
2021-01-07 15:58:26 Found package: mtr-tiny (version: 0.85-2)
2021-01-07 15:58:26 Found package: multiarch-support (version: 2.19-0ubuntu6.15)
2021-01-07 15:58:26 Found package: nano (version: 2.2.6-1ubuntu1)
2021-01-07 15:58:26 Found package: ncurses-base (version: 5.9+20140118-1ubuntu1)
2021-01-07 15:58:26 Found package: ncurses-bin (version: 5.9+20140118-1ubuntu1)
2021-01-07 15:58:26 Found package: ncurses-term (version: 5.9+20140118-1ubuntu1)
2021-01-07 15:58:27 Found package: net-tools (version: 1.60-25ubuntu2.1)
2021-01-07 15:58:27 Found package: netbase (version: 5.2)
2021-01-07 15:58:27 Found package: netcat-openbsd (version: 1.105-7ubuntu1)
2021-01-07 15:58:27 Found package: ntfs-3g (version: 1:2013.1.13AR.1-2ubuntu2)
2021-01-07 15:58:27 Found package: ntpdate (version: 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13)
2021-01-07 15:58:27 Found package: openssh-client (version: 1:6.6p1-2ubuntu2.13)
2021-01-07 15:58:27 Found package: openssh-server (version: 1:6.6p1-2ubuntu2.13)
2021-01-07 15:58:27 Found package: openssh-sftp-server (version: 1:6.6p1-2ubuntu2.13)
2021-01-07 15:58:27 Found package: openssl (version: 1.0.1f-1ubuntu2.27)
2021-01-07 15:58:27 Found package: os-prober (version: 1.63ubuntu1.1)
2021-01-07 15:58:27 Found package: parted (version: 2.3-19ubuntu1.14.04.1)
2021-01-07 15:58:27 Found package: passwd (version: 1:4.1.5.1-1ubuntu9.5)
2021-01-07 15:58:27 Found package: patch (version: 2.7.1-4ubuntu2.4)
2021-01-07 15:58:27 Found package: pciutils (version: 1:3.2.1-1ubuntu5.1)
2021-01-07 15:58:27 Found package: perl (version: 5.18.2-2ubuntu1.7)
2021-01-07 15:58:27 Found package: perl-base (version: 5.18.2-2ubuntu1.7)
2021-01-07 15:58:27 Found package: perl-modules (version: 5.18.2-2ubuntu1.7)
2021-01-07 15:58:27 Found package: plymouth (version: 0.8.8-0ubuntu17.2)
2021-01-07 15:58:27 Found package: plymouth-theme-ubuntu-text (version: 0.8.8-0ubuntu17.2)
2021-01-07 15:58:27 Found package: policykit-1 (version: 0.105-4ubuntu3.14.04.6)
2021-01-07 15:58:27 Found package: popularity-contest (version: 1.57ubuntu1)
2021-01-07 15:58:27 Found package: portsentry (version: 1.2-13)
2021-01-07 15:58:27 Found package: powermgmt-base (version: 1.31build1)
2021-01-07 15:58:27 Found package: ppp (version: 2.4.5-5.1ubuntu2.3)
2021-01-07 15:58:27 Found package: pppconfig (version: 2.3.19ubuntu1)
2021-01-07 15:58:27 Found package: pppoeconf (version: 1.20ubuntu1)
2021-01-07 15:58:27 Found package: procmail (version: 3.22-21ubuntu0.2)
2021-01-07 15:58:27 Found package: procps (version: 1:3.3.9-1ubuntu2.3)
2021-01-07 15:58:27 Found package: psmisc (version: 22.20-1ubuntu2)
2021-01-07 15:58:27 Found package: python (version: 2.7.5-5ubuntu3)
2021-01-07 15:58:27 Found package: python-apt (version: 0.9.3.5ubuntu3)
2021-01-07 15:58:27 Found package: python-apt-common (version: 0.9.3.5ubuntu3)
2021-01-07 15:58:27 Found package: python-chardet (version: 2.0.1-2build2)
2021-01-07 15:58:27 Found package: python-configobj (version: 4.7.2+ds-5build1)
2021-01-07 15:58:27 Found package: python-debian (version: 0.1.21+nmu2ubuntu2)
2021-01-07 15:58:27 Found package: python-gdbm (version: 2.7.5-1ubuntu1)
2021-01-07 15:58:27 Found package: python-minimal (version: 2.7.5-5ubuntu3)
2021-01-07 15:58:27 Found package: python-openssl (version: 0.13-2ubuntu6)
2021-01-07 15:58:27 Found package: python-pam (version: 0.4.2-13.1ubuntu3)
2021-01-07 15:58:27 Found package: python-pkg-resources (version: 3.3-1ubuntu2)
2021-01-07 15:58:27 Found package: python-pyinotify (version: 0.9.4-1build1)
2021-01-07 15:58:27 Found package: python-requests (version: 2.2.1-1ubuntu0.4)
2021-01-07 15:58:27 Found package: python-serial (version: 2.6-1build1)
2021-01-07 15:58:27 Found package: python-six (version: 1.5.2-1ubuntu1.1)
2021-01-07 15:58:27 Found package: python-twisted-bin (version: 13.2.0-1ubuntu1.2)
2021-01-07 15:58:27 Found package: python-twisted-core (version: 13.2.0-1ubuntu1.2)
2021-01-07 15:58:27 Found package: python-urllib3 (version: 1.7.1-1ubuntu4.1)
2021-01-07 15:58:27 Found package: python-xapian (version: 1.2.16-2ubuntu1)
2021-01-07 15:58:27 Found package: python-zope.interface (version: 4.0.5-1ubuntu4)
2021-01-07 15:58:27 Found package: python2.7 (version: 2.7.6-8ubuntu0.5)
2021-01-07 15:58:27 Found package: python2.7-minimal (version: 2.7.6-8ubuntu0.5)
2021-01-07 15:58:27 Found package: python3 (version: 3.4.0-0ubuntu2)
2021-01-07 15:58:27 Found package: python3-apport (version: 2.14.1-0ubuntu3.29)
2021-01-07 15:58:27 Found package: python3-apt (version: 0.9.3.5ubuntu3)
2021-01-07 15:58:27 Found package: python3-commandnotfound (version: 0.3ubuntu12)
2021-01-07 15:58:27 Found package: python3-dbus (version: 1.2.0-2build2)
2021-01-07 15:58:27 Found package: python3-distupgrade (version: 1:0.220.11)
2021-01-07 15:58:27 Found package: python3-gdbm:amd64 (version: 3.4.3-1~14.04.2)
2021-01-07 15:58:27 Found package: python3-gi (version: 3.12.0-1ubuntu1)
2021-01-07 15:58:27 Found package: python3-minimal (version: 3.4.0-0ubuntu2)
2021-01-07 15:58:27 Found package: python3-newt (version: 0.52.15-2ubuntu5)
2021-01-07 15:58:27 Found package: python3-pkg-resources (version: 3.3-1ubuntu2)
2021-01-07 15:58:27 Found package: python3-problem-report (version: 2.14.1-0ubuntu3.29)
2021-01-07 15:58:27 Found package: python3-pycurl (version: 7.19.3-0ubuntu3)
2021-01-07 15:58:27 Found package: python3-software-properties (version: 0.92.37.8)
2021-01-07 15:58:27 Found package: python3-update-manager (version: 1:0.196.25)
2021-01-07 15:58:27 Found package: python3-yaml (version: 3.10-4ubuntu0.1)
2021-01-07 15:58:27 Found package: python3.4 (version: 3.4.3-1ubuntu1~14.04.7)
2021-01-07 15:58:27 Found package: python3.4-minimal (version: 3.4.3-1ubuntu1~14.04.7)
2021-01-07 15:58:27 Found package: readline-common (version: 6.3-4ubuntu2)
2021-01-07 15:58:27 Found package: resolvconf (version: 1.69ubuntu1.4)
2021-01-07 15:58:27 Found package: rsync (version: 3.1.0-2ubuntu0.4)
2021-01-07 15:58:27 Found package: rsyslog (version: 7.4.4-1ubuntu2.7)
2021-01-07 15:58:27 Found package: run-one (version: 1.17-0ubuntu1)
2021-01-07 15:58:27 Found package: screen (version: 4.1.0~20120320gitdb59704-9)
2021-01-07 15:58:27 Found package: sed (version: 4.2.2-4ubuntu1)
2021-01-07 15:58:27 Found package: sendmail (version: 8.14.4-4.1ubuntu1.1)
2021-01-07 15:58:27 Found package: sendmail-base (version: 8.14.4-4.1ubuntu1.1)
2021-01-07 15:58:27 Found package: sendmail-bin (version: 8.14.4-4.1ubuntu1.1)
2021-01-07 15:58:27 Found package: sendmail-cf (version: 8.14.4-4.1ubuntu1.1)
2021-01-07 15:58:27 Found package: sensible-mda (version: 8.14.4-4.1ubuntu1.1)
2021-01-07 15:58:27 Found package: sensible-utils (version: 0.0.9ubuntu0.14.04.1)
2021-01-07 15:58:27 Found package: sgml-base (version: 1.26+nmu4ubuntu1)
2021-01-07 15:58:27 Found package: shared-mime-info (version: 1.2-0ubuntu3)
2021-01-07 15:58:27 Found package: software-properties-common (version: 0.92.37.8)
2021-01-07 15:58:27 Found package: ssh-import-id (version: 3.21-0ubuntu1)
2021-01-07 15:58:27 Found package: strace (version: 4.8-1ubuntu5)
2021-01-07 15:58:27 Found package: sudo (version: 1.8.9p5-1ubuntu1.4)
2021-01-07 15:58:27 Found package: systemd-services (version: 204-5ubuntu20.31)
2021-01-07 15:58:27 Found package: systemd-shim (version: 6-2bzr1)
2021-01-07 15:58:27 Found package: sysv-rc (version: 2.88dsf-41ubuntu6.3)
2021-01-07 15:58:27 Found package: sysv-rc-conf (version: 0.99-7)
2021-01-07 15:58:27 Found package: sysvinit-utils (version: 2.88dsf-41ubuntu6.3)
2021-01-07 15:58:27 Found package: tar (version: 1.27.1-1ubuntu0.1)
2021-01-07 15:58:27 Found package: tasksel (version: 2.88ubuntu15)
2021-01-07 15:58:27 Found package: tasksel-data (version: 2.88ubuntu15)
2021-01-07 15:58:27 Found package: tcpd (version: 7.6.q-25)
2021-01-07 15:58:27 Found package: tcpdump (version: 4.9.2-0ubuntu0.14.04.1)
2021-01-07 15:58:27 Found package: telnet (version: 0.17-36build2)
2021-01-07 15:58:27 Found package: tiger (version: 1:3.2.3-12)
2021-01-07 15:58:27 Found package: time (version: 1.7-24)
2021-01-07 15:58:27 Found package: tmux (version: 1.8-5)
2021-01-07 15:58:27 Found package: tripwire (version: 2.4.2.2-3)
2021-01-07 15:58:27 Found package: tzdata (version: 2019a-0ubuntu0.14.04)
2021-01-07 15:58:27 Found package: ubuntu-advantage-tools (version: 19.6~ubuntu14.04.4)
2021-01-07 15:58:27 Found package: ubuntu-keyring (version: 2012.05.19)
2021-01-07 15:58:27 Found package: ubuntu-minimal (version: 1.325.1)
2021-01-07 15:58:27 Found package: ubuntu-release-upgrader-core (version: 1:0.220.11)
2021-01-07 15:58:27 Found package: ubuntu-standard (version: 1.325.1)
2021-01-07 15:58:27 Found package: ucf (version: 3.0027+nmu1)
2021-01-07 15:58:27 Found package: udev (version: 204-5ubuntu20.31)
2021-01-07 15:58:27 Found package: ufw (version: 0.34~rc-0ubuntu2)
2021-01-07 15:58:27 Found package: unattended-upgrades (version: 0.82.1ubuntu2.5)
2021-01-07 15:58:27 Found package: unhide (version: 20121229-1)
2021-01-07 15:58:27 Found package: update-manager-core (version: 1:0.196.25)
2021-01-07 15:58:27 Found package: update-notifier-common (version: 0.154.1ubuntu8)
2021-01-07 15:58:27 Found package: upstart (version: 1.12.1-0ubuntu4.2)
2021-01-07 15:58:27 Found package: ureadahead (version: 0.100.0-16)
2021-01-07 15:58:27 Found package: usbutils (version: 1:007-2ubuntu1.1)
2021-01-07 15:58:27 Found package: util-linux (version: 2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:27 Found package: uuid-runtime (version: 2.20.1-5.1ubuntu20.9)
2021-01-07 15:58:27 Found package: vim (version: 2:7.4.052-1ubuntu3.1)
2021-01-07 15:58:27 Found package: vim-common (version: 2:7.4.052-1ubuntu3.1)
2021-01-07 15:58:27 Found package: vim-runtime (version: 2:7.4.052-1ubuntu3.1)
2021-01-07 15:58:27 Found package: vim-tiny (version: 2:7.4.052-1ubuntu3.1)
2021-01-07 15:58:27 Found package: w3m (version: 0.5.3-15ubuntu0.2)
2021-01-07 15:58:27 Found package: wamerican (version: 7.1-1)
2021-01-07 15:58:27 Found package: wget (version: 1.15-1ubuntu1.14.04.5)
2021-01-07 15:58:27 Found package: whiptail (version: 0.52.15-2ubuntu5)
2021-01-07 15:58:27 Found package: whois (version: 5.1.1)
2021-01-07 15:58:27 Found package: wireless-regdb (version: 2013.02.13-1ubuntu1)
2021-01-07 15:58:27 Found package: wireless-tools (version: 30~pre9-8ubuntu1)
2021-01-07 15:58:27 Found package: wpasupplicant (version: 2.1-0ubuntu1.7)
2021-01-07 15:58:27 Found package: xauth (version: 1:1.0.7-1ubuntu1)
2021-01-07 15:58:27 Found package: xkb-data (version: 2.10.1-1ubuntu1)
2021-01-07 15:58:27 Found package: xml-core (version: 0.13+nmu2)
2021-01-07 15:58:27 Found package: xz-utils (version: 5.1.1alpha+20120614-2ubuntu2)
2021-01-07 15:58:27 Found package: zlib1g:amd64 (version: 1:1.2.8.dfsg-1ubuntu1.1)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Performing test ID PKGS-7346 (Search unpurged packages on system)
2021-01-07 15:58:27 Test: Querying dpkg -l to get unpurged packages
2021-01-07 15:58:27 Result: no packages found with left overs
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7348 (Check for old distfiles)
2021-01-07 15:58:27 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7350 (Checking for installed packages with DNF utility)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7352 (Checking for security updates with DNF utility)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7354 (Checking package database integrity)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7366 (Checking for debsecan utility)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Performing test ID PKGS-7370 (Checking for debsums utility)
2021-01-07 15:58:27 Result: debsums utility is not installed.
2021-01-07 15:58:27 Hardening: assigned partial number of hardening points (0 of 2). Currently having 112 points (out of 150)
2021-01-07 15:58:27 Suggestion: Install debsums utility for the verification of packages with known good database. [test:PKGS-7370] [details:-] [solution:-]
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7378 (Query portmaster for port upgrades)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7380 (Check for vulnerable NetBSD packages)
2021-01-07 15:58:27 Reason to skip: Incorrect guest OS (NetBSD only)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7381 (Check for vulnerable FreeBSD packages with pkg)
2021-01-07 15:58:27 Reason to skip: pkg tool not available
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7382 (Check for vulnerable FreeBSD packages with portaudit)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7383 (Check for YUM package update management)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7384 (Check for YUM utils package)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7386 (Check for YUM security package)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Skipped test PKGS-7387 (Check for GPG signing in YUM security package)
2021-01-07 15:58:27 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Performing test ID PKGS-7388 (Check security repository in apt sources.list file)
2021-01-07 15:58:27 Searching for security.debian.org/security.ubuntu.com or security repositories in /etc/apt/sources.list file
2021-01-07 15:58:27 Result: Found security repository in /etc/apt/sources.list
2021-01-07 15:58:27 Output: deb http://security.ubuntu.com/ubuntu trusty-security main restricted
2021-01-07 15:58:27 Output: deb-src http://security.ubuntu.com/ubuntu trusty-security main restricted
2021-01-07 15:58:27 Output: deb http://security.ubuntu.com/ubuntu trusty-security universe
2021-01-07 15:58:27 Output: deb-src http://security.ubuntu.com/ubuntu trusty-security universe
2021-01-07 15:58:27 Output: deb http://security.ubuntu.com/ubuntu trusty-security multiverse
2021-01-07 15:58:27 Output: deb-src http://security.ubuntu.com/ubuntu trusty-security multiverse
2021-01-07 15:58:27 Searching for security.debian.org/security.ubuntu.com or security repositories in /etc/apt/sources.list.d directory
2021-01-07 15:58:27 Result: Found security repository in one or more files in directory /etc/apt/sources.list.d
2021-01-07 15:58:27 Output: /etc/apt/sources.list.d/ubuntu-esm-infra-trusty.list:deb https://esm.ubuntu.com/ubuntu trusty-infra-security main
2021-01-07 15:58:27 Result: security repository was found
2021-01-07 15:58:27 Hardening: assigned maximum number of hardening points for this item (3). Currently having 115 points (out of 153)
2021-01-07 15:58:27 ====
2021-01-07 15:58:27 Performing test ID PKGS-7390 (Check Ubuntu database consistency)
2021-01-07 15:58:27 Test: Package database consistency by running apt-get check
2021-01-07 15:58:28 Result: package database seems to be consistent.
2021-01-07 15:58:28 ====
2021-01-07 15:58:28 Performing test ID PKGS-7392 (Check for Debian/Ubuntu security updates)
2021-01-07 15:58:28 Action: updating package repository with apt-get
2021-01-07 15:58:34 Result: apt-get finished
2021-01-07 15:58:34 Test: Checking if /usr/lib/update-notifier/apt-check exists
2021-01-07 15:58:34 Result: found /usr/lib/update-notifier/apt-check
2021-01-07 15:58:34 Test: checking if any of the updates contain security updates
2021-01-07 15:58:36 Result: no vulnerable packages found via apt-check
2021-01-07 15:58:36 Result: no vulnerable packages found
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Skipped test PKGS-7393 (Check for Gentoo vulnerable packages)
2021-01-07 15:58:36 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Performing test ID PKGS-7394 (Check for Ubuntu updates)
2021-01-07 15:58:36 Test: checking /usr/bin/apt-show-versions
2021-01-07 15:58:36 Result: /usr/bin/apt-show-versions not found
2021-01-07 15:58:36 Suggestion: Install package apt-show-versions for patch management purposes [test:PKGS-7394] [details:-] [solution:-]
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Performing test ID PKGS-7398 (Check for package audit tool)
2021-01-07 15:58:36 Test: checking for package audit tool
2021-01-07 15:58:36 Result: found package audit tool: apt-check
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Performing test ID PKGS-7410 (Count installed kernel packages)
2021-01-07 15:58:36 Test: Checking how many kernel packages are installed
2021-01-07 15:58:36 Result: found 2 kernel packages on the system, which is fine
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Performing test ID PKGS-7420 (Detect toolkit to automatically download and apply upgrades)
2021-01-07 15:58:36 Result: found unattended-upgrade
2021-01-07 15:58:36 Hardening: assigned maximum number of hardening points for this item (5). Currently having 120 points (out of 158)
2021-01-07 15:58:36 Security check: file is normal
2021-01-07 15:58:36 Checking permissions of /root/scans/lynis/include/tests_networking
2021-01-07 15:58:36 File permissions are OK
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Action: Performing tests from category: Networking
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Performing test ID NETW-2400 (Hostname length and value check)
2021-01-07 15:58:36 Result: FQDN is defined and not longer than 253 characters (10 characters)
2021-01-07 15:58:36 Result: hostnamed is defined and not longer than 63 characters
2021-01-07 15:58:36 Result: good, no unexpected characters discovered in hostname
2021-01-07 15:58:36 ====
2021-01-07 15:58:36 Performing test ID NETW-2600 (Checking IPv6 configuration)
2021-01-07 15:58:37 Result: IPV6 mode is auto
2021-01-07 15:58:37 Result: IPv6 only configuration: NO
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-2704 (Basic nameserver configuration tests)
2021-01-07 15:58:37 Test: Checking /etc/resolv.conf file
2021-01-07 15:58:37 Result: Found /etc/resolv.conf file
2021-01-07 15:58:37 Test: Querying nameservers
2021-01-07 15:58:37 Found nameserver: 192.168.37.2
2021-01-07 15:58:37 Nameserver 192.168.37.2 seems to respond to queries from this host.
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-2705 (Check availability two nameservers)
2021-01-07 15:58:37 Result: less than 2 responsive nameservers found
2021-01-07 15:58:37 Warning: Couldn't find 2 responsive nameservers [test:NETW-2705] [details:-] [solution:-]
2021-01-07 15:58:37 Note: Non responsive nameservers can give problems for your system(s). Like the lack of recursive lookups, bad connectivity to update servers etc.
2021-01-07 15:58:37 Suggestion: Check your resolv.conf file and fill in a backup nameserver if possible [test:NETW-2705] [details:-] [solution:-]
2021-01-07 15:58:37 Hardening: assigned partial number of hardening points (1 of 2). Currently having 121 points (out of 160)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test NETW-2706 (Check systemd-resolved and upstream DNSSEC status)
2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:37 Result: Test most likely skipped due to not having resolvectl
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3001 (Find default gateway (route))
2021-01-07 15:58:37 Test: Searching default gateway(s)
2021-01-07 15:58:37 Result: Found default gateway 192.168.37.2
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3004 (Search for available network interfaces)
2021-01-07 15:58:37 Found network interface: lo
2021-01-07 15:58:37 Found network interface: eth0
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3006 (Get network MAC addresses)
2021-01-07 15:58:37 Found MAC address: 00:0c:29:d7:de:37
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3008 (Get network IP addresses)
2021-01-07 15:58:37 Found IPv4 address: 192.168.37.132
2021-01-07 15:58:37 Found IPv4 address: 127.0.0.1
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3012 (Check listening ports)
2021-01-07 15:58:37 Test: Retrieving ss information to find listening ports
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test NETW-3014 (Checking promiscuous interfaces (BSD))
2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3015 (Checking promiscuous interfaces (Linux))
2021-01-07 15:58:37 Test: Using ip binary to retrieve network interfaces
2021-01-07 15:58:37 Test: Checking all interfaces to discover any with promiscuous mode enabled
2021-01-07 15:58:37 Result: No promiscuous interfaces found
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3028 (Checking connections in WAIT state)
2021-01-07 15:58:37 Test: Using netstat for check for connections in WAIT state
2021-01-07 15:58:37 Result: currently 2 connections are in a waiting state (max configured: 5000).
2021-01-07 15:58:37 Result: 2 connections are in WAIT state
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3030 (Checking DHCP client status)
2021-01-07 15:58:37 Performing pgrep scan without uid
2021-01-07 15:58:37 IsRunning: process 'dhclient' found (1277 )
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3032 (Checking for ARP monitoring software)
2021-01-07 15:58:37 Performing pgrep scan without uid
2021-01-07 15:58:37 IsRunning: process 'addrwatch' not found
2021-01-07 15:58:37 Performing pgrep scan without uid
2021-01-07 15:58:37 IsRunning: process 'arpwatch' not found
2021-01-07 15:58:37 Performing pgrep scan without uid
2021-01-07 15:58:37 IsRunning: process 'arpon' not found
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID NETW-3200 (Determine available network protocols)
2021-01-07 15:58:37 Test: checking the status of some network protocols that typically are not used
2021-01-07 15:58:37 Test: now checking module 'dccp'
2021-01-07 15:58:37 Suggestion: Determine if protocol 'dccp' is really needed on this system [test:NETW-3200] [details:-] [solution:-]
2021-01-07 15:58:37 Test: now checking module 'sctp'
2021-01-07 15:58:37 Suggestion: Determine if protocol 'sctp' is really needed on this system [test:NETW-3200] [details:-] [solution:-]
2021-01-07 15:58:37 Test: now checking module 'rds'
2021-01-07 15:58:37 Suggestion: Determine if protocol 'rds' is really needed on this system [test:NETW-3200] [details:-] [solution:-]
2021-01-07 15:58:37 Test: now checking module 'tipc'
2021-01-07 15:58:37 Suggestion: Determine if protocol 'tipc' is really needed on this system [test:NETW-3200] [details:-] [solution:-]
2021-01-07 15:58:37 Security check: file is normal
2021-01-07 15:58:37 Checking permissions of /root/scans/lynis/include/tests_printers_spoolers
2021-01-07 15:58:37 File permissions are OK
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Action: Performing tests from category: Printers and Spools
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2302 (Check for printcap consistency)
2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID PRNT-2304 (Check cupsd status)
2021-01-07 15:58:37 Test: Checking cupsd status
2021-01-07 15:58:37 Performing pgrep scan without uid
2021-01-07 15:58:37 IsRunning: process 'cupsd' not found
2021-01-07 15:58:37 Result: cups daemon not running, cups daemon tests skipped
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2306 (Check CUPSd configuration file)
2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2307 (Check CUPSd configuration file permissions)
2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2308 (Check CUPSd network configuration)
2021-01-07 15:58:37 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Performing test ID PRNT-2314 (Check lpd status)
2021-01-07 15:58:37 Test: Checking lpd status
2021-01-07 15:58:37 Performing pgrep scan without uid
2021-01-07 15:58:37 IsRunning: process 'lpd' not found
2021-01-07 15:58:37 Result: lp daemon not running
2021-01-07 15:58:37 Hardening: assigned maximum number of hardening points for this item (4). Currently having 125 points (out of 164)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2316 (Checking /etc/qconfig file)
2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (AIX only)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2418 (Checking qdaemon printer spooler status)
2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (AIX only)
2021-01-07 15:58:37 ====
2021-01-07 15:58:37 Skipped test PRNT-2420 (Checking old print jobs)
2021-01-07 15:58:37 Reason to skip: Incorrect guest OS (AIX only)
2021-01-07 15:58:37 Security check: file is normal
2021-01-07 15:58:37 Checking permissions of /root/scans/lynis/include/tests_mail_messaging
2021-01-07 15:58:38 File permissions are OK
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Action: Performing tests from category: Software: e-mail and messaging
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID MAIL-8802 (Check Exim status)
2021-01-07 15:58:38 Test: check Exim status
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'exim4' not found
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'exim' not found
2021-01-07 15:58:38 Result: no running Exim processes found
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test MAIL-8804 (Exim configuration options)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID MAIL-8814 (Check postfix process status)
2021-01-07 15:58:38 Test: check Postfix status
2021-01-07 15:58:38 Result: no running Postfix processes found
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test MAIL-8816 (Check Postfix configuration)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test MAIL-8817 (Check Postfix configuration errors)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test MAIL-8818 (Check Postfix configuration: banner)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID MAIL-8820 (Postfix configuration scan)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID MAIL-8838 (Check dovecot process)
2021-01-07 15:58:38 Test: check dovecot status
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'dovecot' not found
2021-01-07 15:58:38 Result: dovecot not found
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID MAIL-8860 (Check Qmail status)
2021-01-07 15:58:38 Test: check Qmail status
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'qmail-smtpd' not found
2021-01-07 15:58:38 Result: no running Qmail processes found
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID MAIL-8880 (Check Sendmail status)
2021-01-07 15:58:38 Test: check sendmail status
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'sendmail' not found
2021-01-07 15:58:38 Result: no running Sendmail processes found
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test MAIL-8920 (Check OpenSMTPD status)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 Security check: file is normal
2021-01-07 15:58:38 Checking permissions of /root/scans/lynis/include/tests_firewalls
2021-01-07 15:58:38 File permissions are OK
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Action: Performing tests from category: Software: firewalls
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4502 (Check iptables kernel module)
2021-01-07 15:58:38 Result: Found iptables in loaded kernel modules
2021-01-07 15:58:38 Found module: ip_tables
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4508 (Check used policies of iptables chains)
2021-01-07 15:58:38 Test: gathering information from table filter
2021-01-07 15:58:38 Result: iptables -- policy is .
2021-01-07 15:58:38 Result:
2021-01-07 15:58:38 Result: iptables filter -- INPUT policy is ACCEPT.
2021-01-07 15:58:38 Result: ACCEPT
2021-01-07 15:58:38 Result: Found ACCEPT for INPUT (table: filter)
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 126 points (out of 167)
2021-01-07 15:58:38 Result: iptables filter -- FORWARD policy is ACCEPT.
2021-01-07 15:58:38 Result: ACCEPT
2021-01-07 15:58:38 Result: iptables filter -- OUTPUT policy is ACCEPT.
2021-01-07 15:58:38 Result: ACCEPT
2021-01-07 15:58:38 Result: iptables filter -- RETURN policy is .
2021-01-07 15:58:38 Result:
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4512 (Check iptables for empty ruleset)
2021-01-07 15:58:38 Result: iptables ruleset seems to be empty (found 2 rules)
2021-01-07 15:58:38 Warning: iptables module(s) loaded, but no rules active [test:FIRE-4512] [details:-] [solution:-]
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4513 (Check iptables for unused rules)
2021-01-07 15:58:38 Result: Found one or more possible unused rules
2021-01-07 15:58:38 Description: Unused rules can be a sign that the firewall rules aren't optimized or up-to-date
2021-01-07 15:58:38 Note: Sometimes rules aren't triggered but still in use. Keep this in mind before cleaning up rules.
2021-01-07 15:58:38 Output: iptables rule numbers: 1 1
2021-01-07 15:58:38 Suggestion: Check iptables rules to see which rules are currently not used [test:FIRE-4513] [details:-] [solution:-]
2021-01-07 15:58:38 Tip: iptables --list --numeric --line-numbers --verbose
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4518 (Check pf firewall components)
2021-01-07 15:58:38 Reason to skip: No /dev/pf device
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4520 (Check pf configuration consistency)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4524 (Check for CSF presence)
2021-01-07 15:58:38 Test: check /etc/csf/csf.conf
2021-01-07 15:58:38 Result: /etc/csf/csf.conf does NOT exist
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4526 (Check ipf status)
2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4530 (Check IPFW status)
2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4532 (Check macOS application firewall)
2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (macOS only)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4534 (Check for presence of outbound firewalls on macOS)
2021-01-07 15:58:38 Reason to skip: Incorrect guest OS (macOS only)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4536 (Check nftables status)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4538 (Check nftables basic configuration)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test FIRE-4540 (Check for empty nftables configuration)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4586 (Check firewall logging)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4590 (Check firewall status)
2021-01-07 15:58:38 Result: host based firewall or packet filter is active
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (5). Currently having 130 points (out of 169)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID FIRE-4594 (Check for APF presence)
2021-01-07 15:58:38 Test: check /etc/apf/conf.apf
2021-01-07 15:58:38 Result: /etc/apf/conf.apf does NOT exist
2021-01-07 15:58:38 Security check: file is normal
2021-01-07 15:58:38 Checking permissions of /root/scans/lynis/include/tests_webservers
2021-01-07 15:58:38 File permissions are OK
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Action: Performing tests from category: Software: webserver
2021-01-07 15:58:38 Action: created temporary file /tmp/lynis.MDp0DxOuKJ
2021-01-07 15:58:38 Action: created temporary file /tmp/lynis.poIeU4RToD
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID HTTP-6622 (Checking Apache presence)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6624 (Testing main Apache configuration file)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6626 (Testing other Apache configuration file)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6632 (Determining all available Apache modules)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6640 (Determining existence of specific Apache modules)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6641 (Determining existence of specific Apache modules)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6643 (Determining existence of specific Apache modules)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID HTTP-6702 (Check nginx process)
2021-01-07 15:58:38 Test: searching running nginx process
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'nginx' not found
2021-01-07 15:58:38 Result: no running nginx process found
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6704 (Check nginx configuration file)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6706 (Check for additional nginx configuration files)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6708 (Check discovered nginx configuration settings)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6710 (Check nginx SSL configuration settings)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6712 (Check nginx access logging)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6714 (Check for missing error logs in nginx)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6716 (Check for debug mode on error log in nginx)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Skipped test HTTP-6720 (Check Nginx log files)
2021-01-07 15:58:38 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:38 Security check: file is normal
2021-01-07 15:58:38 Checking permissions of /root/scans/lynis/include/tests_ssh
2021-01-07 15:58:38 File permissions are OK
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Action: Performing tests from category: SSH Support
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID SSH-7402 (Check for running SSH daemon)
2021-01-07 15:58:38 Test: Searching for a SSH daemon
2021-01-07 15:58:38 Performing pgrep scan without uid
2021-01-07 15:58:38 IsRunning: process 'sshd' found (1341 )
2021-01-07 15:58:38 Action: created temporary file /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID SSH-7404 (Check SSH daemon file location)
2021-01-07 15:58:38 Test: searching for sshd_config file
2021-01-07 15:58:38 Result: /etc/ssh/sshd_config exists
2021-01-07 15:58:38 Test: check if we can access /etc/ssh/sshd_config (escaped: /etc/ssh/sshd_config)
2021-01-07 15:58:38 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:38 Result: file /etc/ssh/sshd_config is readable (or directory accessible).
2021-01-07 15:58:38 Result: using last found configuration file: /etc/ssh/sshd_config
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID SSH-7406 (Determine OpenSSH version)
2021-01-07 15:58:38 Result: discovered OpenSSH version is 6.6.1
2021-01-07 15:58:38 Result: OpenSSH major version: 6
2021-01-07 15:58:38 Result: OpenSSH minor version: 6
2021-01-07 15:58:38 ====
2021-01-07 15:58:38 Performing test ID SSH-7408 (Check SSH specific defined options)
2021-01-07 15:58:38 Test: Checking specific defined options in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: added additional options for OpenSSH 6.x and lower
2021-01-07 15:58:38 Test: Checking AllowTcpForwarding in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option AllowTcpForwarding found
2021-01-07 15:58:38 Result: Option AllowTcpForwarding value is YES
2021-01-07 15:58:38 Result: OpenSSH option AllowTcpForwarding is in a weak configuration state and should be fixed
2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:AllowTcpForwarding (set YES to NO)] [solution:-]
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (0 of 3). Currently having 130 points (out of 172)
2021-01-07 15:58:38 Test: Checking ClientAliveCountMax in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option ClientAliveCountMax found
2021-01-07 15:58:38 Result: Option ClientAliveCountMax value is 3
2021-01-07 15:58:38 Result: OpenSSH option ClientAliveCountMax is configured reasonably
2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:ClientAliveCountMax (set 3 to 2)] [solution:-]
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 131 points (out of 175)
2021-01-07 15:58:38 Test: Checking ClientAliveInterval in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option ClientAliveInterval found
2021-01-07 15:58:38 Result: Option ClientAliveInterval value is 0
2021-01-07 15:58:38 Result: OpenSSH option ClientAliveInterval is configured very well
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 134 points (out of 178)
2021-01-07 15:58:38 Test: Checking Compression in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option Compression found
2021-01-07 15:58:38 Result: Option Compression value is YES
2021-01-07 15:58:38 Result: OpenSSH option Compression is in a weak configuration state and should be fixed
2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:Compression (set YES to NO)] [solution:-]
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (0 of 3). Currently having 134 points (out of 181)
2021-01-07 15:58:38 Test: Checking FingerprintHash in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option FingerprintHash not found in output
2021-01-07 15:58:38 Test: Checking GatewayPorts in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option GatewayPorts found
2021-01-07 15:58:38 Result: Option GatewayPorts value is NO
2021-01-07 15:58:38 Result: OpenSSH option GatewayPorts is configured very well
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 137 points (out of 184)
2021-01-07 15:58:38 Test: Checking IgnoreRhosts in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option IgnoreRhosts found
2021-01-07 15:58:38 Result: Option IgnoreRhosts value is YES
2021-01-07 15:58:38 Result: OpenSSH option IgnoreRhosts is configured very well
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 140 points (out of 187)
2021-01-07 15:58:38 Test: Checking LoginGraceTime in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option LoginGraceTime found
2021-01-07 15:58:38 Result: Option LoginGraceTime value is 120
2021-01-07 15:58:38 Result: OpenSSH option LoginGraceTime is configured very well
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 143 points (out of 190)
2021-01-07 15:58:38 Test: Checking LogLevel in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option LogLevel found
2021-01-07 15:58:38 Result: Option LogLevel value is INFO
2021-01-07 15:58:38 Result: OpenSSH option LogLevel is configured reasonably
2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:LogLevel (set INFO to VERBOSE)] [solution:-]
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 144 points (out of 193)
2021-01-07 15:58:38 Test: Checking MaxAuthTries in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option MaxAuthTries found
2021-01-07 15:58:38 Result: Option MaxAuthTries value is 6
2021-01-07 15:58:38 Result: OpenSSH option MaxAuthTries is configured reasonably
2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:MaxAuthTries (set 6 to 3)] [solution:-]
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (1 of 3). Currently having 145 points (out of 196)
2021-01-07 15:58:38 Test: Checking MaxSessions in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option MaxSessions found
2021-01-07 15:58:38 Result: Option MaxSessions value is 10
2021-01-07 15:58:38 Result: OpenSSH option MaxSessions is in a weak configuration state and should be fixed
2021-01-07 15:58:38 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:MaxSessions (set 10 to 2)] [solution:-]
2021-01-07 15:58:38 Hardening: assigned partial number of hardening points (0 of 3). Currently having 145 points (out of 199)
2021-01-07 15:58:38 Test: Checking PermitRootLogin in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option PermitRootLogin found
2021-01-07 15:58:38 Result: Option PermitRootLogin value is WITHOUT-PASSWORD
2021-01-07 15:58:38 Expected value has multiple values, testing if active value is in list ((FORCED-COMMANDS-ONLY|NO|PROHIBIT-PASSWORD|WITHOUT-PASSWORD))
2021-01-07 15:58:38 Result: found
2021-01-07 15:58:38 Result: OpenSSH option PermitRootLogin is configured very well
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 148 points (out of 202)
2021-01-07 15:58:38 Test: Checking PermitUserEnvironment in /tmp/lynis.xSEx85yike
2021-01-07 15:58:38 Result: Option PermitUserEnvironment found
2021-01-07 15:58:38 Result: Option PermitUserEnvironment value is NO
2021-01-07 15:58:38 Result: OpenSSH option PermitUserEnvironment is configured very well
2021-01-07 15:58:38 Hardening: assigned maximum number of hardening points for this item (3). Currently having 151 points (out of 205)
2021-01-07 15:58:39 Test: Checking PermitTunnel in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option PermitTunnel found
2021-01-07 15:58:39 Result: Option PermitTunnel value is NO
2021-01-07 15:58:39 Result: OpenSSH option PermitTunnel is configured very well
2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 154 points (out of 208)
2021-01-07 15:58:39 Test: Checking Port in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option Port found
2021-01-07 15:58:39 Result: Option Port value is 22
2021-01-07 15:58:39 Result: OpenSSH option Port is in a weak configuration state and should be fixed
2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:Port (set 22 to )] [solution:-]
2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 154 points (out of 211)
2021-01-07 15:58:39 Test: Checking PrintLastLog in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option PrintLastLog found
2021-01-07 15:58:39 Result: Option PrintLastLog value is YES
2021-01-07 15:58:39 Result: OpenSSH option PrintLastLog is configured very well
2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 157 points (out of 214)
2021-01-07 15:58:39 Test: Checking StrictModes in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option StrictModes found
2021-01-07 15:58:39 Result: Option StrictModes value is YES
2021-01-07 15:58:39 Result: OpenSSH option StrictModes is configured very well
2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 160 points (out of 217)
2021-01-07 15:58:39 Test: Checking TCPKeepAlive in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option TCPKeepAlive found
2021-01-07 15:58:39 Result: Option TCPKeepAlive value is YES
2021-01-07 15:58:39 Result: OpenSSH option TCPKeepAlive is in a weak configuration state and should be fixed
2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:TCPKeepAlive (set YES to NO)] [solution:-]
2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 160 points (out of 220)
2021-01-07 15:58:39 Test: Checking UseDNS in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option UseDNS found
2021-01-07 15:58:39 Result: Option UseDNS value is YES
2021-01-07 15:58:39 Result: OpenSSH option UseDNS is in a weak configuration state and should be fixed
2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:UseDNS (set YES to NO)] [solution:-]
2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 160 points (out of 223)
2021-01-07 15:58:39 Test: Checking X11Forwarding in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option X11Forwarding found
2021-01-07 15:58:39 Result: Option X11Forwarding value is YES
2021-01-07 15:58:39 Result: OpenSSH option X11Forwarding is in a weak configuration state and should be fixed
2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:X11Forwarding (set YES to NO)] [solution:-]
2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 3). Currently having 160 points (out of 226)
2021-01-07 15:58:39 Test: Checking AllowAgentForwarding in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option AllowAgentForwarding not found in output
2021-01-07 15:58:39 Test: Checking UsePrivilegeSeparation in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option UsePrivilegeSeparation found
2021-01-07 15:58:39 Result: Option UsePrivilegeSeparation value is YES
2021-01-07 15:58:39 Result: OpenSSH option UsePrivilegeSeparation is configured reasonably
2021-01-07 15:58:39 Suggestion: Consider hardening SSH configuration [test:SSH-7408] [details:UsePrivilegeSeparation (set YES to SANDBOX)] [solution:-]
2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (1 of 3). Currently having 161 points (out of 229)
2021-01-07 15:58:39 Test: Checking Protocol in /tmp/lynis.xSEx85yike
2021-01-07 15:58:39 Result: Option Protocol found
2021-01-07 15:58:39 Result: Option Protocol value is 2
2021-01-07 15:58:39 Result: OpenSSH option Protocol is configured very well
2021-01-07 15:58:39 Hardening: assigned maximum number of hardening points for this item (3). Currently having 164 points (out of 232)
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
2021-01-07 15:58:39 Result: AllowUsers is not set
2021-01-07 15:58:39 Result: AllowGroups is not set
2021-01-07 15:58:39 Result: SSH has no specific user or group limitation. Most likely all valid users can SSH to this machine.
2021-01-07 15:58:39 Hardening: assigned partial number of hardening points (0 of 1). Currently having 164 points (out of 233)
2021-01-07 15:58:39 Security check: file is normal
2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_snmp
2021-01-07 15:58:39 File permissions are OK
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Action: Performing tests from category: SNMP Support
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID SNMP-3302 (Check for running SNMP daemon)
2021-01-07 15:58:39 Test: Searching for a SNMP daemon
2021-01-07 15:58:39 Performing pgrep scan without uid
2021-01-07 15:58:39 IsRunning: process 'snmpd' not found
2021-01-07 15:58:39 Result: No running SNMP daemon found
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test SNMP-3304 (Check SNMP daemon file location)
2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test SNMP-3306 (Check SNMP communities)
2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:39 Security check: file is normal
2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_databases
2021-01-07 15:58:39 File permissions are OK
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Action: Performing tests from category: Databases
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1804 (Checking active MySQL process)
2021-01-07 15:58:39 Result: MySQL process not active
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test DBS-1816 (Checking MySQL root password)
2021-01-07 15:58:39 Reason to skip: MySQL not installed, or not running
2021-01-07 15:58:39 Test skipped, MySQL daemon not running or no MySQL client available
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1818 (Check status of MongoDB server)
2021-01-07 15:58:39 Performing pgrep scan without uid
2021-01-07 15:58:39 IsRunning: process 'mongod' not found
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1820 (Check for authorization in MongoDB)
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1826 (Checking active PostgreSQL processes)
2021-01-07 15:58:39 Performing pgrep scan without uid
2021-01-07 15:58:39 IsRunning: process 'postgres:' not found
2021-01-07 15:58:39 Result: PostgreSQL process not active
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test DBS-1828 (Test PostgreSQL configuration)
2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1840 (Checking active Oracle processes)
2021-01-07 15:58:39 Result: Oracle process(es) not active
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1860 (Checking active DB2 instances)
2021-01-07 15:58:39 Performing pgrep scan without uid
2021-01-07 15:58:39 IsRunning: process 'db2sysc' not found
2021-01-07 15:58:39 Result: No DB2 instances are running
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID DBS-1880 (Check for active Redis server)
2021-01-07 15:58:39 Performing pgrep scan without uid
2021-01-07 15:58:39 IsRunning: process 'redis-server' not found
2021-01-07 15:58:39 Result: No Redis processes are running
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test DBS-1882 (Redis configuration file)
2021-01-07 15:58:39 Reason to skip: Redis not running
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test DBS-1884 (Redis: requirepass option configured)
2021-01-07 15:58:39 Reason to skip: Redis not running, or no configuration file found
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test DBS-1886 (Redis: rename-command CONFIG used)
2021-01-07 15:58:39 Reason to skip: Redis not running, or no configuration found
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test DBS-1888 (Redis: bind on localhost)
2021-01-07 15:58:39 Reason to skip: Redis not running, or no configuration found
2021-01-07 15:58:39 Security check: file is normal
2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_ldap
2021-01-07 15:58:39 File permissions are OK
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Action: Performing tests from category: LDAP Services
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID LDAP-2219 (Check running OpenLDAP instance)
2021-01-07 15:58:39 Performing pgrep scan without uid
2021-01-07 15:58:39 IsRunning: process 'slapd' not found
2021-01-07 15:58:39 Result: No running slapd process found.
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Skipped test LDAP-2224 (Check presence slapd.conf)
2021-01-07 15:58:39 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:39 Security check: file is normal
2021-01-07 15:58:39 Checking permissions of /root/scans/lynis/include/tests_php
2021-01-07 15:58:39 File permissions are OK
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Action: Performing tests from category: PHP
2021-01-07 15:58:39 ====
2021-01-07 15:58:39 Performing test ID PHP-2211 (Check php.ini presence)
2021-01-07 15:58:39 Test: Checking for presence php.ini
2021-01-07 15:58:39 Test: checking presence /etc/php.ini
2021-01-07 15:58:39 Result: file /etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php.ini.default
2021-01-07 15:58:39 Result: file /etc/php.ini.default not found
2021-01-07 15:58:39 Test: checking presence /etc/php/php.ini
2021-01-07 15:58:39 Result: file /etc/php/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php7.0/php.ini
2021-01-07 15:58:39 Result: file /etc/php7.0/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php7.1/php.ini
2021-01-07 15:58:39 Result: file /etc/php7.1/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php7.2/php.ini
2021-01-07 15:58:39 Result: file /etc/php7.2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php7.3/php.ini
2021-01-07 15:58:39 Result: file /etc/php7.3/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php7.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php7.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.0/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.0/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.1/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.1/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.3/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.3/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/apache2-php7.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php/apache2-php7.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.0/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.0/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.1/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.1/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.3/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.3/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cgi-php7.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cgi-php7.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.0/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php7.0/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.1/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php7.1/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php7.2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.3/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php7.3/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/cli-php7.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php/cli-php7.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.0/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php7.0/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.1/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php7.1/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php7.2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.3/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php7.3/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/embed-php7.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php/embed-php7.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.3/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.3/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.1/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.1/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php7.0/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php7.0/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/fpm-php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php/fpm-php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/cgi/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/cgi/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/cli/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/cli/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/cli-php5.4/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/cli-php5.4/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/cli-php5.5/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/cli-php5.5/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/cli-php5.6/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/cli-php5.6/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/apache2/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/apache2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php5/fpm/php.ini
2021-01-07 15:58:39 Result: file /etc/php5/fpm/php.ini not found
2021-01-07 15:58:39 Test: checking presence /private/etc/php.ini
2021-01-07 15:58:39 Result: file /private/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.0/apache2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.0/apache2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.1/apache2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.1/apache2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.2/apache2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.2/apache2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.3/apache2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.3/apache2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.4/apache2/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.4/apache2/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.0/cli/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.0/cli/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.0/fpm/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.0/fpm/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.1/cli/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.1/cli/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.1/fpm/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.1/fpm/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.2/cli/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.2/cli/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.2/fpm/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.2/fpm/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.3/cli/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.3/cli/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.3/fpm/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.3/fpm/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.4/cli/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.4/cli/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php/7.4/fpm/php.ini
2021-01-07 15:58:39 Result: file /etc/php/7.4/fpm/php.ini not found
2021-01-07 15:58:39 Test: checking presence /var/www/conf/php.ini
2021-01-07 15:58:39 Result: file /var/www/conf/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/etc/php.ini
2021-01-07 15:58:39 Result: file /usr/local/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/etc/php5/cgi/php.ini
2021-01-07 15:58:39 Result: file /usr/local/etc/php5/cgi/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php54/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php54/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php56/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php56/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php70/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php70/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php71/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php71/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php72/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php72/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php73/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php73/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/php74/lib/php.ini
2021-01-07 15:58:39 Result: file /usr/local/php74/lib/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/local/zend/etc/php.ini
2021-01-07 15:58:39 Result: file /usr/local/zend/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /usr/pkg/etc/php.ini
2021-01-07 15:58:39 Result: file /usr/pkg/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php54/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php54/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php55/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php55/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php56/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php56/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php70/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php70/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php71/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php71/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php72/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php72/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php73/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php73/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/cpanel/ea-php74/root/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/cpanel/ea-php74/root/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php44/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php44/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php51/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php51/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php52/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php52/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php53/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php53/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php54/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php54/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php55/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php55/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php56/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php56/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php70/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php70/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php71/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php71/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php72/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php72/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php73/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php73/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /opt/alt/php74/etc/php.ini
2021-01-07 15:58:39 Result: file /opt/alt/php74/etc/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php56/php.ini
2021-01-07 15:58:39 Result: file /etc/opt/remi/php56/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php70/php.ini
2021-01-07 15:58:39 Result: file /etc/opt/remi/php70/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php71/php.ini
2021-01-07 15:58:39 Result: file /etc/opt/remi/php71/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php72/php.ini
2021-01-07 15:58:39 Result: file /etc/opt/remi/php72/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php73/php.ini
2021-01-07 15:58:39 Result: file /etc/opt/remi/php73/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/opt/remi/php74/php.ini
2021-01-07 15:58:39 Result: file /etc/opt/remi/php74/php.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php-5.6.ini
2021-01-07 15:58:39 Result: file /etc/php-5.6.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php-7.0.ini
2021-01-07 15:58:39 Result: file /etc/php-7.0.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php-7.1.ini
2021-01-07 15:58:39 Result: file /etc/php-7.1.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php-7.2.ini
2021-01-07 15:58:39 Result: file /etc/php-7.2.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php-7.3.ini
2021-01-07 15:58:39 Result: file /etc/php-7.3.ini not found
2021-01-07 15:58:39 Test: checking presence /etc/php-7.4.ini
2021-01-07 15:58:39 Result: file /etc/php-7.4.ini not found
2021-01-07 15:58:39 Result: no files found for /etc/php5/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.0/cli/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.1/cli/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.2/cli/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.3/cli/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.4/cli/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.0/fpm/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.1/fpm/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.2/fpm/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.3/fpm/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php/7.4/fpm/conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php54/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php55/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php56/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php70/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php71/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php72/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php73/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/cpanel/ea-php74/root/etc/php.d
2021-01-07 15:58:39 Result: no files found for /opt/alt/php44/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php51/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php52/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php53/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php54/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php55/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php56/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php70/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php71/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php72/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php73/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /opt/alt/php74/etc/php.d.all
2021-01-07 15:58:39 Result: no files found for /usr/local/lib/php.conf.d
2021-01-07 15:58:39 Result: no files found for /usr/local/php70/lib/php.conf.d
2021-01-07 15:58:39 Result: no files found for /usr/local/php71/lib/php.conf.d
2021-01-07 15:58:39 Result: no files found for /usr/local/php72/lib/php.conf.d
2021-01-07 15:58:39 Result: no files found for /usr/local/php73/lib/php.conf.d
2021-01-07 15:58:39 Result: no files found for /usr/local/php74/lib/php.conf.d
2021-01-07 15:58:39 Result: no files found for /etc/php-5.6
2021-01-07 15:58:39 Result: no files found for /etc/php-7.0
2021-01-07 15:58:39 Result: no files found for /etc/php-7.1
2021-01-07 15:58:39 Result: no files found for /etc/php-7.2
2021-01-07 15:58:39 Result: no files found for /etc/php-7.3
2021-01-07 15:58:39 Result: no files found for /etc/php-7.4
2021-01-07 15:58:40 Result: no php.ini file found
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2320 (Check PHP disabled functions)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2368 (Check PHP register_globals option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2372 (Check PHP expose_php option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2374 (Check PHP enable_dl option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2376 (Check PHP allow_url_fopen option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2378 (Check PHP allow_url_include option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test PHP-2382 (Check PHP expose_php option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 Security check: file is normal
2021-01-07 15:58:40 Checking permissions of /root/scans/lynis/include/tests_squid
2021-01-07 15:58:40 File permissions are OK
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Action: Performing tests from category: Squid Support
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID SQD-3602 (Check for running Squid daemon)
2021-01-07 15:58:40 Test: Searching for a Squid daemon
2021-01-07 15:58:40 Result: No running Squid daemon found
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3604 (Check Squid daemon file location)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3606 (Check Squid version)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3610 (Gather Squid settings)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3613 (Check Squid file permissions)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3614 (Check Squid authentication methods)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3616 (Check external Squid authentication)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3620 (Check Squid access control lists)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3624 (Check Squid safe ports)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3630 (Check Squid reply_body_max_size option)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test SQD-3680 (Check Squid version suppression)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 Security check: file is normal
2021-01-07 15:58:40 Checking permissions of /root/scans/lynis/include/tests_logging
2021-01-07 15:58:40 File permissions are OK
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Action: Performing tests from category: Logging and files
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2130 (Check for running syslog daemon)
2021-01-07 15:58:40 Test: Searching for a logging daemon
2021-01-07 15:58:40 Result: Found a logging daemon
2021-01-07 15:58:40 Hardening: assigned maximum number of hardening points for this item (3). Currently having 167 points (out of 236)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2132 (Check for running syslog-ng daemon)
2021-01-07 15:58:40 Test: Searching for syslog-ng daemon in process list
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'syslog-ng' not found
2021-01-07 15:58:40 Result: Syslog-ng NOT found in process list
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test LOGG-2134 (Checking Syslog-NG configuration file consistency)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2136 (Check for running systemd journal daemon)
2021-01-07 15:58:40 Test: Searching for systemd journal daemon in process list
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'systemd-journal' not found
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2210 (Check for running metalog daemon)
2021-01-07 15:58:40 Test: Searching for metalog daemon in process list
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'metalog' not found
2021-01-07 15:58:40 Result: metalog NOT found in process list
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2230 (Check for running RSyslog daemon)
2021-01-07 15:58:40 Test: Searching for RSyslog daemon in process list
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'rsyslogd' found (497 )
2021-01-07 15:58:40 Result: Found rsyslogd in process list
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2240 (Check for running RFC 3195 compliant daemon)
2021-01-07 15:58:40 Test: Searching for RFC 3195 daemon (alias syslog reliable) in process list
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'rfc3195d' not found
2021-01-07 15:58:40 Result: rfc3195d NOT found in process list
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2138 (Checking kernel logger daemon on Linux)
2021-01-07 15:58:40 Test: Searching kernel logger daemon (klogd)
2021-01-07 15:58:40 Result: test skipped, because other facility is being used to log kernel messages
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2142 (Checking minilog daemon)
2021-01-07 15:58:40 Result: Checking for unkilled minilogd instances
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'minilogd' not found
2021-01-07 15:58:40 Result: No minilogd is running
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2146 (Checking logrotate.conf and logrotate.d)
2021-01-07 15:58:40 Test: Checking for /etc/logrotate.conf
2021-01-07 15:58:40 Result: /etc/logrotate.conf found (file)
2021-01-07 15:58:40 Test: Checking for /etc/logrotate.d (directory)
2021-01-07 15:58:40 Result: /etc/logrotate.d found
2021-01-07 15:58:40 Result: logrotate configuration found
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2148 (Checking logrotated files)
2021-01-07 15:58:40 Test: Checking which files are rotated with logrotate and if they exist
2021-01-07 15:58:40 Result: found one or more files which are rotated via logrotate
2021-01-07 15:58:40 Output: File:/var/log/apport.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/aptitude:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/cron.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/daemon.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/debug:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/lpr.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/mail.info:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/mail.warn:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/messages:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/ppp-connect-errors:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/ufw.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/unattended-upgrades/unattended-upgrades.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/user.log:does_not_exist
2021-01-07 15:58:40 Output: File:/var/log/alternatives.log:exists
2021-01-07 15:58:40 Output: File:/var/log/apport.log:exists
2021-01-07 15:58:40 Output: File:/var/log/apt/history.log:exists
2021-01-07 15:58:40 Output: File:/var/log/apt/term.log:exists
2021-01-07 15:58:40 Output: File:/var/log/aptitude:exists
2021-01-07 15:58:40 Output: File:/var/log/auth.log:exists
2021-01-07 15:58:40 Output: File:/var/log/btmp:exists
2021-01-07 15:58:40 Output: File:/var/log/cron.log:exists
2021-01-07 15:58:40 Output: File:/var/log/daemon.log:exists
2021-01-07 15:58:40 Output: File:/var/log/debug:exists
2021-01-07 15:58:40 Output: File:/var/log/dpkg.log:exists
2021-01-07 15:58:40 Output: File:/var/log/fail2ban.log:exists
2021-01-07 15:58:40 Output: File:/var/log/kern.log:exists
2021-01-07 15:58:40 Output: File:/var/log/lpr.log:exists
2021-01-07 15:58:40 Output: File:/var/log/mail.err:exists
2021-01-07 15:58:40 Output: File:/var/log/mail.info:exists
2021-01-07 15:58:40 Output: File:/var/log/mail.log:exists
2021-01-07 15:58:40 Output: File:/var/log/mail.warn:exists
2021-01-07 15:58:40 Output: File:/var/log/messages:exists
2021-01-07 15:58:40 Output: File:/var/log/ppp-connect-errors:exists
2021-01-07 15:58:40 Output: File:/var/log/syslog:exists
2021-01-07 15:58:40 Output: File:/var/log/ubuntu-advantage.log:exists
2021-01-07 15:58:40 Output: File:/var/log/ufw.log:exists
2021-01-07 15:58:40 Output: File:/var/log/unattended-upgrades/unattended-upgrades-shutdown.log:exists
2021-01-07 15:58:40 Output: File:/var/log/unattended-upgrades/unattended-upgrades.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/console-setup.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/container-detect.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/kmod.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/mountall.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/network-interface-eth0.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/networking.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/procps-static-network-up.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/procps-virtual-filesystems.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/rsyslog.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/systemd-logind.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/ureadahead.log:exists
2021-01-07 15:58:40 Output: File:/var/log/upstart/vmware-tools.log:exists
2021-01-07 15:58:40 Output: File:/var/log/user.log:exists
2021-01-07 15:58:40 Output: File:/var/log/wtmp:exists
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2150 (Checking directories in logrotate configuration)
2021-01-07 15:58:40 Test: Checking which directories can be found in logrotate configuration
2021-01-07 15:58:40 Result: found one or more directories (via logrotate configuration)
2021-01-07 15:58:40 Directory found: /var/log
2021-01-07 15:58:40 Directory found: /var/log/apt
2021-01-07 15:58:40 Directory found: /var/log/unattended-upgrades
2021-01-07 15:58:40 Directory found: /var/log/upstart
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test LOGG-2152 (Checking loghost)
2021-01-07 15:58:40 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test LOGG-2153 (Checking loghost is localhost)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2154 (Checking syslog configuration file)
2021-01-07 15:58:40 Test: analyzing file /etc/rsyslog.conf for remote target
2021-01-07 15:58:40 Result: no remote target found
2021-01-07 15:58:40 Test: analyzing file /etc/rsyslog.d/20-ufw.conf for remote target
2021-01-07 15:58:40 Result: no remote target found
2021-01-07 15:58:40 Test: analyzing file /etc/rsyslog.d/50-default.conf for remote target
2021-01-07 15:58:40 Result: no remote target found
2021-01-07 15:58:40 Result: no remote logging found
2021-01-07 15:58:40 Suggestion: Enable logging to an external logging host for archiving purposes and additional protection [test:LOGG-2154] [details:-] [solution:-]
2021-01-07 15:58:40 Hardening: assigned partial number of hardening points (1 of 3). Currently having 168 points (out of 239)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test LOGG-2160 (Checking /etc/newsyslog.conf)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test LOGG-2162 (Checking directories in /etc/newsyslog.conf)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test LOGG-2164 (Checking files specified /etc/newsyslog.conf)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2170 (Checking log paths)
2021-01-07 15:58:40 Test: Searching log paths
2021-01-07 15:58:40 Result: directory /var/log exists
2021-01-07 15:58:40 Result: directory /var/adm can't be found
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2180 (Checking open log files)
2021-01-07 15:58:40 Test: checking open log files with lsof
2021-01-07 15:58:40 Found logfile: /root/scans/outputs/lynis-console-3.log
2021-01-07 15:58:40 Found logfile: /var/log/auth.log
2021-01-07 15:58:40 Found logfile: /var/log/fail2ban.log
2021-01-07 15:58:40 Found logfile: /var/log/kern.log
2021-01-07 15:58:40 Found logfile: /var/log/mail.log
2021-01-07 15:58:40 Found logfile: /var/log/syslog
2021-01-07 15:58:40 Found logfile: /var/log/upstart/systemd-logind.log
2021-01-07 15:58:40 Found logfile: /var/log/vmware-vmsvc.log
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2190 (Checking for deleted files in use)
2021-01-07 15:58:40 Test: checking deleted files that are still in use
2021-01-07 15:58:40 Result: found one or more files which are deleted, but still in use
2021-01-07 15:58:40 Found deleted file: /lib/systemd/systemd-logind(systemd-l)
2021-01-07 15:58:40 Suggestion: Check what deleted files are still in use and why. [test:LOGG-2190] [details:-] [solution:-]
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID LOGG-2192 (Checking for open log files that are empty)
2021-01-07 15:58:40 Result: all opened log files are bigger than zero bytes in size
2021-01-07 15:58:40 Security check: file is normal
2021-01-07 15:58:40 Checking permissions of /root/scans/lynis/include/tests_insecure_services
2021-01-07 15:58:40 File permissions are OK
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Action: Performing tests from category: Insecure services
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8000 (Installed inetd package)
2021-01-07 15:58:40 Test: Checking if inetd is installed
2021-01-07 15:58:40 Result: inetd is NOT installed
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8002 (Check for enabled inet daemon)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8004 (Presence of inetd configuration file)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8006 (Check configuration of inetd when disabled)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8016 (Check for telnet via inetd)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8100 (Check for installed xinetd daemon)
2021-01-07 15:58:40 Test: Checking for installed xinetd daemon
2021-01-07 15:58:40 Result: xinetd is NOT installed
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8102 (Check for active xinet daemon)
2021-01-07 15:58:40 Test: Searching for active extended internet services daemon (xinetd)
2021-01-07 15:58:40 Performing pgrep scan without uid
2021-01-07 15:58:40 IsRunning: process 'xinetd' not found
2021-01-07 15:58:40 Result: xinetd is NOT running
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8104 (Check for enabled xinet daemon)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8106 (Check configuration of xinetd when disabled)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8116 (Insecure services enabled via xinetd)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Skipped test INSE-8200 (Check if tcp_wrappers is installed when inetd/xinetd is active)
2021-01-07 15:58:40 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8300 (Check if rsh client is installed)
2021-01-07 15:58:40 Test: Checking if rsh client is installed
2021-01-07 15:58:40 Result: rsh client is NOT installed
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8304 (Check if rsh server is installed)
2021-01-07 15:58:40 Test: Checking if rsh server is installed
2021-01-07 15:58:40 Result: rsh server is NOT installed
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8310 (Check if telnet client is installed)
2021-01-07 15:58:40 Test: Checking if telnet client is installed
2021-01-07 15:58:40 Result: telnet client is NOT installed
2021-01-07 15:58:40 ====
2021-01-07 15:58:40 Performing test ID INSE-8322 (Check if telnet server is installed)
2021-01-07 15:58:40 Test: Checking if telnet server is installed
2021-01-07 15:58:41 Result: telnet server is NOT installed
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID INSE-8314 (Check if NIS client is installed)
2021-01-07 15:58:41 Test: Checking if NIS client is installed
2021-01-07 15:58:41 Result: NIS client is NOT installed
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID INSE-8316 (Check if NIS server is installed)
2021-01-07 15:58:41 Test: Checking if NIS server is installed
2021-01-07 15:58:41 Result: NIS server is NOT installed
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID INSE-8318 (Check if TFTP client is installed)
2021-01-07 15:58:41 Test: Checking if TFTP client is installed
2021-01-07 15:58:41 Result: TFTP client is NOT installed
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID INSE-8320 (Check if TFTP server is installed)
2021-01-07 15:58:41 Test: Checking if TFTP server is installed
2021-01-07 15:58:41 Result: TFTP server is NOT installed
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test INSE-8050 (Check for insecure services on macOS)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (macOS only)
2021-01-07 15:58:41 Security check: file is normal
2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_banners
2021-01-07 15:58:41 File permissions are OK
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Action: Performing tests from category: Banners and identification
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test BANN-7113 (Check COPYRIGHT banner file)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID BANN-7124 (Check issue banner file)
2021-01-07 15:58:41 Test: Checking file /etc/issue
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID BANN-7126 (Check issue banner file contents)
2021-01-07 15:58:41 Test: Checking file /etc/issue contents for legal key words
2021-01-07 15:58:41 Result: Found only 0 key words (5 or more suggested), to warn unauthorized users and could be increased
2021-01-07 15:58:41 Suggestion: Add a legal banner to /etc/issue, to warn unauthorized users [test:BANN-7126] [details:-] [solution:-]
2021-01-07 15:58:41 Hardening: assigned partial number of hardening points (0 of 1). Currently having 168 points (out of 240)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID BANN-7128 (Check issue.net banner file)
2021-01-07 15:58:41 Test: Checking file /etc/issue.net
2021-01-07 15:58:41 Result: file /etc/issue.net exists
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID BANN-7130 (Check issue.net banner file contents)
2021-01-07 15:58:41 Test: Checking file /etc/issue.net contents for legal key words
2021-01-07 15:58:41 Result: Found only 0 key words, to warn unauthorized users and could be increased
2021-01-07 15:58:41 Suggestion: Add legal banner to /etc/issue.net, to warn unauthorized users [test:BANN-7130] [details:-] [solution:-]
2021-01-07 15:58:41 Hardening: assigned partial number of hardening points (0 of 1). Currently having 168 points (out of 241)
2021-01-07 15:58:41 Security check: file is normal
2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_scheduling
2021-01-07 15:58:41 File permissions are OK
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Action: Performing tests from category: Scheduled tasks
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID SCHD-7702 (Check status of cron daemon)
2021-01-07 15:58:41 Result: cron daemon running
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID SCHD-7704 (Check crontab/cronjobs)
2021-01-07 15:58:41 Found cronjob (/etc/crontab): 17,*,*,*,*,root,cd,/,&&,run-parts,--report,/etc/cron.hourly
2021-01-07 15:58:41 Found cronjob (/etc/crontab): 25,6,*,*,*,root,test,-x,/usr/sbin/anacron,||,(,cd,/,&&,run-parts,--report,/etc/cron.daily,)
2021-01-07 15:58:41 Found cronjob (/etc/crontab): 47,6,*,*,7,root,test,-x,/usr/sbin/anacron,||,(,cd,/,&&,run-parts,--report,/etc/cron.weekly,)
2021-01-07 15:58:41 Found cronjob (/etc/crontab): 52,6,1,*,*,root,test,-x,/usr/sbin/anacron,||,(,cd,/,&&,run-parts,--report,/etc/cron.monthly,)
2021-01-07 15:58:41 Test: checking directory /etc/cron.d
2021-01-07 15:58:41 Test: check if we can access /etc/cron.d (escaped: /etc/cron.d)
2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:41 Result: file /etc/cron.d is readable (or directory accessible).
2021-01-07 15:58:41 Result: found directory /etc/cron.d
2021-01-07 15:58:41 Test: searching files in /etc/cron.d
2021-01-07 15:58:41 Result: found one or more files in /etc/cron.d. Analyzing files..
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.d/tiger): 0,*,*,*,*,root,test,-x,/usr/sbin/tigercron,&&,{,[,-r,"$DEFAULT",],&&,.,"$DEFAULT",;,nice,-n$NICETIGER,/usr/sbin/tigercron,-q,;,}
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.d/sendmail): */20,*,*,*,*,smmsp,test,-x,/etc/init.d/sendmail,&&,/usr/share/sendmail/sendmail,cron-msp
2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.d
2021-01-07 15:58:41 Test: checking directory /etc/cron.hourly
2021-01-07 15:58:41 Result: found directory /etc/cron.hourly
2021-01-07 15:58:41 Test: check if we can access /etc/cron.hourly (escaped: /etc/cron.hourly)
2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:41 Result: file /etc/cron.hourly is readable (or directory accessible).
2021-01-07 15:58:41 Test: searching files in /etc/cron.hourly
2021-01-07 15:58:41 Result: no files found in /etc/cron.hourly
2021-01-07 15:58:41 Test: checking directory /etc/cron.daily
2021-01-07 15:58:41 Result: found directory /etc/cron.daily
2021-01-07 15:58:41 Test: check if we can access /etc/cron.daily (escaped: /etc/cron.daily)
2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:41 Result: file /etc/cron.daily is readable (or directory accessible).
2021-01-07 15:58:41 Test: searching files in /etc/cron.daily
2021-01-07 15:58:41 Result: found one or more files in /etc/cron.daily. Analyzing files..
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/passwd
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/apt
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/aptitude
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/cracklib-runtime
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/acct
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/logrotate
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/upstart
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/update-notifier-common
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/sendmail
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/man-db
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/apport
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/dpkg
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/chkrootkit
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/tripwire
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/bsdmainutils
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/mlocate
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.daily): /etc/cron.daily/popularity-contest
2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.daily
2021-01-07 15:58:41 Test: checking directory /etc/cron.weekly
2021-01-07 15:58:41 Result: found directory /etc/cron.weekly
2021-01-07 15:58:41 Test: check if we can access /etc/cron.weekly (escaped: /etc/cron.weekly)
2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:41 Result: file /etc/cron.weekly is readable (or directory accessible).
2021-01-07 15:58:41 Test: searching files in /etc/cron.weekly
2021-01-07 15:58:41 Result: found one or more files in /etc/cron.weekly. Analyzing files..
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/apt-xapian-index
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/update-notifier-common
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/man-db
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.weekly): /etc/cron.weekly/fstrim
2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.weekly
2021-01-07 15:58:41 Test: checking directory /etc/cron.monthly
2021-01-07 15:58:41 Result: found directory /etc/cron.monthly
2021-01-07 15:58:41 Test: check if we can access /etc/cron.monthly (escaped: /etc/cron.monthly)
2021-01-07 15:58:41 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:41 Result: file /etc/cron.monthly is readable (or directory accessible).
2021-01-07 15:58:41 Test: searching files in /etc/cron.monthly
2021-01-07 15:58:41 Result: found one or more files in /etc/cron.monthly. Analyzing files..
2021-01-07 15:58:41 Result: Found cronjob (/etc/cron.monthly): /etc/cron.monthly/acct
2021-01-07 15:58:41 Result: done with analyzing files in /etc/cron.monthly
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID SCHD-7718 (Check at users)
2021-01-07 15:58:41 Test: Checking atd status
2021-01-07 15:58:41 Result: at daemon not active
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test SCHD-7720 (Check at users)
2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test SCHD-7724 (Check at jobs)
2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:41 Result: no scheduled Lynis execution found (e.g. crontab, cronjob)
2021-01-07 15:58:41 Security check: file is normal
2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_accounting
2021-01-07 15:58:41 File permissions are OK
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Action: Performing tests from category: Accounting
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-2754 (Check for available FreeBSD accounting information)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (FreeBSD only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-2760 (Check for available OpenBSD accounting information)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (OpenBSD only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID ACCT-9622 (Check for available Linux accounting information)
2021-01-07 15:58:41 Test: Check accounting information
2021-01-07 15:58:41 Result: /var/log/account/pacct available
2021-01-07 15:58:41 Hardening: assigned maximum number of hardening points for this item (3). Currently having 171 points (out of 244)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID ACCT-9626 (Check for sysstat accounting data)
2021-01-07 15:58:41 Test: check /etc/default/sysstat presence
2021-01-07 15:58:41 Result: sysstat not found via /etc/default/sysstat or /etc/cron.d/sysstat or as a systemd unit
2021-01-07 15:58:41 Suggestion: Enable sysstat to collect accounting (no results) [test:ACCT-9626] [details:-] [solution:-]
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID ACCT-9628 (Check for auditd)
2021-01-07 15:58:41 Test: Check auditd status
2021-01-07 15:58:41 Performing pgrep scan without uid
2021-01-07 15:58:41 IsRunning: process 'auditd' not found
2021-01-07 15:58:41 Result: auditd not active
2021-01-07 15:58:41 Suggestion: Enable auditd to collect audit information [test:ACCT-9628] [details:-] [solution:-]
2021-01-07 15:58:41 Hardening: assigned partial number of hardening points (0 of 1). Currently having 171 points (out of 245)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9630 (Check for auditd rules)
2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9632 (Check for auditd configuration file)
2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9634 (Check for auditd log file)
2021-01-07 15:58:41 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID ACCT-9636 (Check for Snoopy wrapper and logger)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9650 (Check Solaris audit daemon)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9652 (Check auditd SMF status)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9654 (Check BSM auditing in /etc/system)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9656 (Check BSM auditing in module list)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9660 (Check location of audit events)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Skipped test ACCT-9662 (Check Solaris auditing stats)
2021-01-07 15:58:41 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:41 Security check: file is normal
2021-01-07 15:58:41 Checking permissions of /root/scans/lynis/include/tests_time
2021-01-07 15:58:41 File permissions are OK
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Action: Performing tests from category: Time and Synchronization
2021-01-07 15:58:41 ====
2021-01-07 15:58:41 Performing test ID TIME-3104 (Check for running NTP daemon or client)
2021-01-07 15:58:41 Test: Searching for a running NTP daemon or available client
2021-01-07 15:58:41 Result: no chrony configuration found
2021-01-07 15:58:41 Performing pgrep scan without uid
2021-01-07 15:58:41 IsRunning: process 'dntpd' not found
2021-01-07 15:58:41 Performing pgrep scan without uid
2021-01-07 15:58:41 IsRunning: process 'timed' not found
2021-01-07 15:58:41 Result: crontab file /etc/anacrontab not found
2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in crontab file /etc/crontab
2021-01-07 15:58:41 Result: no ntpdate, rdate, sntp or ntpdig reference found in crontab file /etc/crontab
2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.d/john
2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.d/sendmail
2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.d/tiger
2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/acct
2021-01-07 15:58:41 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/apport
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/apt
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/aptitude
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/bsdmainutils
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/chkrootkit
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/cracklib-runtime
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/dpkg
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/logrotate
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/man-db
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/mlocate
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/passwd
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/popularity-contest
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/sendmail
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/tripwire
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/update-notifier-common
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.daily/upstart
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/apt-xapian-index
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/fstrim
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/man-db
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.weekly/update-notifier-common
2021-01-07 15:58:42 Test: checking for ntpdate, rdate, sntp or ntpdig in /etc/cron.monthly/acct
2021-01-07 15:58:42 Result: no ntpdate or rdate found in cron directories
2021-01-07 15:58:42 Test: checking for file /etc/network/if-up.d/ntpdate
2021-01-07 15:58:42 Result: found ntpdate action when network interface comes up
2021-01-07 15:58:42 Result: Found a time syncing daemon/client.
2021-01-07 15:58:42 Hardening: assigned maximum number of hardening points for this item (3). Currently having 174 points (out of 248)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3106 (Check systemd NTP time synchronization status)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3112 (Check active NTP associations ID's)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3116 (Check peers with stratum value of 16)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3120 (Check unreliable NTP peers)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3124 (Check selected time source)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3128 (Check preferred time source)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3132 (Check NTP falsetickers)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3136 (Check NTP protocol version)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Performing test ID TIME-3148 (Check TZ variable)
2021-01-07 15:58:42 Test: testing for TZ variable
2021-01-07 15:58:42 Result: found TZ variable with value notset
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3160 (Check empty NTP step-tickers)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Performing test ID TIME-3170 (Check configuration files)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3180 (Report if ntpctl cannot communicate with OpenNTPD)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3181 (Check status of OpenNTPD time synchronisation)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3182 (Check OpenNTPD has working peers)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Skipped test TIME-3185 (Check systemd-timesyncd synchronized time)
2021-01-07 15:58:42 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:42 Security check: file is normal
2021-01-07 15:58:42 Checking permissions of /root/scans/lynis/include/tests_crypto
2021-01-07 15:58:42 File permissions are OK
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Action: Performing tests from category: Cryptography
2021-01-07 15:58:42 ====
2021-01-07 15:58:42 Performing test ID CRYP-7902 (Check expire date of SSL certificates)
2021-01-07 15:58:42 Paths to scan: /etc/apache2 /etc/dovecot /etc/httpd /etc/letsencrypt /etc/pki /etc/postfix /etc/refind.d/keys /etc/ssl /opt/psa/var/certificates /usr/local/psa/var/certificates /usr/local/share/ca-certificates /usr/share/ca-certificates /usr/share/gnupg /var/www /srv/www
2021-01-07 15:58:42 Paths to ignore: /etc/letsencrypt/archive
2021-01-07 15:58:42 Result: SSL path /etc/apache2 does not exist
2021-01-07 15:58:42 Result: SSL path /etc/dovecot does not exist
2021-01-07 15:58:42 Result: SSL path /etc/httpd does not exist
2021-01-07 15:58:42 Result: SSL path /etc/letsencrypt does not exist
2021-01-07 15:58:42 Result: SSL path /etc/pki does not exist
2021-01-07 15:58:42 Result: SSL path /etc/postfix does not exist
2021-01-07 15:58:42 Result: SSL path /etc/refind.d/keys does not exist
2021-01-07 15:58:42 Test: check if we can access /etc/ssl (escaped: /etc/ssl)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /etc/ssl is readable (or directory accessible).
2021-01-07 15:58:42 Result: found directory /etc/ssl
2021-01-07 15:58:42 Test: check if we can access /etc/ssl/certs/ca-certificates.crt (escaped: /etc/ssl/certs/ca-certificates.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /etc/ssl/certs/ca-certificates.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/etc/ssl/certs/ca-certificates.crt' does most likely not belong to a package
2021-01-07 15:58:42 Result: file is a certificate file
2021-01-07 15:58:42 Result: certificate /etc/ssl/certs/ca-certificates.crt seems to be correct and still valid
2021-01-07 15:58:42 Result: found 1 certificates in /etc/ssl
2021-01-07 15:58:42 Result: SSL path /opt/psa/var/certificates does not exist
2021-01-07 15:58:42 Result: SSL path /usr/local/psa/var/certificates does not exist
2021-01-07 15:58:42 Test: check if we can access /usr/local/share/ca-certificates (escaped: /usr/local/share/ca-certificates)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/local/share/ca-certificates is readable (or directory accessible).
2021-01-07 15:58:42 Result: found directory /usr/local/share/ca-certificates
2021-01-07 15:58:42 Result: found 0 certificates in /usr/local/share/ca-certificates
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates (escaped: /usr/share/ca-certificates)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates is readable (or directory accessible).
2021-01-07 15:58:42 Result: found directory /usr/share/ca-certificates
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt (escaped: /usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/ACCVRAIZ1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt (escaped: /usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/ACEDICOM_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt (escaped: /usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AC_RAIZ_FNMT-RCM.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/Actalis_Authentication_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt (escaped: /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Commercial.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Networking.crt' belongs to package (ca-certificates)
2021-01-07 15:58:42 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt)
2021-01-07 15:58:42 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:42 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt is readable (or directory accessible).
2021-01-07 15:58:42 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Premium.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt (escaped: /usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/AffirmTrust_Premium_ECC.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt (escaped: /usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Amazon_Root_CA_4.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt (escaped: /usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Atos_TrustedRoot_2011.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt (escaped: /usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Baltimore_CyberTrust_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Buypass_Class_2_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Buypass_Class_3_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt (escaped: /usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CA_Disig_Root_R1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt (escaped: /usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CA_Disig_Root_R2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt (escaped: /usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CFCA_EV_ROOT.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt (escaped: /usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/CNNIC_ROOT.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/COMODO_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/COMODO_ECC_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/COMODO_RSA_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Certigna.crt (escaped: /usr/share/ca-certificates/mozilla/Certigna.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Certigna.crt is readable (or directory accessible).
2021-01-07 15:58:43 Result: file '/usr/share/ca-certificates/mozilla/Certigna.crt' belongs to package (ca-certificates)
2021-01-07 15:58:43 Test: check if we can access /usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt (escaped: /usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt)
2021-01-07 15:58:43 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:43 Result: file /usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certinomis_-_Autorité_Racine.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certinomis_-_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certplus_Class_2_Primary_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt (escaped: /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certplus_Root_CA_G1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certplus_Root_CA_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certum_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Certum_Trusted_Network_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt (escaped: /usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Chambers_of_Commerce_Root_-_2008.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt (escaped: /usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt (escaped: /usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Comodo_AAA_Services_root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt (escaped: /usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Comodo_Secure_Services_root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt (escaped: /usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Comodo_Trusted_Services_root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Cybertrust_Global_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt (escaped: /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt (escaped: /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt (escaped: /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt (escaped: /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/Deutsche_Telekom_Root_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:44 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:44 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt)
2021-01-07 15:58:44 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:44 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Assured_ID_Root_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Global_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Global_Root_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_High_Assurance_EV_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt (escaped: /usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/DigiCert_Trusted_Root_G4.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/EC-ACC.crt (escaped: /usr/share/ca-certificates/mozilla/EC-ACC.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/EC-ACC.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/EC-ACC.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/EE_Certification_Centre_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_EC1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/Entrust_Root_Certification_Authority_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Global_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Global_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt is readable (or directory accessible).
2021-01-07 15:58:45 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:45 Test: check if we can access /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt)
2021-01-07 15:58:45 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:45 Result: file /usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GeoTrust_Universal_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R4.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_ECC_Root_CA_-_R5.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt (escaped: /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/GlobalSign_Root_CA_-_R3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt (escaped: /usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Global_Chambersign_Root_-_2008.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Go_Daddy_Class_2_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt (escaped: /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt (escaped: /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt (escaped: /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Hongkong_Post_Root_CA_1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt (escaped: /usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/ISRG_Root_X1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/IdenTrust_Commercial_Root_CA_1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/IdenTrust_Public_Sector_Root_CA_1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Izenpe.com.crt (escaped: /usr/share/ca-certificates/mozilla/Izenpe.com.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Izenpe.com.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Izenpe.com.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt (escaped: /usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/LuxTrust_Global_Root_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt (escaped: /usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt is readable (or directory accessible).
2021-01-07 15:58:46 Result: file '/usr/share/ca-certificates/mozilla/Microsec_e-Szigno_Root_CA_2009.crt' belongs to package (ca-certificates)
2021-01-07 15:58:46 Test: check if we can access /usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt (escaped: /usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt)
2021-01-07 15:58:46 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:46 Result: file /usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Network_Solutions_Certificate_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt (escaped: /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt (escaped: /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt (escaped: /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt (escaped: /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt (escaped: /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/OpenTrust_Root_CA_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/PSCProcert.crt (escaped: /usr/share/ca-certificates/mozilla/PSCProcert.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/PSCProcert.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/PSCProcert.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_1_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_2_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt (escaped: /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/QuoVadis_Root_CA_3_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt (escaped: /usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/SZAFIR_ROOT_CA2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt (escaped: /usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/SecureSign_RootCA11.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/SecureTrust_CA.crt (escaped: /usr/share/ca-certificates/mozilla/SecureTrust_CA.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/SecureTrust_CA.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/SecureTrust_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Secure_Global_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Secure_Global_CA.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Secure_Global_CA.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Secure_Global_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt (escaped: /usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Security_Communication_EV_RootCA1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt (escaped: /usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt is readable (or directory accessible).
2021-01-07 15:58:47 Result: file '/usr/share/ca-certificates/mozilla/Security_Communication_RootCA2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:47 Test: check if we can access /usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt)
2021-01-07 15:58:47 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:47 Result: file /usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Security_Communication_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Sonera_Class_2_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_EV_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Starfield_Class_2_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Starfield_Root_Certificate_Authority_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt (escaped: /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Swisscom_Root_CA_1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Swisscom_Root_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt (escaped: /usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Swisscom_Root_EV_CA_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt (escaped: /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt (escaped: /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/T-TeleSec_GlobalRoot_Class_3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt (escaped: /usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt (escaped: /usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TWCA_Global_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/TWCA_Root_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt (escaped: /usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt is readable (or directory accessible).
2021-01-07 15:58:48 Result: file '/usr/share/ca-certificates/mozilla/Taiwan_GRCA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:48 Test: check if we can access /usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt (escaped: /usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt)
2021-01-07 15:58:48 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:48 Result: file /usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/TeliaSonera_Root_CA_v1.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/Trustis_FPS_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt (escaped: /usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt (escaped: /usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/USERTrust_ECC_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/USERTrust_RSA_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt (escaped: /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt (escaped: /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/VeriSign_Universal_Root_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt (escaped: /usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/Visa_eCommerce_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt (escaped: /usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/XRamp_Global_CA_Root.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt (escaped: /usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/certSIGN_ROOT_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt (escaped: /usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/ePKI_Root_Certification_Authority.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt (escaped: /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt (escaped: /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G2.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Test: check if we can access /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt (escaped: /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt is readable (or directory accessible).
2021-01-07 15:58:49 Result: file '/usr/share/ca-certificates/mozilla/thawte_Primary_Root_CA_-_G3.crt' belongs to package (ca-certificates)
2021-01-07 15:58:49 Result: found 148 certificates in /usr/share/ca-certificates
2021-01-07 15:58:49 Test: check if we can access /usr/share/gnupg (escaped: /usr/share/gnupg)
2021-01-07 15:58:49 Result: file is owned by our current user ID (0), checking if it is readable
2021-01-07 15:58:49 Result: file /usr/share/gnupg is readable (or directory accessible).
2021-01-07 15:58:49 Result: found directory /usr/share/gnupg
2021-01-07 15:58:49 Result: found 0 certificates in /usr/share/gnupg
2021-01-07 15:58:49 Result: SSL path /var/www does not exist
2021-01-07 15:58:49 Result: SSL path /srv/www does not exist
2021-01-07 15:58:49 Result: found a total of 149 certificates
2021-01-07 15:58:49 ====
2021-01-07 15:58:49 Performing test ID CRYP-7930 (Determine if system uses LUKS block device encryption)
2021-01-07 15:58:49 ====
2021-01-07 15:58:49 Skipped test CRYP-7931 (Determine if system uses encrypted swap)
2021-01-07 15:58:49 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:49 ====
2021-01-07 15:58:49 Performing test ID CRYP-8002 (Gather available kernel entropy)
2021-01-07 15:58:49 Result: found kernel entropy value of 795
2021-01-07 15:58:49 ====
2021-01-07 15:58:49 Performing test ID CRYP-8004 (Presence of hardware random number generators)
2021-01-07 15:58:49 Test: looking for /sys/class/misc/hw_random/rng_current
2021-01-07 15:58:49 Result: no HW RNG available
2021-01-07 15:58:49 ====
2021-01-07 15:58:49 Performing test ID CRYP-8005 (Presence of software pseudo random number generators)
2021-01-07 15:58:49 Test: looking for software pseudo random number generators
2021-01-07 15:58:49 Performing pgrep scan without uid
2021-01-07 15:58:49 IsRunning: process 'audio-entropyd' not found
2021-01-07 15:58:49 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'haveged' not found
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'jitterentropy-rngd' not found
2021-01-07 15:58:50 Security check: file is normal
2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_virtualization
2021-01-07 15:58:50 File permissions are OK
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Action: Performing tests from category: Virtualization
2021-01-07 15:58:50 Security check: file is normal
2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_containers
2021-01-07 15:58:50 File permissions are OK
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Action: Performing tests from category: Containers
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test CONT-8004 (Query running Solaris zones)
2021-01-07 15:58:50 Reason to skip: Incorrect guest OS (Solaris only)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID CONT-8102 (Checking Docker status and information)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'dockerd' not found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test CONT-8104 (Checking Docker info for any warnings)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test CONT-8106 (Gather basic stats from Docker)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test CONT-8107 (Check number of Docker containers)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test CONT-8108 (Check file permissions for Docker files)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 Security check: file is normal
2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_mac_frameworks
2021-01-07 15:58:50 File permissions are OK
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Action: Performing tests from category: Security frameworks
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MACF-6204 (Check AppArmor presence)
2021-01-07 15:58:50 Result: aa-status binary found, AppArmor is installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MACF-6208 (Check if AppArmor is enabled)
2021-01-07 15:58:50 Result: file /sys/kernel/security/apparmor/profiles is available and readable
2021-01-07 15:58:50 Result: AppArmor is enabled and a policy is loaded
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (3). Currently having 177 points (out of 251)
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1:init
2021-01-07 15:58:50 Result: Unconfined process: unconfined:2:kthreadd
2021-01-07 15:58:50 Result: Unconfined process: unconfined:489:dbus-daemon
2021-01-07 15:58:50 Result: Unconfined process: unconfined:497:rsyslogd
2021-01-07 15:58:50 Result: Unconfined process: unconfined:508:systemd-logind
2021-01-07 15:58:50 Result: Unconfined process: unconfined:880:getty
2021-01-07 15:58:50 Result: Unconfined process: unconfined:884:getty
2021-01-07 15:58:50 Result: Unconfined process: unconfined:889:getty
2021-01-07 15:58:50 Result: Unconfined process: unconfined:890:getty
2021-01-07 15:58:50 Result: Unconfined process: unconfined:892:getty
2021-01-07 15:58:50 Result: Unconfined process: unconfined:954:cron
2021-01-07 15:58:50 Result: Unconfined process: unconfined:970:irqbalance
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1016:acpid
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1033:login
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1154:vmware-vmblock-
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1175:vmtoolsd
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1209:VGAuthService
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1341:sshd
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1464:bash
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1478:sudo
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1479:su
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1480:bash
2021-01-07 15:58:50 Result: Unconfined process: unconfined:1512:vmhgfs-fuse
2021-01-07 15:58:50 Result: Unconfined process: unconfined:11409:sendmail-mta
2021-01-07 15:58:50 Result: Unconfined process: unconfined:11898:fail2ban-server
2021-01-07 15:58:50 Result: Unconfined process: unconfined:25150:portsentry
2021-01-07 15:58:50 Result: Unconfined process: unconfined:25154:portsentry
2021-01-07 15:58:50 Result: Unconfined process: unconfined:33644:scanner.js
2021-01-07 15:58:50 Result: Unconfined process: unconfined:33646:lynis
2021-01-07 15:58:50 Result: Unconfined process: unconfined:33647:tee
2021-01-07 15:58:50 Result: Unconfined process: unconfined:63059:lynis
2021-01-07 15:58:50 Result: Unconfined process: unconfined:63060:ps
2021-01-07 15:58:50 Result: Unconfined process: unconfined:63061:grep
2021-01-07 15:58:50 Result: Unconfined process: unconfined:63062:tr
2021-01-07 15:58:50 Result: Unconfined process: unconfined:63723:upstart-file-br
2021-01-07 15:58:50 Result: Unconfined process: unconfined:63726:upstart-socket-
2021-01-07 15:58:50 Result: Unconfined process: unconfined:65709:upstart-udev-br
2021-01-07 15:58:50 Result: Unconfined process: unconfined:65712:systemd-udevd
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MACF-6232 (Check SELINUX presence)
2021-01-07 15:58:50 Test: checking if we have sestatus binary
2021-01-07 15:58:50 Result: sestatus binary NOT found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test MACF-6234 (Check SELINUX status)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MACF-6240 (Check TOMOYO Linux presence)
2021-01-07 15:58:50 Test: checking if we have tomoyo-init binary
2021-01-07 15:58:50 Result: tomoyo-init binary not found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test MACF-6242 (Check TOMOYO Linux status)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID RBAC-6272 (Check grsecurity presence)
2021-01-07 15:58:50 Result: no grsecurity found in kernel config
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MACF-6290 (Check for implemented MAC framework)
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (3). Currently having 180 points (out of 254)
2021-01-07 15:58:50 Result: found implemented MAC framework
2021-01-07 15:58:50 Security check: file is normal
2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_file_integrity
2021-01-07 15:58:50 File permissions are OK
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Action: Performing tests from category: Software: file integrity
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4310 (AFICK availability)
2021-01-07 15:58:50 Test: Checking AFICK binary
2021-01-07 15:58:50 Result: AFICK is not installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4314 (AIDE availability)
2021-01-07 15:58:50 Test: Checking AIDE binary
2021-01-07 15:58:50 Result: AIDE is not installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4315 (Check AIDE configuration file)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4316 (Presence of AIDE database and size check)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4318 (Osiris availability)
2021-01-07 15:58:50 Test: Checking Osiris binary
2021-01-07 15:58:50 Result: Osiris is not installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4322 (Samhain availability)
2021-01-07 15:58:50 Test: Checking Samhain binary
2021-01-07 15:58:50 Result: Samhain is not installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4326 (Tripwire availability)
2021-01-07 15:58:50 Test: Checking Tripwire binary
2021-01-07 15:58:50 Result: Tripwire is installed (/usr/sbin/tripwire)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4328 (OSSEC syscheck daemon running)
2021-01-07 15:58:50 Test: Checking if OSSEC syscheck daemon is running
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'ossec-syscheckd' not found
2021-01-07 15:58:50 Result: syscheck (OSSEC) is not active
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4330 (mtree availability)
2021-01-07 15:58:50 Test: Checking mtree binary
2021-01-07 15:58:50 Result: mtree is not installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4334 (Check lfd daemon status)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4336 (Check lfd configuration status)
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4338 (osqueryd syscheck daemon running)
2021-01-07 15:58:50 Test: Checking if osqueryd syscheck daemon is running
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'osqueryd' not found
2021-01-07 15:58:50 Result: syscheck (osquery) not installed
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4339 (Check IMA/EVM status)
2021-01-07 15:58:50 Reason to skip: No evmctl binary found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4340 (Check dm-integrity status)
2021-01-07 15:58:50 Reason to skip: No integritysetup binary found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4341 (Check dm-verity status)
2021-01-07 15:58:50 Reason to skip: No veritysetup binary found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Skipped test FINT-4402 (AIDE configuration: Checksums (SHA256 or SHA512))
2021-01-07 15:58:50 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID FINT-4350 (File integrity software installed)
2021-01-07 15:58:50 Test: Check if at least on file integrity tool is available/installed
2021-01-07 15:58:50 Result: found at least one file integrity tool
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (5). Currently having 185 points (out of 259)
2021-01-07 15:58:50 Security check: file is normal
2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_tooling
2021-01-07 15:58:50 File permissions are OK
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Action: Performing tests from category: Software: System tooling
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5002 (Checking for automation tools)
2021-01-07 15:58:50 Test: checking if directory /root/.ansible exists
2021-01-07 15:58:50 Result: directory /root/.ansible NOT found
2021-01-07 15:58:50 Test: checking if directory /etc/ansible exists
2021-01-07 15:58:50 Result: directory /etc/ansible NOT found
2021-01-07 15:58:50 Test: checking if directory /root/.ansible exists
2021-01-07 15:58:50 Result: directory /root/.ansible NOT found
2021-01-07 15:58:50 Test: checking if directory /tmp/.ansible exists
2021-01-07 15:58:50 Result: directory /tmp/.ansible NOT found
2021-01-07 15:58:50 Test: checking if file /var/log/ansible.log exists
2021-01-07 15:58:50 Result: file /var/log/ansible.log NOT found
2021-01-07 15:58:50 Test: checking if file ~/.ansible-retry exists
2021-01-07 15:58:50 Result: file ~/.ansible-retry NOT found
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'puppet master' not found
2021-01-07 15:58:50 Suggestion: Determine if automation tools are present for system management [test:TOOL-5002] [details:-] [solution:-]
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5102 (Check for presence of Fail2ban)
2021-01-07 15:58:50 Result: Fail2ban is installed (/usr/bin/fail2ban-server)
2021-01-07 15:58:50 Checking Fail2ban configuration file
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5104 (Enabled tests in Fail2ban)
2021-01-07 15:58:50 Result: service 'sshd' enabled
2021-01-07 15:58:50 Result: found at least one enabled jail
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (3). Currently having 188 points (out of 262)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5120 (Check for presence of Snort)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'snort' not found
2021-01-07 15:58:50 Result: Snort not present (Snort not running)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5122 (Check Snort configuration file)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5130 (Check for active Suricata daemon)
2021-01-07 15:58:50 Result: Suricata not installed (suricata not found)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5126 (Check for active OSSEC daemon)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'ossec-analysisd' not found
2021-01-07 15:58:50 Result: OSSEC analysis daemon not active
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'ossec-agentd' not found
2021-01-07 15:58:50 Result: OSSEC agent daemon not active
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID TOOL-5190 (Check presence of IDS/IPS tool)
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (2). Currently having 190 points (out of 264)
2021-01-07 15:58:50 Security check: file is normal
2021-01-07 15:58:50 Checking permissions of /root/scans/lynis/include/tests_malware
2021-01-07 15:58:50 File permissions are OK
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Action: Performing tests from category: Software: Malware
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MALW-3275 (Check for chkrootkit)
2021-01-07 15:58:50 Test: checking presence chkrootkit
2021-01-07 15:58:50 Result: Found /usr/sbin/chkrootkit
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (2). Currently having 192 points (out of 266)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MALW-3276 (Check for Rootkit Hunter)
2021-01-07 15:58:50 Test: checking presence Rootkit Hunter
2021-01-07 15:58:50 Result: Found /usr/bin/rkhunter
2021-01-07 15:58:50 Hardening: assigned maximum number of hardening points for this item (2). Currently having 194 points (out of 268)
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MALW-3278 (Check for LMD)
2021-01-07 15:58:50 Test: checking presence LMD
2021-01-07 15:58:50 Result: LMD not found
2021-01-07 15:58:50 ====
2021-01-07 15:58:50 Performing test ID MALW-3280 (Check if anti-virus tool is installed)
2021-01-07 15:58:50 Test: checking process com.avast.daemon
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'com.avast.daemon' not found
2021-01-07 15:58:50 Test: checking process Avira daemon
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'avqmd' not found
2021-01-07 15:58:50 Test: checking process epagd
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'bdagentd' not found
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'epagd' not found
2021-01-07 15:58:50 Test: checking process falcon-sensor (CrowdStrike)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'falcon-sensor' not found
2021-01-07 15:58:50 Test: checking process CylanceSvc
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'CylanceSvc' not found
2021-01-07 15:58:50 Test: checking process esets_daemon
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'esets_daemon' not found
2021-01-07 15:58:50 Test: checking process wdserver or klnagent (Kaspersky)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'klnagent' not found
2021-01-07 15:58:50 Test: checking process cma or cmdagent (McAfee)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'cmdagent' not found
2021-01-07 15:58:50 Test: checking process savscand
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'savscand' not found
2021-01-07 15:58:50 Test: checking process SophosScanD
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'SophosScanD' not found
2021-01-07 15:58:50 Test: checking process rtvscand
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'rtvscand' not found
2021-01-07 15:58:50 Test: checking process Symantec management client service
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'smcd' not found
2021-01-07 15:58:50 Test: checking process Symantec Endpoint Protection configuration service
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'symcfgd' not found
2021-01-07 15:58:50 Test: checking process synoavd
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:50 IsRunning: process 'synoavd' not found
2021-01-07 15:58:50 Test: checking process TmccMac to test for Trend Micro anti-virus (macOS)
2021-01-07 15:58:50 Performing pgrep scan without uid
2021-01-07 15:58:51 IsRunning: process 'TmccMac' not found
2021-01-07 15:58:51 Result: no commercial anti-virus tools found
2021-01-07 15:58:51 Hardening: assigned partial number of hardening points (0 of 3). Currently having 194 points (out of 271)
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID MALW-3282 (Check for clamscan)
2021-01-07 15:58:51 Test: checking presence clamscan
2021-01-07 15:58:51 Result: clamscan couldn't be found
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID MALW-3284 (Check for clamd)
2021-01-07 15:58:51 Test: checking running ClamAV daemon (clamd)
2021-01-07 15:58:51 Performing pgrep scan without uid
2021-01-07 15:58:51 IsRunning: process 'clamd' not found
2021-01-07 15:58:51 Result: clamd not running
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Skipped test MALW-3286 (Check for freshclam)
2021-01-07 15:58:51 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Skipped test MALW-3288 (Check for ClamXav)
2021-01-07 15:58:51 Reason to skip: Prerequisites not met (ie missing tool, other type of Linux distribution)
2021-01-07 15:58:51 Security check: file is normal
2021-01-07 15:58:51 Checking permissions of /root/scans/lynis/include/tests_file_permissions
2021-01-07 15:58:51 File permissions are OK
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Action: Performing tests from category: File Permissions
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID FILE-7524 (Perform file permissions check)
2021-01-07 15:58:51 Test: Checking file permissions
2021-01-07 15:58:51 Using profile /root/scans/lynis/default.prf for baseline.
2021-01-07 15:58:51 Test: checking file/directory /boot/grub/grub.cfg
2021-01-07 15:58:51 Test: checking if file /boot/grub/grub.cfg has the permissions set to 600 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (600)
2021-01-07 15:58:51 Test: checking file/directory /boot/grub2/grub.cfg
2021-01-07 15:58:51 Skipping file/directory /boot/grub2/grub.cfg as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /boot/grub2/user.cfg
2021-01-07 15:58:51 Skipping file/directory /boot/grub2/user.cfg as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /etc/at.allow
2021-01-07 15:58:51 Skipping file/directory /etc/at.allow as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /etc/at.deny
2021-01-07 15:58:51 Skipping file/directory /etc/at.deny as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.allow
2021-01-07 15:58:51 Test: checking if file /etc/cron.allow has the permissions set to 600 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (600)
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.deny
2021-01-07 15:58:51 Test: checking if file /etc/cron.deny has the permissions set to 600 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.deny are not matching expected value (644 != rw-------)
2021-01-07 15:58:51 Test: checking file/directory /etc/crontab
2021-01-07 15:58:51 Test: checking if file /etc/crontab has the permissions set to 600 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/crontab are not matching expected value (644 != rw-------)
2021-01-07 15:58:51 Test: checking file/directory /etc/group
2021-01-07 15:58:51 Test: checking if file /etc/group has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (644)
2021-01-07 15:58:51 Test: checking file/directory /etc/group-
2021-01-07 15:58:51 Test: checking if file /etc/group- has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (600)
2021-01-07 15:58:51 Test: checking file/directory /etc/hosts.allow
2021-01-07 15:58:51 Test: checking if file /etc/hosts.allow has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (644)
2021-01-07 15:58:51 Test: checking file/directory /etc/hosts.deny
2021-01-07 15:58:51 Test: checking if file /etc/hosts.deny has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (644)
2021-01-07 15:58:51 Test: checking file/directory /etc/issue
2021-01-07 15:58:51 Test: checking if file /etc/issue has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (644)
2021-01-07 15:58:51 Test: checking file/directory /etc/issue.net
2021-01-07 15:58:51 Test: checking if file /etc/issue.net has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (644)
2021-01-07 15:58:51 Test: checking file/directory /etc/lilo.conf
2021-01-07 15:58:51 Skipping file/directory /etc/lilo.conf as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /etc/motd
2021-01-07 15:58:51 Skipping file/directory /etc/motd as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /etc/passwd
2021-01-07 15:58:51 Test: checking if file /etc/passwd has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (644)
2021-01-07 15:58:51 Test: checking file/directory /etc/passwd-
2021-01-07 15:58:51 Test: checking if file /etc/passwd- has the permissions set to 644 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (600)
2021-01-07 15:58:51 Test: checking file/directory /etc/ssh/sshd_config
2021-01-07 15:58:51 Test: checking if file /etc/ssh/sshd_config has the permissions set to 600 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/ssh/sshd_config are not matching expected value (644 != rw-------)
2021-01-07 15:58:51 Test: checking file/directory /etc/hosts.equiv
2021-01-07 15:58:51 Skipping file/directory /etc/hosts.equiv as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /etc/shosts.equiv
2021-01-07 15:58:51 Skipping file/directory /etc/shosts.equiv as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /root/.rhosts
2021-01-07 15:58:51 Skipping file/directory /root/.rhosts as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /root/.rlogin
2021-01-07 15:58:51 Skipping file/directory /root/.rlogin as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /root/.shosts
2021-01-07 15:58:51 Skipping file/directory /root/.shosts as it does not exist on this system
2021-01-07 15:58:51 Test: checking file/directory /root/.ssh
2021-01-07 15:58:51 Test: checking if file /root/.ssh has the permissions set to 700 or more restrictive
2021-01-07 15:58:51 Outcome: correct permissions (700)
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.d
2021-01-07 15:58:51 Test: checking if file /etc/cron.d has the permissions set to 700 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.d are not matching expected value (755 != rwx------)
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.daily
2021-01-07 15:58:51 Test: checking if file /etc/cron.daily has the permissions set to 700 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.daily are not matching expected value (755 != rwx------)
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.hourly
2021-01-07 15:58:51 Test: checking if file /etc/cron.hourly has the permissions set to 700 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.hourly are not matching expected value (755 != rwx------)
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.weekly
2021-01-07 15:58:51 Test: checking if file /etc/cron.weekly has the permissions set to 700 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.weekly are not matching expected value (755 != rwx------)
2021-01-07 15:58:51 Test: checking file/directory /etc/cron.monthly
2021-01-07 15:58:51 Test: checking if file /etc/cron.monthly has the permissions set to 700 or more restrictive
2021-01-07 15:58:51 Outcome: permissions of file /etc/cron.monthly are not matching expected value (755 != rwx------)
2021-01-07 15:58:51 Suggestion: Consider restricting file permissions [test:FILE-7524] [details:See screen output or log file] [solution:text:Use chmod to change file permissions]
2021-01-07 15:58:51 Security check: file is normal
2021-01-07 15:58:51 Checking permissions of /root/scans/lynis/include/tests_homedirs
2021-01-07 15:58:51 File permissions are OK
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Action: Performing tests from category: Home directories
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID HOME-9302 (Create list with home directories)
2021-01-07 15:58:51 Test: query /etc/passwd to obtain home directories
2021-01-07 15:58:51 Result: found home directory: /bin (directory exists)
2021-01-07 15:58:51 Result: found home directory: /dev (directory exists)
2021-01-07 15:58:51 Result: found home directory: /home/ll (directory exists)
2021-01-07 15:58:51 Result: found home directory: /home/syslog (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /nonexistent (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /root (directory exists)
2021-01-07 15:58:51 Result: found home directory: /usr/games (directory exists)
2021-01-07 15:58:51 Result: found home directory: /usr/sbin (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/backups (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/cache/man (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/lib/gnats (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /var/lib/landscape (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/lib/libuuid (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/lib/sendmail (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/list (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /var/mail (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/run/dbus (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/run/ircd (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /var/run/sshd (directory exists)
2021-01-07 15:58:51 Result: found home directory: /var/spool/lpd (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /var/spool/news (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /var/spool/uucp (directory does not exist)
2021-01-07 15:58:51 Result: found home directory: /var/www (directory does not exist)
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID HOME-9304 (Check if users' home directories permissions are 750 or more restrictive)
2021-01-07 15:58:51 Test: checking directory '/var/lib/libuuid' for user 'libuuid'
2021-01-07 15:58:51 Result: permissions of home directory /var/lib/libuuid of user libuuid are not strict enough. Should be 750 or more restrictive. Change with: chmod 750 /var/lib/libuuid
2021-01-07 15:58:51 Test: checking directory '/home/ll' for user 'll'
2021-01-07 15:58:51 Result: permissions of home directory /home/ll of user ll are not strict enough. Should be 750 or more restrictive. Change with: chmod 750 /home/ll
2021-01-07 15:58:51 Suggestion: Double check the permissions of home directories as some might be not strict enough. [test:HOME-9304] [details:-] [solution:-]
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID HOME-9306 (Check if users own their home directories)
2021-01-07 15:58:51 Test: checking directory '/var/lib/libuuid' for user 'libuuid'
2021-01-07 15:58:51 Result: ownership of home directory /var/lib/libuuid for user libuuid looks to be correct
2021-01-07 15:58:51 Test: checking directory '/home/ll' for user 'll'
2021-01-07 15:58:51 Result: ownership of home directory /home/ll for user ll looks to be correct
2021-01-07 15:58:51 Result: OK, all users own their home directories
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID HOME-9310 (Checking for suspicious shell history files)
2021-01-07 15:58:51 Result: Ok, history files are type 'file'.
2021-01-07 15:58:51 Remark: History files are normally of the type 'file'. Symbolic links and other types are suspicious.
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID HOME-9350 (Collecting information from home directories)
2021-01-07 15:58:51 Result: IGNORE_HOME_DIRS empty, no paths excluded
2021-01-07 15:58:51 Security check: file is normal
2021-01-07 15:58:51 Checking permissions of /root/scans/lynis/include/tests_kernel_hardening
2021-01-07 15:58:51 File permissions are OK
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Action: Performing tests from category: Kernel Hardening
2021-01-07 15:58:51 ====
2021-01-07 15:58:51 Performing test ID KRNL-6000 (Check sysctl key pairs in scan profile)
2021-01-07 15:58:51 Result: key dev.tty.ldisc_autoload does not exist on this machine
2021-01-07 15:58:51 Result: sysctl key fs.protected_fifos has a different value than expected in scan profile. Expected=2, Real=0
2021-01-07 15:58:51 Hardening: assigned partial number of hardening points (0 of 1). Currently having 194 points (out of 272)
2021-01-07 15:58:51 Result: sysctl key fs.protected_hardlinks contains equal expected and current value (1)
2021-01-07 15:58:51 Hardening: assigned maximum number of hardening points for this item (1). Currently having 195 points (out of 273)
2021-01-07 15:58:52 Result: sysctl key fs.protected_regular has a different value than expected in scan profile. Expected=2, Real=0
2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 195 points (out of 274)
2021-01-07 15:58:52 Result: sysctl key fs.protected_symlinks contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 196 points (out of 275)
2021-01-07 15:58:52 Result: sysctl key fs.suid_dumpable contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 197 points (out of 276)
2021-01-07 15:58:52 Result: key hw.kbd.keymap_restrict_change does not exist on this machine
2021-01-07 15:58:52 Result: key kern.sugid_coredump does not exist on this machine
2021-01-07 15:58:52 Result: key kernel.core_setuid_ok does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key kernel.core_uses_pid contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 198 points (out of 277)
2021-01-07 15:58:52 Result: sysctl key kernel.ctrl-alt-del contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 199 points (out of 278)
2021-01-07 15:58:52 Result: sysctl key kernel.dmesg_restrict contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 200 points (out of 279)
2021-01-07 15:58:52 Result: key kernel.exec-shield-randomize does not exist on this machine
2021-01-07 15:58:52 Result: key kernel.exec-shield does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key kernel.kptr_restrict contains equal expected and current value (2)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 201 points (out of 280)
2021-01-07 15:58:52 Result: key kernel.maps_protect does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key kernel.modules_disabled has a different value than expected in scan profile. Expected=1, Real=0
2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 201 points (out of 281)
2021-01-07 15:58:52 Result: sysctl key kernel.perf_event_paranoid has a different value than expected in scan profile. Expected=3, Real=1
2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 201 points (out of 282)
2021-01-07 15:58:52 Result: sysctl key kernel.randomize_va_space contains equal expected and current value (2)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 202 points (out of 283)
2021-01-07 15:58:52 Result: key kernel.suid_dumpable does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key kernel.sysrq contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 203 points (out of 284)
2021-01-07 15:58:52 Result: sysctl key kernel.unprivileged_bpf_disabled has a different value than expected in scan profile. Expected=1, Real=0
2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 203 points (out of 285)
2021-01-07 15:58:52 Result: key kernel.use-nx does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key kernel.yama.ptrace_scope contains equal expected and current value (1 2 3)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 204 points (out of 286)
2021-01-07 15:58:52 Result: sysctl key net.core.bpf_jit_harden has a different value than expected in scan profile. Expected=2, Real=0
2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (0 of 1). Currently having 204 points (out of 287)
2021-01-07 15:58:52 Result: key net.inet.icmp.bmcastecho does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.icmp.drop_redirect does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.icmp.rediraccept does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.icmp.timestamp does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.accept_sourceroute does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.check_interface does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.forwarding does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.linklocal.in.allowbadttl does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.process_options does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.random_id does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.redirect does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip.sourceroute does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.ip6.redirect does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.tcp.always_keepalive does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.tcp.blackhole does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.tcp.drop_synfin does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.tcp.icmp_may_rst does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.tcp.nolocaltimewait does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.tcp.path_mtu_discovery does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet.udp.blackhole does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet6.icmp6.rediraccept does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet6.ip6.forwarding does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet6.ip6.fw.enable does not exist on this machine
2021-01-07 15:58:52 Result: key net.inet6.ip6.redirect does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.accept_redirects contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 205 points (out of 288)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.accept_source_route contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 206 points (out of 289)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.bootp_relay contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 207 points (out of 290)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.forwarding contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 208 points (out of 291)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.log_martians contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 209 points (out of 292)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.mc_forwarding contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 210 points (out of 293)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.proxy_arp contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 211 points (out of 294)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.rp_filter contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 212 points (out of 295)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.all.send_redirects contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 213 points (out of 296)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.default.accept_redirects contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 214 points (out of 297)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.default.accept_source_route contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 215 points (out of 298)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.conf.default.log_martians contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 216 points (out of 299)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.icmp_echo_ignore_broadcasts contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 217 points (out of 300)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.icmp_ignore_bogus_error_responses contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 218 points (out of 301)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.tcp_syncookies contains equal expected and current value (1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 219 points (out of 302)
2021-01-07 15:58:52 Result: sysctl key net.ipv4.tcp_timestamps contains equal expected and current value (0 1)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 220 points (out of 303)
2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.all.accept_redirects contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 221 points (out of 304)
2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.all.accept_source_route contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 222 points (out of 305)
2021-01-07 15:58:52 Result: key net.ipv6.conf.all.send_redirects does not exist on this machine
2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.default.accept_redirects contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 223 points (out of 306)
2021-01-07 15:58:52 Result: sysctl key net.ipv6.conf.default.accept_source_route contains equal expected and current value (0)
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (1). Currently having 224 points (out of 307)
2021-01-07 15:58:52 Result: key security.bsd.hardlink_check_gid does not exist on this machine
2021-01-07 15:58:52 Result: key security.bsd.hardlink_check_uid does not exist on this machine
2021-01-07 15:58:52 Result: key security.bsd.see_other_gids does not exist on this machine
2021-01-07 15:58:52 Result: key security.bsd.see_other_uids does not exist on this machine
2021-01-07 15:58:52 Result: key security.bsd.stack_guard_page does not exist on this machine
2021-01-07 15:58:52 Result: key security.bsd.unprivileged_proc_debug does not exist on this machine
2021-01-07 15:58:52 Result: key security.bsd.unprivileged_read_msgbuf does not exist on this machine
2021-01-07 15:58:52 Result: found 6 keys that can use tuning, according scan profile
2021-01-07 15:58:52 Suggestion: One or more sysctl values differ from the scan profile and could be tweaked [test:KRNL-6000] [details:] [solution:Change sysctl value or disable test (skip-test=KRNL-6000:<sysctl-key>)]
2021-01-07 15:58:52 Security check: file is normal
2021-01-07 15:58:52 Checking permissions of /root/scans/lynis/include/tests_hardening
2021-01-07 15:58:52 File permissions are OK
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Action: Performing tests from category: Hardening
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Performing test ID HRDN-7220 (Check if one or more compilers are installed)
2021-01-07 15:58:52 Test: Check if one or more compilers can be found on the system
2021-01-07 15:58:52 Result: found installed compiler. See top of logfile which compilers have been found or use /bin/grep to filter on 'compiler'
2021-01-07 15:58:52 Hardening: assigned partial number of hardening points (1 of 3). Currently having 225 points (out of 310)
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Performing test ID HRDN-7222 (Check compiler permissions)
2021-01-07 15:58:52 Test: Check if one or more compilers can be found on the system
2021-01-07 15:58:52 Test: Check file permissions for /usr/bin/as
2021-01-07 15:58:52 Action: checking symlink for file /usr/bin/as
2021-01-07 15:58:52 Result: file /usr/bin/as is not a symlink
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (3). Currently having 228 points (out of 313)
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Performing test ID HRDN-7230 (Check for malware scanner)
2021-01-07 15:58:52 Test: Check if a malware scanner is installed
2021-01-07 15:58:52 Result: found at least one malware scanner
2021-01-07 15:58:52 Hardening: assigned maximum number of hardening points for this item (3). Currently having 231 points (out of 316)
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Performing test ID HRDN-7231 (Check for registered non-native binary formats)
2021-01-07 15:58:52 Test: Check for registered non-native binary formats
2021-01-07 15:58:52 Result: no non-native binary formats found
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Action: Performing tests from category: Custom tests
2021-01-07 15:58:52 Test: Checking for tests_custom file
2021-01-07 15:58:52 ====
2021-01-07 15:58:52 Action: Performing plugin tests
2021-01-07 15:58:53 Result: Found 2 plugins of which 2 are enabled
2021-01-07 15:58:53 Result: Plugins phase 2 finished
2021-01-07 15:58:53 Checking permissions of /root/scans/lynis/include/report
2021-01-07 15:58:53 File permissions are OK
2021-01-07 15:58:53 Hardening index : [73] [############## ]
2021-01-07 15:58:53 Hardening strength: System has been hardened, but could use additional hardening
2021-01-07 15:58:53 ====
2021-01-07 15:58:54 Checking permissions of /root/scans/lynis/include/tool_tips
2021-01-07 15:58:54 File permissions are OK
2021-01-07 15:58:54 Tool tips: enabled
2021-01-07 15:58:54 ================================================================================
2021-01-07 15:58:54 Tests performed: 240
2021-01-07 15:58:54 Total tests: 455
2021-01-07 15:58:54 Active plugins: 2
2021-01-07 15:58:54 Total plugins: 2
2021-01-07 15:58:54 ================================================================================
2021-01-07 15:58:54 Lynis 3.0.3
2021-01-07 15:58:54 2007-2021, CISOfy - https://cisofy.com/lynis/
2021-01-07 15:58:54 Enterprise support available (compliance, plugins, interface and tools)
2021-01-07 15:58:54 Program ended successfully
2021-01-07 15:58:54 ================================================================================
2021-01-07 15:58:54 PID file removed (/var/run/lynis.pid)
2021-01-07 15:58:54 Temporary files: /tmp/lynis.6YdHvjlCxY /tmp/lynis.MDp0DxOuKJ /tmp/lynis.poIeU4RToD /tmp/lynis.xSEx85yike
2021-01-07 15:58:54 Action: removing temporary file /tmp/lynis.6YdHvjlCxY
2021-01-07 15:58:54 Info: temporary file /tmp/lynis.MDp0DxOuKJ was already removed
2021-01-07 15:58:54 Info: temporary file /tmp/lynis.poIeU4RToD was already removed
2021-01-07 15:58:54 Action: removing temporary file /tmp/lynis.xSEx85yike
2021-01-07 15:58:54 Lynis ended successfully.