python 2.6.6 5.10 2011-09-21T13:44:00 Disable usb-storage Kernel Module Red Hat Enterprise Linux 6 The kernel module usb-storage should be disabled. Audit User/Group Information Red Hat Enterprise Linux 6 Audit rules should detect modification to system files that hold information about users and groups. Set Last Logon/Access Notification Red Hat Enterprise Linux 6 Configure the system to notify users of last logon/access using pam_lastlog. File /boot/grub/grub.conf Permissions Red Hat Enterprise Linux 6 File permissions for /boot/grub/grub.conf should be set to 0600. Find files unowned by a group Red Hat Enterprise Linux 6 All files should be owned by a group Package dhcp Removed Red Hat Enterprise Linux 6 The RPM package dhcp should be removed. Package openldap-servers Removed Red Hat Enterprise Linux 6 The RPM package openldap-servers should be removed. Verify Permissions On Apache Web Server Configuration Files Red Hat Enterprise Linux 6 The /etc/httpd/conf/* files should have the appropriate permissions. Ensure /var/log/audit Located On Separate Partition Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Audit logs are stored in the /var/log/audit directory. Ensure that it has its own partition or logical volume. Make absolutely certain that it is large enough to store all audit logs that will be created by the auditing daemon. Disable Kernel Support for USB via Bootloader Configuration Red Hat Enterprise Linux 6 Look for argument "nousb" in the kernel line in /etc/grub.conf Service saslauthd Disabled Red Hat Enterprise Linux 6 The saslauthd service should be disabled if possible. Kernel Runtime Parameter "kernel.dmesg_restrict" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "kernel.dmesg_restrict" should be set to "1". Verify group who owns 'passwd' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/passwd file should be owned by the appropriate group. Package rsyslog Installed Red Hat Enterprise Linux 6 The RPM package rsyslog should be installed. Record Attempts to Alter Logon and Logout Events Red Hat Enterprise Linux 6 Audit rules should be configured to log successful and unsuccessful logon and logout events. Package vsftpd Removed Red Hat Enterprise Linux 6 The RPM package vsftpd should be removed. Audit Discretionary Access Control Modification Events - lchown Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Postfix network listening should be disabled Red Hat Enterprise Linux 6 Postfix network listening should be disabled Enable Auditing for Processes Which Start Prior to the Audit Daemon Red Hat Enterprise Linux 6 Look for argument audit=1 in the kernel line in /etc/grub.conf. Service rdisc Disabled Red Hat Enterprise Linux 6 The rdisc service should be disabled if possible. Service rhsmcertd Disabled Red Hat Enterprise Linux 6 The rhsmcertd service should be disabled if possible. Verify /boot/grub/grub.conf Permissions Red Hat Enterprise Linux 6 This test makes sure that /boot/grub/grub.conf is owned by 0, group owned by 0, and has mode 0600. If the target file or directory has an extended ACL then it will fail the mode check. Verify /etc/shadow Permissions Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 This test makes sure that /etc/shadow is owned by 0, group owned by 0, and has mode 0000. If the target file or directory has an extended ACL then it will fail the mode check. Directory /etc/httpd/conf/ Permissions Red Hat Enterprise Linux 6 Directory permissions for /etc/httpd/conf/ should be set to 0750. Service rhnsd Disabled Red Hat Enterprise Linux 6 The rhnsd service should be disabled if possible. Disable squashfs Kernel Module Red Hat Enterprise Linux 6 The kernel module squashfs should be disabled. Audit Discretionary Access Control Modification Events - fsetxattr Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Lock out account after failed login attempts Red Hat Enterprise Linux 6 The number of allowed failed logins should be set correctly. Service ypbind Disabled Red Hat Enterprise Linux 6 The ypbind service should be disabled if possible. Package qpid-cpp-server Removed Red Hat Enterprise Linux 6 The RPM package qpid-cpp-server should be removed. Package psacct Installed Red Hat Enterprise Linux 6 The RPM package psacct should be installed. Add noexec Option to Removable Media Partitions Red Hat Enterprise Linux 6 The noexec mount option prevents the direct execution of binaries on the mounted filesystem. Users should not be allowed to execute binaries that exist on partitions mounted from removable media (such as a USB key). The noexec option prevents code from being executed directly from the media itself, and may therefore provide a line of defense against certain types of worms or malicious code. Service rsyslog Enabled Red Hat Enterprise Linux 6 The rsyslog service should be enabled if possible. Ensure that Users Have Sensible Umask Values in /etc/login.defs Red Hat Enterprise Linux 6 The default umask for all users specified in /etc/login.defs Set Password Expiration Parameters Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The minimum password age policy should be set appropriately. Proper Permissions User Home Directories Red Hat Enterprise Linux 6 File permissions should be set correctly for the home directories for all user accounts. Add nosuid Option to Removable Media Partitions Red Hat Enterprise Linux 6 The nosuid mount option prevents set-user-identifier (suid) and set-group-identifier (sgid) permissions from taking effect. These permissions allow users to execute binaries with the same permissions as the owner and group of the file respectively. Users should not be allowed to introduce suid and guid files into the system via partitions mounted from removeable media. Kernel Runtime Parameter "net.ipv4.conf.all.send_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.all.send_redirects" should be set to "0". Disable dccp Kernel Module Red Hat Enterprise Linux 6 The kernel module dccp should be disabled. Specify a Remote NTP Server for Time Data Red Hat Enterprise Linux 6 A remote NTP Server for time synchronization should be specified (and dependencies are met) Verify No netrc Files Exist Red Hat Enterprise Linux 6 The .netrc files contain login information used to auto-login into FTP servers and reside in the user's home directory. Any .netrc files should be removed. Service rpcgssd Disabled Red Hat Enterprise Linux 6 The rpcgssd service should be disabled if possible. Package ntp Installed Red Hat Enterprise Linux 6 The RPM package ntp should be installed. SELinux Enforcing Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The SELinux state should be enforcing the local policy. Verify user who owns 'passwd' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/passwd file should be owned by the appropriate user. Confirm Existence and Permissions of System Log Files Red Hat Enterprise Linux 6 All syslog log files should be owned by the appropriate user. Add nodev Option to /tmp Red Hat Enterprise Linux 6 Legitimate character and block devices should not exist within temporary directories like /tmp. The nodev mount option should be specified for /tmp. Lock out account after failed login attempts Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The number of allowed failed logins should be set correctly. Audit Discretionary Access Control Modification Events - setxattr Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Audit Discretionary Access Control Modification Events - chown Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Package rhnsd Removed Red Hat Enterprise Linux 6 The RPM package rhnsd should be removed. Manually Assign Global IPv6 Address Red Hat Enterprise Linux 6 Manually configure addresses for IPv6 Package httpd Removed Red Hat Enterprise Linux 6 The RPM package httpd should be removed. Set Password ucredit Requirements Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password ucredit should meet minimum requirements using pam_cracklib Auditd Action to Take When Disk is Low on Space Red Hat Enterprise Linux 6 admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action Package portreserve Removed Red Hat Enterprise Linux 6 The RPM package portreserve should be removed. Package hal Removed Red Hat Enterprise Linux 6 The RPM package hal should be removed. Change the default policy to DROP (from ACCEPT) for the INPUT built-in chain Red Hat Enterprise Linux 6 Change the default policy to DROP (from ACCEPT) for the INPUT built-in chain. Verify user who owns 'gshadow' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/gshadow file should be owned by the appropriate user. Disable rds Kernel Module Red Hat Enterprise Linux 6 The kernel module rds should be disabled. Kernel Runtime Parameter "net.ipv4.conf.all.log_martians" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.all.log_martians" should be set to "1". Limit Password Reuse Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The passwords to remember should be set correctly. Require Authentication for Single-User Mode Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The requirement for a password to boot into single-user mode should be configured correctly. Verify /etc/gshadow Permissions Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 This test makes sure that /etc/gshadow is owned by 0, group owned by 0, and has mode 0000. If the target file or directory has an extended ACL then it will fail the mode check. Device Files Have Proper SELinux Context Red Hat Enterprise Linux 6 All device files in /dev should be assigned an SELinux security context other than 'unlabeled_t'. Package sysstat Removed Red Hat Enterprise Linux 6 The RPM package sysstat should be removed. Service irqbalance Enabled Red Hat Enterprise Linux 6 The irqbalance service should be enabled if possible. Set Password ocredit Requirements Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password ocredit should meet minimum requirements using pam_cracklib Package ypbind Removed Red Hat Enterprise Linux 6 The RPM package ypbind should be removed. Disable Printer Browsing Entirely if Possible Red Hat Enterprise Linux 6 The CUPS print service can be configured to broadcast a list of available printers to the network. Other machines on the network, also running the CUPS print service, can be configured to listen to these broadcasts and add and configure these printers for immediate use. By disabling this browsing capability, the machine will no longer generate or receive such broadcasts. Auditd Maximum Log File Size Red Hat Enterprise Linux 6 max_log_file setting in /etc/audit/auditd.conf is set to at least a certain value Verify user who owns 'shadow' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/shadow file should be owned by the appropriate user. Verify File Hashes with RPM Red Hat Enterprise Linux 6 Verify the MD5 hashes of system binaries using the RPM database. Mount Remote Filesystems with nosuid Red Hat Enterprise Linux 6 The nosuid option should be enabled for all NFS mounts in /etc/fstab. Package xinetd Removed Red Hat Enterprise Linux 6 The RPM package xinetd should be removed. Service sysstat Disabled Red Hat Enterprise Linux 6 The sysstat service should be disabled if possible. Package iputils Removed Red Hat Enterprise Linux 6 The RPM package iputils should be removed. No nullok Option in /etc/pam.d/system-auth Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The file /etc/pam.d/system-auth should not contain the nullok option Lock out account after failed login attempts Red Hat Enterprise Linux 6 The number of allowed failed logins should be set correctly. Package sendmail Removed Red Hat Enterprise Linux 6 The RPM package sendmail should be removed. Set Password Expiration Parameters Red Hat Enterprise Linux 6 The maximum password age policy should meet minimum requirements. TFTP Daemon Uses Secure Mode Red Hat Enterprise Linux 6 The TFTP daemon should use secure mode. Service named Disabled Red Hat Enterprise Linux 6 The named service should be disabled if possible. Package subscription-manager Removed Red Hat Enterprise Linux 6 The RPM package subscription-manager should be removed. Verify /etc/passwd Permissions Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 This test makes sure that /etc/passwd is owned by 0, group owned by 0, and has mode 0644. If the target file or directory has an extended ACL then it will fail the mode check. Set Accounts to Expire Following Password Expiration Red Hat Enterprise Linux 6 The accounts should be configured to expire automatically following password expiration. Service avahi-daemon Disabled Red Hat Enterprise Linux 6 The avahi-daemon service should be disabled if possible. Do Not Allow Users to Set Environment Options Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 PermitUserEnvironment should be disabled Service smb Disabled Red Hat Enterprise Linux 6 The smb service should be disabled if possible. File grub.conf Owned By root Group Red Hat Enterprise Linux 6 The grub.conf file should be owned by the root group. By default, this file is located at /boot/grub/grub.conf or, for EFI systems, at /boot/efi/EFI/redhat/grub.conf Service messagebus Disabled Red Hat Enterprise Linux 6 The messagebus service should be disabled if possible. Package cpuspeed Removed Red Hat Enterprise Linux 6 The RPM package cpuspeed should be removed. Disallow inbound firewall access to the SSH Server port. Red Hat Enterprise Linux 6 If inbound SSH access is not needed, the firewall should disallow or reject access to the SSH port (22). Ensure Yum gpgcheck Globally Activated Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The gpgcheck option should be used to ensure that checking of an RPM package's signature always occurs prior to its installation. Service vsftpd Disabled Red Hat Enterprise Linux 6 The vsftpd service should be disabled if possible. Ensure /home Located On Separate Partition Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 If user home directories will be stored locally, create a separate partition for /home. If /home will be mounted from another system such as an NFS server, then creating a separate partition is not necessary at this time, and the mountpoint can instead be configured later. Service squid Disabled Red Hat Enterprise Linux 6 The squid service should be disabled if possible. Service atd Disabled Red Hat Enterprise Linux 6 The atd service should be disabled if possible. Package kexec-tools Removed Red Hat Enterprise Linux 6 The RPM package kexec-tools should be removed. Service cups Disabled Red Hat Enterprise Linux 6 The cups service should be disabled if possible. Disable IPv6 Kernel Module Functionality via Disable Option Red Hat Enterprise Linux 6 The disable option will allow the IPv6 module to be inserted, but prevent address assignment and activation of the network stack. Disable Host-Based Authentication Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 SSH host-based authentication should be disabled. Ensure /var/log Located On Separate Partition Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 System logs are stored in the /var/log directory. Ensure that it has its own partition or logical volume. Service netconsole Disabled Red Hat Enterprise Linux 6 The netconsole service should be disabled if possible. Kernel Runtime Parameter "net.ipv4.conf.all.rp_filter" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.all.rp_filter" should be set to "1". Package squid Removed Red Hat Enterprise Linux 6 The RPM package squid should be removed. Disable telnet Service Red Hat Enterprise Linux 6 Disable telnet Service Service oddjobd Disabled Red Hat Enterprise Linux 6 The oddjobd service should be disabled if possible. Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) Red Hat Enterprise Linux 6 Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled Package GConf2 Installed Red Hat Enterprise Linux 6 The RPM package GConf2 should be installed. Service cgconfig Disabled Red Hat Enterprise Linux 6 The cgconfig service should be disabled if possible. Service snmpd Disabled Red Hat Enterprise Linux 6 The snmpd service should be disabled if possible. Service tftp Disabled Red Hat Enterprise Linux 6 The tftp service should be disabled if possible. Disable hfsplus Kernel Module Red Hat Enterprise Linux 6 The kernel module hfsplus should be disabled. Package nfs-utils Removed Red Hat Enterprise Linux 6 The RPM package nfs-utils should be removed. Service restorecond Enabled Red Hat Enterprise Linux 6 The restorecond service should be enabled if possible. Bind Mount /var/tmp To /tmp Red Hat Enterprise Linux 6 The /var/tmp directory should be bind mounted to /tmp in order to consolidate temporary storage into one location protected by the same techniques as /tmp. Kernel Runtime Parameter "net.ipv4.conf.default.rp_filter" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.default.rp_filter" should be set to "1". Add nosuid Option to /tmp Red Hat Enterprise Linux 6 The nosuid mount option should be set for temporary storage partitions such as /tmp. The suid/sgid permissions should not be required in these world-writable directories. Kernel Runtime Parameter "net.ipv4.conf.default.accept_source_route" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.default.accept_source_route" should be set to "0". Service httpd Disabled Red Hat Enterprise Linux 6 The httpd service should be disabled if possible. Find setuid files from system packages Red Hat Enterprise Linux 6 All files with setuid should be owned by a base system package Configure Postfix Against Unnecessary Release of Information Red Hat Enterprise Linux 6 Protect against unnecessary release of information. Package at Removed Red Hat Enterprise Linux 6 The RPM package at should be removed. Disable tipc Kernel Module Red Hat Enterprise Linux 6 The kernel module tipc should be disabled. Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 6 The operating system installed on the system is Red Hat Enterprise Linux 6 Package cronie Installed Red Hat Enterprise Linux 6 The RPM package cronie should be installed. Ensure Only Protocol 2 Connections Allowed Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The OpenSSH daemon should be running protocol 2. Package abrt Removed Red Hat Enterprise Linux 6 The RPM package abrt should be removed. Service dhcpd Disabled Red Hat Enterprise Linux 6 The dhcpd service should be disabled if possible. Package dhcpd Removed Red Hat Enterprise Linux 6 The RPM package dhcpd should be removed. Ensure gpgcheck Enabled For All Yum Package Repositories Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Ensure all yum repositories utilize signature checking. Service iptables Enabled Red Hat Enterprise Linux 6 The iptables service should be enabled if possible. Audit Discretionary Access Control Modification Events - lremovexattr Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Disable Interactive Boot Red Hat Enterprise Linux 6 The ability for users to perform interactive startups should be disabled. Package postfix Installed Red Hat Enterprise Linux 6 The RPM package postfix should be installed. Package iptables Installed Red Hat Enterprise Linux 6 The RPM package iptables should be installed. Set Password retry Requirements Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password retry should meet minimum requirements using pam_cracklib Disable root Login via SSH Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Root login via SSH should be disabled (and dependencies are met) Disable All GNOME Thumbnailers Red Hat Enterprise Linux 6 The system's default desktop environment, GNOME, uses a number of different thumbnailer programs to generate thumbnails for any new or modified content in an opened folder. Disable the execution of these thumbnail applications within GNOME. Verify that All World-Writable Directories Have Sticky Bits Set Red Hat Enterprise Linux 6 The sticky bit should be set for all world-writable directories. Implement idle activation of screen lock Red Hat Enterprise Linux 6 Idle activation of the screen lock should be enabled. Verify /var/log/audit Permissions Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Checks for correct permissions for all log files in /var/log/audit. Service rexec Disabled Red Hat Enterprise Linux 6 The rexec service should be disabled if possible. Kernel Runtime Parameter "net.ipv4.icmp_ignore_bogus_error_responses" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.icmp_ignore_bogus_error_responses" should be set to "1". Service portreserve Disabled Red Hat Enterprise Linux 6 The portreserve service should be disabled if possible. Service mdmonitor Disabled Red Hat Enterprise Linux 6 The mdmonitor service should be disabled if possible. Disable Prelinking Red Hat Enterprise Linux 6 The prelinking feature can interfere with the operation of AIDE, because it changes binaries. Ensure that No Dangerous Directories Exist in Root's Path Red Hat Enterprise Linux 6 The environment variable PATH should be set correctly for the root user. Auditd Action to Take When Disk Starting to Run Low on Space Red Hat Enterprise Linux 6 space_left_action setting in /etc/audit/auditd.conf is set to a certain action Service ntpdate Disabled Red Hat Enterprise Linux 6 The ntpdate service should be disabled if possible. Kernel Runtime Parameter "net.ipv6.conf.default.accept_ra" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv6.conf.default.accept_ra" should be set to "0". Mount Remote Filesystems with nodev Red Hat Enterprise Linux 6 The nodev option should be enabled for all NFS mounts in /etc/fstab. Service quota_nld Disabled Red Hat Enterprise Linux 6 The quota_nld service should be disabled if possible. Service postfix Enabled Red Hat Enterprise Linux 6 The postfix service should be enabled if possible. Ensure auditd Collects Information on the Use of Privileged Commands Red Hat Enterprise Linux 6 Audit rules about the Information on the Use of Privileged Commands are enabled Kernel Runtime Parameter "net.ipv4.tcp_syncookies" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.tcp_syncookies" should be set to "1". Verify File Ownership And Permissions Using RPM Red Hat Enterprise Linux 6 Verify the integrity of installed packages by comparing the installed files with information about the files taken from the package metadata stored in the RPM database. Service cpuspeed Disabled Red Hat Enterprise Linux 6 The cpuspeed service should be disabled if possible. Package bind Removed Red Hat Enterprise Linux 6 The RPM package bind should be removed. Ensure Logwatch HostLimit Configured Red Hat Enterprise Linux 6 Test if HostLimit line in logwatch.conf is set appropriately. Ensure /tmp Located On Separate Partition Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /tmp directory is a world-writable directory used for temporary file storage. Verify that it has its own partition or logical volume. Package smartmontools Removed Red Hat Enterprise Linux 6 The RPM package smartmontools should be removed. Disable sctp Kernel Module Red Hat Enterprise Linux 6 The kernel module sctp should be disabled. Audit Discretionary Access Control Modification Events - fchownat Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Confirm Existence and Permissions of System Log Files Red Hat Enterprise Linux 6 All syslog log files should be owned by the appropriate group. Add nodev Option to /dev/shm Red Hat Enterprise Linux 6 Legitimate character and block devices should not exist within temporary directories like /dev/shm. The nodev mount option should be specified for /dev/shm. Package talk-server Removed Red Hat Enterprise Linux 6 The RPM package talk-server should be removed. Service certmonger Disabled Red Hat Enterprise Linux 6 The certmonger service should be disabled if possible. Kernel Runtime Parameter "net.ipv4.conf.default.secure_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.default.secure_redirects" should be set to "0". Package quota Removed Red Hat Enterprise Linux 6 The RPM package quota should be removed. Audit File Deletion Events Red Hat Enterprise Linux 6 Audit files deletion events. Enable SELinux Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The SELinux policy should be set appropriately. Record Attempts to Alter Time Through Clock_settime Red Hat Enterprise Linux 6 Record attempts to alter time through clock_settime. Service qpidd Disabled Red Hat Enterprise Linux 6 The qpidd service should be disabled if possible. Kernel Runtime Parameter "net.ipv4.conf.all.accept_source_route" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.all.accept_source_route" should be set to "0". Audit Discretionary Access Control Modification Events - fchmodat Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Set ClientAliveCountMax for User Logins Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The SSH ClientAliveCountMax should be set to an appropriate value (and dependencies are met) Set Password difok Requirements Red Hat Enterprise Linux 6 The password difok should meet minimum requirements using pam_cracklib Service auditd Enabled Red Hat Enterprise Linux 6 The auditd service should be enabled if possible. Package net-snmp Removed Red Hat Enterprise Linux 6 The RPM package net-snmp should be removed. Add noexec Option to /tmp Red Hat Enterprise Linux 6 It can be dangerous to allow the execution of binaries from world-writable temporary storage directories such as /tmp. The noexec mount option prevents binaries from being executed out of /tmp. Restrict Virtual Console Root Logins Red Hat Enterprise Linux 6 Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account. Disable DHCP Client Red Hat Enterprise Linux 6 DHCP configuration should be static for all interfaces. Audit Information Export To Media Red Hat Enterprise Linux 6 Audit rules that detect the mounting of filesystems should be enabled. Service kdump Disabled Red Hat Enterprise Linux 6 The kdump service should be disabled if possible. Verify permissions on 'group' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 File permissions for /etc/group should be set correctly. Package cyrus-sasl Removed Red Hat Enterprise Linux 6 The RPM package cyrus-sasl should be removed. Service ip6tables Enabled Red Hat Enterprise Linux 6 The ip6tables service should be enabled if possible. Disable freevxfs Kernel Module Red Hat Enterprise Linux 6 The kernel module freevxfs should be disabled. System Accounts Do Not Run a Shell Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The root account is the only system account that should have a login shell. Configure LDAP CA Certificate Path Red Hat Enterprise Linux 6 Require the use of TLS for ldap clients. Package cups Removed Red Hat Enterprise Linux 6 The RPM package cups should be removed. Set Password Expiration Parameters Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password minimum length should be set appropriately. Disable Zeroconf Networking Red Hat Enterprise Linux 6 Disable Zeroconf automatic route assignment in the 169.254.0.0 subnet. Service ntpd Enabled Red Hat Enterprise Linux 6 The ntpd service should be enabled if possible. Audit Kernel Module Loading and Unloading Red Hat Enterprise Linux 6 The audit rules should be configured to log information about kernel module loading and unloading. Add nosuid Option to /dev/shm Red Hat Enterprise Linux 6 The nosuid mount option should be set for temporary storage partitions such as /dev/shm. The suid/sgid permissions should not be required in these world-writable directories. Set Password dcredit Requirements Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password dcredit should meet minimum requirements using pam_cracklib Audit Discretionary Access Control Modification Events - chmod Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Confirm Existence and Permissions of System Log Files Red Hat Enterprise Linux 6 File permissions for all syslog log files should be set correctly. Set Password Hashing Algorithm in /etc/pam.d/system-auth Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password hashing algorithm should be set correctly in /etc/pam.d/system-auth. Service cgred Disabled Red Hat Enterprise Linux 6 The cgred service should be disabled if possible. Service xinetd Disabled Red Hat Enterprise Linux 6 The xinetd service should be disabled if possible. Verify /var/log/audit Ownership Red Hat Enterprise Linux 6 Checks that all /var/log/audit files and directories are owned by the root user and group. Service crond Enabled Red Hat Enterprise Linux 6 The crond service should be enabled if possible. Kernel Runtime Parameter "net.ipv4.icmp_echo_ignore_broadcasts" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.icmp_echo_ignore_broadcasts" should be set to "1". Kernel Runtime Parameter "net.ipv4.conf.default.send_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.default.send_redirects" should be set to "0". Ensure that Users Have Sensible Umask Values set for bash Red Hat Enterprise Linux 6 The default umask for users of the bash shell Disable jffs2 Kernel Module Red Hat Enterprise Linux 6 The kernel module jffs2 should be disabled. Package rsh-server Removed Red Hat Enterprise Linux 6 The RPM package rsh-server should be removed. Verify that Shared Library Files Have Root Ownership Fedora 19 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and objects therein, are owned by root. Set SHA512 Password Hashing Algorithm in /etc/libuser.conf Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password hashing algorithm should be set correctly in /etc/libuser.conf. Service netfs Disabled Red Hat Enterprise Linux 6 The netfs service should be disabled if possible. Kernel Runtime Parameter "net.ipv4.ip_forward" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.ip_forward" should be set to "0". Audit Discretionary Access Control Modification Events - fchown Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Require Client SMB Packet Signing, if using mount.cifs Red Hat Enterprise Linux 6 Require packet signing of clients who mount Samba shares using the mount.cifs program (e.g., those who specify shares in /etc/fstab). To do so, ensure that signing options (either sec=krb5i or sec=ntlmv2i) are used. Set Daemon umask Red Hat Enterprise Linux 6 The daemon umask should be set as appropriate Send Logs to a Remote Loghost Red Hat Enterprise Linux 6 Syslog logs should be sent to a remote loghost Disable Empty Passwords Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Remote connections from accounts with empty passwords should be disabled (and dependencies are met) Enable a Warning Banner Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 SSH warning banner should be enabled (and dependencies are met) Set SHA512 Password Hashing Algorithm in /etc/login.defs Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password hashing algorithm should be set correctly in /etc/login.defs. Set OpenSSH Idle Timeout Interval Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The SSH idle timeout interval should be set to an appropriate value. Service psacct Enabled Red Hat Enterprise Linux 6 The psacct service should be enabled if possible. Package samba-common Removed Red Hat Enterprise Linux 6 The RPM package samba-common should be removed. Add noexec Option to /dev/shm Red Hat Enterprise Linux 6 It can be dangerous to allow the execution of binaries from world-writable temporary storage directories such as /dev/shm. The noexec mount option prevents binaries from being executed out of /dev/shm. Package telnet-server Removed Red Hat Enterprise Linux 6 The RPM package telnet-server should be removed. Record Events that Modify the System's Mandatory Access Controls Red Hat Enterprise Linux 6 Audit rules that detect changes to the system's mandatory access controls (SELinux) are enabled. Package iptables-ipv6 Installed Red Hat Enterprise Linux 6 The RPM package iptables-ipv6 should be installed. Disable bluetooth Kernel Module Red Hat Enterprise Linux 6 The kernel module bluetooth should be disabled. Service nfs Disabled Red Hat Enterprise Linux 6 The nfs service should be disabled if possible. Service abrtd Disabled Red Hat Enterprise Linux 6 The abrtd service should be disabled if possible. Record Attempts to Alter Time Through Adjtimex Red Hat Enterprise Linux 6 Record attempts to alter time through adjtimex. No Legacy .rhosts Or hosts.equiv Files Red Hat Enterprise Linux 6 There should not be any .rhosts or hosts.equiv files on the system. Service rpcidmapd Disabled Red Hat Enterprise Linux 6 The rpcidmapd service should be disabled if possible. Find files unowned by a user Red Hat Enterprise Linux 6 All files should be owned by a user Configure LDAP to Use TLS for All Transactions Red Hat Enterprise Linux 6 Require the use of TLS for ldap clients. Test for use of pam_ldap Red Hat Enterprise Linux 6 Check for pam_ldap.so presence. Find world writable directories not owned by a system account Red Hat Enterprise Linux 6 All world writable directories should be owned by a system user. Enable GUI Warning Banner Red Hat Enterprise Linux 6 Enable the GUI warning banner. Record Attempts to Alter Time Through the Localtime File Red Hat Enterprise Linux 6 Record attempts to alter time through /etc/localtime Service haldaemon Disabled Red Hat Enterprise Linux 6 The haldaemon service should be disabled if possible. Package ypserv Removed Red Hat Enterprise Linux 6 The RPM package ypserv should be removed. Auditd Email Account to Notify Upon Action Red Hat Enterprise Linux 6 action_mail_acct setting in /etc/audit/auditd.conf is set to a certain account Package xorg-x11-server-common Removed Red Hat Enterprise Linux 6 The RPM package xorg-x11-server-common should be removed. Record Attempts to Alter Time Through Stime Red Hat Enterprise Linux 6 Record attempts to alter time through stime, note that this is only relevant on 32bit architecture. All Password Hashes Shadowed Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 All password hashes should be shadowed. Auditd Action to Take When Maximum Log Size Reached Red Hat Enterprise Linux 6 max_log_file_action setting in /etc/audit/auditd.conf is set to a certain action Service acpid Disabled Red Hat Enterprise Linux 6 The acpid service should be disabled if possible. Disable .rhosts Files Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Emulation of the rsh command through the ssh server should be disabled (and dependencies are met) Test for x86_64 Architecture Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Generic test for x86_64 architecture to be used by other tests Kernel Runtime Parameter "net.ipv4.conf.all.secure_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.all.secure_redirects" should be set to "0". Manually Assign IPv6 Router Address Red Hat Enterprise Linux 6 Define default gateways for IPv6 traffic Service sshd Disabled Red Hat Enterprise Linux 6 The sshd service should be disabled if possible. Audit System Administrator Actions Red Hat Enterprise Linux 6 Audit actions taken by system administrators on the system. Package dovecot Removed Red Hat Enterprise Linux 6 The RPM package dovecot should be removed. Record Events that Modify the System's Network Environment Red Hat Enterprise Linux 6 The network environment should not be modified by anything other than administrator action. Any change to network parameters should be audited. Package dbus Removed Red Hat Enterprise Linux 6 The RPM package dbus should be removed. Implement blank screen saver Red Hat Enterprise Linux 6 The screen saver should be blank. Test for x86 Architecture Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Generic test for x86 architecture to be used by other tests Kernel Runtime Parameter "net.ipv6.conf.default.accept_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv6.conf.default.accept_redirects" should be set to "0". Service rpcsvcgssd Disabled Red Hat Enterprise Linux 6 The rpcsvcgssd service should be disabled if possible. Verify group who owns 'gshadow' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/gshadow file should be owned by the appropriate group. Audit Discretionary Access Control Modification Events - removexattr Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Record Attempts to Alter Time Through Settimeofday Red Hat Enterprise Linux 6 Record attempts to alter time through settimeofday. Ensure All Logs are Rotated by logrotate Red Hat Enterprise Linux 6 The logrotate (syslog rotater) service should be enabled. Disable hfs Kernel Module Red Hat Enterprise Linux 6 The kernel module hfs should be disabled. Implement idle activation of screen saver Red Hat Enterprise Linux 6 Idle activation of the screen saver should be enabled. Enable SELinux in /etc/grub.conf Red Hat Enterprise Linux 6 Check if selinux=0 OR enforcing=0 within /etc/grub.conf lines, fail if found. Package openswan Installed Red Hat Enterprise Linux 6 The RPM package openswan should be installed. Set Boot Loader Password Red Hat Enterprise Linux 6 The grub boot loader should have password protection enabled. Auditd Maximum Number of Logs to Retain Red Hat Enterprise Linux 6 num_logs setting in /etc/audit/auditd.conf is set to at least a certain value Record Attempts to Alter Process and Session Initiation Information Red Hat Enterprise Linux 6 Audit rules should capture information about session initiation. Kernel Runtime Parameter "net.ipv4.conf.all.accept_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.all.accept_redirects" should be set to "0". Service smartd Disabled Red Hat Enterprise Linux 6 The smartd service should be disabled if possible. Audit Discretionary Access Control Modification Events - fchmod Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Package libcgroup Removed Red Hat Enterprise Linux 6 The RPM package libcgroup should be removed. Directory /var/log/httpd/ Permissions Red Hat Enterprise Linux 6 Directory permissions for /var/log/httpd should be set to 0750. Kernel Runtime Parameter "kernel.randomize_va_space" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "kernel.randomize_va_space" should be set to "2". Find setgid files system packages Red Hat Enterprise Linux 6 All files with setgid should be owned by a base system package Audit Discretionary Access Control Modification Events - fremovexattr Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Write permissions are disabled for group and other in all directories in Root's Path Red Hat Enterprise Linux 6 Check each directory in root's path and make use it does not grant write permission to group and other Kernel Runtime Parameter "net.ipv4.conf.default.accept_redirects" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "net.ipv4.conf.default.accept_redirects" should be set to "0". Verify group who owns 'shadow' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/shadow file should be owned by the appropriate group. Restrict Serial Port Root Logins Red Hat Enterprise Linux 6 Preventing direct root login to serial port interfaces helps ensure accountability for actions taken on the system using the root account. Make Audit Configuration Immutable Red Hat Enterprise Linux 6 Force a reboot to change audit rules is enabled Package openssh-server Removed Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The RPM package openssh-server should be removed. Set Password minclass Requirements Red Hat Enterprise Linux 6 The password minclass should meet minimum requirements using pam_cracklib Verify that System Executables Have Restrictive Permissions Fedora 19 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Checks that binary files under /bin, /sbin, /usr/bin, /usr/sbin, /usr/local/bin, and /usr/local/sbin, are not group-writable or world-writable. Set Maximum Number of Concurrent Login Sessions Per User Red Hat Enterprise Linux 6 The maximum number of concurrent login sessions per user should meet minimum requirements. Configure GUI Screen Locking Red Hat Enterprise Linux 6 The allowed period of inactivity before the screensaver is activated. Package irqbalance Installed Red Hat Enterprise Linux 6 The RPM package irqbalance should be installed. Package audit Installed Red Hat Enterprise Linux 6 The RPM package audit should be installed. Disable Printer Server if Possible Red Hat Enterprise Linux 6 By default, locally configured printers will not be shared over the network, but if this functionality has somehow been enabled, these recommendations will disable it again. Be sure to disable outgoing printer list broadcasts, or remote users will still be able to see the locally configured printers, even if they cannot actually print to them. To limit print serving to a particular set of users, use the Policy directive. Package pam_ldap Removed Red Hat Enterprise Linux 6 The RPM package pam_ldap should be removed. Package oddjob Removed Red Hat Enterprise Linux 6 The RPM package oddjob should be removed. Verify that Shared Library Files Have Restrictive Permissions Fedora 19 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and objects therein, are not group-writable or world-writable. Package tftp-server Removed Red Hat Enterprise Linux 6 The RPM package tftp-server should be removed. Set Password lcredit Requirements Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password lcredit should meet minimum requirements using pam_cracklib Disable Rsyslogd from Accepting Remote Messages on Loghosts Only Red Hat Enterprise Linux 6 rsyslogd should reject remote messages Add nodev Option to Removable Media Partitions Red Hat Enterprise Linux 6 The nodev mount option prevents files from being interpreted as character or block devices. Legitimate character and block devices should exist in the /dev directory on the root partition or within chroot jails built for system services. All other locations should not allow character and block devices. Package ntpdate Removed Red Hat Enterprise Linux 6 The RPM package ntpdate should be removed. Audit Discretionary Access Control Modification Events - lsetxattr Red Hat Enterprise Linux 6 The changing of file permissions and attributes should be audited. Service rlogin Disabled Red Hat Enterprise Linux 6 The rlogin service should be disabled if possible. Disable cramfs Kernel Module Red Hat Enterprise Linux 6 The kernel module cramfs should be disabled. Set Password Expiration Parameters Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The password expiration warning age should be set appropriately. Enable Privacy Extensions for IPv6 Red Hat Enterprise Linux 6 Enable privacy extensions for IPv6 Service bluetooth Disabled Red Hat Enterprise Linux 6 The bluetooth service should be disabled if possible. Disable udf Kernel Module Red Hat Enterprise Linux 6 The kernel module udf should be disabled. Package mdadm Removed Red Hat Enterprise Linux 6 The RPM package mdadm should be removed. Add nodev Option to Non-Root Local Partitions Red Hat Enterprise Linux 6 The nodev mount option prevents files from being interpreted as character or block devices. Legitimate character and block devices should exist in the /dev directory on the root partition or within chroot jails built for system services. All other locations should not allow character and block devices. Ensure Logwatch SplitHosts Configured Red Hat Enterprise Linux 6 Check if SplitHosts line in logwatch.conf is set appropriately. Verify that System Executables Have Root Ownership Fedora 19 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Checks that /bin, /sbin, /usr/bin, /usr/sbin, /usr/local/bin, /usr/local/sbin, and objects therein, are owned by root. Kernel Runtime Parameter "fs.suid_dumpable" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "fs.suid_dumpable" should be set to "0". Ensure that Users Have Sensible Umask Values set for csh Red Hat Enterprise Linux 6 The default umask for users of the csh shell Use Only Approved Ciphers Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Limit the ciphers to those which are FIPS-approved and only use ciphers in counter (CTR) mode. UID 0 Belongs Only To Root Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Only the root account should be assigned a user id of 0. Kernel Runtime Parameter "kernel.exec-shield" Check Red Hat Enterprise Linux 6 The kernel runtime parameter "kernel.exec-shield" should be set to "1". Ensure /var Located On Separate Partition Red Hat Enterprise Linux 7 Ensuring that /var is mounted on its own partition enables the setting of more restrictive mount options, which is used as temporary storage by many program, particularly system services such as daemons. It is not uncommon for the /var directory to contain world-writable directories, installed by other software packages. Service rsh Disabled Red Hat Enterprise Linux 6 The rsh service should be disabled if possible. System Login Banner Compliance Red Hat Enterprise Linux 6 The system login banner text should be set correctly. Package aide Installed Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The RPM package aide should be installed. Disable GNOME Automounting Red Hat Enterprise Linux 6 The system's default desktop environment, GNOME, will mount devices and removable media (such as DVDs, CDs and USB flash drives) whenever they are inserted into the system. Disable automount and autorun within GNOME. Disable Plaintext Authentication in Dovecot Red Hat Enterprise Linux 6 Plaintext authentication of mail clients should be disabled. Service autofs Disabled Red Hat Enterprise Linux 6 The autofs service should be disabled if possible. Package policycoreutils Installed Red Hat Enterprise Linux 6 The RPM package policycoreutils should be installed. File grub.conf Owned By root User Red Hat Enterprise Linux 6 The grub.conf file should be owned by the root user. By default, this file is located at /boot/grub/grub.conf or, for EFI systems, at /boot/efi/EFI/redhat/grub.conf Ensure that Users Have Sensible Umask Values in /etc/profile Red Hat Enterprise Linux 6 The default umask for all users should be set correctly Verify user who owns 'group' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/group file should be owned by the appropriate user. Disable X Windows Startup By Setting Runlevel Red Hat Enterprise Linux 6 Checks /etc/inittab to ensure that default runlevel is set to 3. Service dovecot Disabled Red Hat Enterprise Linux 6 The dovecot service should be disabled if possible. Disable the network sniffer Red Hat Enterprise Linux 6 Disable the network sniffer Service nfslock Disabled Red Hat Enterprise Linux 6 The nfslock service should be disabled if possible. Require Client SMB Packet Signing in smb.conf Red Hat Enterprise Linux 6 Require samba clients which use smb.conf, such as smbclient, to use packet signing. A Samba client should only communicate with servers who can support SMB packet signing. Red Hat Release and Auxiliary gpg-pubkey Packages Installed Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The Red Hat release and auxiliary key packages are required to be installed. Find Unauthorized World-Writable Files Red Hat Enterprise Linux 6 The world-write permission should be disabled for all files. Disable Core Dumps Red Hat Enterprise Linux 6 Core dumps for all users should be disabled Deactivate Wireless Interfaces Red Hat Enterprise Linux 6 All wireless interfaces should be disabled. Package vsftpd Installed Red Hat Enterprise Linux 6 The RPM package vsftpd should be installed. Verify group who owns 'group' file Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 The /etc/group file should be owned by the appropriate group. Package screen Installed Red Hat Enterprise Linux 6 The RPM package screen should be installed. Enable SSL in Dovecot Red Hat Enterprise Linux 6 SSL capabilities should be enabled for the mail server. Disable Support for RPC IPv6 Red Hat Enterprise Linux 6 Disable ipv6 based rpc services This will enumerate all files on local partitions /etc/modprobe.d ^.*\.conf$ ^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$ 1 /etc/audit/audit.rules ^\-w\s+/etc/group\s+\-p\s+wa\s+\-k\s+\w+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/passwd\s+\-p\s+wa\s+\-k\s+\w+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/gshadow\s+\-p\s+wa\s+\-k\s+\w+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/shadow\s+\-p\s+wa\s+\-k\s+\w+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/security/opasswd\s+\-p\s+wa\s+\-k\s+\w+\s*$ 1 /etc/pam.d/system-auth ^\s*session\s+(required|requisite)?\s+pam_lastlog.so[\s\w\d\=]+showfailed 1 /boot/grub grub.conf / .* dhcp openldap-servers /etc/httpd/conf ^.*$ /var/log/audit /etc grub.conf ^\s*kernel\s/vmlinuz.*nousb.*$ 1 saslauthd 0 saslauthd 1 saslauthd 2 saslauthd 3 saslauthd 4 saslauthd 5 saslauthd 6 /etc/sysctl.conf ^[\s]*kernel.dmesg_restrict[\s]*=[\s]*1*$ 1 kernel.dmesg_restrict /etc/passwd rsyslog /etc/audit/audit.rules ^\-w\s+/var/log/faillog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/var/log/lastlog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 vsftpd /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/postfix main.cf ^[\s]*inet_interfaces[\s]*=[\s]*localhost[\s]*$ 1 /etc grub.conf ^\s*kernel\s/vmlinuz.*audit=1.*$ 1 rdisc 0 rdisc 1 rdisc 2 rdisc 3 rdisc 4 rdisc 5 rdisc 6 rhsmcertd 0 rhsmcertd 1 rhsmcertd 2 rhsmcertd 3 rhsmcertd 4 rhsmcertd 5 rhsmcertd 6 /boot/grub grub.conf /etc/shadow /etc/httpd/conf rhnsd 0 rhnsd 1 rhnsd 2 rhnsd 3 rhnsd 4 rhnsd 5 rhnsd 6 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+squashfs\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+squashfs\s+(/bin/false|/bin/true)$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/pam.d system-auth ^\s*auth\s+(?:(?:required))\s+pam_faillock\.so.*fail_interval=([0-9]*).*$ 1 /etc/pam.d password-auth ^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so.*fail_interval=([0-9]*).*$ 1 ypbind 0 ypbind 1 ypbind 2 ypbind 3 ypbind 4 ypbind 5 ypbind 6 qpid-cpp-server psacct /etc/fstab ^\s*([/\w]*)\s+.*,?noexec,?.*$ 0 rsyslog 0 rsyslog 1 rsyslog 2 rsyslog 3 rsyslog 4 rsyslog 5 rsyslog 6 /etc/login.defs ^[\s]*UMASK[\s]+([^#\s]*) 1 /etc/login.defs ^[\s]*PASS_MIN_DAYS[\s]+(\d+)\s*$ 1 /home oval:ssg:ste:1334 /etc/fstab ^\s*([/\w]*)\s+.*,?nosuid,?.*$ 0 /etc/sysctl.conf ^[\s]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*0*$ 1 net.ipv4.conf.all.send_redirects /etc/modprobe.d ^.*\.conf$ ^\s*install\s+dccp\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+dccp\s+(/bin/false|/bin/true)$ 1 /etc ntp.conf ^[\s]*server[\s]+.+$ 1 /home ^\.netrc$ rpcgssd 0 rpcgssd 1 rpcgssd 2 rpcgssd 3 rpcgssd 4 rpcgssd 5 rpcgssd 6 ntp /etc/selinux/config ^[\s]*SELINUX[\s]*=[\s]*(.*)[\s]*$ 1 /etc/passwd /var/log .*log /tmp /etc/pam.d/system-auth ^\s*auth\s+(?:(?:required))\s+pam_faillock\.so.*deny=([0-9]*).*$ 1 /etc/pam.d/password-auth ^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so.*deny=([0-9]*).*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 rhnsd /etc/sysconfig/network-scripts ifcfg-.* ^IPV6ADDR=.+$ 1 httpd /etc/pam.d/system-auth ^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]ucredit=(-?\d+)(?:[\s]|$) 1 /etc/audit/auditd.conf ^admin_space_left_action\s*=\s*(\S+)\s*$ 1 portreserve hal /etc/sysconfig iptables ^[\s]*:INPUT\sDROP\s\[0:0\] 1 /etc/sysconfig iptables ^[\s]*:INPUT\ACCEPT\s\[0:0\] 1 /etc/gshadow /etc/modprobe.d ^.*\.conf$ ^\s*install\s+rds\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+rds\s+(/bin/false|/bin/true)$ 1 /etc/sysctl.conf ^[\s]*net.ipv4.conf.all.log_martians[\s]*=[\s]*1*$ 1 net.ipv4.conf.all.log_martians /etc/pam.d/system-auth ^\s*password\s+(?:(?:sufficient)|(?:required))\s+pam_unix\.so.*remember=([0-9]*).*$ 1 /etc/sysconfig/init ^SINGLE=/sbin/sulogin[\s]* 1 /etc/gshadow /dev ^.*$ oval:ssg:ste:1397 sysstat irqbalance 0 irqbalance 1 irqbalance 2 irqbalance 3 irqbalance 4 irqbalance 5 irqbalance 6 /etc/pam.d/system-auth ^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]ocredit=(-?\d+)(?:[\s]|$) 1 ypbind /etc/cups/cupsd.conf Browsing[\s]+(?:Off|No) 1 /etc/cups/cupsd.conf BrowseAllow[\s]+(?!none) 1 /etc/audit/auditd.conf ^max_log_file\s*=\s*(\d+)\s*$ 1 /etc/shadow .* ^.*bin/.*$ oval:ssg:ste:2175 /etc/fstab ^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+(.*)$ 0 /etc/fstab ^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+.*$ 0 xinetd sysstat 0 sysstat 1 sysstat 2 sysstat 3 sysstat 4 sysstat 5 sysstat 6 iputils /etc/pam.d/system-auth \s*nullok\s* 1 /etc/pam.d system-auth ^\s*auth\s+(?:(?:required))\s+pam_faillock\.so.*unlock_time=([0-9]*).*$ 1 /etc/pam.d password-auth ^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so.*unlock_time=([0-9]*).*$ 1 sendmail /etc/login.defs ^[\s]*PASS_MAX_DAYS[\s]+(\d+)\s*$ 1 /etc/xinetd.d/tftp ^[\s]*server_args[\s]+=[\s]+\-s[\s]+.+$ 1 named 0 named 1 named 2 named 3 named 4 named 5 named 6 subscription-manager /etc/passwd /etc/default/useradd ^\s*INACTIVE\s*=\s*(\d+)\s*$ 1 avahi-daemon 0 avahi-daemon 1 avahi-daemon 2 avahi-daemon 3 avahi-daemon 4 avahi-daemon 5 avahi-daemon 6 /etc/ssh/sshd_config ^[\s]*(?i)PermitUserEnvironment[\s]+no[\s]*$ 1 smb 0 smb 1 smb 2 smb 3 smb 4 smb 5 smb 6 /boot/grub/grub.conf /boot/efi/EFI/redhat/grub.conf messagebus 0 messagebus 1 messagebus 2 messagebus 3 messagebus 4 messagebus 5 messagebus 6 cpuspeed /etc/sysconfig iptables ^-A INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT$ 1 /etc/sysconfig ip6tables ^-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT$ 1 /etc/yum.conf ^\s*gpgcheck\s*=\s*1\s*$ 1 vsftpd 0 vsftpd 1 vsftpd 2 vsftpd 3 vsftpd 4 vsftpd 5 vsftpd 6 /home squid 0 squid 1 squid 2 squid 3 squid 4 squid 5 squid 6 atd 0 atd 1 atd 2 atd 3 atd 4 atd 5 atd 6 kexec-tools cups 0 cups 1 cups 2 cups 3 cups 4 cups 5 cups 6 /etc/modprobe.d ^.*\.conf$ ^\s*options\s+ipv6\s+.*disable=1.*$ 1 /etc/ssh/sshd_config ^[\s]*(?i)HostbasedAuthentication[\s]+yes[\s]*$ 1 /var/log netconsole 0 netconsole 1 netconsole 2 netconsole 3 netconsole 4 netconsole 5 netconsole 6 /etc/sysctl.conf ^[\s]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*1*$ 1 net.ipv4.conf.all.rp_filter squid /etc/xinetd.d telnet ^\s*disable\s+=\s+yes\s*$ 1 oddjobd 0 oddjobd 1 oddjobd 2 oddjobd 3 oddjobd 4 oddjobd 5 oddjobd 6 /etc/audit/audit.rules ^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EACCES\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EPERM\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$ 1 GConf2 cgconfig 0 cgconfig 1 cgconfig 2 cgconfig 3 cgconfig 4 cgconfig 5 cgconfig 6 snmpd 0 snmpd 1 snmpd 2 snmpd 3 snmpd 4 snmpd 5 snmpd 6 tftp 0 tftp 1 tftp 2 tftp 3 tftp 4 tftp 5 tftp 6 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$ 1 nfs-utils restorecond 0 restorecond 1 restorecond 2 restorecond 3 restorecond 4 restorecond 5 restorecond 6 /var/tmp /etc/mtab ^[\s]*/tmp[\s]+/var/tmp[\s]+.*bind.*$ 1 /etc/sysctl.conf ^[\s]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*1*$ 1 net.ipv4.conf.default.rp_filter /tmp /etc/sysctl.conf ^[\s]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*0*$ 1 net.ipv4.conf.default.accept_source_route httpd 0 httpd 1 httpd 2 httpd 3 httpd 4 httpd 5 httpd 6 / ^.*$ oval:ssg:ste:2176 oval:ssg:ste:2177 /etc/postfix main.cf ^[\s]*smtpd_banner[\s]*=[\s]*\$myhostname[\s]+ESMTP[\s]*$ 1 at /etc/modprobe.d ^.*\.conf$ ^\s*install\s+tipc\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+tipc\s+(/bin/false|/bin/true)$ 1 redhat-release-workstation redhat-release-server cronie /etc/ssh/sshd_config ^[\s]*(?i)Protocol[\s]+2[\s]*$ 1 abrt dhcpd 0 dhcpd 1 dhcpd 2 dhcpd 3 dhcpd 4 dhcpd 5 dhcpd 6 dhcpd /etc/yum.repos.d .* ^\s*gpgcheck\s*=\s*0\s*$ 1 iptables 0 iptables 1 iptables 2 iptables 3 iptables 4 iptables 5 iptables 6 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/sysconfig/init ^[\s]*PROMPT[\s]*=[\s]*no[\s]*$ 1 postfix iptables /etc/pam.d/system-auth ^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*retry=([0-9]*).*$ 1 /etc/ssh/sshd_config ^[\s]*(?i)PermitRootLogin[\s]+yes[\s]*$ 1 /etc/gconf/gconf.xml.mandatory/desktop/gnome/thumbnailers/%gconf.xml /gconf/entry[@name='disable_all']/@value / oval:ssg:ste:1638 /etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml /gconf/entry[@name='lock_enabled']/@value /var/log/audit ^.*$ oval:ssg:ste:1642 /etc/xinetd.d/rexec ^\s*disable\s+=\s+yes\s*$ 1 /etc/sysctl.conf ^[\s]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*1*$ 1 net.ipv4.icmp_ignore_bogus_error_responses portreserve 0 portreserve 1 portreserve 2 portreserve 3 portreserve 4 portreserve 5 portreserve 6 mdmonitor 0 mdmonitor 1 mdmonitor 2 mdmonitor 3 mdmonitor 4 mdmonitor 5 mdmonitor 6 /etc/sysconfig/prelink ^PRELINKING=no$ 1 PATH /etc/audit/auditd.conf ^space_left_action\s*=\s*(\S+)\s*$ 1 ntpdate 0 ntpdate 1 ntpdate 2 ntpdate 3 ntpdate 4 ntpdate 5 ntpdate 6 /etc/sysctl.conf ^[\s]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*0*$ 1 net.ipv6.conf.default.accept_ra /etc/fstab ^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+(.*)$ 0 /etc/fstab ^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+.*$ 0 quota_nld 0 quota_nld 1 quota_nld 2 quota_nld 3 quota_nld 4 quota_nld 5 quota_nld 6 postfix 0 postfix 1 postfix 2 postfix 3 postfix 4 postfix 5 postfix 6 /etc/audit audit.rules ^\-a\salways,exit\s-F\spath=/bin/ping\s-F perm=x\s\-F\sauid>=500\s\-F\sauid!=4294967295\s\-k\sprivileged 1 /etc/sysctl.conf ^[\s]*net.ipv4.tcp_syncookies[\s]*=[\s]*1*$ 1 net.ipv4.tcp_syncookies .* .* oval:ssg:ste:2178 .* .* oval:ssg:ste:2179 .* .* oval:ssg:ste:2180 cpuspeed 0 cpuspeed 1 cpuspeed 2 cpuspeed 3 cpuspeed 4 cpuspeed 5 cpuspeed 6 bind /etc/logwatch/conf logwatch.conf ^[\s]HostLimit[\s]*=[\s]*no[\s]*$ 1 /tmp smartmontools /etc/modprobe.d ^.*\.conf$ ^\s*install\s+sctp\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+sctp\s+(/bin/false|/bin/true)$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /dev/shm talk-server certmonger 0 certmonger 1 certmonger 2 certmonger 3 certmonger 4 certmonger 5 certmonger 6 /etc/sysctl.conf ^[\s]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*0*$ 1 net.ipv4.conf.default.secure_redirects quota /etc/audit/audit.rules ^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+unlink\s+\-S\s+unlinkat\s+\-S\s+rename\s+\-S\s+renameat\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$ 1 /etc/selinux/config ^[\s]*SELINUXTYPE[\s]*=[\s]*([^\s]*) 1 /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+clock_settime[\s]+.*-k[\s]+[\S]+[\s]*$ 1 /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+clock_settime[\s]+.*-k[\s]+[\S]+[\s]*$ 1 qpidd 0 qpidd 1 qpidd 2 qpidd 3 qpidd 4 qpidd 5 qpidd 6 /etc/sysctl.conf ^[\s]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*0*$ 1 net.ipv4.conf.all.accept_source_route /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/ssh/sshd_config ^[\s]*(?i)ClientAliveCountMax[\s]+([\d]+)[\s]*$ 1 /etc/pam.d system-auth ^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]difok=(-?\d+)(?:[\s]|$) 1 auditd 0 auditd 1 auditd 2 auditd 3 auditd 4 auditd 5 auditd 6 net-snmp /tmp /etc/securetty ^vc/[0-9]+$ 1 /etc/sysconfig/network-scripts ifcfg-.* ^[\s]*BOOTPROTO[\s]*=[\s"]*([^#"\s]*) 1 /etc/audit/audit.rules ^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+mount\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$ 1 kdump 0 kdump 1 kdump 2 kdump 3 kdump 4 kdump 5 kdump 6 /etc/group cyrus-sasl ip6tables 0 ip6tables 1 ip6tables 2 ip6tables 3 ip6tables 4 ip6tables 5 ip6tables 6 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$ 1 /etc/passwd ^(?!root).*:x:[\d]*:0*([0-9]{1,2}|[1-4][0-9]{2}):[^:]*:[^:]*:(?!\/sbin\/nologin|\/bin\/sync|\/sbin\/shutdown|\/sbin\/halt).*$ 1 /etc/pam_ldap.conf ^[\s]*tls_cacertdir[\s]+(.*)$ 1 /etc/pam_ldap.conf ^[\s]*tls_cacertfile[\s]+(.*)$ 1 cups /etc/login.defs ^PASS_MIN_LEN\s+(\d+)\s*$ 1 /etc/sysconfig/network ^[\s]*NOZEROCONF[\s]*=[\s]*yes 1 ntpd 0 ntpd 1 ntpd 2 ntpd 3 ntpd 4 ntpd 5 ntpd 6 /etc/audit/audit.rules ^\-w\s+/sbin/insmod\s+\-p\s+x\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/sbin/rmmod\s+\-p\s+x\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/sbin/modprobe\s+\-p\s+x\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+init_module\s+\-S\s+delete_module\s+\-k\s+[-\w]+\s*$ 1 /dev/shm /etc/pam.d/system-auth ^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]dcredit=(-?\d+)(?:[\s]|$) 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/pam.d/system-auth ^[\s]*password[\s]+sufficient[\s]+pam_unix\.so[\s]+.*sha512.*$ 1 cgred 0 cgred 1 cgred 2 cgred 3 cgred 4 cgred 5 cgred 6 xinetd 0 xinetd 1 xinetd 2 xinetd 3 xinetd 4 xinetd 5 xinetd 6 /var/log/audit oval:ssg:ste:2181 /var/log/audit ^.*$ oval:ssg:ste:2181 crond 0 crond 1 crond 2 crond 3 crond 4 crond 5 crond 6 /etc/sysctl.conf ^[\s]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*1*$ 1 net.ipv4.icmp_echo_ignore_broadcasts /etc/sysctl.conf ^[\s]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*0*$ 1 net.ipv4.conf.default.send_redirects /etc/bashrc ^[\s]*umask[\s]+([^#\s]*) 1 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+jffs2\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+jffs2\s+(/bin/false|/bin/true)$ 1 rsh-server ^\/lib(|64)|^\/usr\/lib(|64) oval:ssg:ste:2182 ^\/lib(|64)|^\/usr\/lib(|64) ^.*$ oval:ssg:ste:2182 /etc/libuser.conf ^[\s]*crypt_style[\s]+=[\s]+(?i)sha512[\s]*$ 1 netfs 0 netfs 1 netfs 2 netfs 3 netfs 4 netfs 5 netfs 6 /etc/sysctl.conf ^[\s]*net.ipv4.ip_forward[\s]*=[\s]*0*$ 1 net.ipv4.ip_forward /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc fstab ^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+) 1 /etc mtab ^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+) 1 /etc/init.d/functions ^[\s]*umask[\s]+([^#\s]*) 1 /etc/rsyslog.conf ^\*\.\*[\s]+(?:@|\:omrelp\:) 1 /etc/rsyslog.d .* ^\*\.\*[\s]+(?:@|\:omrelp\:) 1 /etc/ssh/sshd_config ^[\s]*(?i)PermitEmptyPasswords[\s]+no[\s]*$ 1 /etc/ssh/sshd_config ^[\s]*(?i)Banner(?-i)[\s]+/etc/issue[\s]*$ 1 /etc/login.defs ^[\s]*ENCRYPT_METHOD[\s]+SHA512[\s]*$ 1 /etc/ssh/sshd_config ^[\s]*(?i)ClientAliveInterval[\s]+(\d+)[\s]*$ 1 psacct 0 psacct 1 psacct 2 psacct 3 psacct 4 psacct 5 psacct 6 samba-common /dev/shm telnet-server /etc/audit/audit.rules ^\-w\s+/etc/selinux/\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 iptables-ipv6 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+bluetooth\s+/bin/false$ 1 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+net-pf-31\s+/bin/false$ 1 nfs 0 nfs 1 nfs 2 nfs 3 nfs 4 nfs 5 nfs 6 abrtd 0 abrtd 1 abrtd 2 abrtd 3 abrtd 4 abrtd 5 abrtd 6 /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$ 1 /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$ 1 /root ^\.(r|s)hosts$ /home ^\.(r|s)hosts$ /etc ^s?hosts\.equiv$ rpcidmapd 0 rpcidmapd 1 rpcidmapd 2 rpcidmapd 3 rpcidmapd 4 rpcidmapd 5 rpcidmapd 6 /etc/passwd ^[^:]+:[^:]+:([\d]+):[\d]+:[^:]*:[^:]+:[^:]*$ 1 / .* oval:ssg:ste:2184 /etc/pam_ldap.conf ^[\s]*ssl[\s]+start_tls[\s]*$ 1 /etc/pam.d .* ^[^#].*pam_ldap.so[\s]*.*$ 1 / oval:ssg:ste:1939 /var/lib/gdm/.gconf/apps/gdm/simple-greeter/%gconf.xml /gconf/entry[@name='banner_message_enable']/@value /etc/audit audit.rules ^[\s]*-w[\s]+\/etc\/localtime[\s]+-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b.*-k[\s]+[\S]+[\s]*$ 1 haldaemon 0 haldaemon 1 haldaemon 2 haldaemon 3 haldaemon 4 haldaemon 5 haldaemon 6 ypserv /etc/audit/auditd.conf ^action_mail_acct\s*=\s*(\S+)\s*$ 1 xorg-x11-server-common /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+stime[\s]+.*-k[\s]+[\S]+[\s]*$ 1 .* /etc/audit/auditd.conf ^max_log_file_action\s*=\s*(\S+)\s*$ 1 acpid 0 acpid 1 acpid 2 acpid 3 acpid 4 acpid 5 acpid 6 /etc/ssh/sshd_config ^[\s]*(?i)IgnoreRhosts[\s]+no[\s]*$ 1 /etc/sysctl.conf ^[\s]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*0*$ 1 net.ipv4.conf.all.secure_redirects /etc/sysconfig/network-scripts ifcfg-.* ^IPV6_DEFAULTGW=.+$ 1 sshd 0 sshd 1 sshd 2 sshd 3 sshd 4 sshd 5 sshd 6 /etc/audit/audit.rules ^\-w\s+/etc/sudoers\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 dovecot /etc/audit/audit.rules ^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+sethostname\s+\-S\s+setdomainname\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/issue\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/issue\.net\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/hosts\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/etc/sysconfig/network\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 dbus /etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml /gconf/entry[@name='mode']/stringvalue[1]/text() /etc/sysctl.conf ^[\s]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*0*$ 1 net.ipv6.conf.default.accept_redirects rpcsvcgssd 0 rpcsvcgssd 1 rpcsvcgssd 2 rpcsvcgssd 3 rpcsvcgssd 4 rpcsvcgssd 5 rpcsvcgssd 6 /etc/gshadow /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$ 1 /etc/audit audit.rules ^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$ 1 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+hfs\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+hfs\s+(/bin/false|/bin/true)$ 1 /etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml /gconf/entry[@name='idle_activation_enabled']/@value /etc/grub.conf ^[\s]*kernel[\s]+.*(selinux|enforcing)=0.*$ 1 openswan /etc grub.conf password[\s]+--encrypted[\s]+.* 1 /etc/audit/auditd.conf ^num_logs\s*=\s*(\d+)\s*$ 1 /etc/audit/audit.rules ^\-w\s+/var/run/utmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/var/log/btmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/audit/audit.rules ^\-w\s+/var/log/wtmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$ 1 /etc/sysctl.conf ^[\s]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*0*$ 1 net.ipv4.conf.all.accept_redirects smartd 0 smartd 1 smartd 2 smartd 3 smartd 4 smartd 5 smartd 6 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 libcgroup /var/log/httpd /etc/sysctl.conf ^[\s]*kernel.randomize_va_space[\s]*=[\s]*2*$ 1 kernel.randomize_va_space / ^.*$ oval:ssg:ste:2185 oval:ssg:ste:2186 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 PATH oval:ssg:ste:2189 oval:ssg:ste:2190 /etc/sysctl.conf ^[\s]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*0*$ 1 net.ipv4.conf.default.accept_redirects /etc/shadow /etc securetty ^ttyS[0-9]+$ 1 /etc/audit/audit.rules ^\-e\s+2\s*$ 1 openssh-server /etc/pam.d system-auth ^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]minclass=(-?\d+)(?:[\s]|$) 1 ^\/(|s)bin|^\/usr\/(|local\/)(|s)bin ^.*$ oval:ssg:ste:2191 oval:ssg:ste:2192 /etc/security/limits.conf ^[\s]*\*[\s]+(hard|-)[\s]+maxlogins[\s]+(\d+)\s*$ 1 /etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml /gconf/entry[@name='idle_delay']/@value irqbalance audit /etc/cups/cupsd.conf Port[\s]+(\d)+ 1 /etc/cups/cupsd.conf Listen[\s]+(?:localhost|127\.0\.0\.1):(\d)+ 1 pam_ldap oddjob ^\/lib(|64)|^\/usr\/lib(|64) oval:ssg:ste:2193 oval:ssg:ste:2194 ^\/lib(|64)|^\/usr\/lib(|64) ^.*$ oval:ssg:ste:2193 oval:ssg:ste:2194 tftp-server /etc/pam.d/system-auth ^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]lcredit=(-?\d+)(?:[\s]|$) 1 /etc rsyslog.conf ^\$(?:Input(?:TCP|RELP)|UDP)ServerRun 1 /etc/fstab ^\s*([/\w]*)\s+.*,?nodev,?.*$ 0 ntpdate /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/audit/audit.rules ^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$ 1 /etc/xinetd.d/rlogin ^\s*disable\s+=\s+yes\s*$ 1 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+cramfs\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+cramfs\s+(/bin/false|/bin/true)$ 1 /etc/login.defs ^[\s]*PASS_WARN_AGE[\s]*(\d+)\s*$ 1 /etc/sysconfig/network-scripts ifcfg-.* ^IPV6_PRIVACY=rfc3041$ 1 bluetooth 0 bluetooth 1 bluetooth 2 bluetooth 3 bluetooth 4 bluetooth 5 bluetooth 6 /etc/modprobe.d ^.*\.conf$ ^\s*install\s+udf\s+(/bin/false|/bin/true)$ 1 /etc/modprobe.conf ^\s*install\s+udf\s+(/bin/false|/bin/true)$ 1 mdadm ^/\w.*$ oval:ssg:ste:2100 /etc/logwatch/conf logwatch.conf ^[\s]SplitHosts[\s]*=[\s]*yes[\s]*$ 1 ^\/(|s)bin|^\/usr\/(|local\/)(|s)bin oval:ssg:ste:2196 ^\/(|s)bin|^\/usr\/(|local\/)(|s)bin ^.*$ oval:ssg:ste:2196 /etc/sysctl.conf ^[\s]*fs.suid_dumpable[\s]*=[\s]*0*$ 1 fs.suid_dumpable /etc/csh.cshrc ^[\s]*umask[\s]+([^#\s]*) 1 /etc/ssh/sshd_config ^[\s]*(?i)Ciphers(?-i)[\s]+aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc[\s]*$ 1 /etc/passwd ^(?!root:)[^:]*:[^:]:0 1 /etc/sysctl.conf ^[\s]*kernel.exec-shield[\s]*=[\s]*1*$ 1 kernel.exec-shield /var /etc/xinetd.d/rsh ^\s*disable\s+=\s+yes\s*$ 1 /etc/issue 1 aide /etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences/%gconf.xml /gconf/entry[@name='media_automount']/@value /etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences/%gconf.xml /gconf/entry[@name='media_autorun_never']/@value /etc/dovecot/conf.d 10-auth.conf ^[\s]*disable_plaintext_auth[\s]*=[\s]*yes[\s]*$ 1 autofs 0 autofs 1 autofs 2 autofs 3 autofs 4 autofs 5 autofs 6 policycoreutils /boot/grub/grub.conf /boot/efi/EFI/redhat/grub.conf /etc/profile ^[\s]*umask[\s]+([^#\s]*) 1 /etc/group /etc/inittab ^[\s]*id:3:initdefault:[\s]*$ 1 dovecot 0 dovecot 1 dovecot 2 dovecot 3 dovecot 4 dovecot 5 dovecot 6 ^.*$ oval:ssg:ste:2149 nfslock 0 nfslock 1 nfslock 2 nfslock 3 nfslock 4 nfslock 5 nfslock 6 /etc/samba smb.conf ^[\s]*client[\s]+signing[\s]*=[\s]*mandatory 1 gpg-pubkey / ^.*$ oval:ssg:ste:2198 /etc/security limits.conf ^[\s]*\*[\s]+hard[\s]+core[\s]+([\d]+) 1 /proc/net/wireless ^\s*[-\w]+: 1 vsftpd /etc/group screen /etc/dovecot/conf.d 10-ssl.conf ^[\s]*ssl[\s]*=[\s]*yes[\s]*$ 1 /etc netconfig ^udp6\s+tpi_clts\s+v\s+inet6\s+udp\s+-\s+-$ 1 /etc netconfig ^tcp6\s+tpi_cots_ord\s+v\s+inet6\s+tcp\s+-\s+-$ 1 true true false false false false false false false 0 true true false true false false false false false false true 1 0 false true false true 0 0 false false false true true false false false false false false false 0 0 false false false false false false false false false false false false true true true true false true false false false false true false true noexec true false true true true true true true true nosuid 0 false true 0 0 nodev 1 0 1 0 0 false false false false false false false false false false false false unlabeled_t true false 1 0 fail ^.*nosuid.*$ false true false true 0 0 false false false true true false true false false true false false -1 false true false true 0 false true false true false true false true false true false true 1 false true false true false true false true true false 1 nosuid 0 false true true unix ^6Workstation$ ^6Server$ false true true false true false true true true true true true true true true true true 1 false true false true ^[:\.] :: \.\. [:\.]$ ^[^/] [^\\]:[^/] false true 0 ^.*nodev.*$ false true true false 1 fail fail fail false true nodev false true 0 false true 0 0 1 true false noexec static false true true true false true false false true false false true false true false nosuid 1 false true false true 0 0 true false 1 0 0 false true 0 2 sec=(krb5i|ntlmv2i) true false noexec false true false true false true 500 true true false true x false true x86_64 0 false true blank-only i686 0 false true 0 true 0 false true true true true true false true false false false 2 true true true 0 0 1 true true symbolic link true true symbolic link 1 nodev false true ^/dev/.*$ nodev 0 0 1 false true false true 0 0 false true PROMISC false true 4ae0493b fd431d51 45700c69 2fa658e0 regular true 0 0 /bin/fusermount /bin/mount /bin/ping6 /bin/ping /bin/su /bin/umount /lib64/dbus-1/dbus-daemon-launch-helper /lib/dbus-1/dbus-daemon-launch-helper /sbin/mount.ecryptfs_private /sbin/mount.nfs /sbin/pam_timestamp_check /sbin/unix_chkpwd /usr/bin/abrt-action-install-debuginfo-to-abrt-cache /usr/bin/at /usr/bin/chage /usr/bin/chfn /usr/bin/chsh /usr/bin/crontab /usr/bin/gpasswd /usr/bin/kgrantpty /usr/bin/kpac_dhcp_helper /usr/bin/ksu /usr/bin/newgrp /usr/bin/newrole /usr/bin/passwd /usr/bin/pkexec /usr/bin/rcp /usr/bin/rlogin /usr/bin/rsh /usr/bin/sperl5.10.1 /usr/bin/staprun /usr/bin/sudoedit /usr/bin/sudo /usr/bin/Xorg /usr/lib64/amanda/calcsize /usr/lib64/amanda/dumper /usr/lib64/amanda/killpgrp /usr/lib64/amanda/planner /usr/lib64/amanda/rundump /usr/lib64/amanda/runtar /usr/lib64/nspluginwrapper/plugin-config /usr/lib/amanda/calcsize /usr/lib/amanda/dumper /usr/lib/amanda/killpgrp /usr/lib/amanda/planner /usr/lib/amanda/rundump /usr/lib/amanda/runtar /usr/libexec/abrt-action-install-debuginfo-to-abrt-cache /usr/libexec/spice-gtk-x86_64/spice-client-glib-usb-acl-helper /usr/libexec/mc/cons.saver /usr/libexec/openssh/ssh-keysign /usr/libexec/polkit-1/polkit-agent-helper-1 /usr/libexec/pt_chown /usr/libexec/pulse/proximity-helper /usr/lib/nspluginwrapper/plugin-config /usr/sbin/amcheck /usr/sbin/seunshare /usr/sbin/suexec /usr/sbin/userhelper /usr/sbin/usernetctl /bin/cgexec /sbin/netreport /usr/bin/crontab /usr/bin/gnomine /usr/bin/iagno /usr/bin/locate /usr/bin/lockfile /usr/bin/same-gnome /usr/bin/screen /usr/bin/ssh-agent /usr/bin/wall /usr/bin/write /usr/lib64/vte/gnome-pty-helper /usr/libexec/kde4/kdesud /usr/libexec/utempter/utempter /usr/lib/mailman/cgi-bin/admindb /usr/lib/mailman/cgi-bin/admin /usr/lib/mailman/cgi-bin/confirm /usr/lib/mailman/cgi-bin/create /usr/lib/mailman/cgi-bin/edithtml /usr/lib/mailman/cgi-bin/listinfo /usr/lib/mailman/cgi-bin/options /usr/lib/mailman/cgi-bin/private /usr/lib/mailman/cgi-bin/rmlist /usr/lib/mailman/cgi-bin/roster /usr/lib/mailman/cgi-bin/subscribe /usr/lib/mailman/mail/mailman /usr/lib/vte/gnome-pty-helper /usr/sbin/lockdev /usr/sbin/postdrop /usr/sbin/postqueue /usr/sbin/sendmail.sendmail