msec [options] msecperms [options] msecgui [options]
The security settings are stored in \fB/etc/security/msec/security.conf\fR file, and default settings for each predefined level are stored in \fB/etc/security/msec/level.LEVEL\fR. Permissions for files and directories that should be enforced or checked for changes are stored in \fB/etc/security/msec/perms.conf\fR, and default permissions for each predefined level are stored in \fB/etc/security/msec/perm.LEVEL\fR. Note that user-modified parameters take precedence over default level settings. For example, when default level configuration forbids direct root logins, this setting can be overridden by the user.
The following options are supported by msec applications:
This is the console version of msec. It is responsible for system security configuration and checking and transitions between security levels.
When executed without parameters, msec will read the system configuration file (/etc/security/msec/security.conf), and enforce the specified security settings. The operations are logged to \fB/var/log/msec.log\fP file, and also to syslog, using \fBLOG_AUTHPRIV\fR facility. Please note that msec should by run as root.
\fB-h, --help\fR
This option will display the list of supported command line options.
\fB-l, --level <level>\fR
List the default configuration for given security level.
\fB-f, --force <level>\fR
Apply the specified security level to the system, overwritting all local
changes in /etc/security/msec/security.conf. This usually should be performed
either on first install, on when a transition to a different level is required.
\fB-d\fR
Enable debugging messages.
\fB-p, --pretend\fR
Verify the actions that will be performed by msec, without actually
doing anything to the system. In this mode of operation, msec performs all the
required tasks, except effectively writting data back to disk.
\fB-r, --root <path>\fR
Use path as root. Can be used to perform msec actions in chroot.
\fB-q\fR
Run quietly
\fB-s, --save <level>\fR
Save current settings as a new security level.
This application is responsible for system permission checking and enforcements.
When executed without parameters, msecperms will read the permissions configuration file (/etc/security/msec/perms.conf), and enforce the specified security settings. The operations are logged to \fB/var/log/msec.log\fP file, and also to syslog, using \fBLOG_AUTHPRIV\fR facility. Please note that msecperms should by run as root.
\fB-h, --help\fR
This option will display the list of supported command line options.
\fB-l, --level <level>\fR
List the default configuration for given security level.
\fB-e, --enforce\fR
Enforce the default permissions on all files.
\fB-d\fR
Enable debugging messages.
\fB-p, --pretend\fR
Verify the actions that will be performed by msec, without actually
doing anything to the system. In this mode of operation, msec performs all the
required tasks, except effectively writting data back to disk.
\fB-r, --root <path>\fR
Use path as root. Can be used to perform msec actions in chroot.
\fB-q\fR
Run quietly
This is the GTK version of msec. It acts as frontend to all msec functionalities.
\fB-h, --help\fR
This option will display the list of supported command line options.
\fB-d\fR
Enable debugging messages.
\fBEnforce system configuration according to /etc/security/msec/security.conf file:\fP
msec
\fBDisplay system configuration changes without enforcing anything:\fP
msec -p
\fBInstall predefined security level 'standard':\fP
msec -f standard
\fBPreview changes inflicted by change to 'standard' level:\fP
msec -p -f standard
\fBCreate a custom security level based on 'standard':\fP
cp /etc/security/msec/level.standard /etc/security/msec/level.my
edit /etc/security/msec/level.my
msec -f my
\fBExport current security settings to create a new security level named 'office':\fP
msec -s office
\fBEnforce system permissions according to /etc/security/msec/perms.conf file:\fP
msecperms
\fBDisplay permissions changes without enforcing anything:\fP
msecperms -p
\fBInstall predefined permissions for level 'standard':\fP
msecperms -f standard
\fBPreview changes inflicted by change to 'standard' level:\fP
msecperms -p -f standard
\fBCreate a custom permissions level based on 'secure':\fP
cp /etc/security/msec/perm.secure /etc/security/msec/perm.my
edit /etc/security/msec/level.my
msecperms -f my
\fBExport current security settings to create a new security level named 'office':\fP
msecperms -s office
For example, to exclude all items that match \fB/mnt\fP, Mageia-based chrooted installations in \fB/chroot\fP and all backup files from the results of of check for unowned files on the system, it is sufficient to define the following entry in the exceptions file:
In a similar way, it is possible to exclude the results for the \fBdeluge\fP application from the list of open ports as follows:
Each exception entry is a regular exception, and you might define as many exceptions as necessary.
In order to exclude a path from all msec checks, you may use * for the check name. For example, the following would exclude /media/ from all msec checks:
See below for all msec options that support this feature.
The following security options are supported by msec:
MSEC parameter: BASE_LEVEL
Accepted values: *
Eugeni Dodonov