Perform basic system checks with checksecurity

Deployment

To start checksecurity manually, enter the checksecurity command at the prompt with administrator privileges. The tool then works through the scripts and outputs warning messages in case of deviations as defined in the settings. It displays the messages in a terminal window without separating them from each other (Figure 2). If you have defined a mail account in the configuration dialog, an email is then sent to that account.

Figure 2: Checksecurity is only reporting overflowing disks here.

By default, the installer creates cron jobs for checksecurity. Checksecurity checks the firewall logfiles once a week; the system loads the other routines daily. The program stores the corresponding logs in the /var/log/checksecurity/ directory in various files with meaningful names sorted in chronological order (Figure 3). You can modify these settings to suit your own preferences at any time by modifying the associated cron jobs or by editing the /etc/checksecurity.conf file.

Figure 3: Checksecurity also reliably checks for open ports.

Conclusions

Checksecurity provides security-conscious users with a useful tool for regularly checking a Linux system's basic settings. It primarily tests for open ports, empty or duplicate passwords, and storage capacities on the mounted disks. Although this data can also be queried with other Linux tools, checksecurity does the checks in one go and in the background.

Checksecurity logs abnormalities and optionally sends them to a configured email address, giving you an overview of which system resources you need to check or potentially reconfigure. The software makes a fundamental contribution to system integrity. As a supplement to other routine checks, checksecurity is a valuable addition to any production server.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Charly's Column

    The Postfix Policyd plugin fights spam using techniques such as greylisting, source detection, volume measurements, blacklisting, and HELO rotation detection.

  • Error in Linux Filesystemen Endangers Postfix

    Wietse Venema, the developer of Postfix, points in an advisory to a security problem in connection with the Linux and Solaris filesystems. As more recent versions of these operating systems no longer comply with the POSIX standard for links, local attackers may be able to attach files to other users' Postfix mailboxes.

  • Email Encryption with Zeyple

    IT specialists often rely on automatic notification for status messages and logfiles by email. A Python script named Zeyple uses GPG to protect potentially sensitive messages against unauthorized viewing.

  • Nagios Workshop

    Nagios monitors your network and provides early warning for problems with hosts and services.

  • Anubis

    The Anubis mail manipulation daemon lets you centralize encryption for outgoing mail.

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News