Index Index for
Section 1
Index Alphabetical
listing for C
Bottom of page Bottom of
page

ckfsec(1)

NAME

ckfsec - Check file and directory security

SYNOPSIS

ckfsec [-aeh] [-i flag...] [-mnsvw] directory [directory ...]

OPTIONS

-a "All" mode; has the same effect as a combination of -e, -v, and -w. -e Explain mode; appends explanatory text to lines of the report. -h Displays a usage message. -i Suppresses reporting and checking as specified by one or more of the following flags: a Do not report in the summary whether Access Control Lists (ACLs) are enabled on the system. g Do not check for GID mismatches between a link and its target. h Do not check for hardlinks (files with link count greater than 1). m Do not check for symbolic links whose targets do not exist. s Do not check for world-writable directories on which the sticky bit is not set. u Do not check for UID mismatches between a link and its target. When specifying multiple flags, do not separate them by using spaces. -m Restricts processing to files that are in the same file system as directory. -n Ignores file systems mounted through NFS. -s Suppresses the summary lines that are otherwise included at the end of the report. The summary lines report the total number of directories that were processed, the number of world-writable directories that were found, the total number of potential problems that were found, and (unless the a flag is specified with -i) whether ACLs are enabled on the system. -v Verbose mode; includes in the report all files and directories that were checked, not just those that have a potential problem. -w Displays in the report the pathnames of all world-writable directories, not just those found to be vulnerable. If -w is not specified, the total count of world-writable directories that were processed is included in summary lines at the end of the report (unless -s is specified to omit the summary). This count always includes all world-writable directories that were found, whether or not they had the sticky bit set or contained vulnerable files.

OPERANDS

directory The pathname of the top-level directory of the file tree to be checked. A space-separated list of multiple pathnames may be specified to check more than one tree.

DESCRIPTION

The ckfsec tool searches a directory tree for world-writable directories and, in each of these, searches for and reports on the following potential vulnerabilities: · A symbolic link whose target has an owner or group different from the link · A symbolic link whose target does not exist · A world-writable writable directory without the sticky bit set, including the specified directory, if applicable · A pipe · A file with a link count greater than 1 (a file with "hard links") Potential vulnerabilities are reported in the following format: code type [uid] [gid] mtime file[ -> target] [explanatory_text] In this format: code Indicates the problem. Each code value begins with W (warning) or E (error) to indicate the severity, followed by one to three of the following letters to indicate why file is potentially vulnerable: g The GID of a symbolic link does not match the GID of its target. This might mean that a nonprivileged user created a symbolic link to point to a privileged file. h The file has a link count greater than 1. This might mean that a nonprivileged user created a hardlink that specifies a privileged file. m The symbolic link specifies a target that does not exist. This might allow a nonprivileged user to trick a privileged process into creating a privileged file. By itself, this condition is treated as a warning. p A pipe was found. s The mode of the directory (if world-writable) is missing the sticky bit. u The UID of a symbolic link does not match the UID of its target. This might mean that a nonprivileged user created a symbolic link to point to a privileged file. w The directory is world-writable, which allows nonprivileged users to create links that can trick privileged programs into writing or overwriting privileged files. A world-writable directory is reported as a warning, unless its sticky bit is not set, in which case the directory is reported as an error. type Specifies what file represents. Type identifiers are as follows: d Directory f Regular file (shown only if -v is specified) h Hardlink l Symbolic link p Pipe uid Identifies the owner (UID) of file. gid Identifies the group (GID) of file. mtime Specifies the time that file was last modified. file Specifies the pathname of the file system object that is potentially vulnerable. -> target If file is a symbolic link, specifies its target. explanatory_text Includes additional information about the potential problem. This additional information is appended to report lines only if -e is specified on the command line. While traversing the specified directory tree, ckfsec does not process any files found in secure subdirectories; however, the tool does process all subdirectories. The main body of the report that the tool produces lists files that are potential vulnerabilities. If the -a or -v option is specified, the body of the report lists all directories and files that were processed. Unless the -s option is specified, the report ends with summary lines as follows: Total directories: count World-writable dirs: count Total problems: count ACLs_statement Unless omitted by the a flag for the -i option, ACLs_statement is one of the following: · This system has ACLs enabled. ACLs may introduce additional security risks. The ckfsec utility does not check ACLs. ACLs, depending on what they contain, can either tighten or relax the security provided by directory or file permissions alone. This informational message is displayed to remind you that ACLs have not been checked and that you should make sure that no world-writable directory has an ACL that makes the system more vulnerable than it would be otherwise. · ACLs are not enabled on this system. This message is what you would expect if ACLs are not being used to manage system security. Note ACL reporting is not supported for releases prior to Tru64 UNIX Version 5.0A. If the ckfsec tool is installed and run on Tru64 UNIX versions prior to Version 5.0A, ACLs_statement is not included in the report. The tool's report must be checked manually to determine whether any of the files and directories identified as vulnerable represent an actual breach of system security or are likely to be used in that way.

EXAMPLES

The following example shows a report from a ckfsec command that includes no options: # ckfsec / Ews d 0777 0 0 2002/02/11 /tmp/one [1] Eh h 0644 8941 0 2002/02/11 /tmp/backdoor [2] Eg l 0777 8941 0 2002/02/11 /tmp/one/two/a.txt -> /home/brians/.profile [3] Eu l 0777 0 0 2002/02/11 /tmp/one/two/three/a.txt -> /tmp/one/two/a.txt [4] Eg l 0777 8941 0 2002/02/11 /tmp/one/two/a.txt -> /home/brians/.profile [5] Eug l 0777 8941 33 2002/02/09 /tmp/README -> /etc/fstab [6] Wm l 0777 8941 0 2002/02/09 /tmp/core -> /etc/nologin [7] Total directories: 9 World-writable dirs: 5 Total problems: 7 ACLs are not enabled on this system. In this example, the lines that start with error codes show the following: [1] Reports a world-writable directory that does not have the sticky bit set. The sticky bit prevents users (other than the directory owner, the file owner, or the superuser) from deleting or renaming files in that directory. [2] Reports a file system object (in a world-writable directory) with a link count greater than 1. The ls -i command might reveal, for example, that backdoor is a hardlink to (has the same i-number as) the one directory. [3] Reports a GID mismatch. [4] Reports a UID mismatch. [4], [5] Trace links two levels deep; therefore, Line 5 is indented accordingly. These lines show that vulnerabilities are sometimes masked through multiple links between different directories and files. [6] Reports both a UID and GID mismatch. In this case, the link might cause a privileged file to be overwritten. [7] Reports a symbolic link to a file that does not currently exist. In this case, the link target would be a problem if it were created in the future.

SEE ALSO

Commands: dirclean(8) Functions: mktemp(3), safe_open(3) Others: sys_attrs_sec(5)

Index Index for
Section 1
Index Alphabetical
listing for C
Top of page Top of
page