Under Construction
Audit of the Security Status of a System
When auditing a system’s security status, the security attributes of trusted files stored in the TSD are compared with the current state of the system. Comparing such a trusted file can result in two possible outcomes:
- The actual state of the file on the system matches the entry in the TSD.
- The actual state of the file on the system does not match the target state from the TSD.
In the event of a discrepancy, the question arises, whether it should be corrected or not. When starting such a check with the trustchk command, you must specify what should be done in the event of a discrepancy. The following options are available:
-n # Deviations are output, but not automatically korrigiert. (no correction)
-t # Deviations are displayed, and for each deviation, an interactive query appears asking whether the deviation should be corrected. (prompt)
-y # Deviations are output and automatically corrected without prompting. (yes)
Individual files can be checked or all trusted files can be checked by specifying “ALL”:
# trustchk -n ALL
# echo $?
0
#
All trusted files were checked and no deviations were detected. The exit status is 0.
If there are deviations on a system, these are displayed and the exit status has a value different from 0:
# trustchk -n ALL
trustchk: File or directory or device not existing: /var/perf/pm/bin/pmcfg
trustchk: /etc/filesystems: Verification of attributes failed: mode
trustchk: /etc/security/audit/objects: Verification of attributes failed: mode
…
# echo $?
114
#
Note: This review was performed on a second system.
The exit status of the check is 114 (ENOTRUST).