Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rule updates vdec2 #315

Merged
merged 21 commits into from
Jan 18, 2018
Merged

Rule updates vdec2 #315

merged 21 commits into from
Jan 18, 2018

Conversation

mstemm
Copy link
Contributor

@mstemm mstemm commented Jan 18, 2018

No description provided.

salt-minion can also touch the rpm database, and some node packages
write below /root/.config/configstore.
It's a server-like program.
default shell for alpine linux
Let many veritas programs write below /etc/vx.

Let one veritas-related perl script read sensitive files.
Also let consul (agent, but the distinction is in the command line args)
to run nc in addition to curl. Also rename the macro.
Let postgres setuid to itself. Seen by archiving programs like wal-e.
"sh -c /bin/consul-alerts watch checks --alert-addr 0.0.0.0:9000 ..."
Openshift's logging support containers generally run privileged.
Add lvcreate as a program that can write below /etc/lvm and rename the
macro to lvprogs_writing_lvm_archive.
https://glide.sh/, package management for go.
Microsoft System Center Operations Manager (SCOM).
Was included in prior version of shell rules, adding back.
Strange that the program is denyhosts.py but observed in actual
environments.
Previously added as an exception for db program spawned process, need to
add as an exception for run shell untrusted.
They aren't used that often and removing them cleans up space for new
rules we want to add soon.
@mstemm mstemm merged commit 1feae90 into dev Jan 18, 2018
@mstemm mstemm deleted the rule-updates-vdec2 branch January 18, 2018 04:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants