You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
harden.py sends (on a average small webserver) a ~20MB email, consisting of all /var/www/ files not owned by root, each listed on its own row with the full description repeated thousands of times.
Insecure configuration detected on filesystem: Issue identified: /var/www/* permissions are not set to root. If an attacker compromises the system and is running under the Apache user account, could view these files. Recommendation: Change the permission of /var/www/* to root:root. Command: chown root:root /var/www/*
Would suggest some sort of limiting and grouping.
The text was updated successfully, but these errors were encountered:
just looked @ src for harden.py. the setting you refer to is for checking ssh config. it is is_config_enabled("ROOT_CHECK"): on line 19 through 21. not sure why it says www in config file. will look into it for you. also can i ask what you are running this on i know its linux but what flavor/kernel etc.
python version? as to replicate your env as close as possible. will see if i can work in a new option in cfg to address your issue concerning limiting/grouping & switching on/off alerting for this part of harden.py
harden.py sends (on a average small webserver) a ~20MB email, consisting of all /var/www/ files not owned by root, each listed on its own row with the full description repeated thousands of times.
Would suggest some sort of limiting and grouping.
The text was updated successfully, but these errors were encountered: