tiger 1:3.2.3-13 source package in Ubuntu

Changelog

tiger (1:3.2.3-13) unstable; urgency=high

  * debian/rules: Make a symbolic link to make Tiger work with Linux kernel
    versions 4 (Closes:  #785589)
  * util/genmsgidx: Try to make build reproducible with patch provided by
    Daniel Kahn Gillmor that sets the environment variable LC_COLLATE=C when
    running the ls command (Closes: #792828)
  * systems/Linux/2/gen_mounts:
        - Fix typo in sshfs definition (Closes: 7680867)
        - Added aufs (Debian bug 781171)
        - Added fuse.s3fs (Debian bug 799753)


 -- Javier Fernández-Sanguino Peña <email address hidden>  Sun, 22 Nov 2015 20:22:26 +0100

Upload details

Uploaded by:
Javier Fernández-Sanguino
Uploaded to:
Sid
Original maintainer:
Javier Fernández-Sanguino
Architectures:
any
Section:
admin
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
tiger_3.2.3-13.dsc 1.8 KiB 504da1751211bc4fe785031d8a3e265286900f79c4ab963372cf0039c4076e82
tiger_3.2.3.orig.tar.gz 991.4 KiB 80db27618de0d806805e77653e568fb9ae556537cfd5a4b17b6b6c9dc442a415
tiger_3.2.3-13.diff.gz 231.9 KiB 6e233f5912d77c822277652ed7d6443f7f73141d264148be83a3ca8c0e9d3599

Available diffs

No changes file available.

Binary packages built by this source

tiger: Report system security vulnerabilities

 TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
 and data files which are used to perform a security audit of different
 operating systems. The tools can be both run altogether once to generate an
 audit report of the system and they can also be run periodically to
 provide information on changes to the system's security once a
 security baseline has been defined. Consequently, they can be used
 also as a host intrusion detection mechanism.
 .
 The tools rely on specialised external security tools such as
 John the Ripper, Chkroot and integrity check tools (like Tripwire,
 Integrit or Aide) for some of the tasks. The periodic review
 mechanism relies on the use of the cron task scheduler and an email
 delivery system.
 .
 TIGER has one primary goal: report ways the system's security can be
 compromised.
 .
 Debian's TIGER incorporates new checks primarily oriented towards
 Debian distribution including: md5sums checks of installed files,
 location of files not belonging to packages, check of security
 advisories and analysis of local listening processes.
 .
 This package provides all the security scripts and data files.

tiger-otheros: Scripts to run Tiger in other operating systems

 TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
 and data files which are used to perform a security audit of different
 operating systems. The tools can be both run altogether once to generate an
 audit report of the system and they can also be run periodically to
 provide information on changes to the system's security once a
 security baseline has been defined. Consequently, they can be used
 also as a host intrusion detection mechanism.
 .
 This package provides all the scripts for operating systems other
 than Linux provided for in the Tiger distribution. It is provided
 in the hope it will be useful for admins that wish to run tiger
 in a distributed environment sharing this files through the network
 (e.g. NFS).