From c32c985bb7f00a9ae6e058de9c4c86ee42e77dac Mon Sep 17 00:00:00 2001 From: "thibault.dewailly" Date: Tue, 12 Apr 2016 17:59:17 +0200 Subject: [PATCH] 6.10_disable_http_server.sh 6.11_disable_imap_pop.sh 6.12_disable_samba.sh 6.13_diable_http_proxy.sh 6.14_disable_snmp_server.sh 6.15_mta_localhost.sh 6.9_disable_ftp.sh --- bin/hardening/5.1.2_disable_rsh.sh | 3 +- bin/hardening/5.1.3_disable_rsh_client.sh | 3 +- bin/hardening/5.1.6_disable_telnet_server.sh | 3 +- bin/hardening/6.10_disable_http_server.sh | 60 ++++++++++++++++++ bin/hardening/6.11_disable_imap_pop.sh | 60 ++++++++++++++++++ bin/hardening/6.12_disable_samba.sh | 59 +++++++++++++++++ bin/hardening/6.13_diable_http_proxy.sh | 59 +++++++++++++++++ bin/hardening/6.14_disable_snmp_server.sh | 59 +++++++++++++++++ bin/hardening/6.15_mta_localhost.sh | 66 ++++++++++++++++++++ bin/hardening/6.1_disable_xwindow_system.sh | 3 +- bin/hardening/6.2_disable_avahi_server.sh | 2 +- bin/hardening/6.3_disable_print_server.sh | 2 +- bin/hardening/6.4_disable_dhcp.sh | 2 +- bin/hardening/6.6_diable_ldap.sh | 2 +- bin/hardening/6.7_disable_nfs_rpc.sh | 2 +- bin/hardening/6.8_disable_dns_server.sh | 2 +- bin/hardening/6.9_disable_ftp.sh | 60 ++++++++++++++++++ etc/conf.d/6.10_disable_http_server.cfg | 2 + etc/conf.d/6.11_disable_imap_pop.cfg | 2 + etc/conf.d/6.12_disable_samba.cfg | 2 + etc/conf.d/6.13_diable_http_proxy.cfg | 2 + etc/conf.d/6.14_disable_snmp_server.cfg | 2 + etc/conf.d/6.15_mta_localhost.cfg | 2 + etc/conf.d/6.9_disable_ftp.cfg | 2 + 24 files changed, 451 insertions(+), 10 deletions(-) create mode 100755 bin/hardening/6.10_disable_http_server.sh create mode 100755 bin/hardening/6.11_disable_imap_pop.sh create mode 100755 bin/hardening/6.12_disable_samba.sh create mode 100755 bin/hardening/6.13_diable_http_proxy.sh create mode 100755 bin/hardening/6.14_disable_snmp_server.sh create mode 100755 bin/hardening/6.15_mta_localhost.sh create mode 100755 bin/hardening/6.9_disable_ftp.sh create mode 100644 etc/conf.d/6.10_disable_http_server.cfg create mode 100644 etc/conf.d/6.11_disable_imap_pop.cfg create mode 100644 etc/conf.d/6.12_disable_samba.cfg create mode 100644 etc/conf.d/6.13_diable_http_proxy.cfg create mode 100644 etc/conf.d/6.14_disable_snmp_server.cfg create mode 100644 etc/conf.d/6.15_mta_localhost.cfg create mode 100644 etc/conf.d/6.9_disable_ftp.cfg diff --git a/bin/hardening/5.1.2_disable_rsh.sh b/bin/hardening/5.1.2_disable_rsh.sh index 0abc6b6..802ab4b 100755 --- a/bin/hardening/5.1.2_disable_rsh.sh +++ b/bin/hardening/5.1.2_disable_rsh.sh @@ -11,7 +11,8 @@ set -e # One error, it's over set -u # One variable unset, it's over -PACKAGES='rsh-server rsh-redone-server' +# Based on aptitude search '~Prsh-server' +PACKAGES='rsh-server rsh-redone-server heimdal-servers' FILE='/etc/inetd.conf' PATTERN='^(shell|login|exec)' diff --git a/bin/hardening/5.1.3_disable_rsh_client.sh b/bin/hardening/5.1.3_disable_rsh_client.sh index 5104dfc..679093a 100755 --- a/bin/hardening/5.1.3_disable_rsh_client.sh +++ b/bin/hardening/5.1.3_disable_rsh_client.sh @@ -11,7 +11,8 @@ set -e # One error, it's over set -u # One variable unset, it's over -PACKAGES='rsh-client rsh-redone-client' +# Based on aptitude search '~Prsh-client', exluding ssh-client OFC +PACKAGES='rsh-client rsh-redone-client heimdal-clients' # This function will be called if the script status is on enabled / audit mode audit () { diff --git a/bin/hardening/5.1.6_disable_telnet_server.sh b/bin/hardening/5.1.6_disable_telnet_server.sh index 6329d72..9d7b3f6 100755 --- a/bin/hardening/5.1.6_disable_telnet_server.sh +++ b/bin/hardening/5.1.6_disable_telnet_server.sh @@ -11,7 +11,8 @@ set -e # One error, it's over set -u # One variable unset, it's over -PACKAGES='telnetd inetutils-telnetd telnetd-ssl' +# Based on aptitude search '~Ptelnet-server' +PACKAGES='telnetd inetutils-telnetd telnetd-ssl krb5-telnetd heimdal-servers' FILE='/etc/inetd.conf' PATTERN='^telnet' diff --git a/bin/hardening/6.10_disable_http_server.sh b/bin/hardening/6.10_disable_http_server.sh new file mode 100755 index 0000000..72d3076 --- /dev/null +++ b/bin/hardening/6.10_disable_http_server.sh @@ -0,0 +1,60 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.10 Ensure HTTP Server is not enabled (Not Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +# Based on aptitude search '~Phttpd' +PACKAGES='nginx apache2 lighttpd micro-httpd mini-httpd yaws boa bozohttpd' + +# This function will be called if the script status is on enabled / audit mode +audit () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed !" + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will be called if the script status is on enabled mode +apply () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed, purging it" + apt-get purge $PACKAGE -y + apt-get autoremove + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/bin/hardening/6.11_disable_imap_pop.sh b/bin/hardening/6.11_disable_imap_pop.sh new file mode 100755 index 0000000..9d4b82d --- /dev/null +++ b/bin/hardening/6.11_disable_imap_pop.sh @@ -0,0 +1,60 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.11 Ensure IMAP and POP server is not enabled (Not Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +# Based on aptitude search '~Pimap-server' and aptitude search '~Ppop3-server' +PACKAGES='citadel-server courier-imap cyrus-imapd-2.4 dovecot-imapd mailutils-imap4d courier-pop cyrus-pop3d-2.4 dovecot-pop3d heimdal-servers mailutils-pop3d popa3d solid-pop3d xmail' + +# This function will be called if the script status is on enabled / audit mode +audit () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed !" + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will be called if the script status is on enabled mode +apply () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed, purging it" + apt-get purge $PACKAGE -y + apt-get autoremove + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/bin/hardening/6.12_disable_samba.sh b/bin/hardening/6.12_disable_samba.sh new file mode 100755 index 0000000..d635a34 --- /dev/null +++ b/bin/hardening/6.12_disable_samba.sh @@ -0,0 +1,59 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.12 Ensure Samba is not enabled (Not Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +PACKAGES='samba' + +# This function will be called if the script status is on enabled / audit mode +audit () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed !" + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will be called if the script status is on enabled mode +apply () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed, purging it" + apt-get purge $PACKAGE -y + apt-get autoremove + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/bin/hardening/6.13_diable_http_proxy.sh b/bin/hardening/6.13_diable_http_proxy.sh new file mode 100755 index 0000000..b1a4b29 --- /dev/null +++ b/bin/hardening/6.13_diable_http_proxy.sh @@ -0,0 +1,59 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.13 Ensure HTTP Proxy Server is not enabled (Not Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +PACKAGES='squid3 squid' + +# This function will be called if the script status is on enabled / audit mode +audit () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed !" + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will be called if the script status is on enabled mode +apply () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed, purging it" + apt-get purge $PACKAGE -y + apt-get autoremove + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/bin/hardening/6.14_disable_snmp_server.sh b/bin/hardening/6.14_disable_snmp_server.sh new file mode 100755 index 0000000..6eceacb --- /dev/null +++ b/bin/hardening/6.14_disable_snmp_server.sh @@ -0,0 +1,59 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.14 Ensure SNMP Server is not enabled (Not Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +PACKAGES='snmpd' + +# This function will be called if the script status is on enabled / audit mode +audit () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed !" + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will be called if the script status is on enabled mode +apply () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed, purging it" + apt-get purge $PACKAGE -y + apt-get autoremove + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/bin/hardening/6.15_mta_localhost.sh b/bin/hardening/6.15_mta_localhost.sh new file mode 100755 index 0000000..e08325c --- /dev/null +++ b/bin/hardening/6.15_mta_localhost.sh @@ -0,0 +1,66 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.15 Configure Mail Transfer Agent for Local-Only Mode (Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +# This function will be called if the script status is on enabled / audit mode +audit () { + info "Checking netport ports opened" + eval 'RESULT=$(netstat -an | grep LIST | grep ":25[[:space:]]")' + debug "Result is $RESULT" + if [ -z "$RESULT" ]; then + ok "Nothing listens on 25 port, probably unix socket configured" + else + info "Checking $RESULT" + if $(grep -q "127.0.0.1" <<< $RESULT); then + ok "MTA is configured to localhost only" + else + crit "MTA listens worldwide" + fi + fi +} + +# This function will be called if the script status is on enabled mode +apply () { + info "Checking netport ports opened" + eval 'RESULT=$(netstat -an | grep LIST | grep ":25[[:space:]]")' + debug "Result is $RESULT" + if [ -z "$RESULT" ]; then + ok "Nothing listens on 25 port, probably unix socket configured" + else + info "Checking $RESULT" + if $(grep -q "127.0.0.1" <<< $RESULT); then + ok "MTA is configured to localhost only" + else + warn "MTA listens worldwide, correct this considering your MTA" + fi + fi + : +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/bin/hardening/6.1_disable_xwindow_system.sh b/bin/hardening/6.1_disable_xwindow_system.sh index c50b597..bd30e09 100755 --- a/bin/hardening/6.1_disable_xwindow_system.sh +++ b/bin/hardening/6.1_disable_xwindow_system.sh @@ -11,7 +11,8 @@ set -e # One error, it's over set -u # One variable unset, it's over -PACKAGES='xserver-xorg-core xserver-xorg-core-dbg xserver-common' +# Based on aptitude search '~Pxserver' +PACKAGES='xserver-xorg-core xserver-xorg-core-dbg xserver-common xserver-xephyr xserver-xfbdev tightvncserver vnc4server fglrx-driver xvfb xserver-xorg-video-nvidia-legacy-173xx xserver-xorg-video-nvidia-legacy-96xx xnest' # This function will be called if the script status is on enabled / audit mode audit () { diff --git a/bin/hardening/6.2_disable_avahi_server.sh b/bin/hardening/6.2_disable_avahi_server.sh index 9d24d83..7a4a13a 100755 --- a/bin/hardening/6.2_disable_avahi_server.sh +++ b/bin/hardening/6.2_disable_avahi_server.sh @@ -32,7 +32,7 @@ apply () { if [ $FNRET = 0 ]; then crit "$PACKAGE is installed, purging it" apt-get purge $PACKAGE -y -apt-get autoremove + apt-get autoremove else ok "$PACKAGE is absent" fi diff --git a/bin/hardening/6.3_disable_print_server.sh b/bin/hardening/6.3_disable_print_server.sh index f430c7e..2a606f9 100755 --- a/bin/hardening/6.3_disable_print_server.sh +++ b/bin/hardening/6.3_disable_print_server.sh @@ -32,7 +32,7 @@ apply () { if [ $FNRET = 0 ]; then crit "$PACKAGE is installed, purging it" apt-get purge $PACKAGE -y -apt-get autoremove + apt-get autoremove else ok "$PACKAGE is absent" fi diff --git a/bin/hardening/6.4_disable_dhcp.sh b/bin/hardening/6.4_disable_dhcp.sh index 8c1504a..dcf76d9 100755 --- a/bin/hardening/6.4_disable_dhcp.sh +++ b/bin/hardening/6.4_disable_dhcp.sh @@ -32,7 +32,7 @@ apply () { if [ $FNRET = 0 ]; then crit "$PACKAGE is installed, purging it" apt-get purge $PACKAGE -y -apt-get autoremove + apt-get autoremove else ok "$PACKAGE is absent" fi diff --git a/bin/hardening/6.6_diable_ldap.sh b/bin/hardening/6.6_diable_ldap.sh index 1126ec9..9fb4f35 100755 --- a/bin/hardening/6.6_diable_ldap.sh +++ b/bin/hardening/6.6_diable_ldap.sh @@ -32,7 +32,7 @@ apply () { if [ $FNRET = 0 ]; then crit "$PACKAGE is installed, purging it" apt-get purge $PACKAGE -y -apt-get autoremove + apt-get autoremove else ok "$PACKAGE is absent" fi diff --git a/bin/hardening/6.7_disable_nfs_rpc.sh b/bin/hardening/6.7_disable_nfs_rpc.sh index 40244dd..d1f0d00 100755 --- a/bin/hardening/6.7_disable_nfs_rpc.sh +++ b/bin/hardening/6.7_disable_nfs_rpc.sh @@ -32,7 +32,7 @@ apply () { if [ $FNRET = 0 ]; then crit "$PACKAGE is installed, purging it" apt-get purge $PACKAGE -y -apt-get autoremove + apt-get autoremove else ok "$PACKAGE is absent" fi diff --git a/bin/hardening/6.8_disable_dns_server.sh b/bin/hardening/6.8_disable_dns_server.sh index b3ecb69..492a9bb 100755 --- a/bin/hardening/6.8_disable_dns_server.sh +++ b/bin/hardening/6.8_disable_dns_server.sh @@ -32,7 +32,7 @@ apply () { if [ $FNRET = 0 ]; then crit "$PACKAGE is installed, purging it" apt-get purge $PACKAGE -y -apt-get autoremove + apt-get autoremove else ok "$PACKAGE is absent" fi diff --git a/bin/hardening/6.9_disable_ftp.sh b/bin/hardening/6.9_disable_ftp.sh new file mode 100755 index 0000000..579f933 --- /dev/null +++ b/bin/hardening/6.9_disable_ftp.sh @@ -0,0 +1,60 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# 6.9 Ensure FTP Server is not enabled (Not Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +# Based on aptitude search '~Pftp-server' +PACKAGES='ftpd ftpd-ssl heimdal-servers inetutils-ftpd krb5-ftpd muddleftpd proftpd-basic pure-ftpd pure-ftpd-ldap pure-ftpd-mysql pure-ftpd-postgresql twoftpd-run vsftpd wzdftpd' + +# This function will be called if the script status is on enabled / audit mode +audit () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed !" + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will be called if the script status is on enabled mode +apply () { + for PACKAGE in $PACKAGES; do + is_pkg_installed $PACKAGE + if [ $FNRET = 0 ]; then + crit "$PACKAGE is installed, purging it" + apt-get purge $PACKAGE -y + apt-get autoremove + else + ok "$PACKAGE is absent" + fi + done +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/etc/conf.d/6.10_disable_http_server.cfg b/etc/conf.d/6.10_disable_http_server.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.10_disable_http_server.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/conf.d/6.11_disable_imap_pop.cfg b/etc/conf.d/6.11_disable_imap_pop.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.11_disable_imap_pop.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/conf.d/6.12_disable_samba.cfg b/etc/conf.d/6.12_disable_samba.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.12_disable_samba.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/conf.d/6.13_diable_http_proxy.cfg b/etc/conf.d/6.13_diable_http_proxy.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.13_diable_http_proxy.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/conf.d/6.14_disable_snmp_server.cfg b/etc/conf.d/6.14_disable_snmp_server.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.14_disable_snmp_server.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/conf.d/6.15_mta_localhost.cfg b/etc/conf.d/6.15_mta_localhost.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.15_mta_localhost.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/conf.d/6.9_disable_ftp.cfg b/etc/conf.d/6.9_disable_ftp.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/6.9_disable_ftp.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled