Provided by: checksecurity_2.0.16+nmu1ubuntu1_all bug

NAME

       check-setuid - check for changes to setuid programs

SYNOPSIS

       check-setuid

DESCRIPTION

       The  check-setuid is a plugin run by the checksecurity command. It scans the mounted files
       systems (subject to the filter defined in /etc/checksecurity.conf) and compares  the  list
       of  setuid  programs  to  the list created on the previous run. Any changes are printed to
       standard output. Also, it generates a list of nfs and afs  filesystems  that  are  mounted
       insecurely (i.e. they are missing the nodev and either the noexec or nosuid flags).

       checksecurity   is   run   by   cron   on   a  daily  basis,  and  the  output  stored  in
       /var/log/setuid/setuid.changes.

CONFIGURATION

       The checksecurity.conf file defines several configuration variables: CHECKSECURITY_FILTER,
       CHECKSECURITY_NOFINDERRORS,          CHECKSECURITY_NONFSAFS,          CHECKSECURITY_EMAIL,
       CHECKSECURITY_DEVICEFILTER,  CHECKSECURITY_PATHFILTER,  and  LOGDIR.   Each  is  described
       below.

       The  CHECKSECURITY_FILTER environment variable which is the argument of 'grep -vE' applied
       to the output of the mount command. In other words, the value of CHECKSECURITY_FILTER is a
       regular  expression  that  removes  matching  lines  from  those file systems that will be
       scanned. The default value removes all file systems of type proc,  bind,  msdos,  iso9660,
       ncpfs,  nfs,  afs,  smbfs,  auto,  ntfs,  coda file systems, anything mounted on /dev/fd*,
       anything mounted on /mnt or /amd, and anything mounted with option nosuid or noexec.

       The checksecurity.conf file is sourced from checksecurity, so you  could  do  some  fairly
       tricky things to define CHECKSECURITY_FILTER.

       The  CHECKSECURITY_NOFINDERRORS  environment  variable,  if  set  to  the  literal "TRUE",
       disables find errors from checksecurity (actually, it re-routes them to /dev/null ).

       The CHECKSECURITY_NONFSAFS environment variable, if set to the  literal  "TRUE",  disables
       the  message  about nfs and afs file systems that are mounted without the nodev and either
       the noexec or nosuid options.

       If set, the CHECKSECURITY_EMAIL variable defines who is sent a copy of the  setuid.changes
       file.

       The  CHECKSECURITY_DEVICEFILTER  variable specifies a find clause for which matching block
       and character device files will not be monitored for changing owners and permissions.  For
       example,  if  you  don't  want to check for permission changes on tty device files beneath
       /dev, you could set the following:

              CHECKSECURITY_DEVICEFILTER='-path /dev/tty*'

       Note that any added or modified suid programs under that path would still be detected.  If
       you want to specify multiple expressions, separate them with '-o', but there is no need to
       surround the whole clause with parentheses. To disable this filter, specify it as '-false'
       (which is the default).

       Note that if the system gets restarted often checksecurity will report a lot of changes in
       the /dev/ subdirectory due to timestamp changes. In this case you might want to change  it
       to:

              CHECKSECURITY_DEVICEFILTER='-path /dev/'

       The  CHECKSECURITY_PATHFILTER  variable  specifies a find clause which will be pruned from
       the search path.  This means that the entire subtree will be  completely  skipped.   Thus,
       specifying

              CHECKSECURITY_PATHFILTER='-path /var/ftp'

       then  the  entire  /var/ftp  tree  will  be skipped. To disable this filter, specify it as
       '-false' (which is the default).

       LOGDIR sets the name of the directory which stores the files which  track  the  permission
       and ownership changes. By default, they are in /var/log/setuid.

FILES

       /etc/checksecurity.conf
              checksecurity configuration file

       /var/log/setuid/setuid.today
              setuid files from the most recent run

       /var/log/setuid/setuid.yesterday
              setuid files from the previous run