Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ninja(8) [debian man page]

NINJA(8)																  NINJA(8)

NAME
ninja - Privilege escalation detection system for GNU/Linux SYNOPSIS
ninja filename DESCRIPTION
Ninja is a privilege escalation detection and prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of all processes running as root. If a process is spawned with UID or GID zero (root), ninja will log necessary information about this process, and optionally kill the process if it was spawned by an unauthorized user. A "magic" group can be specified, allowing members of this group to run any setuid/setgid root executable. Individual executables can be whitelisted. Ninja uses a fine grained whitelist that lets you whitelist executables on a group and/or user basis. This can be used to allow specific groups or individual users access to setuid/setgid root programs, such as su(1) and passwd(1). CONFIGURATION
Ninja requires a configuration file to run. For more information about the configuration, please refer to the "default.conf" file, located at "/usr/share/doc/ninja/examples/" in the source tree. There, all the available options are explained in detail. WHITELIST
The whitelist is a plain text file, containing new-line separated entries. Entries consists of three fields, separated by colons. The first field is the full path to the executable you wish to whitelist. The second field is a comma separated list of groups that should be granted access to the executable. The third field is a comma separated list of users. <executable>:<groups>:<users> The second or third field can be left empty. Please refer to the example whitlist located in "/usr/share/doc/ninja/examples/". Remember that it is a good idea to whitelist programs such as passwd(1) and other regular setuid applications that users require access to. SECURITY
The goal of this application is to be able to detect and stop local, and possibly also remote exploits. It is important to note that ninja cannot prevent attackers from running exploits, as a successful exploitation only will be detected AFTER the attacker has gained root. How- ever, when ninja is running with a short scanning cycle, this detection happens nearly immediately. The security lies in the fact that we stop the attacker before he/she has time to do anything nasty to the system, and it gives us the opportunity to disable the attacker's shell access, and lock him/her out of the system. In an ideal environment, ninja should be run together with kernel hardening systems such as grsecurity (www.grsecurity.net) as this will allow for some protection of the ninja process. This is not a complete security system. Do not rely on it to keep your system safe. BUGS
Please let me know if you should stumble across any bugs or other weirdness. I greatly appreciate all bug reports, patches, ideas, sugges- tions and comments. LICENSE
Ninja is released under the General Public License (GPL) version 2 or higher. AUTHOR
Tom Rune Flo <tom@x86.no> August 2005 NINJA(8)

Check Out this Related Man Page

RAZOR-WHITELIST(5)					User Contributed Perl Documentation					RAZOR-WHITELIST(5)

NAME
"razor-whitelist" - Format for Vipul's Razor Whitelist DESCRIPTION
The razor whitelist is a list of email addresses and body signatures. Emails that match the whitelist are not processed by any of the Razor Agents. That is, They are not checked, reported, or revoked. In the case of razor-check(1), they are instantly marked as non-spam. LOCATION
The razor whitelist is usually "<razorhome>/razor-whitelist". The "whitelist" parameter in razor-agent.conf(5) should point to this file. If the "whitelist" parameter in razor-agent.conf(5) is missing, "whitelist" is not used. FORMAT
Each whitelist rule is placed on a line of its own. Lines that begin in a `#' character are considered to be comments and are ignored by the parser. A rule contains the name of a header and the string to match against the header, separated by whitespace. Here are some examples: to bugtraq@securityfocus.com cc a.list@somewhere.net These rules imply that when a mail contains "bugtraq@securityfocus.com" in its `to' and `cc' headers, it should be whitelisted. It's worth noting that a match occurs if the address string matches any part of the address. from @mydomain.com A special rule called `sha1' can be used for whitelisting signatures. For example: sha1 75f8bcc2357366bbfa9c6ab0b6e5648ed0cf7083 whitelists a message with the body of `test'. AUTHORS
Vipul Ved Prakash <mail@vipul.net>, and Chad Norwood <chad@samo.org> SEE ALSO
razor-agents(1), razor-agent.conf(5), razor-check(1), razor-admin(1), razor-report(1), razor-revoke(1) LICENSE
This is free software, distributed under the Artistic License 2.0. perl v5.14.2 2008-07-21 RAZOR-WHITELIST(5)
Man Page