1*d583833aSAndrew Geissler# Q: Would you like to enforce password aging? [Y] 2*d583833aSAndrew GeisslerAccountSecurity.passwdage="Y" 3*d583833aSAndrew Geissler# Q: Should Bastille disable clear-text r-protocols that use IP-based authentication? [Y] 4*d583833aSAndrew GeisslerAccountSecurity.protectrhost="Y" 5*d583833aSAndrew Geissler# Q: Should we disallow root login on tty's 1-6? [N] 6*d583833aSAndrew GeisslerAccountSecurity.rootttylogins="Y" 7*d583833aSAndrew Geissler# Q: What umask would you like to set for users on the system? [077] 8*d583833aSAndrew GeisslerAccountSecurity.umask="077" 9*d583833aSAndrew Geissler# Q: Do you want to set the default umask? [Y] 10*d583833aSAndrew GeisslerAccountSecurity.umaskyn="Y" 11*d583833aSAndrew Geissler# Q: Would you like to deactivate the Apache web server? [Y] 12*d583833aSAndrew GeisslerApache.apacheoff="Y" 13*d583833aSAndrew Geissler# Q: Would you like to password protect single-user mode? [Y] 14*d583833aSAndrew GeisslerBootSecurity.passsum="Y" 15*d583833aSAndrew Geissler# Q: Should we restrict console access to a small group of user accounts? [N] 16*d583833aSAndrew GeisslerConfigureMiscPAM.consolelogin="Y" 17*d583833aSAndrew Geissler# Q: Which accounts should be able to login at console? [root] 18*d583833aSAndrew GeisslerConfigureMiscPAM.consolelogin_accounts="root" 19*d583833aSAndrew Geissler# Q: Would you like to put limits on system resource usage? [N] 20*d583833aSAndrew GeisslerConfigureMiscPAM.limitsconf="Y" 21*d583833aSAndrew Geissler# Q: Would you like to set more restrictive permissions on the administration utilities? [N] 22*d583833aSAndrew GeisslerFilePermissions.generalperms_1_1="Y" 23*d583833aSAndrew Geissler# Q: Would you like to disable SUID status for mount/umount? 24*d583833aSAndrew GeisslerFilePermissions.suidmount="Y" 25*d583833aSAndrew Geissler# Q: Would you like to disable SUID status for ping? [Y] 26*d583833aSAndrew GeisslerFilePermissions.suidping="Y" 27*d583833aSAndrew Geissler# Q: Would you like to disable SUID status for traceroute? [Y] 28*d583833aSAndrew GeisslerFilePermissions.suidtrace="Y" 29*d583833aSAndrew Geissler# Q: Do you need the advanced networking options? 30*d583833aSAndrew GeisslerFirewall.ip_advnetwork="Y" 31*d583833aSAndrew Geissler# Q: Should Bastille run the firewall and enable it at boot time? [N] 32*d583833aSAndrew GeisslerFirewall.ip_enable_firewall="Y" 33*d583833aSAndrew Geissler# Q: Would you like to run the packet filtering script? [N] 34*d583833aSAndrew GeisslerFirewall.ip_intro="Y" 35*d583833aSAndrew Geissler# Q: Interfaces for DHCP queries: [ ] 36*d583833aSAndrew GeisslerFirewall.ip_s_dhcpiface=" " 37*d583833aSAndrew Geissler# Q: DNS servers: [0.0.0.0/0] 38*d583833aSAndrew GeisslerFirewall.ip_s_dns="10.184.9.1" 39*d583833aSAndrew Geissler# Q: ICMP allowed types: [destination-unreachable echo-reply time-exceeded] 40*d583833aSAndrew GeisslerFirewall.ip_s_icmpallowed="destination-unreachable echo-reply time-exceeded" 41*d583833aSAndrew Geissler# Q: ICMP services to audit: [ ] 42*d583833aSAndrew GeisslerFirewall.ip_s_icmpaudit=" " 43*d583833aSAndrew Geissler# Q: ICMP types to disallow outbound: [destination-unreachable time-exceeded] 44*d583833aSAndrew GeisslerFirewall.ip_s_icmpout="destination-unreachable time-exceeded" 45*d583833aSAndrew Geissler# Q: Internal interfaces: [ ] 46*d583833aSAndrew GeisslerFirewall.ip_s_internaliface=" " 47*d583833aSAndrew Geissler# Q: TCP service names or port numbers to allow on private interfaces: [ ] 48*d583833aSAndrew GeisslerFirewall.ip_s_internaltcp=" " 49*d583833aSAndrew Geissler# Q: UDP service names or port numbers to allow on private interfaces: [ ] 50*d583833aSAndrew GeisslerFirewall.ip_s_internaludp=" " 51*d583833aSAndrew Geissler# Q: Masqueraded networks: [ ] 52*d583833aSAndrew GeisslerFirewall.ip_s_ipmasq=" " 53*d583833aSAndrew Geissler# Q: Kernel modules to masquerade: [ftp raudio vdolive] 54*d583833aSAndrew GeisslerFirewall.ip_s_kernelmasq="ftp raudio vdolive" 55*d583833aSAndrew Geissler# Q: NTP servers to query: [ ] 56*d583833aSAndrew GeisslerFirewall.ip_s_ntpsrv=" " 57*d583833aSAndrew Geissler# Q: Force passive mode? [N] 58*d583833aSAndrew GeisslerFirewall.ip_s_passiveftp="N" 59*d583833aSAndrew Geissler# Q: Public interfaces: [eth+ ppp+ slip+] 60*d583833aSAndrew GeisslerFirewall.ip_s_publiciface="eth+ ppp+ slip+" 61*d583833aSAndrew Geissler# Q: TCP service names or port numbers to allow on public interfaces:[ ] 62*d583833aSAndrew GeisslerFirewall.ip_s_publictcp=" " 63*d583833aSAndrew Geissler# Q: UDP service names or port numbers to allow on public interfaces:[ ] 64*d583833aSAndrew GeisslerFirewall.ip_s_publicudp=" " 65*d583833aSAndrew Geissler# Q: Reject method: [DENY] 66*d583833aSAndrew GeisslerFirewall.ip_s_rejectmethod="DENY" 67*d583833aSAndrew Geissler# Q: Enable source address verification? [Y] 68*d583833aSAndrew GeisslerFirewall.ip_s_srcaddr="Y" 69*d583833aSAndrew Geissler# Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh] 70*d583833aSAndrew GeisslerFirewall.ip_s_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh" 71*d583833aSAndrew Geissler# Q: TCP services to block: [2049 2065:2090 6000:6020 7100] 72*d583833aSAndrew GeisslerFirewall.ip_s_tcpblock="2049 2065:2090 6000:6020 7100" 73*d583833aSAndrew Geissler# Q: Trusted interface names: [lo] 74*d583833aSAndrew GeisslerFirewall.ip_s_trustiface="lo" 75*d583833aSAndrew Geissler# Q: UDP services to audit: [31337] 76*d583833aSAndrew GeisslerFirewall.ip_s_udpaudit="31337" 77*d583833aSAndrew Geissler# Q: UDP services to block: [2049 6770] 78*d583833aSAndrew GeisslerFirewall.ip_s_udpblock="2049 6770" 79*d583833aSAndrew Geissler# Q: Would you like to add additional logging? [Y] 80*d583833aSAndrew GeisslerLogging.morelogging="Y" 81*d583833aSAndrew Geissler# Q: Would you like to set up process accounting? [N] 82*d583833aSAndrew GeisslerLogging.pacct="N" 83*d583833aSAndrew Geissler# Q: Do you have a remote logging host? [N] 84*d583833aSAndrew GeisslerLogging.remotelog="N" 85*d583833aSAndrew Geissler# Q: Would you like to disable acpid and/or apmd? [Y] 86*d583833aSAndrew GeisslerMiscellaneousDaemons.apmd="Y" 87*d583833aSAndrew Geissler# Q: Would you like to deactivate NFS and Samba? [Y] 88*d583833aSAndrew GeisslerMiscellaneousDaemons.remotefs="Y" 89*d583833aSAndrew Geissler# Q: Would you like to disable printing? [N] 90*d583833aSAndrew GeisslerPrinting.printing="Y" 91*d583833aSAndrew Geissler# Q: Would you like to disable printing? [N] 92*d583833aSAndrew GeisslerPrinting.printing_cups="Y" 93*d583833aSAndrew Geissler# Q: Would you like to display "Authorized Use" messages at log-in time? [Y] 94*d583833aSAndrew GeisslerSecureInetd.banners="Y" 95*d583833aSAndrew Geissler# Q: Should Bastille ensure inetd's FTP service does not run on this system? [y] 96*d583833aSAndrew GeisslerSecureInetd.deactivate_ftp="Y" 97*d583833aSAndrew Geissler# Q: Should Bastille ensure the telnet service does not run on this system? [y] 98*d583833aSAndrew GeisslerSecureInetd.deactivate_telnet="Y" 99*d583833aSAndrew Geissler# Q: Who is responsible for granting authorization to use this machine? 100*d583833aSAndrew GeisslerSecureInetd.owner="its owner" 101*d583833aSAndrew Geissler# Q: Would you like to set a default-deny on TCP Wrappers and xinetd? [N] 102*d583833aSAndrew GeisslerSecureInetd.tcpd_default_deny="Y" 103*d583833aSAndrew Geissler# Q: Do you want to stop sendmail from running in daemon mode? [Y] 104*d583833aSAndrew GeisslerSendmail.sendmaildaemon="Y" 105*d583833aSAndrew Geissler# Q: Would you like to install TMPDIR/TMP scripts? [N] 106*d583833aSAndrew GeisslerTMPDIR.tmpdir="N" 107