Tiger (security software)

Tiger (security software)
Tiger Security Tool
Stable release 3.2.3 / March 3, 2010; 19 months ago (2010-03-03)
Operating system Unix, Linux, Solaris
Available in English
Type Security Audit, Intrusion Detection System
License GPL
Website http://www.nongnu.org/tiger/

Tiger is a software for Unix-like computer operating systems that can be use both as a security audit and intrusion detection system. It supports multiple UNIX platforms and it is free and provided under a GPL license. Unlike other tools, Tiger needs only of POSIX tools and is written entirely in shell language.

History

Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford started Tiger in 1992 at Texas A&M University.[1] It was written at the same time that COPS, SATAN and Internet Scanner were. Eventually, after the 2.2.4 version, which was released in 1994, development of Tiger stalled.[2]

Three different forks evolved after Tiger: TARA (developed by Advanced Research Computing [3]), one internally developed by the HP corporation by Bryan Gartner and the last one developed for the Debian GNU/Linux distribution by Javier Fernández-Sanguino (current upstream maintainer).

These forks were merged on May 2002 and in June 2002 the new source code, now labeled as the 3.0 release, was published at the Savannah site. The 3.1 release was distributed in October 2002, it was considered an unstable release and included some new checks, a new autoconf script for automatic configuration, but mostly included fixes for bugs found after testing Tiger in Debian GNU/Linux and in other operating systems. Over 2200 lines of code and documentation were included in this release.

The release 3.2 was published in May 2003. It improved the stability of the tool and fixed some security problems including a buffer overflow in realpath.

The 3.2.1 release was published in October 2003. It introduced new checks including: check_ndd (for HPUX and SunOS systems), check_passwspec (for Linux and HPUX) check_trusted (for HPUX), check_rootkit (which can interact with the chkrootkit tool), check_xinetd, and, finally, aide_run and integrit_run (integrity file checkers).

The 3.2.2 release was published in August 2007. It introduced support for Tru64, Solaris 8 and 9. This release also introduced the audit scripts, a collection of scripts originally written by Marc Heuse that can be used to do offline audits of systems by recovering all the needed information and putting it into an archive. These scripts are intended for use with security operating systems baselines or checklists.

The 3.2.3 release was published in September 2007 and is mainly a bug fix release and also including new features related to handling exotic filesystems in Linux.

Overview

Tiger has some interesting features that merit its resurrection,[citation needed] including a modular design that is easy to expand. It can be used as an audit tool and a host intrusion detection system tool.

Tiger complements Intrusion Detection System (IDS) (from network IDS Snort), to the kernel (Log-based Intrusion Detection System or LIDS, or SNARE for Linux and Systrace for OpenBSD, for example), integrity checkers (many of these: AIDE, integrit, Samhain, Tripwire...) and logcheckers, providing a framework in which all of them can work together. Tiger it is not a logchecker, nor it focused in integrity analysis. It is checks the system configuration and status.

The cronrc and tigerrc files are used for configuration.

Binaries used by tiger include md5, realpath, snefru and testsuid.

References

  1. ^ Mann, Scott; Mitchell, Ellen L. (2000). Linux System Security. Upper Saddle River, NJ: Prentice Hall PTR. p. 341. ISBN 0-13-015807-0. 
  2. ^ http://www.net.tamu.edu/network/tools/tiger.html
  3. ^ The Advanced Research Corporation

Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Tiger (disambiguation) — See also: Tigress (disambiguation) Contents 1 Zoology 2 People 2.1 Athletes …   Wikipedia

  • Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Scan — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Test — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Tiger team — For the Court TV/TruTV television series based on a tiger team, see Tiger Team (TV series). A tiger team is a group of experts assigned to investigate and/or solve technical or systemic problems. The term may have originated in aerospace design… …   Wikipedia

  • Tiger Direct — Type Subsidiary Industry Retail Founded 1987 Headquarters Fountainbleau, Florida, USA Number of locations 6 stores in Canada …   Wikipedia

  • Tiger (software) — Tiger may refer to one of the following software projects which used Tiger as their project code name: Tiger Software, the previous name of from Mondago Ltd Mac OS X v10.4 from Apple Computer Java 5.0 from Sun Microsystems Tiger, a Unix like… …   Wikipedia

  • Software Firewall — Eine (auch: ein) Personal Firewall oder Desktop Firewall (von englisch firewall Brandschutzwand, „Brandmauer“) ist eine Software, die den ein und ausgehenden Datenverkehr eines PCs auf dem Rechner selbst filtert. Sie wird zum Schutz des Computers …   Deutsch Wikipedia

  • IT Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”