[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[LCFC] templates://rkhunter/{templates}

This is the last call for comments for the review of debconf
templates for rkhunter.

The reviewed templates will be sent on Monday, November 19, 2007 to the package
maintainer as a bug report and a mail will be sent to this list with
"[BTS]" as a subject tag.


Template: rkhunter/cron_daily_run
Type: boolean
_Description: Activate daily run of rkhunter?
 If you choose this option, rkhunter will be run automatically
 by a daily cron job.

Template: rkhunter/cron_db_update
Type: boolean
_Description: Activate weekly update of rkhunter's databases?
 If you choose this option, rkhunter databases will be
 updated automatically by a weekly cron job.

Template: rkhunter/apt_autogen
Type: boolean
Default: false
_Description: Automatically update rkhunter's file properties database?
 The file properties database can be updated automatically
 by the package management system.
 This feature is not enabled by default as
 database updates may be slow on low-end machines.
 Even if it is enabled, the database won't be updated if the 
 'hashes' test is disabled in rkhunter configuration.
Source: rkhunter
Section: admin
Priority: optional
Maintainer: Micah Anderson <micah@debian.org>
Uploaders: Julien Valroff <julien@kirya.net>
Build-Depends: debhelper (>= 5.0.0), dpatch, po-debconf
Standards-Version: 3.7.2
Homepage: http://rkhunter.sourceforge.net

Package: rkhunter
Architecture: all
Depends: file, exim4 | postfix | sendmail | mail-transport-agent, perl, net-tools, ${misc:Depends}
Recommends: libmd5-perl, binutils, wget | curl | links | elinks | lynx, iproute
Suggests: mailx
Description: rootkit, backdoor, sniffer and exploit scanner
 Rootkit Hunter scans systems for known and unknown rootkits,
 backdoors, sniffers and exploits.
 It checks for:
  - MD5 hash changes;
  - files commonly created by rootkits;
  - executables with anomalous file permissions;
  - suspicious strings in kernel modules;
  - hidden files in system directories;
 and can optionally scan within files.
 Using rkhunter alone does not guarantee that a system is not
 compromised. Running additional tests, such as chkrootkit, is

Attachment: signature.asc
Description: Digital signature

Reply to: