[PATCH 1/8] use rkhunter as a role, and use newer construct for the last playbook

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



---
 files/rkhunter/rkhunter.conf.j2         | 590 --------------------------------
 files/rkhunter/rkhunter.sysconfig       |  11 -
 playbooks/groups/arm-packager.yml       |   4 +-
 playbooks/groups/arm-qa.yml             |   4 +-
 playbooks/groups/backup-server.yml      |   5 +-
 playbooks/groups/badges-backend.yml     |   4 +-
 playbooks/groups/badges-web.yml         |   4 +-
 playbooks/groups/beaker.yml             |   4 +-
 playbooks/groups/gallery.yml            |   4 +-
 playbooks/groups/kernel-qa.yml          |   4 +-
 playbooks/groups/keyserver.yml          |   4 +-
 playbooks/groups/koji-hub.yml           |   4 +-
 playbooks/groups/mailman.yml            |   4 +-
 playbooks/groups/mirrorlist.yml         |   4 +-
 playbooks/groups/postgresl-server.yml   |   5 +-
 playbooks/groups/sign.yml               |   4 +-
 playbooks/groups/taskbot.yml            |   4 +-
 playbooks/groups/virthost.yml           |   5 +-
 playbooks/rkhunter_update.yml           |   8 +-
 roles/rkhunter/files/rkhunter.conf.j2   | 590 ++++++++++++++++++++++++++++++++
 roles/rkhunter/files/rkhunter.sysconfig |  11 +
 roles/rkhunter/tasks/main.yml           |  18 +
 tasks/rkhunter.yml                      |  18 -
 23 files changed, 671 insertions(+), 642 deletions(-)
 delete mode 100644 files/rkhunter/rkhunter.conf.j2
 delete mode 100644 files/rkhunter/rkhunter.sysconfig
 create mode 100644 roles/rkhunter/files/rkhunter.conf.j2
 create mode 100644 roles/rkhunter/files/rkhunter.sysconfig
 create mode 100644 roles/rkhunter/tasks/main.yml
 delete mode 100644 tasks/rkhunter.yml

diff --git a/files/rkhunter/rkhunter.conf.j2 b/files/rkhunter/rkhunter.conf.j2
deleted file mode 100644
index 7055175..0000000
--- a/files/rkhunter/rkhunter.conf.j2
+++ /dev/null
@@ -1,590 +0,0 @@
-#
-# This is the configuration file for Rootkit Hunter.
-#
-# Please modify it to your own requirements.
-# Please review the documentation before posting bug reports or questions.
-# To report bugs, obtain updates, or provide patches or comments, please go to:
-# http://rkhunter.sourceforge.net
-#
-# To ask questions about rkhunter, please use the rkhunter-users mailing list.
-# Note this is a moderated list: please subscribe before posting.
-#
-# Lines beginning with a hash (#), and blank lines, will be ignored.
-#
-# Most of the following options need only be specified once. If
-# they appear more than once, then the last one seen will be used.
-# Some options are allowed to appear more than once, and the text
-# describing the option will say if this is so.
-#
-
-#
-# If this option is set to 1, it specifies that the mirrors file, which
-# is used when the '--update' and '--versioncheck' options are used, is
-# to be rotated. Rotating the entries in the file allows a basic form
-# of load-balancing between the mirror sites whenever the above options
-# are used.
-# If the option is set to 0, then the mirrors will be treated as if in
-# a priority list. That is, the first mirror will always be used. The
-# second mirror will only be used if the first mirror fails, then the
-# third mirror will be used if the second fails and so on.
-#
-
-ROTATE_MIRRORS=1
-
-#
-# If this option is set to 1, it specifies that when the '--update'
-# option is used, then the mirrors file is to be checked for updates
-# as well. If the current mirrors file contains any local mirrors,
-# these will be prepended to the updated file.
-# If this option is set to 0, the mirrors file can only be updated
-# manually. This may be useful if only using local mirrors.
-#
-UPDATE_MIRRORS=1
-
-#
-# The MIRRORS_MODE option tells rkhunter which mirrors are to be
-# used when the '--update' or '--versioncheck' command-line options
-# are given. Possible values are:
-#     0 - use any mirror (the default)
-#     1 - only use local mirrors
-#     2 - only use remote mirrors
-#
-# Local and remote mirrors can be defined in the mirrors.dat file
-# by using the 'local=' and 'remote=' keywords respectively.
-#
-MIRRORS_MODE=0
-
-#
-# Email a message to this address if a warning is found when the
-# system is being checked. Multiple addresses may be specified
-# simply be separating them with a space.
-#
-MAIL-ON-WARNING=""
-
-#
-# Specify the mail command to use if MAIL-ON-WARNING is set.
-# NOTE: Double quotes are not required around the command, but
-# are required around the subject line if it contains spaces.
-#
-MAIL_CMD=mail -s "[rkhunter] Warnings found for ${HOST_NAME}"
-
-#
-# Specify the temporary directory to use.
-#
-# NOTE: Do not use /tmp as your temporary directory. Some
-# important files will be written to this directory, so be
-# sure that the directory permissions are tight.
-#
-TMPDIR=/var/lib/rkhunter
-
-#
-# Specify the database directory to use.
-#
-DBDIR=/var/lib/rkhunter/db
-
-#
-# Specify the script directory to use.
-#
-SCRIPTDIR=/usr/share/rkhunter/scripts
-
-#
-# Specify the root directory to use.
-#
-#ROOTDIR=""
-
-#
-# Specify the command directories to be checked. This is a
-# space-separated list of directories.
-#
-BINDIR="/bin /usr/bin /sbin /usr/sbin /usr/local/bin /usr/local/sbin /usr/libexec /usr/local/libexec"
-
-#
-# Specify the language to use. This should be similar
-# to the ISO 639 language code.
-#
-# NOTE: Please ensure that the language you specify is supported.
-#       For a list of supported languages use the following command:
-#
-#           rkhunter --lang en --list languages
-#
-#LANGUAGE=en
-
-#
-# Specify the log file pathname.
-#
-LOGFILE=/var/log/rkhunter/rkhunter.log
-
-#
-# Set the following option to 1 if the log file is to be appended to
-# whenever rkhunter is run.
-#
-
-
-#
-# Set the following option to enable the rkhunter check start and finish
-# times to be logged by syslog. Warning messages will also be logged.
-# The value of the option must be a standard syslog facility and
-# priority, separated by a dot.
-#
-# For example: USE_SYSLOG=authpriv.warning
-#
-# Setting the value to 'none', or just leaving the option commented out,
-# disables the use of syslog.
-#
-USE_SYSLOG=authpriv.notice
-
-#
-# Set the following option to 1 if the second colour set is to be used.
-# This can be useful if your screen uses black characters on a white
-# background (for example, a PC instead of a server).
-#
-COLOR_SET2=0
-
-#
-# Set the following option to 0 if rkhunter should not detect if X is
-# being used. If X is detected as being used, then the second colour
-# set will automatically be used.
-#
-AUTO_X_DETECT=1
-
-#
-# The following option is checked against the SSH configuration file
-# 'PermitRootLogin' option. A warning will be displayed if they do not
-# match. However, if a value has not been set in the SSH configuration
-# file, then a value here of 'yes' or 'unset' will not cause a warning.
-# This option has a default value of 'no'.
-#
-ALLOW_SSH_ROOT_USER=without-password
-
-#
-# Set this option to '1' to allow the use of the SSH-1 protocol, but note
-# that theoretically it is weaker, and therefore less secure, than the
-# SSH-2 protocol. Do not modify this option unless you have good reasons
-# to use the SSH-1 protocol (for instance for AFS token passing or Kerberos4
-# authentication). If the 'Protocol' option has not been set in the SSH
-# configuration file, then a value of '2' may be set here in order to
-# suppress a warning message. This option has a default value of '0'.
-#
-ALLOW_SSH_PROT_V1=0
-
-#
-# This setting tells rkhunter the directory containing the SSH configuration
-# file. This setting will be worked out by rkhunter, and so should not
-# usually need to be set.
-#
-#SSH_CONFIG_DIR=/etc/ssh
-
-#
-# These two options determine which tests are to be performed.
-# The ENABLE_TESTS option can use the word 'all' to refer to all the
-# available tests. The DISABLE_TESTS option can use the word 'none' to
-# mean that no tests are disabled. The list of disabled tests is applied to
-# the list of enabled tests. Both options are space-separated lists of test
-# names. The currently available test names can be seen by using the command
-# 'rkhunter --list tests'.
-#
-# The program defaults are to enable all tests and disable none. However, if
-# either option is specified in this file, then it overrides the program
-# default. The supplied rkhunter.conf file has some tests already disabled,
-# and these are tests that will be used only incidentally, can be considered
-# "advanced" or those that are prone to produce more than the "average" number
-# of "false positives".
-#
-# Please read the README file for more details about enabling and disabling
-# tests, the test names, and how rkhunter behaves when these options are used.
-#
-ENABLE_TESTS="all"
-DISABLE_TESTS="suspscan hidden_procs deleted_files packet_cap_apps apps"
-
-#
-# The HASH_FUNC option can be used to specify the command to use
-# for the file hash value check. It can be specified as just
-# the command name or the full pathname. Systems using prelinking
-# are restricted to using either SHA1 or MD5 functions. To get rkhunter
-# to look for the sha1(sum)/md5(sum) command, or to use the supplied
-# perl scripts, simply specify this option as 'SHA1' or 'MD5' in
-# uppercase. The default is SHA1, or MD5 if SHA1 cannot be found.
-#
-# A value of 'NONE' (in uppercase) can be specified to indicate that
-# no hash function should be used. Rootkit Hunter will detect this and
-# automatically disable the file hash checks.
-#
-# Examples:
-#   For Solaris 9 : HASH_FUNC=gmd5sum
-#   For Solaris 10: HASH_FUNC=sha1sum
-#   For AIX (>5.2): HASH_FUNC="csum -hMD5"
-#   For NetBSD    : HASH_FUNC="cksum -a sha512"
-#
-# NOTE: If the hash function is changed then you MUST run rkhunter with
-#       the '--propupd' option to rebuild the file properties database.
-#
-HASH_FUNC=sha1sum
-
-#
-# The HASH_FLD_IDX option specifies which field from the HASH_FUNC
-# command output contains the hash value. The fields are assumed to
-# be space-separated. The default value is one, but for *BSD users
-# rkhunter will, by default, use a value of 4 if the HASH_FUNC option
-# has not been set. The option value must be a positive integer.
-#
-#HASH_FLD_IDX=4
-
-#
-# The PKGMGR option tells rkhunter to use the specified package manager
-# to obtain the file property information. This is used when updating
-# the file properties file 'rkhunter.dat', and when running the file
-# properties check. For RedHat/RPM-based systems, 'RPM' can be used
-# to get information from the RPM database. For Debian-based systems
-# 'DPKG' can be used, and for *BSD systems 'BSD' can be used.
-# No value, or a value of 'NONE', indicates that no package manager
-# is to be used. The default is 'NONE'.
-#
-# The current package managers store the file hash values using an
-# MD5 hash function.
-#
-# The 'DPKG' and 'BSD' package managers only provide MD5 hash values.
-# The 'RPM' package manager additionally provides values for the inode,
-# file permissions, uid, gid and other values.
-#
-# For any file not part of a package, rkhunter will revert to using
-# the HASH_FUNC hash function instead.
-#
-PKGMGR=RPM
-
-#
-# Whitelist various attributes of the specified files.
-# The attributes are those of the 'attributes' test.
-# Specifying a file name here does not include it being
-# whitelisted for the write permission test below.
-# One command per line (use multiple ATTRWHITELIST lines).
-#
-#ATTRWHITELIST=/bin/ps
-
-#
-# Allow the specified commands to have the 'others'
-# (world) permission have the write-bit set.
-#
-# For example, files with permissions r-xr-xrwx
-# or rwxrwxrwx.
-#
-# One command per line (use multiple WRITEWHITELIST lines).
-#
-#WRITEWHITELIST=/bin/ps
-
-#
-# Allow the specified commands to be scripts.
-# One command per line (use multiple SCRIPTWHITELIST lines).
-#
-#SCRIPTWHITELIST=/sbin/ifup
-#SCRIPTWHITELIST=/sbin/ifdown
-#SCRIPTWHITELIST=/usr/bin/groups
-
-#
-# Allow the specified commands to have the immutable attribute set.
-# One command per line (use multiple IMMUTWHITELIST lines).
-#
-#IMMUTWHITELIST=/sbin/ifup
-
-#
-# Allow the specified hidden directories.
-# One directory per line (use multiple ALLOWHIDDENDIR lines).
-#
-ALLOWHIDDENDIR=/dev/.udev
-ALLOWHIDDENDIR=/dev/.mdadm
-ALLOWHIDDENDIR=/dev/.systemd
-ALLOWHIDDENDIR=/dev/.mount
-ALLOWHIDDENDIR=/dev/.udevdb
-ALLOWHIDDENDIR=/dev/.udev.tdb
-ALLOWHIDDENDIR=/dev/.udev/db
-ALLOWHIDDENDIR=/dev/.udev/rules.d
-
-#
-# Allow the specified hidden files.
-# One file per line (use multiple ALLOWHIDDENFILE lines).
-# 
-ALLOWHIDDENFILE=/usr/share/man/man1/..1.gz
-ALLOWHIDDENFILE=/usr/bin/.ssh-add.hmac
-ALLOWHIDDENFILE=/usr/bin/.ssh-agent.hmac
-ALLOWHIDDENFILE=/usr/bin/.ssh-keyscan.hmac
-ALLOWHIDDENFILE=/usr/bin/.ssh-keygen.hmac
-ALLOWHIDDENFILE=/usr/bin/.ssh.hmac
-ALLOWHIDDENFILE=/usr/bin/.fipscheck.hmac
-ALLOWHIDDENFILE=/usr/sbin/.sshd.hmac
-ALLOWHIDDENFILE=/usr/share/man/man5/.k5login.5.gz
-ALLOWHIDDENFILE=/usr/share/man/man5/.k5identity.5.gz
-ALLOWHIDDENFILE=/sbin/.cryptsetup.hmac
-ALLOWHIDDENFILE=/dev/.udev/queue.bin
-ALLOWHIDDENFILE=/dev/.udev/uevent_seqnum
-
-#
-# Allow the specified processes to use deleted files.
-# One process per line (use multiple ALLOWPROCDELFILE lines).
-#
-#ALLOWPROCDELFILE=/sbin/cardmgr
-#ALLOWPROCDELFILE=/usr/sbin/gpm
-#ALLOWPROCDELFILE=/usr/libexec/gconfd-2
-#ALLOWPROCDELFILE=/usr/sbin/mysqld
-
-#
-# Allow the specified processes to listen on any network interface.
-# One process per line (use multiple ALLOWPROCLISTEN lines).
-#
-#ALLOWPROCLISTEN=/sbin/dhclient
-#ALLOWPROCLISTEN=/usr/bin/dhcpcd
-#ALLOWPROCLISTEN=/usr/sbin/pppoe
-#ALLOWPROCLISTEN=/usr/sbin/tcpdump
-#ALLOWPROCLISTEN=/usr/sbin/snort-plain
-#ALLOWPROCLISTEN=/usr/local/bin/wpa_supplicant
-
-#
-# SCAN_MODE_DEV governs how we scan /dev for suspicious files.
-# The two allowed options are: THOROUGH or LAZY.
-# If commented out we do a THOROUGH scan which will increase the runtime.
-# Even though this adds to the running time it is highly recommended to
-# leave it like this.
-#
-#SCAN_MODE_DEV=THOROUGH
-
-#
-# Allow the specified files to be present in the /dev directory,
-# and not regarded as suspicious. One file per line (use multiple
-# ALLOWDEVFILE lines).
-#
-#ALLOWDEVFILE=/dev/abc
-#ALLOWDEVFILE=/dev/shm/pulse-shm-*
-ALLOWDEVFILE=/dev/shm/sem.slapd-FEDORAPROJECT-ORG.stats
-ALLOWDEVFILE=/dev/md/md-device-map
-ALLOWDEVFILE=/dev/.udev/queue.bin
-ALLOWDEVFILE=/dev/.udev/db/*
-ALLOWDEVFILE=/dev/.udev/rules.d/99-root.rules
-ALLOWDEVFILE=/dev/.udev/uevent_seqnum
-ALLOWDEVFILE=/dev/md/autorebuild.pid
-
-#
-# This setting tells rkhunter where the inetd configuration
-# file is located.
-#
-#INETD_CONF_PATH=/etc/inetd.conf
-
-#
-# Allow the following enabled inetd services.
-# Only one service per line (use multiple INETD_ALLOWED_SVC lines).
-#
-# Below are some Solaris 9 and 10 services that may want to be whitelisted.
-#
-#INETD_ALLOWED_SVC=echo
-#INETD_ALLOWED_SVC=/usr/dt/bin/rpc.ttdbserverd
-#INETD_ALLOWED_SVC=/usr/openwin/lib/fs.auto
-#INETD_ALLOWED_SVC=/usr/lib/smedia/rpc.smserverd
-#INETD_ALLOWED_SVC=/usr/sbin/rpc.metad
-#INETD_ALLOWED_SVC=/usr/sbin/rpc.metamhd
-#INETD_ALLOWED_SVC=/usr/sbin/rpc.metamedd
-#INETD_ALLOWED_SVC=/usr/sbin/rpc.mdcommd
-#INETD_ALLOWED_SVC=/usr/dt/bin/dtspcd
-#INETD_ALLOWED_SVC=/usr/dt/bin/rpc.cmsd
-#INETD_ALLOWED_SVC=/usr/lib/gss/gssd
-#INETD_ALLOWED_SVC=/usr/lib/ST/stfsloader
-#INETD_ALLOWED_SVC=/usr/lib/fs/cachefs/cachefsd
-#INETD_ALLOWED_SVC=/network/rpc/mdcomm
-#INETD_ALLOWED_SVC=/network/rpc/meta
-#INETD_ALLOWED_SVC=/network/rpc/metamed
-#INETD_ALLOWED_SVC=/network/rpc/metamh
-#INETD_ALLOWED_SVC=/network/security/ktkt_warn
-#INETD_ALLOWED_SVC=/application/x11/xfs
-#INETD_ALLOWED_SVC=/application/print/rfc1179
-#INETD_ALLOWED_SVC=/application/font/stfsloader
-#INETD_ALLOWED_SVC=/network/rpc-100235_1/rpc_ticotsord
-#INETD_ALLOWED_SVC=/network/rpc-100083_1/rpc_tcp
-#INETD_ALLOWED_SVC=/network/rpc-100068_2-5/rpc_udp
-
-#
-# This setting tells rkhunter where the xinetd configuration
-# file is located.
-#
-#XINETD_CONF_PATH=/etc/xinetd.conf
-
-#
-# Allow the following enabled xinetd services. Whilst it would be
-# nice to use the service names themselves, at the time of testing
-# we only have the pathname available. As such, these entries are
-# the xinetd file pathnames.
-# Only one service (file) per line (use multiple XINETD_ALLOWED_SVC lines).
-#
-XINETD_ALLOWED_SVC=/etc/xinetd.d/rsync
-XINETD_ALLOWED_SVC=/etc/xinetd.d/cvspserver
-XINETD_ALLOWED_SVC=/etc/xinetd.d/tftp
-XINETD_ALLOWED_SVC=/etc/xinetd.d/git-server
-XINETD_ALLOWED_SVC=/etc/xinetd.d/git
-XINETD_ALLOWED_SVC=/etc/xinetd.d/bzr-server
-
-#
-# This setting tells rkhunter the local system startup file pathnames.
-# More than one file may be present on the system, and so this option
-# can be a space-separated list. This setting will be worked out by
-# rkhunter, and so should not usually need to be set.
-#
-# If the system uses a directory of local startup scripts, then rather
-# that setting all the file names here, leave this setting blank, and
-# specify the directory name in SYSTEM_RC_DIR instead.
-#
-# If the system does not use a local startup script at all, then this
-# setting can be set to 'none'. Without this, rkhunter would give a
-# warning that no local startup script could be found.
-#
-#LOCAL_RC_PATH="/etc/rc.local /etc/rc.d/rc.sysinit"
-
-#
-# This setting tells rkhunter the local system startup file directory.
-# This setting will be worked out by rkhunter, and so should not usually
-# need to be set.
-#
-#SYSTEM_RC_DIR=/etc/rc.d
-
-#
-# This setting tells rkhunter the pathname to the file containing the
-# user account passwords. This setting will be worked out by rkhunter,
-# and so should not usually need to be set.
-#
-PASSWORD_FILE=/etc/shadow
-
-#
-# Allow the following accounts to be root equivalent. These accounts
-# will have a UID value of zero. This option is a space-separated list
-# of account names. The 'root' account does not need to be listed as it
-# is automatically whitelisted.
-#
-# Note: For *BSD systems you may need to enable this for the 'toor' account.
-#
-#UID0_ACCOUNTS="toor rooty"
-
-#
-# Allow the following accounts to have no password. This option is a
-# space-separated list of account names. NIS/YP entries do not need to
-# be listed as they are automatically whitelisted.
-#
-#PWDLESS_ACCOUNTS="abc"
-
-#
-# This setting tells rkhunter the pathname to the syslog configuration
-# file. This setting will be worked out by rkhunter, and so should not
-# usually need to be set.
-#
-#SYSLOG_CONFIG_FILE=/etc/syslog.conf
-
-#
-# This option permits the use of syslog remote logging.
-#
-ALLOW_SYSLOG_REMOTE_LOGGING=1
-
-#
-# Allow the following applications, or a specific version of an application,
-# to be whitelisted. This option is a space-separated list consisting of the
-# application names. If a specific version is to be whitelisted, then the
-# name must be followed by a colon and then the version number.
-#
-# For example: APP_WHITELIST="openssl:0.9.7d gpg"
-#
-APP_WHITELIST="sshd:4.3p2 sshd:5.2p1 httpd:2.2.3 httpd:2.2.13 php:5.1.6 named:9.3.6 openssl:0.9.8e php:5.2.6 named:9.3.6-P1"
-
-# 
-# Scan for suspicious files in directories containing temporary files and
-# directories posing a relatively higher risk due to user write access.
-# Please do not enable by default as suspscan is CPU and I/O intensive and prone to
-# producing false positives. Do review all settings before usage.
-# Also be aware that running suspscan in combination with verbose logging on,
-# RKH's default, will show all ignored files.
-# Please consider adding all directories the user the (web)server runs as has 
-# write access to including the document root (example: "/var/www") and log
-# directories (example: "/var/log/httpd"). 
-#
-# A space-separated list of directories to scan.
-#
-SUSPSCAN_DIRS="/tmp /var/tmp"
-
-#
-# Directory for temporary files. A memory-based one is better (faster).
-# Do not use a directory name that is listed in SUSPSCAN_DIRS.
-# Please make sure you have a tempfs mounted and the directory exists.
-#
-SUSPSCAN_TEMP=/dev/shm
-
-#
-# Maximum filesize in bytes. Files larger than this will not be inspected.
-# Do make sure you have enough space left in your temporary files directory.
-#
-SUSPSCAN_MAXSIZE=10240000
-
-#
-# Score threshold. Below this value no hits will be reported.
-# A value of "200" seems "good" after testing on malware. Please adjust
-# locally if necessary. 
-#
-SUSPSCAN_THRESH=200
-
-#
-# The following option can be used to whitelist network ports which
-# are known to have been used by malware. The option is a space-
-# separated list of one or more of three types of whitelisting.
-# These are:
-#
-#   1) a 'protocol:port' pair       (e.g. TCP:25)
-#   2) a pathname to an executable  (e.g. /usr/sbin/squid)
-#   3) an asterisk ('*')
-#
-# Only the UDP or TCP protocol may be specified, and the port number
-# must be between 1 and 65535 inclusive.
-#
-# The asterisk can be used to indicate that any executable in a trusted
-# path directory will be whitelisted. A trusted path directory is one which
-# rkhunter uses to locate commands. It is composed of the root PATH
-# environment variable, and the BINDIR command-line or configuration
-# file option.
-#
-# For example: PORT_WHITELIST="/home/user1/abc /opt/xyz TCP:2001 UDP:32011"
-#
-#PORT_WHITELIST=""
-
-#
-# The following option can be used to tell rkhunter where the operating
-# system 'release' file is located. This file contains information
-# specifying the current O/S version. RKH will store this information
-# itself, and check to see if it has changed between each run. If it has
-# changed, then the user is warned that RKH may issue warning messages
-# until RKH has been run with the '--propupd' option.
-#
-# Since the contents of the file vary according to the O/S distribution,
-# RKH will perform different actions when it detects the file itself. As
-# such, this option should not be set unless necessary. If this option is
-# specified, then RKH will assume the O/S release information is on the
-# first non-blank line of the file.
-#
-# {{ ansible_distribution|lower }}
-OS_VERSION_FILE=/etc/{{ ansible_distribution|lower }}-release
-
-#
-# The following two options can be used to whitelist files and directories
-# that would normally be flagged with a warning during the rootkit checks.
-# If the file or directory name contains a space, then the percent character
-# ('%') must be used instead. Only existing files and directories can be
-# specified.
-#
-#RTKT_DIR_WHITELIST=""
-#RTKT_FILE_WHITELIST=""
-
-#
-# To force rkhunter to use the supplied script for the 'stat' or 'readlink'
-# command, then the following two options can be used. The value must be
-# set to 'BUILTIN'.
-#
-# NOTE: IRIX users will probably need to enable STAT_CMD.
-#
-#STAT_CMD=BUILTIN
-#READLINK_CMD=BUILTIN
-
-INSTALLDIR=/usr
-SCRIPTWHITELIST=/usr/bin/whatis
-SCRIPTWHITELIST=/usr/bin/ldd
-SCRIPTWHITELIST=/usr/bin/groups
-SCRIPTWHITELIST=/usr/bin/GET
-SCRIPTWHITELIST=/sbin/ifup
-SCRIPTWHITELIST=/sbin/ifdown
diff --git a/files/rkhunter/rkhunter.sysconfig b/files/rkhunter/rkhunter.sysconfig
deleted file mode 100644
index 0c463db..0000000
--- a/files/rkhunter/rkhunter.sysconfig
+++ /dev/null
@@ -1,11 +0,0 @@
-# System configuration file for Rootkit Hunter which
-# stores RPM system specifics for cron run, etc.
-#
-#    MAILTO= <email address to send scan report>
-# DIAG_SCAN= no  - perform  normal  report scan
-#            yes - perform detailed report scan
-#                  (includes application check)
-
-MAILTO=smooge@xxxxxxxxxxxxxxxxx,kevin@xxxxxxxxxxxxxxxxx
-DIAG_SCAN=no
-
diff --git a/playbooks/groups/arm-packager.yml b/playbooks/groups/arm-packager.yml
index efdc0fa..e8008f9 100644
--- a/playbooks/groups/arm-packager.yml
+++ b/playbooks/groups/arm-packager.yml
@@ -11,6 +11,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -20,7 +23,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
 
   handlers:
diff --git a/playbooks/groups/arm-qa.yml b/playbooks/groups/arm-qa.yml
index af789b2..d9a745b 100644
--- a/playbooks/groups/arm-qa.yml
+++ b/playbooks/groups/arm-qa.yml
@@ -11,6 +11,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -20,7 +23,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
 
   handlers:
diff --git a/playbooks/groups/backup-server.yml b/playbooks/groups/backup-server.yml
index 965c8cb..8b95ebb 100644
--- a/playbooks/groups/backup-server.yml
+++ b/playbooks/groups/backup-server.yml
@@ -13,7 +13,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
-  tasks:
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -22,7 +24,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/mysql_server.yml
diff --git a/playbooks/groups/badges-backend.yml b/playbooks/groups/badges-backend.yml
index 77514dd..73aba95 100644
--- a/playbooks/groups/badges-backend.yml
+++ b/playbooks/groups/badges-backend.yml
@@ -29,6 +29,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -37,7 +40,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/openvpn_client.yml
diff --git a/playbooks/groups/badges-web.yml b/playbooks/groups/badges-web.yml
index c93eb85..15ae8df 100644
--- a/playbooks/groups/badges-web.yml
+++ b/playbooks/groups/badges-web.yml
@@ -32,6 +32,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -40,7 +43,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/openvpn_client.yml
diff --git a/playbooks/groups/beaker.yml b/playbooks/groups/beaker.yml
index ddd2dd2..1be9e9d 100644
--- a/playbooks/groups/beaker.yml
+++ b/playbooks/groups/beaker.yml
@@ -28,6 +28,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -38,7 +41,6 @@
   - include: $tasks/collectd/client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
 
diff --git a/playbooks/groups/gallery.yml b/playbooks/groups/gallery.yml
index 596ce8b..a99a438 100644
--- a/playbooks/groups/gallery.yml
+++ b/playbooks/groups/gallery.yml
@@ -29,6 +29,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -37,7 +40,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/fedmsg_base.yml
diff --git a/playbooks/groups/kernel-qa.yml b/playbooks/groups/kernel-qa.yml
index b08ebe3..4f2fdc7 100644
--- a/playbooks/groups/kernel-qa.yml
+++ b/playbooks/groups/kernel-qa.yml
@@ -12,6 +12,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -21,7 +24,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
 
diff --git a/playbooks/groups/keyserver.yml b/playbooks/groups/keyserver.yml
index d8a4ba7..0b9e190 100644
--- a/playbooks/groups/keyserver.yml
+++ b/playbooks/groups/keyserver.yml
@@ -29,6 +29,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -37,7 +40,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/fedmsg_base.yml
diff --git a/playbooks/groups/koji-hub.yml b/playbooks/groups/koji-hub.yml
index 4d26766..6b9725f 100644
--- a/playbooks/groups/koji-hub.yml
+++ b/playbooks/groups/koji-hub.yml
@@ -30,6 +30,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -38,7 +41,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/collectd/client.yml
diff --git a/playbooks/groups/mailman.yml b/playbooks/groups/mailman.yml
index d85eab8..cd3af1c 100644
--- a/playbooks/groups/mailman.yml
+++ b/playbooks/groups/mailman.yml
@@ -28,6 +28,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -38,7 +41,6 @@
   - include: $tasks/collectd/client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
 
diff --git a/playbooks/groups/mirrorlist.yml b/playbooks/groups/mirrorlist.yml
index a6bc4d1..dbc70ed 100644
--- a/playbooks/groups/mirrorlist.yml
+++ b/playbooks/groups/mirrorlist.yml
@@ -38,6 +38,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -49,7 +52,6 @@
   - include: $tasks/openvpn_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/apache.yml
diff --git a/playbooks/groups/postgresl-server.yml b/playbooks/groups/postgresl-server.yml
index d95801d..44f9934 100644
--- a/playbooks/groups/postgresl-server.yml
+++ b/playbooks/groups/postgresl-server.yml
@@ -30,7 +30,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
-  tasks:
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -39,7 +41,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/collectd/client.yml
diff --git a/playbooks/groups/sign.yml b/playbooks/groups/sign.yml
index c287286..1c5c64d 100644
--- a/playbooks/groups/sign.yml
+++ b/playbooks/groups/sign.yml
@@ -19,9 +19,11 @@
   tasks:
   - include: $tasks/base.yml
   - include: $tasks/serialgetty.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/motd.yml
   - include: $tasks/sign_setup.yml
 
+  roles:
+  - rkhunter
+
   handlers:
   - include: $handlers/restart_services.yml
diff --git a/playbooks/groups/taskbot.yml b/playbooks/groups/taskbot.yml
index 5c4e24a..47bb3a2 100644
--- a/playbooks/groups/taskbot.yml
+++ b/playbooks/groups/taskbot.yml
@@ -28,6 +28,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
+  roles:
+  - rkhunter
+
   tasks:
   # this is how you include other task lists
   - include: $tasks/hosts.yml
@@ -38,7 +41,6 @@
   - include: $tasks/collectd/client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
 
diff --git a/playbooks/groups/virthost.yml b/playbooks/groups/virthost.yml
index 5d5b22c..6d22a47 100644
--- a/playbooks/groups/virthost.yml
+++ b/playbooks/groups/virthost.yml
@@ -12,7 +12,9 @@
    - ${private}/vars.yml
    - ${vars}/${ansible_distribution}.yml
 
-  tasks:
+  roles:
+  - rkhunter
+
   tasks:
   - include: $tasks/hosts.yml
   - include: $tasks/yumrepos.yml
@@ -21,7 +23,6 @@
   - include: $tasks/2fa_client.yml
   - include: $tasks/motd.yml
   - include: $tasks/sudo.yml
-  - include: $tasks/rkhunter.yml
   - include: $tasks/denyhosts.yml
   - include: $tasks/nagios_client.yml
   - include: $tasks/collectd/client.yml
diff --git a/playbooks/rkhunter_update.yml b/playbooks/rkhunter_update.yml
index a47d6bf..c69ea64 100644
--- a/playbooks/rkhunter_update.yml
+++ b/playbooks/rkhunter_update.yml
@@ -6,20 +6,20 @@
 
   tasks:
   - name: expire-caches
-    action: command yum clean expire-cache
+    command: yum clean expire-cache
     
   - name: yum -y ${yumcommand}
-    action: command yum -y ${yumcommand}
+    command: yum -y ${yumcommand}
     async: 7200
     poll: 15
 
   - name: check for rkhunter
-    action: command /usr/bin/test -f /usr/bin/rkhunter
+    command: /usr/bin/test -f /usr/bin/rkhunter
     register: rkhunter
     ignore_errors: true
   
   - name: run rkhunter --propupd
-    action: command /usr/bin/rkhunter --propupd
+    command: /usr/bin/rkhunter --propupd
     when: rkhunter|success
 
 
diff --git a/roles/rkhunter/files/rkhunter.conf.j2 b/roles/rkhunter/files/rkhunter.conf.j2
new file mode 100644
index 0000000..7055175
--- /dev/null
+++ b/roles/rkhunter/files/rkhunter.conf.j2
@@ -0,0 +1,590 @@
+#
+# This is the configuration file for Rootkit Hunter.
+#
+# Please modify it to your own requirements.
+# Please review the documentation before posting bug reports or questions.
+# To report bugs, obtain updates, or provide patches or comments, please go to:
+# http://rkhunter.sourceforge.net
+#
+# To ask questions about rkhunter, please use the rkhunter-users mailing list.
+# Note this is a moderated list: please subscribe before posting.
+#
+# Lines beginning with a hash (#), and blank lines, will be ignored.
+#
+# Most of the following options need only be specified once. If
+# they appear more than once, then the last one seen will be used.
+# Some options are allowed to appear more than once, and the text
+# describing the option will say if this is so.
+#
+
+#
+# If this option is set to 1, it specifies that the mirrors file, which
+# is used when the '--update' and '--versioncheck' options are used, is
+# to be rotated. Rotating the entries in the file allows a basic form
+# of load-balancing between the mirror sites whenever the above options
+# are used.
+# If the option is set to 0, then the mirrors will be treated as if in
+# a priority list. That is, the first mirror will always be used. The
+# second mirror will only be used if the first mirror fails, then the
+# third mirror will be used if the second fails and so on.
+#
+
+ROTATE_MIRRORS=1
+
+#
+# If this option is set to 1, it specifies that when the '--update'
+# option is used, then the mirrors file is to be checked for updates
+# as well. If the current mirrors file contains any local mirrors,
+# these will be prepended to the updated file.
+# If this option is set to 0, the mirrors file can only be updated
+# manually. This may be useful if only using local mirrors.
+#
+UPDATE_MIRRORS=1
+
+#
+# The MIRRORS_MODE option tells rkhunter which mirrors are to be
+# used when the '--update' or '--versioncheck' command-line options
+# are given. Possible values are:
+#     0 - use any mirror (the default)
+#     1 - only use local mirrors
+#     2 - only use remote mirrors
+#
+# Local and remote mirrors can be defined in the mirrors.dat file
+# by using the 'local=' and 'remote=' keywords respectively.
+#
+MIRRORS_MODE=0
+
+#
+# Email a message to this address if a warning is found when the
+# system is being checked. Multiple addresses may be specified
+# simply be separating them with a space.
+#
+MAIL-ON-WARNING=""
+
+#
+# Specify the mail command to use if MAIL-ON-WARNING is set.
+# NOTE: Double quotes are not required around the command, but
+# are required around the subject line if it contains spaces.
+#
+MAIL_CMD=mail -s "[rkhunter] Warnings found for ${HOST_NAME}"
+
+#
+# Specify the temporary directory to use.
+#
+# NOTE: Do not use /tmp as your temporary directory. Some
+# important files will be written to this directory, so be
+# sure that the directory permissions are tight.
+#
+TMPDIR=/var/lib/rkhunter
+
+#
+# Specify the database directory to use.
+#
+DBDIR=/var/lib/rkhunter/db
+
+#
+# Specify the script directory to use.
+#
+SCRIPTDIR=/usr/share/rkhunter/scripts
+
+#
+# Specify the root directory to use.
+#
+#ROOTDIR=""
+
+#
+# Specify the command directories to be checked. This is a
+# space-separated list of directories.
+#
+BINDIR="/bin /usr/bin /sbin /usr/sbin /usr/local/bin /usr/local/sbin /usr/libexec /usr/local/libexec"
+
+#
+# Specify the language to use. This should be similar
+# to the ISO 639 language code.
+#
+# NOTE: Please ensure that the language you specify is supported.
+#       For a list of supported languages use the following command:
+#
+#           rkhunter --lang en --list languages
+#
+#LANGUAGE=en
+
+#
+# Specify the log file pathname.
+#
+LOGFILE=/var/log/rkhunter/rkhunter.log
+
+#
+# Set the following option to 1 if the log file is to be appended to
+# whenever rkhunter is run.
+#
+
+
+#
+# Set the following option to enable the rkhunter check start and finish
+# times to be logged by syslog. Warning messages will also be logged.
+# The value of the option must be a standard syslog facility and
+# priority, separated by a dot.
+#
+# For example: USE_SYSLOG=authpriv.warning
+#
+# Setting the value to 'none', or just leaving the option commented out,
+# disables the use of syslog.
+#
+USE_SYSLOG=authpriv.notice
+
+#
+# Set the following option to 1 if the second colour set is to be used.
+# This can be useful if your screen uses black characters on a white
+# background (for example, a PC instead of a server).
+#
+COLOR_SET2=0
+
+#
+# Set the following option to 0 if rkhunter should not detect if X is
+# being used. If X is detected as being used, then the second colour
+# set will automatically be used.
+#
+AUTO_X_DETECT=1
+
+#
+# The following option is checked against the SSH configuration file
+# 'PermitRootLogin' option. A warning will be displayed if they do not
+# match. However, if a value has not been set in the SSH configuration
+# file, then a value here of 'yes' or 'unset' will not cause a warning.
+# This option has a default value of 'no'.
+#
+ALLOW_SSH_ROOT_USER=without-password
+
+#
+# Set this option to '1' to allow the use of the SSH-1 protocol, but note
+# that theoretically it is weaker, and therefore less secure, than the
+# SSH-2 protocol. Do not modify this option unless you have good reasons
+# to use the SSH-1 protocol (for instance for AFS token passing or Kerberos4
+# authentication). If the 'Protocol' option has not been set in the SSH
+# configuration file, then a value of '2' may be set here in order to
+# suppress a warning message. This option has a default value of '0'.
+#
+ALLOW_SSH_PROT_V1=0
+
+#
+# This setting tells rkhunter the directory containing the SSH configuration
+# file. This setting will be worked out by rkhunter, and so should not
+# usually need to be set.
+#
+#SSH_CONFIG_DIR=/etc/ssh
+
+#
+# These two options determine which tests are to be performed.
+# The ENABLE_TESTS option can use the word 'all' to refer to all the
+# available tests. The DISABLE_TESTS option can use the word 'none' to
+# mean that no tests are disabled. The list of disabled tests is applied to
+# the list of enabled tests. Both options are space-separated lists of test
+# names. The currently available test names can be seen by using the command
+# 'rkhunter --list tests'.
+#
+# The program defaults are to enable all tests and disable none. However, if
+# either option is specified in this file, then it overrides the program
+# default. The supplied rkhunter.conf file has some tests already disabled,
+# and these are tests that will be used only incidentally, can be considered
+# "advanced" or those that are prone to produce more than the "average" number
+# of "false positives".
+#
+# Please read the README file for more details about enabling and disabling
+# tests, the test names, and how rkhunter behaves when these options are used.
+#
+ENABLE_TESTS="all"
+DISABLE_TESTS="suspscan hidden_procs deleted_files packet_cap_apps apps"
+
+#
+# The HASH_FUNC option can be used to specify the command to use
+# for the file hash value check. It can be specified as just
+# the command name or the full pathname. Systems using prelinking
+# are restricted to using either SHA1 or MD5 functions. To get rkhunter
+# to look for the sha1(sum)/md5(sum) command, or to use the supplied
+# perl scripts, simply specify this option as 'SHA1' or 'MD5' in
+# uppercase. The default is SHA1, or MD5 if SHA1 cannot be found.
+#
+# A value of 'NONE' (in uppercase) can be specified to indicate that
+# no hash function should be used. Rootkit Hunter will detect this and
+# automatically disable the file hash checks.
+#
+# Examples:
+#   For Solaris 9 : HASH_FUNC=gmd5sum
+#   For Solaris 10: HASH_FUNC=sha1sum
+#   For AIX (>5.2): HASH_FUNC="csum -hMD5"
+#   For NetBSD    : HASH_FUNC="cksum -a sha512"
+#
+# NOTE: If the hash function is changed then you MUST run rkhunter with
+#       the '--propupd' option to rebuild the file properties database.
+#
+HASH_FUNC=sha1sum
+
+#
+# The HASH_FLD_IDX option specifies which field from the HASH_FUNC
+# command output contains the hash value. The fields are assumed to
+# be space-separated. The default value is one, but for *BSD users
+# rkhunter will, by default, use a value of 4 if the HASH_FUNC option
+# has not been set. The option value must be a positive integer.
+#
+#HASH_FLD_IDX=4
+
+#
+# The PKGMGR option tells rkhunter to use the specified package manager
+# to obtain the file property information. This is used when updating
+# the file properties file 'rkhunter.dat', and when running the file
+# properties check. For RedHat/RPM-based systems, 'RPM' can be used
+# to get information from the RPM database. For Debian-based systems
+# 'DPKG' can be used, and for *BSD systems 'BSD' can be used.
+# No value, or a value of 'NONE', indicates that no package manager
+# is to be used. The default is 'NONE'.
+#
+# The current package managers store the file hash values using an
+# MD5 hash function.
+#
+# The 'DPKG' and 'BSD' package managers only provide MD5 hash values.
+# The 'RPM' package manager additionally provides values for the inode,
+# file permissions, uid, gid and other values.
+#
+# For any file not part of a package, rkhunter will revert to using
+# the HASH_FUNC hash function instead.
+#
+PKGMGR=RPM
+
+#
+# Whitelist various attributes of the specified files.
+# The attributes are those of the 'attributes' test.
+# Specifying a file name here does not include it being
+# whitelisted for the write permission test below.
+# One command per line (use multiple ATTRWHITELIST lines).
+#
+#ATTRWHITELIST=/bin/ps
+
+#
+# Allow the specified commands to have the 'others'
+# (world) permission have the write-bit set.
+#
+# For example, files with permissions r-xr-xrwx
+# or rwxrwxrwx.
+#
+# One command per line (use multiple WRITEWHITELIST lines).
+#
+#WRITEWHITELIST=/bin/ps
+
+#
+# Allow the specified commands to be scripts.
+# One command per line (use multiple SCRIPTWHITELIST lines).
+#
+#SCRIPTWHITELIST=/sbin/ifup
+#SCRIPTWHITELIST=/sbin/ifdown
+#SCRIPTWHITELIST=/usr/bin/groups
+
+#
+# Allow the specified commands to have the immutable attribute set.
+# One command per line (use multiple IMMUTWHITELIST lines).
+#
+#IMMUTWHITELIST=/sbin/ifup
+
+#
+# Allow the specified hidden directories.
+# One directory per line (use multiple ALLOWHIDDENDIR lines).
+#
+ALLOWHIDDENDIR=/dev/.udev
+ALLOWHIDDENDIR=/dev/.mdadm
+ALLOWHIDDENDIR=/dev/.systemd
+ALLOWHIDDENDIR=/dev/.mount
+ALLOWHIDDENDIR=/dev/.udevdb
+ALLOWHIDDENDIR=/dev/.udev.tdb
+ALLOWHIDDENDIR=/dev/.udev/db
+ALLOWHIDDENDIR=/dev/.udev/rules.d
+
+#
+# Allow the specified hidden files.
+# One file per line (use multiple ALLOWHIDDENFILE lines).
+# 
+ALLOWHIDDENFILE=/usr/share/man/man1/..1.gz
+ALLOWHIDDENFILE=/usr/bin/.ssh-add.hmac
+ALLOWHIDDENFILE=/usr/bin/.ssh-agent.hmac
+ALLOWHIDDENFILE=/usr/bin/.ssh-keyscan.hmac
+ALLOWHIDDENFILE=/usr/bin/.ssh-keygen.hmac
+ALLOWHIDDENFILE=/usr/bin/.ssh.hmac
+ALLOWHIDDENFILE=/usr/bin/.fipscheck.hmac
+ALLOWHIDDENFILE=/usr/sbin/.sshd.hmac
+ALLOWHIDDENFILE=/usr/share/man/man5/.k5login.5.gz
+ALLOWHIDDENFILE=/usr/share/man/man5/.k5identity.5.gz
+ALLOWHIDDENFILE=/sbin/.cryptsetup.hmac
+ALLOWHIDDENFILE=/dev/.udev/queue.bin
+ALLOWHIDDENFILE=/dev/.udev/uevent_seqnum
+
+#
+# Allow the specified processes to use deleted files.
+# One process per line (use multiple ALLOWPROCDELFILE lines).
+#
+#ALLOWPROCDELFILE=/sbin/cardmgr
+#ALLOWPROCDELFILE=/usr/sbin/gpm
+#ALLOWPROCDELFILE=/usr/libexec/gconfd-2
+#ALLOWPROCDELFILE=/usr/sbin/mysqld
+
+#
+# Allow the specified processes to listen on any network interface.
+# One process per line (use multiple ALLOWPROCLISTEN lines).
+#
+#ALLOWPROCLISTEN=/sbin/dhclient
+#ALLOWPROCLISTEN=/usr/bin/dhcpcd
+#ALLOWPROCLISTEN=/usr/sbin/pppoe
+#ALLOWPROCLISTEN=/usr/sbin/tcpdump
+#ALLOWPROCLISTEN=/usr/sbin/snort-plain
+#ALLOWPROCLISTEN=/usr/local/bin/wpa_supplicant
+
+#
+# SCAN_MODE_DEV governs how we scan /dev for suspicious files.
+# The two allowed options are: THOROUGH or LAZY.
+# If commented out we do a THOROUGH scan which will increase the runtime.
+# Even though this adds to the running time it is highly recommended to
+# leave it like this.
+#
+#SCAN_MODE_DEV=THOROUGH
+
+#
+# Allow the specified files to be present in the /dev directory,
+# and not regarded as suspicious. One file per line (use multiple
+# ALLOWDEVFILE lines).
+#
+#ALLOWDEVFILE=/dev/abc
+#ALLOWDEVFILE=/dev/shm/pulse-shm-*
+ALLOWDEVFILE=/dev/shm/sem.slapd-FEDORAPROJECT-ORG.stats
+ALLOWDEVFILE=/dev/md/md-device-map
+ALLOWDEVFILE=/dev/.udev/queue.bin
+ALLOWDEVFILE=/dev/.udev/db/*
+ALLOWDEVFILE=/dev/.udev/rules.d/99-root.rules
+ALLOWDEVFILE=/dev/.udev/uevent_seqnum
+ALLOWDEVFILE=/dev/md/autorebuild.pid
+
+#
+# This setting tells rkhunter where the inetd configuration
+# file is located.
+#
+#INETD_CONF_PATH=/etc/inetd.conf
+
+#
+# Allow the following enabled inetd services.
+# Only one service per line (use multiple INETD_ALLOWED_SVC lines).
+#
+# Below are some Solaris 9 and 10 services that may want to be whitelisted.
+#
+#INETD_ALLOWED_SVC=echo
+#INETD_ALLOWED_SVC=/usr/dt/bin/rpc.ttdbserverd
+#INETD_ALLOWED_SVC=/usr/openwin/lib/fs.auto
+#INETD_ALLOWED_SVC=/usr/lib/smedia/rpc.smserverd
+#INETD_ALLOWED_SVC=/usr/sbin/rpc.metad
+#INETD_ALLOWED_SVC=/usr/sbin/rpc.metamhd
+#INETD_ALLOWED_SVC=/usr/sbin/rpc.metamedd
+#INETD_ALLOWED_SVC=/usr/sbin/rpc.mdcommd
+#INETD_ALLOWED_SVC=/usr/dt/bin/dtspcd
+#INETD_ALLOWED_SVC=/usr/dt/bin/rpc.cmsd
+#INETD_ALLOWED_SVC=/usr/lib/gss/gssd
+#INETD_ALLOWED_SVC=/usr/lib/ST/stfsloader
+#INETD_ALLOWED_SVC=/usr/lib/fs/cachefs/cachefsd
+#INETD_ALLOWED_SVC=/network/rpc/mdcomm
+#INETD_ALLOWED_SVC=/network/rpc/meta
+#INETD_ALLOWED_SVC=/network/rpc/metamed
+#INETD_ALLOWED_SVC=/network/rpc/metamh
+#INETD_ALLOWED_SVC=/network/security/ktkt_warn
+#INETD_ALLOWED_SVC=/application/x11/xfs
+#INETD_ALLOWED_SVC=/application/print/rfc1179
+#INETD_ALLOWED_SVC=/application/font/stfsloader
+#INETD_ALLOWED_SVC=/network/rpc-100235_1/rpc_ticotsord
+#INETD_ALLOWED_SVC=/network/rpc-100083_1/rpc_tcp
+#INETD_ALLOWED_SVC=/network/rpc-100068_2-5/rpc_udp
+
+#
+# This setting tells rkhunter where the xinetd configuration
+# file is located.
+#
+#XINETD_CONF_PATH=/etc/xinetd.conf
+
+#
+# Allow the following enabled xinetd services. Whilst it would be
+# nice to use the service names themselves, at the time of testing
+# we only have the pathname available. As such, these entries are
+# the xinetd file pathnames.
+# Only one service (file) per line (use multiple XINETD_ALLOWED_SVC lines).
+#
+XINETD_ALLOWED_SVC=/etc/xinetd.d/rsync
+XINETD_ALLOWED_SVC=/etc/xinetd.d/cvspserver
+XINETD_ALLOWED_SVC=/etc/xinetd.d/tftp
+XINETD_ALLOWED_SVC=/etc/xinetd.d/git-server
+XINETD_ALLOWED_SVC=/etc/xinetd.d/git
+XINETD_ALLOWED_SVC=/etc/xinetd.d/bzr-server
+
+#
+# This setting tells rkhunter the local system startup file pathnames.
+# More than one file may be present on the system, and so this option
+# can be a space-separated list. This setting will be worked out by
+# rkhunter, and so should not usually need to be set.
+#
+# If the system uses a directory of local startup scripts, then rather
+# that setting all the file names here, leave this setting blank, and
+# specify the directory name in SYSTEM_RC_DIR instead.
+#
+# If the system does not use a local startup script at all, then this
+# setting can be set to 'none'. Without this, rkhunter would give a
+# warning that no local startup script could be found.
+#
+#LOCAL_RC_PATH="/etc/rc.local /etc/rc.d/rc.sysinit"
+
+#
+# This setting tells rkhunter the local system startup file directory.
+# This setting will be worked out by rkhunter, and so should not usually
+# need to be set.
+#
+#SYSTEM_RC_DIR=/etc/rc.d
+
+#
+# This setting tells rkhunter the pathname to the file containing the
+# user account passwords. This setting will be worked out by rkhunter,
+# and so should not usually need to be set.
+#
+PASSWORD_FILE=/etc/shadow
+
+#
+# Allow the following accounts to be root equivalent. These accounts
+# will have a UID value of zero. This option is a space-separated list
+# of account names. The 'root' account does not need to be listed as it
+# is automatically whitelisted.
+#
+# Note: For *BSD systems you may need to enable this for the 'toor' account.
+#
+#UID0_ACCOUNTS="toor rooty"
+
+#
+# Allow the following accounts to have no password. This option is a
+# space-separated list of account names. NIS/YP entries do not need to
+# be listed as they are automatically whitelisted.
+#
+#PWDLESS_ACCOUNTS="abc"
+
+#
+# This setting tells rkhunter the pathname to the syslog configuration
+# file. This setting will be worked out by rkhunter, and so should not
+# usually need to be set.
+#
+#SYSLOG_CONFIG_FILE=/etc/syslog.conf
+
+#
+# This option permits the use of syslog remote logging.
+#
+ALLOW_SYSLOG_REMOTE_LOGGING=1
+
+#
+# Allow the following applications, or a specific version of an application,
+# to be whitelisted. This option is a space-separated list consisting of the
+# application names. If a specific version is to be whitelisted, then the
+# name must be followed by a colon and then the version number.
+#
+# For example: APP_WHITELIST="openssl:0.9.7d gpg"
+#
+APP_WHITELIST="sshd:4.3p2 sshd:5.2p1 httpd:2.2.3 httpd:2.2.13 php:5.1.6 named:9.3.6 openssl:0.9.8e php:5.2.6 named:9.3.6-P1"
+
+# 
+# Scan for suspicious files in directories containing temporary files and
+# directories posing a relatively higher risk due to user write access.
+# Please do not enable by default as suspscan is CPU and I/O intensive and prone to
+# producing false positives. Do review all settings before usage.
+# Also be aware that running suspscan in combination with verbose logging on,
+# RKH's default, will show all ignored files.
+# Please consider adding all directories the user the (web)server runs as has 
+# write access to including the document root (example: "/var/www") and log
+# directories (example: "/var/log/httpd"). 
+#
+# A space-separated list of directories to scan.
+#
+SUSPSCAN_DIRS="/tmp /var/tmp"
+
+#
+# Directory for temporary files. A memory-based one is better (faster).
+# Do not use a directory name that is listed in SUSPSCAN_DIRS.
+# Please make sure you have a tempfs mounted and the directory exists.
+#
+SUSPSCAN_TEMP=/dev/shm
+
+#
+# Maximum filesize in bytes. Files larger than this will not be inspected.
+# Do make sure you have enough space left in your temporary files directory.
+#
+SUSPSCAN_MAXSIZE=10240000
+
+#
+# Score threshold. Below this value no hits will be reported.
+# A value of "200" seems "good" after testing on malware. Please adjust
+# locally if necessary. 
+#
+SUSPSCAN_THRESH=200
+
+#
+# The following option can be used to whitelist network ports which
+# are known to have been used by malware. The option is a space-
+# separated list of one or more of three types of whitelisting.
+# These are:
+#
+#   1) a 'protocol:port' pair       (e.g. TCP:25)
+#   2) a pathname to an executable  (e.g. /usr/sbin/squid)
+#   3) an asterisk ('*')
+#
+# Only the UDP or TCP protocol may be specified, and the port number
+# must be between 1 and 65535 inclusive.
+#
+# The asterisk can be used to indicate that any executable in a trusted
+# path directory will be whitelisted. A trusted path directory is one which
+# rkhunter uses to locate commands. It is composed of the root PATH
+# environment variable, and the BINDIR command-line or configuration
+# file option.
+#
+# For example: PORT_WHITELIST="/home/user1/abc /opt/xyz TCP:2001 UDP:32011"
+#
+#PORT_WHITELIST=""
+
+#
+# The following option can be used to tell rkhunter where the operating
+# system 'release' file is located. This file contains information
+# specifying the current O/S version. RKH will store this information
+# itself, and check to see if it has changed between each run. If it has
+# changed, then the user is warned that RKH may issue warning messages
+# until RKH has been run with the '--propupd' option.
+#
+# Since the contents of the file vary according to the O/S distribution,
+# RKH will perform different actions when it detects the file itself. As
+# such, this option should not be set unless necessary. If this option is
+# specified, then RKH will assume the O/S release information is on the
+# first non-blank line of the file.
+#
+# {{ ansible_distribution|lower }}
+OS_VERSION_FILE=/etc/{{ ansible_distribution|lower }}-release
+
+#
+# The following two options can be used to whitelist files and directories
+# that would normally be flagged with a warning during the rootkit checks.
+# If the file or directory name contains a space, then the percent character
+# ('%') must be used instead. Only existing files and directories can be
+# specified.
+#
+#RTKT_DIR_WHITELIST=""
+#RTKT_FILE_WHITELIST=""
+
+#
+# To force rkhunter to use the supplied script for the 'stat' or 'readlink'
+# command, then the following two options can be used. The value must be
+# set to 'BUILTIN'.
+#
+# NOTE: IRIX users will probably need to enable STAT_CMD.
+#
+#STAT_CMD=BUILTIN
+#READLINK_CMD=BUILTIN
+
+INSTALLDIR=/usr
+SCRIPTWHITELIST=/usr/bin/whatis
+SCRIPTWHITELIST=/usr/bin/ldd
+SCRIPTWHITELIST=/usr/bin/groups
+SCRIPTWHITELIST=/usr/bin/GET
+SCRIPTWHITELIST=/sbin/ifup
+SCRIPTWHITELIST=/sbin/ifdown
diff --git a/roles/rkhunter/files/rkhunter.sysconfig b/roles/rkhunter/files/rkhunter.sysconfig
new file mode 100644
index 0000000..0c463db
--- /dev/null
+++ b/roles/rkhunter/files/rkhunter.sysconfig
@@ -0,0 +1,11 @@
+# System configuration file for Rootkit Hunter which
+# stores RPM system specifics for cron run, etc.
+#
+#    MAILTO= <email address to send scan report>
+# DIAG_SCAN= no  - perform  normal  report scan
+#            yes - perform detailed report scan
+#                  (includes application check)
+
+MAILTO=smooge@xxxxxxxxxxxxxxxxx,kevin@xxxxxxxxxxxxxxxxx
+DIAG_SCAN=no
+
diff --git a/roles/rkhunter/tasks/main.yml b/roles/rkhunter/tasks/main.yml
new file mode 100644
index 0000000..4bec0f7
--- /dev/null
+++ b/roles/rkhunter/tasks/main.yml
@@ -0,0 +1,18 @@
+---
+
+- name: install rkhunter
+  yum: name=rkhunter state=present
+  tags:
+  - packages
+
+- name: rkhunter.conf
+  template: src=rkhunter.conf.j2 dest=/etc/rkhunter.conf mode=0640
+  tags:
+  - config
+
+- name: rkhunter sysconfig
+  copy: src=rkhunter.sysconfig dest=/etc/sysconfig/rkhunter mode=0640
+  tags:
+  - config
+
+
diff --git a/tasks/rkhunter.yml b/tasks/rkhunter.yml
deleted file mode 100644
index 325315b..0000000
--- a/tasks/rkhunter.yml
+++ /dev/null
@@ -1,18 +0,0 @@
----
-
-- name: install rkhunter
-  yum: name=rkhunter state=present
-  tags:
-  - packages
-
-- name: rkhunter.conf
-  template: src=$files/rkhunter/rkhunter.conf.j2 dest=/etc/rkhunter.conf mode=0640
-  tags:
-  - config
-
-- name: rkhunter sysconfig
-  copy: src=$files/rkhunter/rkhunter.sysconfig dest=/etc/sysconfig/rkhunter mode=0640
-  tags:
-  - config
-
-
-- 
1.8.3.1

_______________________________________________
infrastructure mailing list
infrastructure@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/infrastructure





[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux