This file is indexed.

/usr/share/doc/samhain/manual.html/portcheck.html is in samhain 3.1.0-5ubuntu1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN""http://www.w3.org/TR/html4/loose.dtd">
<HTML
><HEAD
><TITLE
>Checking for open ports</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.79"><LINK
REL="HOME"
TITLE="The Samhain Host Integrity Monitoring System"
HREF="index.html"><LINK
REL="UP"
TITLE="Configuring samhain, the host integrity monitor"
HREF="file-monitor.html"><LINK
REL="PREVIOUS"
TITLE="Checking for hidden/fake/missing processes"
HREF="processcheck.html"><LINK
REL="NEXT"
TITLE="Logfile monitoring/analysis"
HREF="logmon.html"><LINK
REL="STYLESHEET"
TYPE="text/css"
HREF="./docbook.css"></HEAD
><BODY
CLASS="SECT1"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><!--#if expr="! ($HTTP_USER_AGENT = /MSIE/)"--><!--#include virtual="/resources/ssi/header.html"--><!--#endif --><DIV
CLASS="NAVHEADER"
><TABLE
SUMMARY="Header navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>The Samhain Host Integrity Monitoring System</TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="processcheck.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
>Chapter 5. Configuring <SPAN
CLASS="APPLICATION"
>samhain</SPAN
>, the host integrity monitor</TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="logmon.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="SECT1"
><H1
CLASS="SECT1"
><A
NAME="PORTCHECK"
>5.15. Checking for open ports</A
></H1
><P
>  To compile with support for this option, use the configure option 
  </P
><P
>  <B
CLASS="COMMAND"
>./configure --enable-port-check</B
>
  </P
><P
>  This module enables <SPAN
CLASS="APPLICATION"
>samhain</SPAN
> to check for
  open ports (services) on the local machine, and report ports that are 
  open, but not listed in the configuration. Reports are like:
  </P
><P
></P
><DIV
CLASS="VARIABLELIST"
><DL
><DT
>interface:portnumber/protocol (maybe_servicename)</DT
><DD
><P
>     This is a non-RPC service, e.g. 192.168.1.2:22/tcp (maybe_ssh).
     The service name is taken from <TT
CLASS="FILENAME"
>/etc/services</TT
>,
     and prepended by <SPAN
CLASS="emphasis"
><I
CLASS="EMPHASIS"
>maybe_</I
></SPAN
>, because
     <SPAN
CLASS="APPLICATION"
>samhain</SPAN
> cannot determine whether it really
     is the SSH daemon that is listening on this port.
     </P
></DD
><DT
>interface:portnumber/protocol (servicename)</DT
><DD
><P
>     This is an RPC service, e.g. 192.168.1.2:2049/tcp (nfs).
     The service name is obtained by querying the portmapper daemon.
     The portmapper daemon may return a service name as listed in
     <TT
CLASS="FILENAME"
>/etc/rpc</TT
>, or just a number (if there is no name
     for the service). If the portmapper daemon only returns the number
     of the RPC service, samhain will list <SPAN
CLASS="emphasis"
><I
CLASS="EMPHASIS"
>RPC_number</I
></SPAN
>
     as servicename.
     </P
></DD
></DL
></DIV
><DIV
CLASS="SECT2"
><H2
CLASS="SECT2"
><A
NAME="AEN2782"
>5.15.1. Options</A
></H2
><P
>  By default, (only) the interface corresponding to the 'official name' of
  the host will be scanned. Additional interfaces can be added via the 
  option 
  <B
CLASS="COMMAND"
>PortCheckInterface=<TT
CLASS="REPLACEABLE"
><I
>(list of) IP address(es)</I
></TT
></B
>,
  where 'IP address' is the address of the interface that should be scanned.
  You can use this options multiple times to specify up to 15 additional 
  interfaces, or supply a list of interfaces.
  </P
><DIV
CLASS="NOTE"
><P
></P
><TABLE
CLASS="NOTE"
WIDTH="100%"
BORDER="0"
><TR
><TD
WIDTH="25"
ALIGN="CENTER"
VALIGN="TOP"
><IMG
SRC="./stylesheet-images/note.gif"
HSPACE="5"
ALT="Note"></TD
><TH
ALIGN="LEFT"
VALIGN="MIDDLE"
><B
>Don't specify external interfaces</B
></TH
></TR
><TR
><TD
>&nbsp;</TD
><TD
ALIGN="LEFT"
VALIGN="TOP"
><P
>  While it is possible to misuse this option to specify an external 
  IP address, the check will only work for interfaces on the local machine.
  </P
></TD
></TR
></TABLE
></DIV
><P
>  Services (open ports) that are required or optional (allowed, but not
  required) can be specified with the options
  <B
CLASS="COMMAND"
>PortCheckRequired=<TT
CLASS="REPLACEABLE"
><I
>interface:service list</I
></TT
></B
>, and/or
  <B
CLASS="COMMAND"
>PortCheckOptional=<TT
CLASS="REPLACEABLE"
><I
>interface:service list</I
></TT
></B
>.
  </P
><P
>  Services (open ports) that should be completely ignored can be specified with the option
  <B
CLASS="COMMAND"
>PortCheckIgnore=<TT
CLASS="REPLACEABLE"
><I
>interface:service list</I
></TT
></B
>.
  </P
><P
>  Here, 'interface' should be the IP address of an 
  interface, and 'service list'
  the comma-separated list of required/optional services. Each service
  must be listed as 'port/protocol' (e.g. 22/tcp) for a non-RPC service,
  and 'name/protocol' for an RPC service (e.g. portmapper/tcp). If an 
  RPC service has no name, but just an RPC program number, then the
  name must be given as 'RPC_number' (e.g. RPC_100075).
  </P
><P
>  By default, both TCP and UDP ports are scanned. To disable UDP scanning,
  the option 
  <B
CLASS="COMMAND"
>PortCheckUDP=<TT
CLASS="REPLACEABLE"
><I
>boolean</I
></TT
></B
>
  can be used.
  </P
><P
>  Ports that should be skipped during the check can be specified with 
  the option
  <B
CLASS="COMMAND"
>PortCheckSkip=<TT
CLASS="REPLACEABLE"
><I
>interface:port list</I
></TT
></B
>.
  </P
><P
>  Here, 'interface' should be the IP address of an 
  interface, and 'service list'
  the comma-separated list 'port/protocol' pairs (e.g.: 22/tcp,514/udp,...) 
  to skip.
  </P
><P
>  This option is different from <B
CLASS="COMMAND"
>PortCheckIgnore=...</B
> in 
  two ways:
  (i) since it allows
  to skip ports only, it does not work for RPC services which have no fixed 
  port, and (ii) since the port is not probed, you can avoid error messages by
  obnoxious deamons.
  </P
><DIV
CLASS="TIP"
><P
></P
><TABLE
CLASS="TIP"
WIDTH="100%"
BORDER="0"
><TR
><TD
WIDTH="25"
ALIGN="CENTER"
VALIGN="TOP"
><IMG
SRC="./stylesheet-images/tip.gif"
HSPACE="5"
ALT="Tip"></TD
><TH
ALIGN="LEFT"
VALIGN="MIDDLE"
><B
>MySQL (port 3306)</B
></TH
></TR
><TR
><TD
>&nbsp;</TD
><TD
ALIGN="LEFT"
VALIGN="TOP"
><P
>      MySQL counts unsuccessful connection attempts and may refuse
      further connection if some limit is exceeded. You may want to
      use the <B
CLASS="COMMAND"
>PortCheckSkip</B
> option to avoid probing
      the MySQL port.
    </P
></TD
></TR
></TABLE
></DIV
><P
>    By default, all ports from 0 to 65535 are scanned. To change these limits,
    the options 
    <B
CLASS="COMMAND"
>PortCheckMinPort=<TT
CLASS="REPLACEABLE"
><I
>integer</I
></TT
></B
> and
    <B
CLASS="COMMAND"
>PortCheckMaxPort=<TT
CLASS="REPLACEABLE"
><I
>integer</I
></TT
></B
> 
    can be used.
  </P
></DIV
><DIV
CLASS="SECT2"
><H2
CLASS="SECT2"
><A
NAME="AEN2817"
>5.15.2. Example configuration</A
></H2
><PRE
CLASS="PROGRAMLISTING"
>  [PortCheck]
  #
  # Activate (default is on)
  #
  PortCheckActive = yes

  # The severity of reports: debug/info/notice/warn/err/crit/alert
  # (default is crit)
  #
  SeverityPortCheck = crit

  # These are the defaults
  #
  PortCheckMinPort = 0
  PortCheckMaxPort = 65535
 
  # Services that are required. This example specifies ssl (22/tcp), 
  # smtp (25/tcp), http (80/tcp), and portmapper.
  #
  PortCheckRequired = 192.168.1.128:22/tcp,25/tcp,80/tcp,portmapper/tcp,portmapper/udp

  # Services that are optional. This example specifies 
  # mysql (3306/tcp).
  #
  PortCheckOptional = 192.168.1.128:3306/tcp

  # Additional interfaces to scan. This example presumes that
  # the 'official hostname' corresponds to 192.168.1.128, and
  # that the machine has three more interfaces.
  # 127.0.0.1 (localhost) is not listed, hence not scanned.
  #
  PortCheckInterface = 192.168.1.129
  PortCheckInterface = 192.168.1.130
  PortCheckInterface = 192.168.1.131

  # The interval (in seconds) for port checks (default is 300 sec)
  #
  PortCheckInterval = 300

  # By default, UDP ports are checked as well as TCP ports.
  #
  PortCheckUDP = yes
  </PRE
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
SUMMARY="Footer navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="processcheck.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
ACCESSKEY="H"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="logmon.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>Checking for hidden/fake/missing processes</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="file-monitor.html"
ACCESSKEY="U"
>Up</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>Logfile monitoring/analysis</TD
></TR
></TABLE
></DIV
><!--#if expr="! ($HTTP_USER_AGENT = /MSIE/)"--><!--#include virtual="/resources/ssi/footer.html"--><!--#endif --></BODY
></HTML
>