Tuesday, June 11, 2013

Cisco Live app

I am heading to Cisco Live this year in Orlando.  I was looking for the Android app that usually comes out but didn't see it yet.  Looks like it will be coming out shortly on June 17th, available on Android as well as the unfortunate people that are stuck on an iOS platform. :)

During the event attendees will have the opportunity to network with their peers, get hands-on experience, and gain insight into the future of this fast-paced industry. The Mobile App provides a convenient way for attendees to access personal schedules, keynote and session information, exhibitor and sponsor profiles, and daily news via their mobile device.

From this link:

http://www.cisco.com/web/mobile/news/events/ciscolive/app.html

Friday, June 7, 2013

Upgrade from CUCM 8.6.2.21900-5 to 9.1.1.10000-11 (Part 9 of 9)

Just thought I'd post a log file from a recent CUCM 8.6.2.21900-5 to 9.1.1.10000-11 upgrade.  I had the ISO uploaded to the ESXi datastore, mounted it to the virtual CD drive, and ran the upgrade from the OS Administration GUI.

(Part 9 of 9)

06/01/2013 19:47:40 secure_files_permission.sh|Grepping the sudoers file to extract the scripts running as root|
06/01/2013 19:47:40 secure_files_permission.sh|Running AWK to build the files entries|
06/01/2013 19:47:40 secure_files_permission.sh|Running AWK to build the final list of file|
06/01/2013 19:47:40 secure_files_permission.sh|Successfully generated the final list of files.|
06/01/2013 19:47:40 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|

06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sec_pwd_change.py]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_user_pwd.exp]|
06/01/2013 19:47:40 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_usr_pmd.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/InstallWizard]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ssh_PK_setup.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_user_pwd.exp]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|

06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/grub_swap.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/cancel_upgrade.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/check_process.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/file_list.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_active_version.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_inactive_version.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/locale_install.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|[/usr/bin/nohup] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_get_file.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_validate_file.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|warning [/common/download/copstart.sh] is not a regular file|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/install/bin/filter]|
06/01/2013 19:47:40 secure_files_permission.sh|warning [/usr/local/cm/application_locale/localeinstaller/redeploy.sh] is not a regular file|
06/01/2013 19:47:40 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/procAuth]|
06/01/2013 19:47:40 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/procAuth] from [tomcat] to root|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_dnssetup]|

06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostname]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostsetup]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ifconfig]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_language]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntp]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntpkey]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntpdate]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_zoneinfo]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hwdetect]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/networkFaultTolerance.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/list_cluster.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/network_cluster.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Changing ownership of [/usr/local/bin/base_scripts/network_cluster.sh] from [clm] to root|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/tftp_upload_security.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|warning [/usr/local/bin/base_scripts/killPartitionB_PIDs.sh] is not a regular file|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_cancelInstall.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_gethostbyname]|

06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:40 secure_files_permission.sh|[/sbin/ethtool] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/ip] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/sbin/arping] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/netstat] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/show_ipv6_settings.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/bin/ndisc6] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/misc/bin/hwdetect] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_set_clock.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/network]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/dhcpd]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_one_shot.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_reachability.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_start.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_stop.sh]|

06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_validate_servers.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/ntpd]|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/poweroff] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/locale_install.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/LicenseMac.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/comp_notification/notify.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_createaccount]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_decoderversion]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_displayaccount]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_getflag]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_enable.sh]|

06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_disable.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/CertMgmt.py] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/bulkCertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/bulkCertMgmt.py] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgr.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/CertMgr.sh] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/certDBSync.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/certDBSync.sh] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/SSOMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_create_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_create_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_disable_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_disable_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_delete_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_delete_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_enable_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_enable_association.sh] from [ipsecmgr] to root|

06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/ipsec_validate.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hpacucli] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hrconf] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/ipssend] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/arcconf] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/raid-cfggen.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/DELL/data/RAID-Defs/7845D2-2333/raid-status.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/misc/bin/linux_swraid.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/sbin/mdadm] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/sbin/dmidecode] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sam_hw_settings.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mkdir] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlConsoleBanner.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/cp] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/nice] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/platform/diagnostics/diag.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/platform/diagnostics/diag_terminate.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/tcpdumpOperations.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/tcpdumpOperations.sh] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/tcpDumpManager.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/showtechOperations.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/showtechOperations.sh] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/diagnostics/diag.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/diagnostics/diag.py] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_timezone_list.sh]|

06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_domainname]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/regenerate_all_certs.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/Diag_Agent] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/fgalogcfg] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/update_dictionary.py] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/setup_wcaconfig.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/setup_accordion.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cli-unset_domainname.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cli-unset_domainname.sh] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/cat] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cuba/pcmcapture/pcmcapture.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/drf/setdrfdetails.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/tar] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/isClusterNodeValid.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mt] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/cp] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/cert/locateCertDirs.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/nice] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/bin/du] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostname]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_gethostbyname]|

06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/common/drf/scripts/platform/platform_known_hosts_restore.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/common/drf/scripts/platform/platform_known_hosts_restore.sh] from [drf] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/common/drf/scripts/platform/platform_ipv6_restore.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/common/drf/scripts/platform/platform_ipv6_restore.sh] from [drf] to root|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/comp_notification/registration.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ihistory_impl]|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/SSOMgmt.py]|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/perform_ipsec_cert.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/perform_ipsec_cert.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/enable_ipsec.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/disable_ipsec.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/cert/locateCertDirs.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ctiScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/startcardbl] is being excluded from hardening|

06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/startdbl] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/startrpc] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ccmScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbmScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbmTmpScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbmTmpScriptUsage.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/dnaScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ctftp] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/bin/snmpdm]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/snmpCcmScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/snmpdm.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/cdpSubAgt.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/syslogsubagt.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/hostagt.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/mib2agt.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|warning [/usr/local/Snmpri/script/naaagt.sh] is not a regular file|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/sappagt.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbm] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/home/tomcat/tomcat_security_startup.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ilsScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/bin/kill] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/bin/kill] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/sbin/telinit] is being excluded from hardening|

06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/get_current_log.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/get_current_log.sh] from [servmgr] to root|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs_bulk.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/dhcpd]|
06/01/2013 19:47:42 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/mv] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/sed] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/sed] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/home/sftpuser/sftp_connect.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Changing ownership of [/home/sftpuser/sftp_connect.sh] from [sftpuser] to root|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/home/sftpuser/sftp_connect.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/delKnownHostKeys.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/drf_tape.pl]|
06/01/2013 19:47:42 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/drf_tape.pl] from [drf] to root|
06/01/2013 19:47:42 secure_files_permission.sh|[/sbin/ethtool] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/cdpScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/pre_db_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/do_db_backup.sh] is being excluded from hardening|

06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/post_db_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/pre_db_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/do_db_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/post_db_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/pre_prefs_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/do_prefs_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/post_prefs_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/pre_prefs_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/do_prefs_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/post_prefs_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/msa_drf_reg.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_pre_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_do_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_pre_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_do_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_pre_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_do_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_pre_restore.py] is being excluded from hardening|

06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_do_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/pre_syslog_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/do_syslog_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/post_syslog_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/pre_syslog_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/do_syslog_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/post_syslog_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/pre_cdp_backup.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/do_cdp_backup.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/post_cdp_backup.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/pre_cdp_restore.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/do_cdp_restore.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/post_cdp_restore.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/cfrt] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/lsof] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/lsof] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/count_fds.pldl] is being excluded from hardening|

06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/enable_ipsec.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/disable_ipsec.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/perform_ipsec_cert.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|warning [/usr/local/bin/base_scripts/sd_procnodesec] is not a regular file|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostupdate]|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/logrotate] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/stopDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dropadmindb.sh] is being excluded from hardening|

06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/controlcenter.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dropadmindb.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/cisco_creve.pl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/car/bin/CAR-CDRCMRSoftLinkManager.py]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/car/bin/CAR-CDRCMRSoftLinkManager.py] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/car/bin/RecreateCARTables.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/car/bin/RecreateCARTables.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/informix/bin/onmode] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/pryftool] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dumpDbIntegrity.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dropadmindb.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/stopDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetReplicationTimeOut.sh] is being excluded from hardening|

06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/forcedatasyncsub.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/rebuild.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbdiag.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/replicationRTstate.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbHighCpuTasks.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/InformixPerm.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/DbReplStop.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbIntegrity.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dumpSqlHistory.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dropAdminDb.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/mmfSpyScript.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/ilsc] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/extract-trace.pl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/elm/server/bin/RunElmDb]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/elm/server/bin/ElmSrvr]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/elm/server/bin/ResetLicSrc]|

06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/SSOMgmt.py]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/admin/adminAccounts.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ssh_PK_setup.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/gen_tomcat_selfsigned.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/display_tomcat_cert.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/home/sftpuser/sftp_connect.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_user_pwd.exp]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sec_pwd_change.py]|
06/01/2013 19:47:43 secure_files_permission.sh|warning [/sbin/hplog] is not a regular file|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cmdGetConfigFiles.sh]|

06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cmdGetConfigFiles.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/lsof] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cmdIOStat.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cmdIOStat.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/manage_service_agents.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/manage_service_agents.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/snmpv3getwalk.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/snmpv3getwalk.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/snmpv3Commands.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/snmpv2Commands.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/validateDHCP.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/firewall.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/showEnvironmental.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/showEnvironmental.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/showMemory.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/showMemory.sh] from [tomcat] to root|

06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cmdUtilsCore.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cmdUtilsCore.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/last] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/opt/ibm/dsa/ibm_utl_dsa.bin] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/traceroute] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/ping] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/ethtool] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/iptables] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/arp] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/kill] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/date] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/ip] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/arping] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/fuser] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/tcpdump] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/netstat] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/sbin/mdadm] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hpacucli] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hrconf] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/ipssend] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/arcconf] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/raid-cfggen.sh] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/DELL/data/RAID-Defs/7845D2-2333/raid-status.sh] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/misc/bin/linux_swraid.sh] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/network]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/poweroff] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/grub_swap.sh]|

06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/chroot] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/dhcpd]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/ntpd]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/sshd]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/clm]|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_dnssetup]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_domainname]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostname]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ifconfig]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_language]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntp]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntpdate]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_zoneinfo]|

06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_timezone_list.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/regenerate_all_certs.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/filefrag]|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/filefrag] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/stat] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/sort] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/filefragWrapper.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/filefragWrapper.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/snmpget] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/snmpwalk] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/networkFaultTolerance.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/restore_ethernet_interface.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_one_shot.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_reachability.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_start.sh]|

06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_stop.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_validate_servers.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/kernel_tunables.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_gethostbyname]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/procList]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/procList] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_createaccount]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_decoderversion]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_displayaccount]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_getflag]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_enable.sh]|

06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_disable.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/controlsel]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/bulkCertMgmt.py]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgr.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/certDBSync.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/servm]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_create_association.sh]|

06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_disable_association.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_delete_association.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_enable_association.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/ipsec_status.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/ipsec_status.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/tar] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/tar] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/shutdown] is being excluded from hardening|

06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/shutdown] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/terminal_io]|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/sbin/dmidecode] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/du] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/df] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/gdb] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/file_list.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_get_file.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_validate_file.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/file_list.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_cancelInstall.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/nohup] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/locale_install.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/sbin/hponcfg] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/sbin/hpasmcli] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/usr/sbin/hpaducli] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hrconf] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/find] is being excluded from hardening|

06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/switch_boot_console.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/switch_boot_console.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/auditd_wrapper.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/auditd_wrapper.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/uptime] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hwdetect]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sam_hw_settings.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/sftp_file_commands.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/sftp_file_commands.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/tcpdumpOperations.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/check_ipv6_nw.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/check_ipv6_nw.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/listProcesses.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/listProcesses.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cli-ldapfix.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cli-ldapfix.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cli-unset_domainname.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/show_ipv6_settings.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/ping6] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/traceroute6] is being excluded from hardening|

06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/ndisc6] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdComplexity.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdMaxAge.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdMinLen.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdExpiry.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdMinAge.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdHistory.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdInactivity.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlUserAccount.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdAcctLockout.sh]|

06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/seldiag]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/os/sata_cleanup_cron]|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/runsubsql.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/kDump.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/etc/kdump.conf]|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/fdisk] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/sed] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/reboot] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/kDumpServer.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/kdump]|

06/01/2013 19:47:45 secure_files_permission.sh|warning [/root/.ssh/known_hosts] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/cat] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ssh_keygen.exp]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ssh_server.exp]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ssh_server_details.exp]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/fips.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/fips.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/dscp-markings]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin//load_dscp_values.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/restart_iptables.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/restart_iptables.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/upgradeVMwareTools.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/upgradeVMwareTools.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/usb_key_detect]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/comp_notification/notify.sh]|

06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/md5sum] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/md5sum] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|[/usr/bin/sha1sum] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|[/usr/bin/sha1sum] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/sshRestrict.sh]|
06/01/2013 19:47:46 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/sshRestrict.sh] from [tomcat] to root|
06/01/2013 19:47:46 secure_files_permission.sh|Hardening permission/ownership of file [/etc/ssh/sshd_config]|
06/01/2013 19:47:46 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/sshd]|
06/01/2013 19:47:46 post_upgrade|Secure permissions completed during upgrade|
06/01/2013 19:47:46 post_upgrade|Successfully changed ownership for tardd.sh to root:root|
06/01/2013 19:47:46 post_upgrade|Successfully changed attribute on tardd.sh to immutable|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN001200|
06/01/2013 19:47:46 GEN001200|Addressing GEN001200|

06/01/2013 19:47:46 GEN001200|/etc/cron.hourly/rmTempAxisFiles permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.pem permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.der permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/opt/cisco/elm/client/.security/trust_certs/911953b0.0 permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/hotplug/usb/audio permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/usr/bin/Linuxzip permissions set to 0755|
06/01/2013 19:47:46 GEN001200|Cleaning up temporary files /tmp/GEN001200.Examples, PdiExamplesTMP|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN001260|
06/01/2013 19:47:46 GEN001260|Modifying permissions of logs listed in /etc/syslog.conf |
06/01/2013 19:47:46 GEN001260|Possible logfile /dev/null not found|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/messages to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/secure to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/maillog to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/cron to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/spooler to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/boot.log to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/platform/log/authenticateFile.log to 0640|
06/01/2013 19:47:46 GEN001260|Possible logfile /usr/local/cm/misc/CiscoSyslogFifo not found|
06/01/2013 19:47:46 GEN001260|Permissions for /var/log/active/syslog/CiscoSyslog already set to 0640|
06/01/2013 19:47:46 GEN001260|File /var/adm/sulog not found|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/lastlog to 0640|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/wtmp to 0640|
06/01/2013 19:47:46 GEN001260|Modifying /etc/rc.d/rc.sysinit for setting /var/log/wtmp to 0640|
06/01/2013 19:47:46 GEN001260|Changing umask in /usr/lib/sa/sa1|
06/01/2013 19:47:46 GEN001260|Changing umask in /usr/lib/sa/sa2|
06/01/2013 19:47:46 GEN001260|Changing group ownership of /var/log/sa/  files to ccmsyslog.|
06/01/2013 19:47:46 GEN001260|Changing umask in /etc/rc.d/init.d/sysstat|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/active/syslog/CallManager to 0640|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/active/syslog/sd_ntp.log to 0640|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN003740|
06/01/2013 19:47:46 GEN003740|Executing GEN003740|
06/01/2013 19:47:46 GEN003740|Successfully changed permissions for /etc/xinetd.conf to 440|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN001520|
06/01/2013 19:47:46 GEN001520|Checking for users that do not own their home directories...|
06/01/2013 19:47:46 GEN001520|User radvd flagged - does not own home dir /|
06/01/2013 19:47:46 GEN001520|User radvd home dir changed from / to /dev/null|
06/01/2013 19:47:47 GEN001520|User adminsftp flagged - does not own home dir /common/adminsftp|
06/01/2013 19:47:47 post_upgrade|Calling /root/.security/ia/GEN001560|
06/01/2013 19:47:47 GEN001560|Addressing GEN001560|

06/01/2013 19:47:47 GEN001560|Home directory for adminsftp /common/adminsftp excluded from check.|
06/01/2013 19:47:47 GEN001560|Home directory for postgres /var/lib/pgsql excluded from check.|

06/01/2013 19:47:48 GEN001560|Cleaning up temporary files /tmp/tmpGEN001560-0 /tmp/tmpGEN001560-1 /tmp/tmpGEN001560-2|
06/01/2013 19:47:48 post_upgrade|Calling /root/.security/ia/GEN001880|
06/01/2013 19:47:48 GEN001880|Addressing GEN001880|

06/01/2013 19:47:48 GEN001880|/home/sftpuser/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/sftpuser/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/sftpuser/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/pwrecovery/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/pwrecovery/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/pwrecovery/.bashrc change permissions to 0740|

06/01/2013 19:47:48 GEN001880|/home/drfuser/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfuser/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfuser/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfkeys/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfkeys/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfkeys/.bashrc change permissions to 0740|

06/01/2013 19:47:48 GEN001880|/home/monsteradmin/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/monsteradmin/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/monsteradmin/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/etc/skel/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/etc/skel/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/etc/skel/.bashrc change permissions to 0740|
06/01/2013 19:47:48 post_upgrade|Calling /root/.security/ia/GEN002140|
06/01/2013 19:47:48 GEN002140|Addressing GEN002140|
06/01/2013 19:47:49 GEN002140|The following user shells were not in /etc/shells.|
06/01/2013 19:47:49 GEN002140|sftpuser /usr/libexec/openssh/sftp-server|
06/01/2013 19:47:49 GEN002140|pwrecovery /usr/local/platform/bin/startpwreset.sh|
06/01/2013 19:47:49 GEN002140|drfuser /home/drfuser/tardd.sh|
06/01/2013 19:47:49 GEN002140|drfkeys /home/drfkeys/drfkeys_shell.sh|
06/01/2013 19:47:49 GEN002140|ccmservice /usr/libexec/openssh/sftp-server|
06/01/2013 19:47:49 GEN002140|monsteradmin /usr/local/platform/bin/startcliscript.sh|
06/01/2013 19:47:49 post_upgrade|Calling /root/.security/ia/GEN002480|
06/01/2013 19:47:49 GEN002480|Obtaining list of folders to be processed|
06/01/2013 19:47:49 GEN002480| Finding the world writable files|

06/01/2013 19:49:15 GEN002480|Setting /etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.pem permissions to o-w failed.|
06/01/2013 19:49:15 GEN002480|Setting /etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.der permissions to o-w failed.|

06/01/2013 19:49:19 GEN002480|0 paths were not found or were not regular/special files/directories. They are listed below...|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /bin/chmod: changing permissions of `/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.pem': Operation not permitted|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /bin/chmod: changing permissions of `/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.der': Operation not permitted|
06/01/2013 19:49:19 GEN002480|(CAPTURE) |
06/01/2013 19:49:19 GEN002480|Some files were excluded from hardening, their parent directories are listed below...|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log/taos-log-a/cm/trace/dbl|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log/taos-log-a/cm/trace/dbl/sdi|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log/taos-log-b/cm/trace/dbl/sdi|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /usr/local/cm/db|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /usr/local/cm/db/car|
06/01/2013 19:49:19 GEN002480|Cleaning up temporary files /tmp/LsFind, /tmp/TmpGEN002480-0, /tmp/FindFile, /tmp/FindErrors|
06/01/2013 19:49:19 post_upgrade|Calling /root/.security/ia/GEN003080|
06/01/2013 19:49:19 GEN003080|Successfully changed the permission of /etc/cron.d/fiostats|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.d/sysstat already set to 600|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/crontab already set to 600|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.deny already set to 600|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.hourly/logrotate_wrapper already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.hourly/remotesupport.cron already set to 700|
06/01/2013 19:49:19 GEN003080|Successfully changed the permission of /etc/cron.hourly/rmTempAxisFiles|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/adminsftpwatch already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/ia_cron_daily already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/logrotate already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/rpm already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/tmpwatch already set to 700|
06/01/2013 19:49:19 GEN003080|Successfully changed the permission of /etc/cron.daily/tomcatDailyCron|
06/01/2013 19:49:19 post_upgrade|Calling /root/.security/ia/GEN005320|
06/01/2013 19:49:19 GEN005320|Executing GEN005320|
06/01/2013 19:49:19 GEN005320|Getting the list of dirs to process|
06/01/2013 19:49:19 GEN005320|Finding SNMP conf files in directory|

06/01/2013 19:50:01 GEN005320|Processing permissions on SNMP files|
06/01/2013 19:50:01 GEN005320|Successfully changed permissions for /etc/snmp/snmpd.conf|
06/01/2013 19:50:01 GEN005320|Successfully changed permissions for /partB/etc/snmp/snmpd.conf|
06/01/2013 19:50:01 post_upgrade|Calling /root/.security/ia/GEN005340|
06/01/2013 19:50:01 GEN005340|Executing GEN005340|
06/01/2013 19:50:01 GEN005340|Getting the list of dirs to process|
06/01/2013 19:50:01 GEN005340|Finding MIB files in directory|

06/01/2013 19:50:44 GEN005340|Processing permissions on MIB files|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/onmibV1.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/rdbmsV2.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/rdbmsV1.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/applV1.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/applV2.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/onmibV2.mib|
06/01/2013 19:50:44 GEN005340|Cleaning up temporary files /tmp/tmp0_GEN005340_11027, /tmp/tmp1_GEN005340_11027, /tmp/SRRFIND_GEN005340_11027, /tmp/LsGrepFind|
06/01/2013 19:50:44 post_upgrade|Calling /root/.security/ia/GEN005360|
06/01/2013 19:50:44 GEN005360|Addressing GEN005360|
06/01/2013 19:50:44 GEN005360|Removed Informix mib files from /usr/local/cm/db/informix/snmp|
06/01/2013 19:50:44 GEN005360|Informix mib files already removed from /partB/usr/local/cm/db/informix/snmp|
06/01/2013 19:50:44 GEN005360|Cleaning up temporary files /tmp/MIBfiles, /tmp/MIBfilesB|
06/01/2013 19:50:44 post_upgrade|Calling /root/.security/ia/GEN001160|
06/01/2013 19:50:44 GEN001160|Executing GEN001160|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/cpld/Firmware_ver does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/SCELNX_32 does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/amifldrv_mod.o does not exist|
06/01/2013 19:50:44 GEN001160|Changing ownership for file /common/log/install/upgrade-messages.properties|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/cpld/Firmware_ver does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/SCELNX_32 does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/amifldrv_mod.o does not exist|
06/01/2013 19:50:44 post_upgrade|All post install IA scripts completed during upgrade|
06/01/2013 19:50:44 post_upgrade|Adding GEN001280 to rc.local|
06/01/2013 19:50:44 rclocalmgr.sh|action type is add|
06/01/2013 19:50:44 rclocalmgr.sh|running add|
06/01/2013 19:50:44 rclocalmgr.sh|Adding /root/.security/ia/GEN001280|
06/01/2013 19:50:44 rclocalmgr.sh|Add /root/.security/ia/GEN001280 to section 20|
06/01/2013 19:50:44 rclocalmgr.sh|Add /root/.security/ia/GEN001280 to /etc/rc.d/rc.local complete|
06/01/2013 19:50:44 rclocalmgr.sh|action type is add|
06/01/2013 19:50:44 rclocalmgr.sh|running add|
06/01/2013 19:50:44 rclocalmgr.sh|Adding rm -rf /etc/hwprofile > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Duplicate entry for rm -rf /etc/hwprofile > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Add rm -rf /etc/hwprofile > /dev/null 2>&1 to section 10|
06/01/2013 19:50:44 rclocalmgr.sh|Add rm -rf /etc/hwprofile > /dev/null 2>&1 to /partB/etc/rc.d/rc.local complete|
06/01/2013 19:50:44 rclocalmgr.sh|action type is add|
06/01/2013 19:50:44 rclocalmgr.sh|running add|
06/01/2013 19:50:44 rclocalmgr.sh|Adding /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Duplicate entry for /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Add /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1 to section 10|
06/01/2013 19:50:44 rclocalmgr.sh|Add /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1 to /partB/etc/rc.d/rc.local complete|
06/01/2013 19:50:44 post_upgrade|Adding the OS admin user  into the informix group|
06/01/2013 19:50:44 post_upgrade|Calling /usr/bin/gpasswd -a  informix|
06/01/2013 19:50:44 post_upgrade|warning Failure to add  into informix group, continuing with install (2)|
06/01/2013 19:50:44 post_upgrade|Enabling network verify service|
06/01/2013 19:50:44 post_upgrade|Copy /usr/local/bin/base_scripts/verifyNetwork to /etc/rc.d/init.d/|

06/01/2013 19:50:44 post_upgrade|Calling "cp /usr/local/bin/base_scripts/verifyNetwork /etc/rc.d/init.d"|
06/01/2013 19:50:44 post_upgrade|Skipping inactive file touch since deployment = callmanager|
06/01/2013 19:50:44 post_upgrade|Do miscellaneous cleanup|
06/01/2013 19:50:44 post_upgrade|Calling /usr/local/bin/base_scripts/cleanup_misc.sh|
06/01/2013 19:50:44 cleanup_misc.sh|Removing unneeded files to free up space|

06/01/2013 19:50:44 cleanup_misc.sh|Moving unneeded cron jobs to save area |
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The DEMO directory does not exist|
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The SAMPLE directory does not exist|
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The man directory does not exist|
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The sample directory does not exist|

06/01/2013 19:50:47 product_extensions|No ucm extensions found for cleanup_misc.sh.  Continuing normally.|

06/01/2013 19:50:49 product_extensions|No elm extensions found for cleanup_misc.sh.  Continuing normally.|
06/01/2013 19:50:49 post_upgrade|Removing vendor, base_bin and base_scripts from /common/rpm-archive/9.1.1.10000-11|
06/01/2013 19:50:49 post_upgrade|Dumping /usr disk usage to /usr/local/platform/conf/usr_du_out.txt|
06/01/2013 19:50:49 post_upgrade|Immunizing file system|
06/01/2013 19:50:49 post_upgrade|post_upgrade processing complete|
06/01/2013 19:50:49 post_upgrade|Calling /usr/local/bin/base_scripts/parse_upgrade_log|

06/01/2013 19:51:03 post_upgrade|Post Upgrade RTMTFinish|
06/01/2013 19:51:03 post_upgrade|========================= Upgrade complete. Awaiting switch to version. =========================|
06/01/2013 19:51:03 upgrade_manager.sh|Post-upgrade processing complete|
06/01/2013 19:51:03 upgrade_manager.sh|Application install on inactive partition complete|
06/01/2013 19:51:03 upgrade_manager.sh|Parse argument status=upgrade.stage.completed|
06/01/2013 19:51:03 upgrade_manager.sh|_set_upgrade_status_attribute: status set to upgrade.stage.completed|
06/01/2013 19:51:03 upgrade_manager.sh|Upgrade complete|
06/01/2013 19:51:03 upgrade_manager.sh|Final exit processing with result 0|
06/01/2013 19:51:03 upgrade_manager.sh|Calling /common/download/9.1.1.10000-11/Cisco/bin/prepare_grub --phase L2 --action update --basepath /mnt/source/Cisco --active_part /partB --logfile /common/log/install/capture.txt|

06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) |
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Preparing grub for phase: l2!|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Setting up GRUB for l2 for update action|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Checking for serial-console |
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Checking for product specific hpet setting|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:04] prepare_grub: Checking platform type for kernel arg.|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:04] prepare_grub: Detected HWModel=VMware|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Set kernel parm for platform as: clock=pmtmr divider=4|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Set kernel parm: enforcing=0|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Set crash kernel parm: crashkernel=128M@16M|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Adding kernel-param:  clock=pmtmr divider=4 enforcing=0 crashkernel=128M@16M|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Created a new /grub/boot/grub/grub.conf with entries from /tmp/active_grub_entry & /tmp/grub_entry|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) Mail notification cancelled - smtp server address for email not found! [/common/cisco/platformConfig.xml]|
06/01/2013 19:51:05 upgrade_manager.sh|IOWAIT monitor stopped|

06/01/2013 19:51:05 upgrade_manager.sh|Exit processing with result 0|
06/01/2013 19:51:05 preflight|Starting preflight|
06/01/2013 19:51:05 preflight|Validate preflight data|
06/01/2013 19:51:05 preflight|Preflight data validation complete|
06/01/2013 19:51:05 preflight|Determine upgrade type|

06/01/2013 19:51:05 preflight|Active RH version = 5Server|
06/01/2013 19:51:05 preflight|New os version(xml) = 5Server|
06/01/2013 19:51:05 preflight|Upgrade type = L2|
06/01/2013 19:51:05 preflight|Obtain product type|
06/01/2013 19:51:06 preflight|Obtained product type CallManager|
06/01/2013 19:51:06 preflight|Processing preflight cleanup mode|
06/01/2013 19:51:06 preflight|Clear preflight cancel utility|
06/01/2013 19:51:06 preflight|Removing /common/cancel_upgrade/preflight_cancel|
06/01/2013 19:51:06 preflight|Execute cleanup preflight commands for CallManager:L2 from /mnt/source/Cisco/install/preflight.xml|
06/01/2013 19:51:06 preflight|Found 7 preflight commands to execute|
06/01/2013 19:51:06 preflight|Execute preflight command (1/7): rm -rf /usr/local/platform/conf/dynamicConfig.xml|
06/01/2013 19:51:06 preflight|Preflight command returns 0|
06/01/2013 19:51:06 preflight|Execute preflight command (2/7): cp -f /common/preflight/CM/L2/dynamicConfig.xml /usr/local/platform/conf/dynamicConfig.xml|
06/01/2013 19:51:06 preflight|Preflight command returns 1|
06/01/2013 19:51:06 preflight|(CAPTURE) cp: cannot stat `/common/preflight/CM/L2/dynamicConfig.xml': No such file or directory|
06/01/2013 19:51:06 preflight|Preflight command did not complete (1). Continuing command processing...|
06/01/2013 19:51:06 preflight|Execute preflight command (3/7): rm -rf /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp|
06/01/2013 19:51:06 preflight|Preflight command returns 0|
06/01/2013 19:51:06 preflight|Execute preflight command (4/7): cp -f /common/preflight/CM/L2/dynamic.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp|
06/01/2013 19:51:06 preflight|Preflight command returns 0|
06/01/2013 19:51:07 preflight|Execute preflight command (5/7): rm -rf /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|
06/01/2013 19:51:07 preflight|Preflight command returns 0|
06/01/2013 19:51:07 preflight|Execute preflight command (6/7): cp -f /common/preflight/CM/L2/install-confirm-content.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|
06/01/2013 19:51:07 preflight|Preflight command returns 0|
06/01/2013 19:51:07 preflight|Execute preflight command (7/7): rm -rf /common/preflight/CM/L2|
06/01/2013 19:51:07 preflight|Preflight command returns 0|
06/01/2013 19:51:07 upgrade_manager.sh|Cleanup RAM disk|
06/01/2013 19:51:07 upgrade_manager.sh|Unmount /common/mnt/product_img|
06/01/2013 19:51:07 upgrade_manager.sh|Cleanup mounted DVD or ISO|

06/01/2013 19:51:07 upgrade_manager.sh|Found mount point "/mnt/source" for source filesystem /dev/hdc|
06/01/2013 19:51:07 upgrade_manager.sh|Unmount /mnt/source|
06/01/2013 19:51:07 upgrade_manager.sh|Ejecting DVD (/dev/hdc)|
06/01/2013 19:51:07 upgrade_manager.sh|Refresh CLI product properties cache|
06/01/2013 19:51:07 upgrade_manager.sh|Refresh hardware cache|
06/01/2013 19:51:07 ServerApiManager|INITIALIZE: sam_legacy_mode_init=1|

06/01/2013 19:51:09 ServerApiManager|INITIALIZE: sam_hssi_mode_init=0|

06/01/2013 19:51:14 upgrade_manager.sh|Cleanup exiting - Cached Data: [Vendor= VMware, Inc.
HWModel=VMware
CPUCount=2
CPUType= Intel(R) Xeon(R) CPU           E5640  @ 2.67GHz
CPUSpeed=2670
MEMSize=6144
BIOSVer=PhoenixTechnologiesLTD 6.00 06/22/2012
ObjectId=1.3.6.1.4.1.9.1.1348
OSVersion=UCOS 5.0.0.0-2
SerialNumber= VMware-11 22 33 44 55 66 77 88-99 00 aa bb cc dd ee ff
VendorOID=1.3.6.1.4.1.674]|
06/01/2013 19:51:14 upgrade_install.sh|Process interface file|
06/01/2013 19:51:14 upgrade_install.sh|switch=no|
06/01/2013 19:51:14 upgrade_install.sh|notify_clm=yes|
06/01/2013 19:51:14 upgrade_install.sh|Process interface file complete|
06/01/2013 19:51:14 upgrade_install.sh|Upgrade manager complete|
06/01/2013 19:51:14 upgrade_install.sh|System upgrade complete|
06/01/2013 19:51:14 upgrade_install.sh|Cleaning up download...|
06/01/2013 19:51:14 upgrade_install.sh|Cleanup upgrade source area.|
06/01/2013 19:51:14 upgrade_install.sh|Ejecting DVD (/dev/sda1)|
06/01/2013 19:51:14 upgrade_install.sh|Removing /common/download/9.1.1.10000-11|
06/01/2013 19:51:14 upgrade_install.sh|Started auditd...|
06/01/2013 19:51:14 upgrade_install.sh|Started setroubleshoot...|
06/01/2013 19:51:14 upgrade_install.sh|Changed selinux mode to enforcing|
06/01/2013 19:51:14 upgrade_install.sh|No switch to new version|

06/01/2013 19:51:17 upgrade_install.sh|Initiated cluster manager to send updated publisher data to subscribers|
06/01/2013 19:51:17 upgrade_install.sh|Upgrade Complete -- (0)|
06/01/2013 19:51:17 upgrade_install.sh|set_upgrade_result: set to 1|
06/01/2013 19:51:17 upgrade_install.sh|is_upgrade_lock_available: Upgrade lock is not available.|
06/01/2013 19:51:17 upgrade_install.sh|is_upgrade_in_progress: Already locked by this process (pid: 28857).|
06/01/2013 19:51:17 upgrade_install.sh|release_upgrade_lock: Releasing lock (pid: 28857)|