(Part 9 of 9)
06/01/2013 19:47:40 secure_files_permission.sh|Grepping the sudoers file to extract the scripts running as root|
06/01/2013 19:47:40 secure_files_permission.sh|Running AWK to build the files entries|
06/01/2013 19:47:40 secure_files_permission.sh|Running AWK to build the final list of file|
06/01/2013 19:47:40 secure_files_permission.sh|Successfully generated the final list of files.|
06/01/2013 19:47:40 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sec_pwd_change.py]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_user_pwd.exp]|
06/01/2013 19:47:40 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_usr_pmd.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/InstallWizard]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ssh_PK_setup.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_user_pwd.exp]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/grub_swap.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/cancel_upgrade.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/check_process.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/file_list.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_active_version.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_inactive_version.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/locale_install.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|[/usr/bin/nohup] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_get_file.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_validate_file.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|warning [/common/download/copstart.sh] is not a regular file|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/install/bin/filter]|
06/01/2013 19:47:40 secure_files_permission.sh|warning [/usr/local/cm/application_locale/localeinstaller/redeploy.sh] is not a regular file|
06/01/2013 19:47:40 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/procAuth]|
06/01/2013 19:47:40 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/procAuth] from [tomcat] to root|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_dnssetup]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostname]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostsetup]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ifconfig]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_language]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntp]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntpkey]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntpdate]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_zoneinfo]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hwdetect]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/networkFaultTolerance.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/list_cluster.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/network_cluster.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Changing ownership of [/usr/local/bin/base_scripts/network_cluster.sh] from [clm] to root|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/tftp_upload_security.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|warning [/usr/local/bin/base_scripts/killPartitionB_PIDs.sh] is not a regular file|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_cancelInstall.sh]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_gethostbyname]|
06/01/2013 19:47:40 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:40 secure_files_permission.sh|[/sbin/ethtool] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/ip] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/sbin/arping] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/netstat] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/show_ipv6_settings.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/bin/ndisc6] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/misc/bin/hwdetect] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_set_clock.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/network]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/dhcpd]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_one_shot.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_reachability.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_start.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_stop.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_validate_servers.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/ntpd]|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/poweroff] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/locale_install.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/LicenseMac.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/comp_notification/notify.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_createaccount]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_decoderversion]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_displayaccount]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_getflag]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_enable.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_disable.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/CertMgmt.py] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/bulkCertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/bulkCertMgmt.py] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgr.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/CertMgr.sh] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/certDBSync.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/certDBSync.sh] from [certmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/SSOMgmt.py]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_create_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_create_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_disable_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_disable_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_delete_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_delete_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_enable_association.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/ipsec_enable_association.sh] from [ipsecmgr] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/ipsec_validate.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hpacucli] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hrconf] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/ipssend] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/arcconf] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/raid-cfggen.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/DELL/data/RAID-Defs/7845D2-2333/raid-status.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/vendor/misc/bin/linux_swraid.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/sbin/mdadm] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/sbin/dmidecode] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sam_hw_settings.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mkdir] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlConsoleBanner.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/cp] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/nice] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/platform/diagnostics/diag.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/platform/diagnostics/diag_terminate.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/tcpdumpOperations.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/tcpdumpOperations.sh] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/tcpDumpManager.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/showtechOperations.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/showtechOperations.sh] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/diagnostics/diag.py]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/diagnostics/diag.py] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_timezone_list.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_domainname]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/regenerate_all_certs.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/Diag_Agent] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/fgalogcfg] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/update_dictionary.py] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/setup_wcaconfig.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cm/script/setup_accordion.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cli-unset_domainname.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cli-unset_domainname.sh] from [tomcat] to root|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/cat] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|warning [/usr/local/cuba/pcmcapture/pcmcapture.sh] is not a regular file|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/drf/setdrfdetails.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/tar] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/isClusterNodeValid.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mt] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/cp] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/cert/locateCertDirs.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/bin/nice] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|[/usr/bin/du] is being excluded from hardening|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostname]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_gethostbyname]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/common/drf/scripts/platform/platform_known_hosts_restore.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/common/drf/scripts/platform/platform_known_hosts_restore.sh] from [drf] to root|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Hardening permission/ownership of file [/common/drf/scripts/platform/platform_ipv6_restore.sh]|
06/01/2013 19:47:41 secure_files_permission.sh|Changing ownership of [/common/drf/scripts/platform/platform_ipv6_restore.sh] from [drf] to root|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/comp_notification/registration.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ihistory_impl]|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/SSOMgmt.py]|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chown] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/perform_ipsec_cert.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/perform_ipsec_cert.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/enable_ipsec.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/disable_ipsec.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/cert/locateCertDirs.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ctiScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/startcardbl] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/startdbl] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/startrpc] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ccmScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbmScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbmTmpScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbmTmpScriptUsage.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/dnaScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ctftp] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/bin/snmpdm]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/snmpCcmScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/snmpdm.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/cdpSubAgt.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/syslogsubagt.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/hostagt.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/mib2agt.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|warning [/usr/local/Snmpri/script/naaagt.sh] is not a regular file|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/Snmpri/script/sappagt.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/lbm] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/home/tomcat/tomcat_security_startup.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ilsScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/bin/kill] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/bin/kill] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/sbin/telinit] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/get_current_log.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/get_current_log.sh] from [servmgr] to root|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs_bulk.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/dhcpd]|
06/01/2013 19:47:42 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/mv] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/sed] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/sed] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/home/sftpuser/sftp_connect.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|Changing ownership of [/home/sftpuser/sftp_connect.sh] from [sftpuser] to root|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/home/sftpuser/sftp_connect.sh]|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/delKnownHostKeys.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/drf_tape.pl]|
06/01/2013 19:47:42 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/drf_tape.pl] from [drf] to root|
06/01/2013 19:47:42 secure_files_permission.sh|[/sbin/ethtool] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/cdpScript.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/pre_db_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/do_db_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/post_db_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/pre_db_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/do_db_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/post_db_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/pre_prefs_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/do_prefs_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/post_prefs_restore.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/pre_prefs_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/do_prefs_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/prefsdrf/post_prefs_backup.sh] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/msa_drf_reg.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_pre_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_do_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_pre_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/moh_do_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_pre_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_do_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_pre_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/bin/ann_do_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/pre_syslog_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/do_syslog_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/post_syslog_backup.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/pre_syslog_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/do_syslog_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/syslogagt/backup/post_syslog_restore.py] is being excluded from hardening|
06/01/2013 19:47:42 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/pre_cdp_backup.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/do_cdp_backup.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/post_cdp_backup.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/pre_cdp_restore.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/do_cdp_restore.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/cdpagt/backup/post_cdp_restore.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/cfrt] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/lsof] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/lsof] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/count_fds.pldl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/enable_ipsec.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/disable_ipsec.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ipsec/perform_ipsec_cert.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|warning [/usr/local/bin/base_scripts/sd_procnodesec] is not a regular file|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostupdate]|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/logrotate] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/stopDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dropadmindb.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/controlcenter.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dropadmindb.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/cisco_creve.pl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/car/bin/CAR-CDRCMRSoftLinkManager.py]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/car/bin/CAR-CDRCMRSoftLinkManager.py] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/car/bin/RecreateCARTables.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/car/bin/RecreateCARTables.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/informix/bin/onmode] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/pryftool] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dumpDbIntegrity.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/dropadmindb.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/stopDBReplication.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/resetReplicationTimeOut.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/forcedatasyncsub.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/rebuild.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbdiag.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/db/commands/replicationRTstate.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbHighCpuTasks.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/InformixPerm.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/DbReplStop.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dbIntegrity.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dumpSqlHistory.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/dropAdminDb.py] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/mmfSpyScript.sh] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/ilsc] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/local/cm/bin/extract-trace.pl] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/elm/server/bin/RunElmDb]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/elm/server/bin/ElmSrvr]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/opt/cisco/elm/server/bin/ResetLicSrc]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/SSOMgmt.py]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/admin/adminAccounts.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ssh_PK_setup.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/gen_tomcat_selfsigned.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/display_tomcat_cert.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/home/sftpuser/sftp_connect.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/update_user_pwd.exp]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sec_pwd_change.py]|
06/01/2013 19:47:43 secure_files_permission.sh|warning [/sbin/hplog] is not a regular file|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cmdGetConfigFiles.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cmdGetConfigFiles.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|[/usr/sbin/lsof] is being excluded from hardening|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cmdIOStat.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cmdIOStat.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/manage_service_agents.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/manage_service_agents.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/snmpv3getwalk.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/snmpv3getwalk.sh] from [tomcat] to root|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/snmpv3Commands.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/snmpv2Commands.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/validateDHCP.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/firewall.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/showEnvironmental.sh]|
06/01/2013 19:47:43 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/showEnvironmental.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/showMemory.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/showMemory.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cmdUtilsCore.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cmdUtilsCore.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/last] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/opt/ibm/dsa/ibm_utl_dsa.bin] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/traceroute] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/ping] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/ethtool] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/iptables] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/arp] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/kill] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/date] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/ip] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/arping] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/fuser] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/tcpdump] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/netstat] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/sbin/mdadm] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hpacucli] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hrconf] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/ipssend] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/arcconf] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/IBM/bin/raid-cfggen.sh] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/DELL/data/RAID-Defs/7845D2-2333/raid-status.sh] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|warning [/usr/local/bin/vendor/misc/bin/linux_swraid.sh] is not a regular file|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/network]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/poweroff] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/grub_swap.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/chroot] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/dhcpd]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/ntpd]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/sshd]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/clm]|
06/01/2013 19:47:44 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_dnssetup]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_domainname]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hostname]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ifconfig]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_language]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntp]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_ntpdate]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_zoneinfo]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/get_timezone_list.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/regenerate_all_certs.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/filefrag]|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/sbin/filefrag] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/stat] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/bin/sort] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/filefragWrapper.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/filefragWrapper.sh] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/snmpget] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|[/usr/bin/snmpwalk] is being excluded from hardening|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/networkFaultTolerance.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/restore_ethernet_interface.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_one_shot.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_reachability.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_start.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_stop.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ntp_validate_servers.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/reboot.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/kernel_tunables.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_gethostbyname]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/procList]|
06/01/2013 19:47:44 secure_files_permission.sh|Changing ownership of [/usr/local/platform/bin/procList] from [tomcat] to root|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_createaccount]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_decoderversion]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_displayaccount]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_getflag]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_enable.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/remotesupport_disable.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/controlsel]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgmt.py]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/bulkCertMgmt.py]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/CertMgr.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/certDBSync.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/servm]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_create_association.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_disable_association.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_delete_association.sh]|
06/01/2013 19:47:44 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/ipsec_enable_association.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/ipsec_status.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/ipsec_status.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chgrp] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ipprefs]|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/tar] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/tar] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/shutdown] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/shutdown] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/terminal_io]|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/sbin/dmidecode] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/du] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/df] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/gdb] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/mount] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/umount] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/file_list.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_get_file.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/upgrade_validate_file.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/file_list.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_cancelInstall.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/nohup] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/locale_install.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/service] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/chkconfig] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/sbin/hponcfg] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/sbin/hpasmcli] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/usr/sbin/hpaducli] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/usr/local/bin/vendor/HP/bin/hrconf] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/find] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/switch_boot_console.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/switch_boot_console.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/auditd_wrapper.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/auditd_wrapper.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/uptime] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sd_hwdetect]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/sam_hw_settings.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/sftp_file_commands.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/sftp_file_commands.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/tcpdumpOperations.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/check_ipv6_nw.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/check_ipv6_nw.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/listProcesses.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/listProcesses.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cli-ldapfix.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/cli-ldapfix.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/cli-unset_domainname.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/show_ipv6_settings.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/ping6] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/traceroute6] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/ndisc6] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdComplexity.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdMaxAge.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdMinLen.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdExpiry.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdMinAge.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdHistory.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdInactivity.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlUserAccount.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/root/.security/ia/controlPasswdAcctLockout.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/seldiag]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/os/sata_cleanup_cron]|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/rm] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/runsubsql.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/kDump.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/etc/kdump.conf]|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/fdisk] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/sed] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/sbin/reboot] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/kDumpServer.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/kdump]|
06/01/2013 19:47:45 secure_files_permission.sh|warning [/root/.ssh/known_hosts] is not a regular file|
06/01/2013 19:47:45 secure_files_permission.sh|[/bin/cat] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ssh_keygen.exp]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ssh_server.exp]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/ssh_server_details.exp]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/fips.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/fips.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/dscp-markings]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin//load_dscp_values.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/restart_iptables.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/restart_iptables.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/upgradeVMwareTools.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/upgradeVMwareTools.sh] from [tomcat] to root|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/bin/base_scripts/usb_key_detect]|
06/01/2013 19:47:45 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/bin/comp_notification/notify.sh]|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/md5sum] is being excluded from hardening|
06/01/2013 19:47:45 secure_files_permission.sh|[/usr/bin/md5sum] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|[/usr/bin/sha1sum] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|[/usr/bin/sha1sum] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|Hardening permission/ownership of file [/usr/local/platform/cli_scripts/sshRestrict.sh]|
06/01/2013 19:47:46 secure_files_permission.sh|Changing ownership of [/usr/local/platform/cli_scripts/sshRestrict.sh] from [tomcat] to root|
06/01/2013 19:47:46 secure_files_permission.sh|Hardening permission/ownership of file [/etc/ssh/sshd_config]|
06/01/2013 19:47:46 secure_files_permission.sh|[/bin/chmod] is being excluded from hardening|
06/01/2013 19:47:46 secure_files_permission.sh|Hardening permission/ownership of file [/etc/init.d/sshd]|
06/01/2013 19:47:46 post_upgrade|Secure permissions completed during upgrade|
06/01/2013 19:47:46 post_upgrade|Successfully changed ownership for tardd.sh to root:root|
06/01/2013 19:47:46 post_upgrade|Successfully changed attribute on tardd.sh to immutable|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN001200|
06/01/2013 19:47:46 GEN001200|Addressing GEN001200|
06/01/2013 19:47:46 GEN001200|/etc/cron.hourly/rmTempAxisFiles permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.pem permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.der permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/opt/cisco/elm/client/.security/trust_certs/911953b0.0 permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/etc/hotplug/usb/audio permissions set to 0755|
06/01/2013 19:47:46 GEN001200|/usr/bin/Linuxzip permissions set to 0755|
06/01/2013 19:47:46 GEN001200|Cleaning up temporary files /tmp/GEN001200.Examples, PdiExamplesTMP|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN001260|
06/01/2013 19:47:46 GEN001260|Modifying permissions of logs listed in /etc/syslog.conf |
06/01/2013 19:47:46 GEN001260|Possible logfile /dev/null not found|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/messages to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/secure to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/maillog to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/cron to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/spooler to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/syslog/boot.log to 0640|
06/01/2013 19:47:46 GEN001260|Changing permissions on /var/log/active/platform/log/authenticateFile.log to 0640|
06/01/2013 19:47:46 GEN001260|Possible logfile /usr/local/cm/misc/CiscoSyslogFifo not found|
06/01/2013 19:47:46 GEN001260|Permissions for /var/log/active/syslog/CiscoSyslog already set to 0640|
06/01/2013 19:47:46 GEN001260|File /var/adm/sulog not found|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/lastlog to 0640|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/wtmp to 0640|
06/01/2013 19:47:46 GEN001260|Modifying /etc/rc.d/rc.sysinit for setting /var/log/wtmp to 0640|
06/01/2013 19:47:46 GEN001260|Changing umask in /usr/lib/sa/sa1|
06/01/2013 19:47:46 GEN001260|Changing umask in /usr/lib/sa/sa2|
06/01/2013 19:47:46 GEN001260|Changing group ownership of /var/log/sa/ files to ccmsyslog.|
06/01/2013 19:47:46 GEN001260|Changing umask in /etc/rc.d/init.d/sysstat|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/active/syslog/CallManager to 0640|
06/01/2013 19:47:46 GEN001260|Change permissions on /var/log/active/syslog/sd_ntp.log to 0640|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN003740|
06/01/2013 19:47:46 GEN003740|Executing GEN003740|
06/01/2013 19:47:46 GEN003740|Successfully changed permissions for /etc/xinetd.conf to 440|
06/01/2013 19:47:46 post_upgrade|Calling /root/.security/ia/GEN001520|
06/01/2013 19:47:46 GEN001520|Checking for users that do not own their home directories...|
06/01/2013 19:47:46 GEN001520|User radvd flagged - does not own home dir /|
06/01/2013 19:47:46 GEN001520|User radvd home dir changed from / to /dev/null|
06/01/2013 19:47:47 GEN001520|User adminsftp flagged - does not own home dir /common/adminsftp|
06/01/2013 19:47:47 post_upgrade|Calling /root/.security/ia/GEN001560|
06/01/2013 19:47:47 GEN001560|Addressing GEN001560|
06/01/2013 19:47:47 GEN001560|Home directory for adminsftp /common/adminsftp excluded from check.|
06/01/2013 19:47:47 GEN001560|Home directory for postgres /var/lib/pgsql excluded from check.|
06/01/2013 19:47:48 GEN001560|Cleaning up temporary files /tmp/tmpGEN001560-0 /tmp/tmpGEN001560-1 /tmp/tmpGEN001560-2|
06/01/2013 19:47:48 post_upgrade|Calling /root/.security/ia/GEN001880|
06/01/2013 19:47:48 GEN001880|Addressing GEN001880|
06/01/2013 19:47:48 GEN001880|/home/sftpuser/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/sftpuser/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/sftpuser/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/pwrecovery/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/pwrecovery/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/pwrecovery/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfuser/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfuser/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfuser/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfkeys/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfkeys/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/drfkeys/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/monsteradmin/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/monsteradmin/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/home/monsteradmin/.bashrc change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/etc/skel/.bash_logout change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/etc/skel/.bash_profile change permissions to 0740|
06/01/2013 19:47:48 GEN001880|/etc/skel/.bashrc change permissions to 0740|
06/01/2013 19:47:48 post_upgrade|Calling /root/.security/ia/GEN002140|
06/01/2013 19:47:48 GEN002140|Addressing GEN002140|
06/01/2013 19:47:49 GEN002140|The following user shells were not in /etc/shells.|
06/01/2013 19:47:49 GEN002140|sftpuser /usr/libexec/openssh/sftp-server|
06/01/2013 19:47:49 GEN002140|pwrecovery /usr/local/platform/bin/startpwreset.sh|
06/01/2013 19:47:49 GEN002140|drfuser /home/drfuser/tardd.sh|
06/01/2013 19:47:49 GEN002140|drfkeys /home/drfkeys/drfkeys_shell.sh|
06/01/2013 19:47:49 GEN002140|ccmservice /usr/libexec/openssh/sftp-server|
06/01/2013 19:47:49 GEN002140|monsteradmin /usr/local/platform/bin/startcliscript.sh|
06/01/2013 19:47:49 post_upgrade|Calling /root/.security/ia/GEN002480|
06/01/2013 19:47:49 GEN002480|Obtaining list of folders to be processed|
06/01/2013 19:47:49 GEN002480| Finding the world writable files|
06/01/2013 19:49:15 GEN002480|Setting /etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.pem permissions to o-w failed.|
06/01/2013 19:49:15 GEN002480|Setting /etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.der permissions to o-w failed.|
06/01/2013 19:49:19 GEN002480|0 paths were not found or were not regular/special files/directories. They are listed below...|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /bin/chmod: changing permissions of `/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.pem': Operation not permitted|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /bin/chmod: changing permissions of `/etc/opt/cisco/elm/client/.security/trust_certs/Cisco_Root_CA_M1.der': Operation not permitted|
06/01/2013 19:49:19 GEN002480|(CAPTURE) |
06/01/2013 19:49:19 GEN002480|Some files were excluded from hardening, their parent directories are listed below...|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log/taos-log-a/cm/trace/dbl|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log/taos-log-a/cm/trace/dbl/sdi|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /common/log/taos-log-b/cm/trace/dbl/sdi|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /usr/local/cm/db|
06/01/2013 19:49:19 GEN002480|(CAPTURE) /usr/local/cm/db/car|
06/01/2013 19:49:19 GEN002480|Cleaning up temporary files /tmp/LsFind, /tmp/TmpGEN002480-0, /tmp/FindFile, /tmp/FindErrors|
06/01/2013 19:49:19 post_upgrade|Calling /root/.security/ia/GEN003080|
06/01/2013 19:49:19 GEN003080|Successfully changed the permission of /etc/cron.d/fiostats|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.d/sysstat already set to 600|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/crontab already set to 600|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.deny already set to 600|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.hourly/logrotate_wrapper already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.hourly/remotesupport.cron already set to 700|
06/01/2013 19:49:19 GEN003080|Successfully changed the permission of /etc/cron.hourly/rmTempAxisFiles|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/adminsftpwatch already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/ia_cron_daily already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/logrotate already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/rpm already set to 700|
06/01/2013 19:49:19 GEN003080|Permissions for /etc/cron.daily/tmpwatch already set to 700|
06/01/2013 19:49:19 GEN003080|Successfully changed the permission of /etc/cron.daily/tomcatDailyCron|
06/01/2013 19:49:19 post_upgrade|Calling /root/.security/ia/GEN005320|
06/01/2013 19:49:19 GEN005320|Executing GEN005320|
06/01/2013 19:49:19 GEN005320|Getting the list of dirs to process|
06/01/2013 19:49:19 GEN005320|Finding SNMP conf files in directory|
06/01/2013 19:50:01 GEN005320|Processing permissions on SNMP files|
06/01/2013 19:50:01 GEN005320|Successfully changed permissions for /etc/snmp/snmpd.conf|
06/01/2013 19:50:01 GEN005320|Successfully changed permissions for /partB/etc/snmp/snmpd.conf|
06/01/2013 19:50:01 post_upgrade|Calling /root/.security/ia/GEN005340|
06/01/2013 19:50:01 GEN005340|Executing GEN005340|
06/01/2013 19:50:01 GEN005340|Getting the list of dirs to process|
06/01/2013 19:50:01 GEN005340|Finding MIB files in directory|
06/01/2013 19:50:44 GEN005340|Processing permissions on MIB files|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/onmibV1.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/rdbmsV2.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/rdbmsV1.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/applV1.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/applV2.mib|
06/01/2013 19:50:44 GEN005340|Successfully changed permissions for /usr/local/cm/db/informix/snmp/onmibV2.mib|
06/01/2013 19:50:44 GEN005340|Cleaning up temporary files /tmp/tmp0_GEN005340_11027, /tmp/tmp1_GEN005340_11027, /tmp/SRRFIND_GEN005340_11027, /tmp/LsGrepFind|
06/01/2013 19:50:44 post_upgrade|Calling /root/.security/ia/GEN005360|
06/01/2013 19:50:44 GEN005360|Addressing GEN005360|
06/01/2013 19:50:44 GEN005360|Removed Informix mib files from /usr/local/cm/db/informix/snmp|
06/01/2013 19:50:44 GEN005360|Informix mib files already removed from /partB/usr/local/cm/db/informix/snmp|
06/01/2013 19:50:44 GEN005360|Cleaning up temporary files /tmp/MIBfiles, /tmp/MIBfilesB|
06/01/2013 19:50:44 post_upgrade|Calling /root/.security/ia/GEN001160|
06/01/2013 19:50:44 GEN001160|Executing GEN001160|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/cpld/Firmware_ver does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/SCELNX_32 does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/amifldrv_mod.o does not exist|
06/01/2013 19:50:44 GEN001160|Changing ownership for file /common/log/install/upgrade-messages.properties|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/cpld/Firmware_ver does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/SCELNX_32 does not exist|
06/01/2013 19:50:44 GEN001160|warning File /usr/local/bin/hssi/server_implementation/VOLARIS/shared/hcf/utility/amifldrv_mod.o does not exist|
06/01/2013 19:50:44 post_upgrade|All post install IA scripts completed during upgrade|
06/01/2013 19:50:44 post_upgrade|Adding GEN001280 to rc.local|
06/01/2013 19:50:44 rclocalmgr.sh|action type is add|
06/01/2013 19:50:44 rclocalmgr.sh|running add|
06/01/2013 19:50:44 rclocalmgr.sh|Adding /root/.security/ia/GEN001280|
06/01/2013 19:50:44 rclocalmgr.sh|Add /root/.security/ia/GEN001280 to section 20|
06/01/2013 19:50:44 rclocalmgr.sh|Add /root/.security/ia/GEN001280 to /etc/rc.d/rc.local complete|
06/01/2013 19:50:44 rclocalmgr.sh|action type is add|
06/01/2013 19:50:44 rclocalmgr.sh|running add|
06/01/2013 19:50:44 rclocalmgr.sh|Adding rm -rf /etc/hwprofile > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Duplicate entry for rm -rf /etc/hwprofile > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Add rm -rf /etc/hwprofile > /dev/null 2>&1 to section 10|
06/01/2013 19:50:44 rclocalmgr.sh|Add rm -rf /etc/hwprofile > /dev/null 2>&1 to /partB/etc/rc.d/rc.local complete|
06/01/2013 19:50:44 rclocalmgr.sh|action type is add|
06/01/2013 19:50:44 rclocalmgr.sh|running add|
06/01/2013 19:50:44 rclocalmgr.sh|Adding /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Duplicate entry for /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1|
06/01/2013 19:50:44 rclocalmgr.sh|Add /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1 to section 10|
06/01/2013 19:50:44 rclocalmgr.sh|Add /usr/local/bin/base_scripts/sd_prefs -set ALL > /dev/null 2>&1 to /partB/etc/rc.d/rc.local complete|
06/01/2013 19:50:44 post_upgrade|Adding the OS admin user into the informix group|
06/01/2013 19:50:44 post_upgrade|Calling /usr/bin/gpasswd -a informix|
06/01/2013 19:50:44 post_upgrade|warning Failure to add into informix group, continuing with install (2)|
06/01/2013 19:50:44 post_upgrade|Enabling network verify service|
06/01/2013 19:50:44 post_upgrade|Copy /usr/local/bin/base_scripts/verifyNetwork to /etc/rc.d/init.d/|
06/01/2013 19:50:44 post_upgrade|Calling "cp /usr/local/bin/base_scripts/verifyNetwork /etc/rc.d/init.d"|
06/01/2013 19:50:44 post_upgrade|Skipping inactive file touch since deployment = callmanager|
06/01/2013 19:50:44 post_upgrade|Do miscellaneous cleanup|
06/01/2013 19:50:44 post_upgrade|Calling /usr/local/bin/base_scripts/cleanup_misc.sh|
06/01/2013 19:50:44 cleanup_misc.sh|Removing unneeded files to free up space|
06/01/2013 19:50:44 cleanup_misc.sh|Moving unneeded cron jobs to save area |
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The DEMO directory does not exist|
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The SAMPLE directory does not exist|
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The man directory does not exist|
06/01/2013 19:50:44 cleanup_misc.sh|WG385: The sample directory does not exist|
06/01/2013 19:50:47 product_extensions|No ucm extensions found for cleanup_misc.sh. Continuing normally.|
06/01/2013 19:50:49 product_extensions|No elm extensions found for cleanup_misc.sh. Continuing normally.|
06/01/2013 19:50:49 post_upgrade|Removing vendor, base_bin and base_scripts from /common/rpm-archive/9.1.1.10000-11|
06/01/2013 19:50:49 post_upgrade|Dumping /usr disk usage to /usr/local/platform/conf/usr_du_out.txt|
06/01/2013 19:50:49 post_upgrade|Immunizing file system|
06/01/2013 19:50:49 post_upgrade|post_upgrade processing complete|
06/01/2013 19:50:49 post_upgrade|Calling /usr/local/bin/base_scripts/parse_upgrade_log|
06/01/2013 19:51:03 post_upgrade|Post Upgrade RTMTFinish|
06/01/2013 19:51:03 post_upgrade|========================= Upgrade complete. Awaiting switch to version. =========================|
06/01/2013 19:51:03 upgrade_manager.sh|Post-upgrade processing complete|
06/01/2013 19:51:03 upgrade_manager.sh|Application install on inactive partition complete|
06/01/2013 19:51:03 upgrade_manager.sh|Parse argument status=upgrade.stage.completed|
06/01/2013 19:51:03 upgrade_manager.sh|_set_upgrade_status_attribute: status set to upgrade.stage.completed|
06/01/2013 19:51:03 upgrade_manager.sh|Upgrade complete|
06/01/2013 19:51:03 upgrade_manager.sh|Final exit processing with result 0|
06/01/2013 19:51:03 upgrade_manager.sh|Calling /common/download/9.1.1.10000-11/Cisco/bin/prepare_grub --phase L2 --action update --basepath /mnt/source/Cisco --active_part /partB --logfile /common/log/install/capture.txt|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) |
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Preparing grub for phase: l2!|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Setting up GRUB for l2 for update action|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Checking for serial-console |
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:03] prepare_grub: Checking for product specific hpet setting|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:04] prepare_grub: Checking platform type for kernel arg.|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:04] prepare_grub: Detected HWModel=VMware|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Set kernel parm for platform as: clock=pmtmr divider=4|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Set kernel parm: enforcing=0|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Set crash kernel parm: crashkernel=128M@16M|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Adding kernel-param: clock=pmtmr divider=4 enforcing=0 crashkernel=128M@16M|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) [13/06/04_19:51:05] prepare_grub: Created a new /grub/boot/grub/grub.conf with entries from /tmp/active_grub_entry & /tmp/grub_entry|
06/01/2013 19:51:05 upgrade_manager.sh|(CAPTURE) Mail notification cancelled - smtp server address for email not found! [/common/cisco/platformConfig.xml]|
06/01/2013 19:51:05 upgrade_manager.sh|IOWAIT monitor stopped|
06/01/2013 19:51:05 upgrade_manager.sh|Exit processing with result 0|
06/01/2013 19:51:05 preflight|Starting preflight|
06/01/2013 19:51:05 preflight|Validate preflight data|
06/01/2013 19:51:05 preflight|Preflight data validation complete|
06/01/2013 19:51:05 preflight|Determine upgrade type|
06/01/2013 19:51:05 preflight|Active RH version = 5Server|
06/01/2013 19:51:05 preflight|New os version(xml) = 5Server|
06/01/2013 19:51:05 preflight|Upgrade type = L2|
06/01/2013 19:51:05 preflight|Obtain product type|
06/01/2013 19:51:06 preflight|Obtained product type CallManager|
06/01/2013 19:51:06 preflight|Processing preflight cleanup mode|
06/01/2013 19:51:06 preflight|Clear preflight cancel utility|
06/01/2013 19:51:06 preflight|Removing /common/cancel_upgrade/preflight_cancel|
06/01/2013 19:51:06 preflight|Execute cleanup preflight commands for CallManager:L2 from /mnt/source/Cisco/install/preflight.xml|
06/01/2013 19:51:06 preflight|Found 7 preflight commands to execute|
06/01/2013 19:51:06 preflight|Execute preflight command (1/7): rm -rf /usr/local/platform/conf/dynamicConfig.xml|
06/01/2013 19:51:06 preflight|Preflight command returns 0|
06/01/2013 19:51:06 preflight|Execute preflight command (2/7): cp -f /common/preflight/CM/L2/dynamicConfig.xml /usr/local/platform/conf/dynamicConfig.xml|
06/01/2013 19:51:06 preflight|Preflight command returns 1|
06/01/2013 19:51:06 preflight|(CAPTURE) cp: cannot stat `/common/preflight/CM/L2/dynamicConfig.xml': No such file or directory|
06/01/2013 19:51:06 preflight|Preflight command did not complete (1). Continuing command processing...|
06/01/2013 19:51:06 preflight|Execute preflight command (3/7): rm -rf /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp|
06/01/2013 19:51:06 preflight|Preflight command returns 0|
06/01/2013 19:51:06 preflight|Execute preflight command (4/7): cp -f /common/preflight/CM/L2/dynamic.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp|
06/01/2013 19:51:06 preflight|Preflight command returns 0|
06/01/2013 19:51:07 preflight|Execute preflight command (5/7): rm -rf /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|
06/01/2013 19:51:07 preflight|Preflight command returns 0|
06/01/2013 19:51:07 preflight|Execute preflight command (6/7): cp -f /common/preflight/CM/L2/install-confirm-content.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|
06/01/2013 19:51:07 preflight|Preflight command returns 0|
06/01/2013 19:51:07 preflight|Execute preflight command (7/7): rm -rf /common/preflight/CM/L2|
06/01/2013 19:51:07 preflight|Preflight command returns 0|
06/01/2013 19:51:07 upgrade_manager.sh|Cleanup RAM disk|
06/01/2013 19:51:07 upgrade_manager.sh|Unmount /common/mnt/product_img|
06/01/2013 19:51:07 upgrade_manager.sh|Cleanup mounted DVD or ISO|
06/01/2013 19:51:07 upgrade_manager.sh|Found mount point "/mnt/source" for source filesystem /dev/hdc|
06/01/2013 19:51:07 upgrade_manager.sh|Unmount /mnt/source|
06/01/2013 19:51:07 upgrade_manager.sh|Ejecting DVD (/dev/hdc)|
06/01/2013 19:51:07 upgrade_manager.sh|Refresh CLI product properties cache|
06/01/2013 19:51:07 upgrade_manager.sh|Refresh hardware cache|
06/01/2013 19:51:07 ServerApiManager|INITIALIZE: sam_legacy_mode_init=1|
06/01/2013 19:51:09 ServerApiManager|INITIALIZE: sam_hssi_mode_init=0|
06/01/2013 19:51:14 upgrade_manager.sh|Cleanup exiting - Cached Data: [Vendor= VMware, Inc.
HWModel=VMware
CPUCount=2
CPUType= Intel(R) Xeon(R) CPU E5640 @ 2.67GHz
CPUSpeed=2670
MEMSize=6144
BIOSVer=PhoenixTechnologiesLTD 6.00 06/22/2012
ObjectId=1.3.6.1.4.1.9.1.1348
OSVersion=UCOS 5.0.0.0-2
SerialNumber= VMware-11 22 33 44 55 66 77 88-99 00 aa bb cc dd ee ff
VendorOID=1.3.6.1.4.1.674]|
06/01/2013 19:51:14 upgrade_install.sh|Process interface file|
06/01/2013 19:51:14 upgrade_install.sh|switch=no|
06/01/2013 19:51:14 upgrade_install.sh|notify_clm=yes|
06/01/2013 19:51:14 upgrade_install.sh|Process interface file complete|
06/01/2013 19:51:14 upgrade_install.sh|Upgrade manager complete|
06/01/2013 19:51:14 upgrade_install.sh|System upgrade complete|
06/01/2013 19:51:14 upgrade_install.sh|Cleaning up download...|
06/01/2013 19:51:14 upgrade_install.sh|Cleanup upgrade source area.|
06/01/2013 19:51:14 upgrade_install.sh|Ejecting DVD (/dev/sda1)|
06/01/2013 19:51:14 upgrade_install.sh|Removing /common/download/9.1.1.10000-11|
06/01/2013 19:51:14 upgrade_install.sh|Started auditd...|
06/01/2013 19:51:14 upgrade_install.sh|Started setroubleshoot...|
06/01/2013 19:51:14 upgrade_install.sh|Changed selinux mode to enforcing|
06/01/2013 19:51:14 upgrade_install.sh|No switch to new version|
06/01/2013 19:51:17 upgrade_install.sh|Initiated cluster manager to send updated publisher data to subscribers|
06/01/2013 19:51:17 upgrade_install.sh|Upgrade Complete -- (0)|
06/01/2013 19:51:17 upgrade_install.sh|set_upgrade_result: set to 1|
06/01/2013 19:51:17 upgrade_install.sh|is_upgrade_lock_available: Upgrade lock is not available.|
06/01/2013 19:51:17 upgrade_install.sh|is_upgrade_in_progress: Already locked by this process (pid: 28857).|
06/01/2013 19:51:17 upgrade_install.sh|release_upgrade_lock: Releasing lock (pid: 28857)|
No comments:
Post a Comment