Mon, 20 Apr 2009 19:22:00 +0200
Change unfortunate but partly useful overreaching security tradeoff.
The principle of allocating each running process an individual system
user and group can have security benefits, however maintining a plethora
of users, groups, processes, file modes, file permissions, and even
nonportable file ACLs on a host serving from a hundred processes has
some security disadvantages. This tradeoff is even worse for systems
like OpenPKG which benefit from administration transparency through the
use of minimal system intrusion and only three usage privilege levels.
1 ##
2 ## nessusd.conf -- Nessus Daemon Configuration
3 ##
5 # paths
6 rules = @l_prefix@/etc/nessus/nessusd.rules
7 users = @l_prefix@/etc/nessus/nessusd.users
8 logfile = @l_prefix@/var/nessus/nessusd.log
9 dumpfile = @l_prefix@/var/nessus/nessusd.dump
10 cert_file = @l_prefix@/var/nessus/CA/servercert.pem
11 key_file = @l_prefix@/var/nessus/CA/serverkey.pem
12 ca_file = @l_prefix@/var/nessus/CA/cacert.pem
13 plugins_folder = @l_prefix@/lib/nessus/plugins
15 # options
16 max_hosts = 30
17 max_checks = 10
18 max_threads = 15
19 be_nice = yes
20 log_whole_attack = yes
21 log_plugins_name_at_load = no
22 cgi_path = /cgi-bin:/scripts
23 port_range = default
24 optimize_test = yes
25 checks_read_timeout = 5
26 non_simult_ports = 139, 445
27 plugins_timeout = 320
28 safe_checks = yes
29 auto_enable_dependencies = yes
30 use_mac_addr = no
31 plugin_upload = no
32 plugin_upload_suffixes = .nasl, .inc
33 admin_user = root
34 language = english
35 slice_network_addresses = no
36 #pem_password = password
37 #force_pubkey_auth = yes