OXIESEC PANEL
- Current Dir:
/
/
snap
/
core
/
17200
/
etc
/
init.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
06/06/2024 02:31:58 PM
rwxr-xr-x
📄
.depend.boot
959 bytes
02/18/2024 07:56:28 PM
rw-r--r--
📄
.depend.start
386 bytes
02/18/2024 07:56:28 PM
rw-r--r--
📄
.depend.stop
411 bytes
02/18/2024 07:56:28 PM
rw-r--r--
📄
README
2.37 KB
01/19/2016 06:33:50 PM
rw-r--r--
📄
apparmor
6.08 KB
03/03/2017 10:52:31 PM
rwxr-xr-x
📄
bootmisc.sh
1.25 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
cgmanager
3.48 KB
09/14/2015 10:15:39 PM
rwxr-xr-x
📄
cgproxy
3.28 KB
09/14/2015 10:15:39 PM
rwxr-xr-x
📄
checkfs.sh
3.72 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
checkroot-bootclean.sh
1.07 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
checkroot.sh
9.13 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
console-setup
1.31 KB
04/04/2016 05:41:49 PM
rwxr-xr-x
📄
cron
2.98 KB
05/10/2022 10:15:22 PM
rwxr-xr-x
📄
dbus
2.75 KB
10/07/2019 11:29:04 AM
rwxr-xr-x
📄
halt
1.3 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
hostname.sh
1.39 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
hwclock.sh
3.72 KB
03/12/2016 03:14:57 PM
rwxr-xr-x
📄
keyboard-setup
1.76 KB
04/04/2016 05:41:49 PM
rwxr-xr-x
📄
killprocs
1.27 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
kmod
2.04 KB
11/12/2018 09:55:37 PM
rwxr-xr-x
📄
mountall-bootclean.sh
703 bytes
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
mountall.sh
2.25 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountdevsubfs.sh
1.43 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountkernfs.sh
1.53 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountnfs-bootclean.sh
711 bytes
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountnfs.sh
2.4 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
networking
4.66 KB
11/30/2016 05:16:19 PM
rwxr-xr-x
📄
ondemand
1.54 KB
10/16/2015 02:45:22 AM
rwxr-xr-x
📄
pppd-dns
612 bytes
01/27/2016 04:19:52 PM
rwxr-xr-x
📄
procps
1.16 KB
09/06/2015 05:30:20 AM
rwxr-xr-x
📄
rc
6.22 KB
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
rc.local
820 bytes
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
rcS
117 bytes
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
reboot
661 bytes
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
resolvconf
4.05 KB
11/29/2017 06:26:46 PM
rwxr-xr-x
📄
rsyslog
2.73 KB
02/03/2016 10:54:29 AM
rwxr-xr-x
📄
sendsigs
3.83 KB
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
single
597 bytes
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
skeleton
1.06 KB
01/19/2016 06:33:51 PM
rw-r--r--
📄
ssh
3.98 KB
05/13/2020 02:12:28 PM
rwxr-xr-x
📄
ubuntu-fan
1.2 KB
10/28/2016 03:24:40 PM
rwxr-xr-x
📄
udev
5.94 KB
04/02/2021 02:39:40 AM
rwxr-xr-x
📄
umountfs
2.67 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
umountnfs.sh
2.15 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
umountroot
1.83 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
urandom
3.04 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
Editing: urandom
Close
#! /bin/sh ### BEGIN INIT INFO # Provides: urandom # Required-Start: $local_fs $time # Required-Stop: $local_fs # Default-Start: S # Default-Stop: 0 6 # Short-Description: Save and restore random seed between restarts. # Description: This script saves the random seed between restarts. # It is called from the boot, halt and reboot scripts. ### END INIT INFO ## Assumption 1: We assume $SAVEDFILE is a file (or a symlink ## to a file) that resides on a non-volatile medium that persists ## across reboots. ## Case 1a: Ideally, it is readable and writeable. Its is unshared, ## i.e. its contents are unique to this machine. It is protected so ## that its contents are not known to attackers. ## Case 1b: Less than ideally, it is read-only. Its contents are ## unique to this machine and not known to attackers. SAVEDFILE=/var/lib/urandom/random-seed [ -c /dev/urandom ] || exit 0 PATH=/sbin:/bin if ! POOLBYTES=$(( ($(cat /proc/sys/kernel/random/poolsize 2>/dev/null) + 7) / 8 )) ; then POOLBYTES=512 fi . /lib/init/vars.sh . /lib/lsb/init-functions do_status () { if [ -f $SAVEDFILE ] ; then return 0 else return 4 fi } case "$1" in start|"") [ "$VERBOSE" = no ] || log_action_begin_msg "Initializing random number generator" # Seed the RNG with date and time. # This is helpful in the less-than-ideal case where $SAVEDFILE # is read-only. # The value of this is greatly reduced if $SAVEDFILE is missing, # or its contents are shared machine-to-machine or known to # attackers (since they might well know at what time this # machine booted up). ( date +%s.%N # Load and then save $POOLBYTES bytes, # which is the size of the entropy pool if [ -f "$SAVEDFILE" ] then cat "$SAVEDFILE" fi # Redirect output of subshell (not individual commands) # to cope with a misfeature in the FreeBSD (not Linux) # /dev/random, where every superuser write/close causes # an explicit reseed of the yarrow. ) >/dev/urandom # Write a new seed into $SAVEDFILE because re-using a seed # compromises security. Each time we re-seed, we want the # seed to be as different as possible. # Write it now, in case the machine crashes without doing # an orderly shutdown. # The write will fail if $SAVEDFILE is read-only, but it # doesn't hurt to try. umask 077 dd if=/dev/urandom of=$SAVEDFILE bs=$POOLBYTES count=1 >/dev/null 2>&1 ES=$? umask 022 [ "$VERBOSE" = no ] || log_action_end_msg $ES ;; stop) # Carry a random seed from shut-down to start-up; # Write it on shutdown, in case the one written at startup # has been lost, snooped, or otherwise compromised. # see documentation in linux/drivers/char/random.c [ "$VERBOSE" = no ] || log_action_begin_msg "Saving random seed" umask 077 dd if=/dev/urandom of=$SAVEDFILE bs=$POOLBYTES count=1 >/dev/null 2>&1 ES=$? [ "$VERBOSE" = no ] || log_action_end_msg $ES ;; status) do_status exit $? ;; restart|reload|force-reload) echo "Error: argument '$1' not supported" >&2 exit 3 ;; *) echo "Usage: urandom start|stop" >&2 exit 3 ;; esac :