« Back to Lynis

What’s New in Lynis 2: Features

Lynis 2.x will bring security auditing of Linux and Unix systems to a new level. In this blog post we share some exciting new features.

Release of Lynis 2 is planned for February 2015.

Overview:

  • History
  • Lynis 2.x
    • Plugins
    • Systemd Support
    • File Integrity Monitoring
    • Containers & Virtualization
    • Operating Systems
    • Focus on Simplicity
    • Free and Commercial Support

History

Lynis has been created in 2007, as a follow-up on the well-known tool Rootkit Hunter (rkhunter). Both tools are now used by companies all over the world, from individuals up to big companies, military and governments.

Where Rootkit Hunter only searched for malware, Lynis was about scanning systems broader and deeper. The goal was simply measuring the security defenses of a particular system and assisting with hardening.

Since 2013, Lynis under the support of CISOfyExternal link , to ensure ongoing development and keep up with new trends. With the author still being involved in development and promotion, the tool gained much traction over the last years. This resulted in more downloads and reaching even more users than ever before. The tool has been covered on many blogs, magazines and recently ended 3rd in ToolsWatch’s hunt for the best security tool of 2014External link .

Lynis 2.x

Now seven years later, the goal is much higher. Instead of just hardening, the new Lynis wants to help you preventing break-ins, detecting intruders and provide continuously security monitoring. In this post we share some of the upcoming developments.

Plugins

The biggest change in Lynis 2.x might the usage of plugins. It implies a difference in thinking about how individual tests are performed. In the past different types of tests where placed in the category file (e.g. include/tests_firewalls). From now on, they are split into two different types:

  • Information gathering
  • Configuration checks

Information gathering

The first type of tests simply gather information on the system, or in other words system discovery. Examples include a process listing, files in a directory, or the status of a particular program.

Configuration checks

Configuration checks on the other hand, are the ones who you might recognize from the screen output. They actually make an informed decision on what has been found and tell the user the result. This may include actual advice or a suggestion.

Most plugins will focus on the information gathering. Where appropriate, it might be an input for configuration checks and provide a suggestion here and there. With this new separation, the scan process will be more efficient, resulting in quicker scans.

The plan is to release both community plugins and commercial plugins. The last group will focus on the Enterprise functionality, like compliance and file integrity monitoring.

Systemd support

While there are many strong opinions about systemd, and its strengths and weaknesses, the truth is that it is out there. Since systemd is still under (heavy) development, we will be the first auditing tool to do a deep analysis of systemd, and keep up with its development. Each related Lynis test will determine what systemd options are available and process the related output, helping you to understand systemd more easily.

Auditing is underrated?

We believe that auditing is still underrated by companies. After all, even with a lot of auditing in place, systems get compromised. That does not mean auditing is useless. Too often simple basic details are being overlooked, which later then turn out to be cause for a break-in.

While Systemd enhances the boot process, it might complicate things. Proper auditing is needed to keep it well configured. Analyzing systemd is something which is of great value to maintain a healthy system. Our goal with Lynis 2.x is to audit it inside out and tell you when things can be improved.

Related Tests:

  • Determine available units
  • Checked for failed units
  • Analyze coredump configuration
  • Determine timers
  • Check journal and its configuration

File Integrity Monitoring

Being a host based auditing utility, also indicates that the files on the system can be analyzed. During the audit much information can be gathered about what security defenses are applied, and how many. One interesting area is that of determining the integrity of files, packages and data. Lynis 2.x will focus even more on these areas.

Some examples which will be tested in the newer Lynis versions:

  • GPG signing
  • Vulnerability database
  • Aging of files
  • Presence of file integrity monitoring tools

Additionally a plugin will be released which will do more data collection, so this data can be stored and compared.

Containers & Virtualization

The upcoming releases of Lynis have improved detection for both virtualization and container technology. By better determination of the environment a machine is running it, the better advice can be provided.

Control groups (cgroups) and Namespaces

Not new, but definitely more used in the last years are cgroups and namespaces. Both combined they prioritize, control and restrict processes. When used properly, powerful protection against limited resources. From a security point of view they are both very interesting options.

Docker

A few posts have already been dedicated to this subject. What is new is following how container technology and the role of Docker will develop. Lynis will be tracking these developments to ensure the security aspects. With containers still not being able to fully contain, companies and individuals might be sharing way too much they intended. Lynis will help detecting possible gaps.

Secure Dockerfile(s)

One of the first areas to secure Docker is building your images securely. With the new command lynis audit dockerfile, you can test your Dockerfile for security best practices.

Ubuntu Snappy

Another company, known for its Linux distribution Ubuntu, is Canonical with its product Snappy. Definitely something which will be used by Ubuntu users in the (near) future. Enough reason to ensure those areas are audited.

Operating Systems

Lynis has been tested on many different platforms and versions. From Solaris to lesser known Linux distributions, the tool runs on all of them.

Portable code

The big difference with benchmarks and other tools, is that it uses a “discover on the go” method. So it actually learns per machine what can be tested, how much is needed and what tools are available. This method has proven to be successful and one of the reasons why tools like OpenSCAP simply don’t take off. Most of you do not want to run binaries, have to compile things manually or have to read hundreds of unclear findings.

To ensure portability of our code, we regularly test it on different platforms and perform an extensive analysis on the related log file. Within Lynis 2.x we will continue this effort and focus on the key differences of each operating system.

Arch Linux

One of the great benefits of Linux is that it is open source and new features in software are quickly shared. Arch Linux being a “rolling release” distribution, means it is always up-to-date and using new great features. With the Lynis 2 releases, Arch Linux will be better supported. As they are one of the pioneers when it comes to new features, Lynis will keep an eye on them.

Gentoo

Gentoo and clones are still being used a lot. With the great support of Gentoo to include Lynis, we will keep on supporting this Linux distribution in the best possible way.

Red Hat

One of the giants in open source is Red Hat and their commercial product line. For those using clones like CentOS, Scientific Linux or Red Hat’s playground distribution Fedora, Lynis will leverage common used technologies. One of best known parts might be that of the Linux Audit framework.

SuSE SLES

Commercially available operating systems are interesting for corporate users. With the upcoming Lynis releases we will add additional support for commercial platforms like those of SuSE. This will include the detection of specific tools not found on other distributions.

Ubuntu

Originally Ubuntu was seen as a desktop distribution. During the last years it has become clear Ubuntu is also suitable for servers. With upcoming container technologies, Ubuntu will implement Snappy. Lynis will aim for including as many technologies as possible. By proper segmentation, audits will remain quick and at the same time the code base will be as simple as before.

Free and Commercial Support

Too many open source projects became closed source or abandoned after an organization got involved with its development. We are so passionate about our software and the community of users, that we want to keep Lynis open source and available to the community.

This means that the Lynis remains free and can be used as a standalone tool. At the same time it is part of the Lynis Enterprise solution, being the client which collects data and brings it to the central node.

Support

Good software needs the right support. If your business is relying on security tools like Lynis, you will benefit from having an up-to-date tool. To ensure you have the best possible tools in your toolbox, we continue to release often. Free users will benefit from the development efforts by the supporting company, while customers will benefit from a well-known tool, which is well-known and peer reviewed by the community.

Transformation

With Lynis version 2, we want to finish the transformation from a hobby project, to a well-known and rock-solid solution for system administrator and security professionals.

Lynis Features:

  • License: Open Source, GPLv3
  • Pricing: Free
  • Primary goal: Security auditing and system hardening
  • Developer: CISOfy
  • Project URL: https://cisofy.com/lynis/External link

Lynis Enterprise Features:

  • Additional plugins (e.g. file integrity, compliance)
  • Central management interface
  • Reporting possibilities
  • Automation, snippets and defensive hardening tools
  • Project URL: https://cisofy.com/lynis-enterprise/External link

Do you believe in open source and security auditing? Share this post in your social network and get the internet a safer place.

Related articles

Like to learn more? Here is a list of articles within the same category or having similar tags.

Feedback

Small picture of Michael Boelen

This article has been written by our Linux security expert Michael Boelen. With focus on creating high-quality articles and relevant examples, he wants to improve the field of Linux security. No more web full of copy-pasted blog posts.

Discovered outdated information or have a question? Share your thoughts. Thanks for your contribution!

Mastodon icon