Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BUG: -o pipefail is not work on FreeBSD's /bin/sh. because it isn't bash #91

Closed
sheo0147 opened this issue Jun 3, 2016 · 1 comment
Closed

Comments

@sheo0147
Copy link

sheo0147 commented Jun 3, 2016

Vuls supports FreeBSD just now.
It is awesome. Very very thanks to the work!

I found 1 problem.

see following line.
DEBU[0000] SSH executed. cmd: set -o pipefail; uname, status: <nil>

This line is one of the debug log.

I think vuls assumes that target hosts shell is bash, but FreeBSD's shell is not bash.

So, on FreeBSD, you cannot use -o pipefail option.

@kotakanbe
Copy link
Member

  • Run with csh
    Fixed in Enable to detect vulnerabilities on FreeBSD #98
    Now vuls execute commands without -o pipefail option on FreeBSD.
    You don't need to create a user with bash login shell.
  • non-root privilege
    There is no need to use root privilege user on FreeBSD servers.
    Vuls can scan using non-root users on FreeBSD.

(root privilege is needed on Amazon, CentOS, RHEL, Ubuntu and Debian for now)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants