Lce 4.4 Opsec Client Guide
Lce 4.4 Opsec Client Guide
Lce 4.4 Opsec Client Guide
4
OPSEC Client Guide
February 3, 2015
(Revision 1)
Table of Contents
Introduction ............................................................................................................................................................... 3
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Introduction
This document describes the 4.4.x OPSEC client that is available for Tenable Network Securitys Log Correlation Engine 4.4.
Please email any comments and suggestions to [email protected].
A working knowledge of Secure Shell (SSH), Log Correlation Engine (LCE), and SecurityCenter Continuous View
(SecurityCenter CV) operation and architecture is assumed. Familiarity with general log formats from various operating
systems, network devices and applications, as well as a basic understanding of Linux/Unix is also assumed.
This document describes the current LCE server (daemon) version of 4.4.x as it is used with the LCE 4.4.x OPSEC
Client.
Tips, examples, and best practices are highlighted with this symbol and white on blue text.
A Check Point Security Management Server is installed with the proper license and is running without any
configuration issue.
-
The Security Management Server should be accessed using SSH to get what we will call the Configuration
Prompt (which is not a regular terminal).
A Check Point SmartDashboard client is available to configure the Security Management Server. We will refer to the
server that hosts the SmartDashboard client as the Dashboard Server.
-
The Dashboard Server must be accessed through a user interface (not SSH), such as Remote Desktop
Connection.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
The Check Point OPSEC SDK has been downloaded and extracted on the machine running the LCE OPSEC Client.
Upon downloading the OPSEC SDK 6.0 for Linux, the required utilities are in OpsecSicUtils_linux30.tar. The
OPSEC SDK 6.0 for Linux can be found here.
The LCE OPSEC Client RPM package has been downloaded and a RHEL6 64-bit host is available on which to install
the client. The LCE OPSEC Client may also be referred to as the LEA Application, because it uses the OPSEC LEA to
pull logs from an OPSEC-compliant device.
Setting up an authenticated LEA connection on the Check Point Security Management Server
Log in to the Security Management Server via SSH as admin (not root).
2.
From the configuration prompt (see below), go into expert mode with the command expert, which requires a
password.
3.
4.
Edit the file fwopsec.conf. This file configures the port and authentication settings for the various server types
(SAM, LEA, ELA, CPMI, UAA, etc.). For LEA configuration, look for the lines starting with the text lea_server.
Update or add the highlighted settings below to enable an authenticated LEA connection on port 18185:
#
# (c) Copyright 1993-2008 Check Point Software Technologies Ltd.
# All rights reserved.
#
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
auth_port
port
18183
0
lea_server
lea_server
auth_port
port
18184
0
ela_server
ela_server
auth_port
port
18187
0
cpmi_server auth_port
18190
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
#
# uaa_server auth_port
19191
# uaa_server
port
0
#
lea_server auth_port 18185
lea_server port 0
lea_server auth_type sslca
Make note of the auth_port (18185 in this example) and the IP address of the Check Point Security
Management Server (192.168.2.32 in this example).
They will be placed into the <fw1-port> and <fw1-server> tags, respectively, when the LCE OPSEC Client policy
is created.
The first line, lea_server auth_port, turns on LEA authenticated connection on port 18185. The second line,
lea_server port 0, turns off LEA unauthenticated connection. If these lines are not present in the
fwopsec.conf file, add them. Save the file and exit the editor. After the fwopsec.conf file is updated, the
firewall service must be restarted. Use the following commands to stop, and then start the server:
# cpstop
SmartPortal: Stopping CPWMD
cpwd_admin:
Process CPWMD terminated
SmartPortal: Stopping CPHTTPD
cpwd_admin:
Process CPHTTPD terminated
Stopping SmartView Monitor daemon ...
SmartView Monitor daemon is not running
Stopping SmartView Monitor kernel ...
Driver is Down.
rtmstop: SmartView Monitor kernel is not loaded
# cpstart
cpstart: Power-Up self tests passed successfully
cpstart: Starting product - SVN Foundation
SVN Foundation: cpWatchDog already running
SVN Foundation: cpd already running
SVN Foundation started
cpstart: Starting product - VPN-1
FireWall-1: starting external VPN module -- OK
FireWall-1: Starting fwd
The LEA service is now enabled and running on the Check Point device.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
1.
Connect to the Dashboard Servers desktop and start the SmartDashboard application.
2.
Connect to the Security Management Server using the SmartDashboard username. Note: This is not the same user
that logs into the Security Management Server via SSH; it is a SmartDashboard administrative user, not a user on the
Security Management Server.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
3.
Click the menu item Manage -> Network Objects... to bring up the Network Objects dialog.
4.
In the Network Objects dialog, select New... -> Node -> Host... to enter new host node information.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
5.
In the New Node window, fill in the Name and IP Address using the hostname and IP address of the LCE OPSEC
Client host. Click OK when done. Select Close on the Network Objects window.
6.
In the SmartDashboard locate the Objects Tree window. The objects tree can be displayed or hidden using the
menu item View -> Objects Tree. Verify the new node is in the Objects Tree tab Network Objects, under Nodes.
The next series of steps is to tell the Security Management server about the LCE OPSEC Client (as opposed to the LEA
server).
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
1.
In the Objects Tree window (see step six directly above), click on the Servers and OPSEC Applications tab. In this
tab view, locate the item Servers and OPSEC Applications -> OPSEC Application. Right-click this item and select
New OPSEC Application.... This will bring up the OPSEC Application Properties dialog.
2.
Fill in the OPSEC Application Properties dialog (shown below) with information about the LCE OPSEC Client host.
Enter the LCE OPSEC Client hostname under Name, and choose the correct host from the Host drop-down box.
Under Client Entities select the LEA checkbox. This step describes the LCE OPSEC Client to the SmartDashboard
and the Security Management Server.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
10
To set up an authenticated connection, the section Secure Internal Communication (SIC) must be completed:
1.
Click on the Communication button of the OPSEC Application Properties dialog shown above. This will bring up
the SIC Dialog, which requests an Activation Key that is created by the user. This is also referred to as the SIC
Password and will be used again later on.
2.
In the SIC Dialog (shown above), enter an activation key that is created by the user for the LEA connection.
3.
Click Initialize to accept the key. The Trust state value should show Initialized but trust not established. This is
OK at this time. The value will change to Trust established when the certificate is pulled by the LEA application.
4.
5.
Copy down the DN field from the OPSEC Application Properties dialog. This value is referred to as the OPSEC
client DN and will be used by the LCE OPSEC client in the <opsec-client-dn> policy element.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
11
Make note of the Name in the OPSEC Application Properties window it will be used later in conjunction with
the opsec_pull_cert command.
There is another DN needed by the LCE OPSEC Client that is referred to as the OPSEC server DN. This is the DN of the
Check Point server. To get this value,
1.
Click the menu item Manage -> Network Objects... to bring up the Network Objects dialog.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
12
2.
In the Network Objects dialog, set the drop-down filter labeled Show to Security Gateways to identify the
Security Management Server machine.
3.
Select the Security Management Server machine and click Edit... to bring up the Check Point Host dialog.
4.
Verify that the IP address matches that of the Security Management Server, to ensure you will get the
correct DN.
2.
Locate the Secure Information Communication (SIC) section and copy down the OPSEC Server DN value
to be used later in the LCE OPSEC Client policy file.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
13
3.
5.
Click Cancel.
The OPSEC Server DN value isnt visible in some versions of the Check Point SmartDashboard. Using the cpca_client
lscert -kind SIC command on the Security Management Server will also show the OPSEC Server DN value, as shown
below:
# expert
Enter expert password:
You are in expert mode now.
# cpca_client lscert -kind SIC
Operation succeeded. rc=0. 1 certs found.
Subject = CN=cpmodule,O=cpmodule..bbj6k8
Status = Valid
Kind = SIC
Serial = 56267
Not_Before: Mon Oct 8 21:51:52 2012
Not_After: Mon Jan 11 20:43:04 2038
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
14
additional rule should be required. It is recommended that the rule tracking is not set to Log, because this would create
additional logs for each instance of the LCE OPSEC Client connection to the OPSEC interface.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
15
On the Install Database dialog, select the firewall being configured and click OK. This will install the changes to the
Security Management Server.
2.
3.
Enter and confirm the Secret Key. This key will be used later when configuring the LCE OPSEC Client environment.
# fw putkey 192.168.7.222
Enter secret key:
Again secret key:
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
16
OK
].
Make sure DNS is configured in /etc/resolv.conf on the host where the LCE OPSEC Client is installed.
Command
Install
Start
Stop
Status
Remove
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
17
2.
3.
4.
5.
# cd /opt
# unzip OPSEC_SDK_6.0_Linux.zip
Archive: OPSEC_SDK_6.0_Linux.zip
inflating: OPSEC_SDK_6_0.linux22.tar.gz
inflating: OPSEC_SDK_6_0.linux30.tar.gz
inflating: RoamAdmin_linux22.tar.gz
inflating: RoamAdmin_linux30.tar.gz
inflating: OpsecSicUtils_linux30.tar.gz
inflating: OpsecSicUtils_linux22.tar.gz
# tar -xf OpsecSicUtils_linux30.tar.gz
# cd linux30/
# ls
opsec_pull_cert opsec_putkey
# cp opsec_pull_cert opsec_putkey /opt/lce_opsec
6.
Run the following command from the /opt/lce directory: opsec_putkey <IP of Security Management
Server>
7.
Enter the secret key that was created in the previous step with the fw putkey command. Confirm the secret key.
This creates several SSL files that begin with the prefix CKP.
# ./opsec_putkey 192.168.7.44
Please enter secret key:
Please enter secret key again:
Key for host 192.168.7.44 saved to file
8.
The two files CKP_shmem_._sslsess.C and CKP_shmem_._sslauthkeys.C will be used to connect to the
Security Management Server.
9.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
18
If the opsec_pull_cert command hangs, you may need to SSH to and log in to the Security Management Server, type
expert, and run the cpstop and cpstart commands to restart the Check Point module.
# cpstop
SmartPortal: Stopping CPWMD
cpwd_admin:
Process CPWMD terminated
SmartPortal: Stopping CPHTTPD
cpwd_admin:
Process CPHTTPD terminated
Stopping SmartView Monitor daemon ...
SmartView Monitor daemon is not running
Stopping SmartView Monitor kernel ...
Driver is Down.
rtmstop: SmartView Monitor kernel is not loaded
# cpstart
cpstart: Power-Up self tests passed successfully
cpstart: Starting product - SVN Foundation
SVN Foundation: cpWatchDog already running
SVN Foundation: cpd already running
10. Verify the opsec.p12 (which was created in the previous step and is the OPSEC certificate file) is present in the
/opt/lce_opsec directory by performing the following command:
# ls -la opsec.p12
-rw-r--r--. 1 root root 2641 Jan 22 13:15 opsec.p12
Make note of the name of the OPSEC certificate file as it will be required when the LCE OPSEC Client policy is
created.
2.
3.
4.
A sample LCE server policy file shown below can be used by changing the fw1-server, opsec-certificate, opsecclient-dn, and opsec-server-dn values in a text editor.
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<options xmlns:xi="http://www.w3.org/2003/XInclude">
<log-directory>/opt/lce_opsec/logs/</log-directory>
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
19
<fw1-server>192.168.7.44</fw1-server>
<fw1-port>18185</fw1-port>
<dateformat>STD</dateformat>
<authenticated>yes</authenticated>
<opsec-certificate>opsec.p12</opsec-certificate>
<opsec-client-dn>CN=LCE_OPSEC_test,O=cpmodule..bbj6k8</opsec-client-dn>
<opsec-server-dn>cn=cp_mgmt,O=cpmodule..bbj6k8</opsec-server-dn>
<heartbeat-frequency>300</heartbeat-frequency>
<statistics-frequency>60</statistics-frequency>
<compress-events>1</compress-events>
</options>
After the information is added to the LCE OPSEC Client policy, save the file as opsecpolicy_rhel_opsec.lcp, and then
upload it to SecurityCenter. To do this, log in to SecurityCenter as the admin user and select Resources followed by LCE
Clients. Select the LCE OPSEC client from the list of clients. Then select Authorize if the client hasnt previously been
authorized.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
20
Then choose Assign Policy from the LCE Clients menu. From the Assign Policy window select Import.
In the Import LCE Client Policy dialog box use the prefix opsecpolicy, select rhel from the OS type drop-down menu,
and then choose opsec from the Client Type drop-down menu.Then choose Browse, followed by Browse, locate the
opsecpolicy_rhel_opsec.lcp, and choose Upload.
From the Assign Policy menu select the opsecpolicy_rhel_opsec.lcp and then choose Assign.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
21
If the policy was applied successfully, the following should be displayed at the top of the LCE Clients window and the correct
policy should be displayed in the Policy column for the LCE OPSEC Client.
Policy Parameters
The following is a list of all valid keys available for use with the LCE OPSEC Client policies:
Key Name
Description
Example Values
fw1-server
192.168.1.1
fw1-port
18185
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
22
opseccertificate
The path to the opsec.p12 file pulled from the Check Point.
/opt/lce_opsec/opsec.p12
opsec-client-dn
CN=LCE-OPSECtest,O=cpmodule..bbj6k8
opsec-server-dn
cn=cp_mgmt,o=cpmodule..bbj6k8
authenticated
YES
dateformat
STD
Examples:
STD 2014-10-18 19:07:53
UNIX 1413673763
CP 18Oct2014 19:32:10
syslog-server
192.168.1.66:514
debug-level
INFO
VERBOSE
INFO
WARN
ERROR
NONE.
log-directory
/opt/lce_opsec/logs/
local-ip-net
192.168.1.0/24
A positive integer.
statisticsfrequency
A positive integer.
monitor-period
1000
compress-events
0 or 1
(0=off,1=on)
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
23
compressionlevel
0-9
minimumcompressionratio
1.0-10.0
minimumcompressioninput-size
0-1500
event-queuetimeout
1-60
Description
--input-conf-file
-i
--output-policy-file
-o
--help
-h
--version
-v
Once saved as a policy file, the converted file may be imported to the LCE Client Manager and assigned to the appropriate
client(s).
The following is an example of how to convert an lce_opsec.conf to a policy file (for RHEL), and add the policy that is
created to the LCE:
# /opt/lce/daemons/lce_conf_file_converter -i
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
24
/opt/lce_opsec/lce_opsec.conf -o ~/lce_opsec_conf.lcp
Successfully converted /opt/lce_client/lce_opsec.conf to policy
/root/lce_opsec_conf.lcp.
# /opt/lce/daemons/lce_client_manager --import-policy
~/lce_opsec_conf.lcp --output-policy my-converted-conf
--client-type opsec --os-type rhel
/opt/lce/daemons/policies/my-converted-conf_rhel_opsec.lcp
If there is an error, a non-zero error code will be displayed.
The policy that was added to the LCE can be found in SecurityCenter CV by logging in as the Admin user, and selecting
Resources followed by LCE Clients. Select the client that requires the policy from the list of clients, and choose Assign
Policy to view the available policies. Choose the imported policy, and select Assign to apply the policy to the LCE OPSEC
Client.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
25
By selecting Normalized Event Summary at the top of the Event Analysis window a list of filters will be shown. Choose the
option Type Summary the Check Point data will be organized by type as shown below:
From the Type Summary view selecting the number 3 next to the login-failure will display the associated normalized
event name.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
26
If more detailed information is required about these login-failure events, Jump to Raw Syslog Events can be chosen from
the upper right hand corner of the Event Analysis window. In the Raw Syslog Events view selecting the plus symbol will
display the complete log from the Check Point Firewall as shown below:
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
27
Log Correlation Engine 4.2 Architecture Guide provides a high-level view of LCE architecture and supported
platforms/environments.
Log Correlation Engine 4.4 Administrator and User Guide describes installation, configuration, and operation of
the LCE.
Log Correlation Engine 4.4 Quick Start Guide provides basic instructions to quickly install and configure an LCE
server. A more detailed description of configuration and management of an LCE server is provided in the LCE
Administration and User Guide document.
Log Correlation Engine 4.4 Client Guide how to configure, operate, and manage the various Linux, Unix, Windows,
NetFlow, OPSEC, and other clients.
Log Correlation Engine 4.4 OPSEC Client Guide how to configure, operate, and manage the OPSEC Client.
LCE 4.4 High Availability Large Scale Deployment Guide details various configuration methods, architecture
examples, and hardware specifications for performance and high availability of large scale deployments of Tenables
Log Correlation Engine (LCE).
LCE Best Practices Learn how to best leverage the Log Correlation Engine in your enterprise.
Tenable Event Correlation outlines various methods of event correlation provided by Tenable products and
describes the type of information leveraged by the correlation, and how this can be used to monitor security and
compliance on enterprise networks.
Tenable Products Plugin Families provides a description and summary of the plugin families for Nessus, Log
Correlation Engine, and the Passive Vulnerability Scanner.
Log Correlation Engine Log Normalization Guide explanation of the LCEs log parsing syntax with extensive
examples of log parsing and manipulating the LCEs .prm libraries.
Log Correlation Engine TASL Reference Guide explanation of the Tenable Application Scripting Language with
extensive examples of a variety of correlation rules.
Log Correlation Engine 4.0 Statistics Daemon Guide configuration, operation, and theory of the LCEs statistic
daemon used to discover behavioral anomalies.
Log Correlation Engine 3.6 Large Disk Array Install Guide configuration, operation, and theory for using the LCE in
large disk array environments.
Example Custom LCE Log Parsing - Minecraft Server Logs describes how to create a custom log parser using
Minecraft as an example.
Documentation is also available for Nessus, the Passive Vulnerability Scanner, and SecurityCenter through the Tenable
Support Portal located at https://support.tenable.com/.
There are also some relevant postings at Tenables blog located at http://www.tenable.com/blog and at the Tenable
Discussion Forums located at https://discussions.nessus.org/community/lce.
For further information, please contact Tenable at [email protected], [email protected], or visit our web site at
http://www.tenable.com/.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
28
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
29
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
30
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this
code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
libCURL
COPYRIGHT AND PERMISSION NOTICE
Copyright (c) 1996 - 2011, Daniel Stenberg, <[email protected]>.
All rights reserved.
Permission to use, copy, modify, and distribute this software for any purpose
with or without fee is hereby granted, provided that the above copyright
notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not
be used in advertising or otherwise to promote the sale, use or other dealings
in this Software without prior written authorization of the copyright holder.
OpenSSL
Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this
software must display the following acknowledgment:
"This product includes software developed by the OpenSSL Project
for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
endorse or promote products derived from this software without
prior written permission. For written permission, please contact
[email protected].
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
31
Mark Adler
[email protected]
Hash functions
Hash functions is Copyright 2004-2008 by Paul Hsieh, and distributed under the LGPL 2.1 license.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
32
OpenBSM
OpenBSM is covered by a number of copyrights, with licenses being either two or three clause BSD licenses. Individual file
headers should be consulted for specific copyrights on specific components.
libpcap
License: BSD
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The names of the authors may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
libmcrypt
libmcrypt (part of the mcrypt project) is distributed under the LGPL 2.1 license.
libxml2
Libxml2 is the XML C parser and toolkit developed for the Gnome project (but usable outside of the Gnome platform), it is
free software available under the MIT License.
Copyright 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
33