Stable release |
3.2.3 / March 3, 2010
|
---|---|
Operating system | Unix, Linux, Solaris |
Available in | English |
Type | Security Audit, Intrusion Detection System |
License | GPL |
Website | http://www.nongnu.org/tiger/ |
Tiger is a security software for Unix-like computer operating systems. It can be used both as a security audit and intrusion detection system and supports multiple UNIX platforms. Tiger is free under the GPL license and unlike other tools, it needs only of POSIX tools, and is written entirely in shell language.
It has not been maintained since the 3.2.3 release in September 2007. Its a good security.
Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford started Tiger in 1992 at Texas A&M University. It was written at the same time that COPS, SATAN and Internet Scanner were. Eventually, after the 2.2.4 version, which was released in 1994, development of Tiger stalled.
Three different forks evolved after Tiger: TARA (developed by Advanced Research Computing ), one internally developed by the HP corporation by Bryan Gartner and the last one developed for the Debian GNU/Linux distribution by Javier Fernández-Sanguino (current upstream maintainer).
These forks were merged on May 2002 and in June 2002 the new source code, now labeled as the 3.0 release, was published at the Savannah site. The 3.1 release was distributed in October 2002, it was considered an unstable release and included some new checks, a new autoconf script for automatic configuration, but mostly included fixes for bugs found after testing Tiger in Debian GNU/Linux and in other operating systems. Over 2200 lines of code and documentation were included in this release.
The release 3.2 was published in May 2003. It improved the stability of the tool and fixed some security problems including a buffer overflow in realpath.
The 3.2.1 release was published in October 2003. It introduced new checks including: check_ndd (for HPUX and SunOS systems), check_passwspec (for Linux and HPUX) check_trusted (for HPUX), check_rootkit (which can interact with the chkrootkit tool), check_xinetd, and, finally, aide_run and integrit_run (integrity file checkers).