2018-08-21 22:01:50 +02:00
|
|
|
# CIS Debian 7 Hardening Utility functions
|
|
|
|
|
2019-03-31 22:15:09 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
# debian version check
|
|
|
|
#
|
|
|
|
|
|
|
|
is_debian_9()
|
|
|
|
{
|
|
|
|
if $(cat /etc/debian_version | grep -q "^9.[0-9]"); then
|
|
|
|
debug "Debian version is 9.*."
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Debian version is not 9.*."
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-04-11 20:50:30 +02:00
|
|
|
is_debian_10()
|
|
|
|
{
|
2019-04-11 20:57:14 +02:00
|
|
|
if $(cat /etc/debian_version | grep -q "^buster"); then
|
|
|
|
debug "Debian version is buster/10."
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=0
|
|
|
|
else
|
2019-04-11 20:57:14 +02:00
|
|
|
debug "Debian version is not buster/10."
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
2019-04-14 14:09:04 +02:00
|
|
|
|
|
|
|
is_64bit_arch()
|
|
|
|
{
|
|
|
|
if $(uname -m | grep -q "64"); then
|
|
|
|
FNRET=0
|
|
|
|
debug "This machine architecture is 64 bit."
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
debug "This machine architecture is not 64 bit."
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-08-21 22:01:50 +02:00
|
|
|
#
|
|
|
|
# Sysctl
|
|
|
|
#
|
|
|
|
|
|
|
|
has_sysctl_param_expected_result() {
|
|
|
|
local SYSCTL_PARAM=$1
|
|
|
|
local EXP_RESULT=$2
|
|
|
|
|
|
|
|
if [ "$($SUDO_CMD sysctl $SYSCTL_PARAM 2>/dev/null)" = "$SYSCTL_PARAM = $EXP_RESULT" ]; then
|
|
|
|
FNRET=0
|
|
|
|
elif [ $? = 255 ]; then
|
|
|
|
debug "$SYSCTL_PARAM does not exist"
|
|
|
|
FNRET=255
|
|
|
|
else
|
|
|
|
debug "$SYSCTL_PARAM should be set to $EXP_RESULT"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
does_sysctl_param_exists() {
|
|
|
|
local SYSCTL_PARAM=$1
|
|
|
|
if [ "$($SUDO_CMD sysctl -a 2>/dev/null |grep "$SYSCTL_PARAM" -c)" = 0 ]; then
|
|
|
|
FNRET=1
|
|
|
|
else
|
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
set_sysctl_param() {
|
|
|
|
local SYSCTL_PARAM=$1
|
|
|
|
local VALUE=$2
|
|
|
|
debug "Setting $SYSCTL_PARAM to $VALUE"
|
|
|
|
if [ "$(sysctl -w $SYSCTL_PARAM=$VALUE 2>/dev/null)" = "$SYSCTL_PARAM = $VALUE" ]; then
|
2018-12-02 19:43:43 +01:00
|
|
|
echo "$SYSCTL_PARAM = $VALUE" >> /etc/sysctl.conf
|
2018-08-21 22:01:50 +02:00
|
|
|
FNRET=0
|
|
|
|
elif [ $? = 255 ]; then
|
|
|
|
debug "$SYSCTL_PARAM does not exist"
|
|
|
|
FNRET=255
|
|
|
|
else
|
|
|
|
warn "$SYSCTL_PARAM failed!"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Dmesg
|
|
|
|
#
|
|
|
|
|
|
|
|
does_pattern_exist_in_dmesg() {
|
|
|
|
local PATTERN=$1
|
|
|
|
if $($SUDO_CMD dmesg | grep -qE "$PATTERN"); then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# File
|
|
|
|
#
|
|
|
|
|
|
|
|
does_file_exist() {
|
|
|
|
local FILE=$1
|
|
|
|
if $SUDO_CMD [ -e $FILE ]; then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
has_file_correct_ownership() {
|
|
|
|
local FILE=$1
|
|
|
|
local USER=$2
|
|
|
|
local GROUP=$3
|
|
|
|
local USERID=$(id -u $USER)
|
|
|
|
local GROUPID=$(getent group $GROUP | cut -d: -f3)
|
|
|
|
debug "$SUDO_CMD stat -c '%u %g' $FILE"
|
|
|
|
if [ "$($SUDO_CMD stat -c "%u %g" $FILE)" = "$USERID $GROUPID" ]; then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
has_file_correct_permissions() {
|
|
|
|
local FILE=$1
|
|
|
|
local PERMISSIONS=$2
|
|
|
|
|
|
|
|
if [ $($SUDO_CMD stat -L -c "%a" $1) = "$PERMISSIONS" ]; then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
does_pattern_exist_in_file() {
|
|
|
|
local FILE=$1
|
|
|
|
local PATTERN=$2
|
|
|
|
|
|
|
|
debug "Checking if $PATTERN is present in $FILE"
|
|
|
|
if $SUDO_CMD [ -r "$FILE" ] ; then
|
|
|
|
debug "$SUDO_CMD grep -qE -- '$PATTERN' $FILE"
|
|
|
|
if $($SUDO_CMD grep -qE -- "$PATTERN" $FILE); then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
debug "File $FILE is not readable!"
|
|
|
|
FNRET=2
|
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
add_end_of_file() {
|
|
|
|
local FILE=$1
|
|
|
|
local LINE=$2
|
|
|
|
|
|
|
|
debug "Adding $LINE at the end of $FILE"
|
|
|
|
backup_file "$FILE"
|
|
|
|
echo "$LINE" >> $FILE
|
|
|
|
}
|
|
|
|
|
|
|
|
add_line_file_before_pattern() {
|
|
|
|
local FILE=$1
|
|
|
|
local LINE=$2
|
|
|
|
local PATTERN=$3
|
|
|
|
|
|
|
|
backup_file "$FILE"
|
|
|
|
debug "Inserting $LINE before $PATTERN in $FILE"
|
|
|
|
PATTERN=$(sed 's@/@\\\/@g' <<< $PATTERN)
|
|
|
|
debug "sed -i '/$PATTERN/i $LINE' $FILE"
|
|
|
|
sed -i "/$PATTERN/i $LINE" $FILE
|
|
|
|
FNRET=0
|
|
|
|
}
|
|
|
|
|
2018-11-02 16:56:44 +01:00
|
|
|
add_line_file_after_pattern() {
|
|
|
|
local FILE=$1
|
|
|
|
local LINE=$2
|
|
|
|
local PATTERN=$3
|
|
|
|
|
|
|
|
backup_file "$FILE"
|
|
|
|
debug "Inserting $LINE before $PATTERN in $FILE"
|
|
|
|
PATTERN=$(sed 's@/@\\\/@g' <<< $PATTERN)
|
|
|
|
debug "sed -i '/$PATTERN/a $LINE' $FILE"
|
|
|
|
sed -i "/$PATTERN/a $LINE" $FILE
|
|
|
|
FNRET=0
|
|
|
|
}
|
|
|
|
|
2018-08-21 22:01:50 +02:00
|
|
|
replace_in_file() {
|
|
|
|
local FILE=$1
|
|
|
|
local SOURCE=$2
|
|
|
|
local DESTINATION=$3
|
|
|
|
|
|
|
|
backup_file "$FILE"
|
|
|
|
debug "Replacing $SOURCE to $DESTINATION in $FILE"
|
|
|
|
SOURCE=$(sed 's@/@\\\/@g' <<< $SOURCE)
|
|
|
|
debug "sed -i 's/$SOURCE/$DESTINATION/g' $FILE"
|
|
|
|
sed -i "s/$SOURCE/$DESTINATION/g" $FILE
|
|
|
|
FNRET=0
|
|
|
|
}
|
|
|
|
|
|
|
|
delete_line_in_file() {
|
|
|
|
local FILE=$1
|
|
|
|
local PATTERN=$2
|
|
|
|
|
|
|
|
backup_file "$FILE"
|
|
|
|
debug "Deleting lines from $FILE containing $PATTERN"
|
|
|
|
PATTERN=$(sed 's@/@\\\/@g' <<< $PATTERN)
|
|
|
|
debug "sed -i '/$PATTERN/d' $FILE"
|
|
|
|
sed -i "/$PATTERN/d" $FILE
|
|
|
|
FNRET=0
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Users and groups
|
|
|
|
#
|
|
|
|
|
|
|
|
does_user_exist() {
|
|
|
|
local USER=$1
|
|
|
|
if $(getent passwd $USER >/dev/null 2>&1); then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
does_group_exist() {
|
|
|
|
local GROUP=$1
|
|
|
|
if $(getent group $GROUP >/dev/null 2>&1); then
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Service Boot Checks
|
|
|
|
#
|
|
|
|
|
|
|
|
is_service_enabled() {
|
|
|
|
local SERVICE=$1
|
2019-03-31 22:15:09 +02:00
|
|
|
is_debian_9
|
|
|
|
if [ $FNRET = 0 ]; then
|
|
|
|
if [ $(systemctl is-enabled $SERVICE | grep -wc "^enabled") -eq 1 ]; then
|
|
|
|
debug "Service $SERVICE is enabled"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Service $SERVICE is disabled"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
2018-08-21 22:01:50 +02:00
|
|
|
else
|
2019-03-31 22:15:09 +02:00
|
|
|
if [ $($SUDO_CMD find /etc/rc?.d/ -name "S*$SERVICE" -print | wc -l) -gt 0 ]; then
|
|
|
|
debug "Service $SERVICE is enabled"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Service $SERVICE is disabled"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
2018-08-21 22:01:50 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Kernel Options checks
|
|
|
|
#
|
|
|
|
|
|
|
|
is_kernel_option_enabled() {
|
|
|
|
local KERNEL_OPTION="$1"
|
|
|
|
local MODULE_NAME=""
|
|
|
|
if [ $# -ge 2 ] ; then
|
|
|
|
MODULE_NAME="$2"
|
|
|
|
fi
|
|
|
|
if $SUDO_CMD [ -r "/proc/config.gz" ] ; then
|
|
|
|
RESULT=$($SUDO_CMD zgrep "^$KERNEL_OPTION=" /proc/config.gz) || :
|
|
|
|
elif $SUDO_CMD [ -r "/boot/config-$(uname -r)" ] ; then
|
|
|
|
RESULT=$($SUDO_CMD grep "^$KERNEL_OPTION=" "/boot/config-$(uname -r)") || :
|
|
|
|
fi
|
|
|
|
ANSWER=$(cut -d = -f 2 <<< "$RESULT")
|
|
|
|
if [ "x$ANSWER" = "xy" ]; then
|
|
|
|
debug "Kernel option $KERNEL_OPTION enabled"
|
|
|
|
FNRET=0
|
|
|
|
elif [ "x$ANSWER" = "xn" ]; then
|
|
|
|
debug "Kernel option $KERNEL_OPTION disabled"
|
|
|
|
FNRET=1
|
|
|
|
else
|
|
|
|
debug "Kernel option $KERNEL_OPTION not found"
|
|
|
|
FNRET=2 # Not found
|
|
|
|
fi
|
|
|
|
|
|
|
|
if $SUDO_CMD [ "$FNRET" -ne 0 -a -n "$MODULE_NAME" -a -d "/lib/modules/$(uname -r)" ] ; then
|
|
|
|
# also check in modules, because even if not =y, maybe
|
|
|
|
# the admin compiled it separately later (or out-of-tree)
|
|
|
|
# as a module (regardless of the fact that we have =m or not)
|
|
|
|
debug "Checking if we have $MODULE_NAME.ko"
|
|
|
|
local modulefile=$($SUDO_CMD find "/lib/modules/$(uname -r)/" -type f -name "$MODULE_NAME.ko")
|
|
|
|
if $SUDO_CMD [ -n "$modulefile" ] ; then
|
|
|
|
debug "We do have $modulefile!"
|
|
|
|
# ... but wait, maybe it's blacklisted? check files in /etc/modprobe.d/ for "blacklist xyz"
|
|
|
|
if grep -qRE "^\s*blacklist\s+$MODULE_NAME\s*$" /etc/modprobe.d/ ; then
|
|
|
|
debug "... but it's blacklisted!"
|
|
|
|
FNRET=1 # Not found (found but blacklisted)
|
|
|
|
# FIXME: even if blacklisted, it might be present in the initrd and
|
|
|
|
# be insmod from there... but painful to check :/ maybe lsmod would be enough ?
|
|
|
|
fi
|
|
|
|
FNRET=0 # Found!
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Mounting point
|
|
|
|
#
|
|
|
|
|
|
|
|
# Verify $1 is a partition declared in fstab
|
|
|
|
is_a_partition() {
|
2018-11-11 16:53:47 +01:00
|
|
|
local PARTITION=$1
|
2018-08-21 22:01:50 +02:00
|
|
|
FNRET=128
|
2018-11-21 08:45:33 +01:00
|
|
|
if $(grep "[[:space:]]*${PARTITION}[[:space:]]*" /etc/fstab | grep -vqE "^#"); then
|
2018-08-21 22:01:50 +02:00
|
|
|
debug "$PARTITION found in fstab"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Unable to find $PARTITION in fstab"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Verify that $1 is mounted at runtime
|
|
|
|
is_mounted() {
|
2018-11-11 16:53:47 +01:00
|
|
|
local PARTITION=$1
|
2018-08-21 22:01:50 +02:00
|
|
|
if $(grep -q "[[:space:]]$1[[:space:]]" /proc/mounts); then
|
|
|
|
debug "$PARTITION found in /proc/mounts, it's mounted"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Unable to find $PARTITION in /proc/mounts"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Verify $1 has the proper option $2 in fstab
|
|
|
|
has_mount_option() {
|
|
|
|
local PARTITION=$1
|
|
|
|
local OPTION=$2
|
|
|
|
if $(grep "[[:space:]]$1[[:space:]]" /etc/fstab | grep -vE "^#" | awk {'print $4'} | grep -q "$2"); then
|
|
|
|
debug "$OPTION has been detected in fstab for partition $PARTITION"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Unable to find $OPTION in fstab for partition $PARTITION"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-08-23 21:25:46 +02:00
|
|
|
# Verify option $2 in $1 service
|
|
|
|
has_mount_option_systemd() {
|
|
|
|
local SERVICENAME=$1
|
|
|
|
local OPTION=$2
|
|
|
|
if $(grep -i "options" "$SERVICENAME" | grep -vE "^#" | grep -q "$2"); then
|
|
|
|
debug "$OPTION has been detected in systemd service $SERVICENAME"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Unable to find $OPTION in systemd service $SERVICENAME"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-08-21 22:01:50 +02:00
|
|
|
# Verify $1 has the proper option $2 at runtime
|
|
|
|
has_mounted_option() {
|
|
|
|
local PARTITION=$1
|
|
|
|
local OPTION=$2
|
|
|
|
if $(grep "[[:space:]]$1[[:space:]]" /proc/mounts | awk {'print $4'} | grep -q "$2"); then
|
|
|
|
debug "$OPTION has been detected in /proc/mounts for partition $PARTITION"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "Unable to find $OPTION in /proc/mounts for partition $PARTITION"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Setup mount option in fstab
|
2018-11-14 19:47:55 +01:00
|
|
|
# Notice: The format of the entry in the fstab file must be in the format shown in the following example, otherwise an error may occur.
|
2018-08-21 22:01:50 +02:00
|
|
|
add_option_to_fstab() {
|
|
|
|
local PARTITION=$1
|
|
|
|
local OPTION=$2
|
|
|
|
debug "Setting $OPTION for $PARTITION in fstab"
|
|
|
|
backup_file "/etc/fstab"
|
2018-11-14 19:47:55 +01:00
|
|
|
# For example :
|
|
|
|
# local PARTITION="/home"
|
|
|
|
# local OPTION="nosuid"
|
|
|
|
# UUID=40327bc9-f9d1-5816-a312-df307cc8732e /home ext4 errors=remount-ro 0 2
|
|
|
|
# UUID=40327bc9-f9d1-5816-a312-df307cc8732e /home ext4 errors=remount-ro,nosuid 0 2
|
|
|
|
# debug "Sed command : sed -ie \"s;\(.*\)\(\s*\)\s\($PARTITION\)\s\(\s*\)\(\w*\)\(\s*\)\(\w*\)*;\1\2 \3 \4\5\6\7,$OPTION;\" /etc/fstab"
|
2018-11-21 08:45:33 +01:00
|
|
|
# sed -ie "s;\(^[^#].*${PARTITION}\)\(\s.*\)\(\s\w.*\)\(\s[0-2]\s*[0-2]\);\1\2\3,${OPTION}\4;" /etc/fstab
|
2018-11-21 10:32:59 +01:00
|
|
|
MOUNT_OPTION=$(grep -v "^#" /etc/fstab | awk '$2=="'${PARTITION}'" {print $4}')
|
2018-12-05 19:41:44 +01:00
|
|
|
CURLINE=$(grep -v "^#" /etc/fstab -n | grep "${PARTITION}" | awk -F: '{print $1}')
|
2018-11-21 10:32:59 +01:00
|
|
|
#This case is for option of starting with "no", example: nosuid noexec nodev
|
|
|
|
NOTNOOPTION=$(echo $OPTION | cut -c 3-)
|
2018-11-21 08:45:33 +01:00
|
|
|
|
|
|
|
if [ "${MOUNT_OPTION}" == "defaults" ]; then
|
2018-11-21 10:32:59 +01:00
|
|
|
if [ "$OPTION" == "noexec" ]; then
|
|
|
|
NEWOP='rw,nosuid,nodev,noexec,auto,async'
|
|
|
|
else
|
|
|
|
NEWOP='rw,nosuid,nodev,auto,async'
|
|
|
|
fi
|
|
|
|
sed -i "${CURLINE}s/$MOUNT_OPTION/$NEWOP/" /etc/fstab
|
2018-11-21 09:23:04 +01:00
|
|
|
#This case is for option of starting with "no", example: nosuid noexec nodev
|
2018-11-21 10:32:59 +01:00
|
|
|
elif [ $(echo $MOUNT_OPTION | grep -cw ${NOTNOOPTION}) -gt 0 ]; then
|
|
|
|
sed -i "${CURLINE}s/${NOTNOOPTION}/${OPTION}/" /etc/fstab
|
|
|
|
elif [ $(echo $MOUNT_OPTION | grep -cw $OPTION) -eq 0 ]; then
|
|
|
|
sed -i "${CURLINE}s/${MOUNT_OPTION}/${MOUNT_OPTION},${OPTION}/" /etc/fstab
|
2018-11-21 08:45:33 +01:00
|
|
|
fi
|
2018-08-21 22:01:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
remount_partition() {
|
|
|
|
local PARTITION=$1
|
|
|
|
debug "Remounting $PARTITION"
|
|
|
|
mount -o remount $PARTITION
|
|
|
|
}
|
|
|
|
|
2018-08-24 23:09:03 +02:00
|
|
|
# Setup mount option in systemd
|
|
|
|
add_option_to_systemd() {
|
|
|
|
local SERVICEPATH=$1
|
|
|
|
local OPTION=$2
|
|
|
|
local SERVICENAME=$3
|
|
|
|
debug "Setting $OPTION for in systemd"
|
|
|
|
backup_file "$SERVICEPATH"
|
|
|
|
systemctl stop $SERVICENAME
|
|
|
|
# For example :
|
|
|
|
# Options=mode=1777,strictatime,nosuid
|
|
|
|
# Options=mode=1777,strictatime,nosuid,nodev
|
|
|
|
#debug "Sed command : sed -ie "s;\(^Options.*=mode=[1,2,4,7][1,2,4,7][1,2,4,7][1,2,4,7].*\);\1,$OPTION;\" $SERVICEPATH"
|
|
|
|
sed -ie "s;\(^Options.*=mode=[1,2,4,7][1,2,4,7][1,2,4,7][1,2,4,7].*\);\1,$OPTION;" $SERVICEPATH
|
|
|
|
systemctl daemon-reload
|
2018-12-02 14:11:10 +01:00
|
|
|
systemctl start $SERVICENAME
|
2018-08-24 23:09:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
remount_partition_by_systemd() {
|
|
|
|
local SERVICENAME=$1
|
|
|
|
local PARTITION=$2
|
|
|
|
debug "Remounting $PARTITION by systemd"
|
|
|
|
systemctl start $SERVICENAME
|
|
|
|
}
|
|
|
|
|
2018-08-21 22:01:50 +02:00
|
|
|
#
|
|
|
|
# APT
|
|
|
|
#
|
|
|
|
|
|
|
|
apt_update_if_needed()
|
|
|
|
{
|
|
|
|
if [ -e /var/cache/apt/pkgcache.bin ]
|
|
|
|
then
|
|
|
|
UPDATE_AGE=$(( $(date +%s) - $(stat -c '%Y' /var/cache/apt/pkgcache.bin) ))
|
|
|
|
|
2018-12-05 08:10:06 +01:00
|
|
|
if [ $UPDATE_AGE -gt 3600 ]
|
2018-08-21 22:01:50 +02:00
|
|
|
then
|
|
|
|
# update too old, refresh database
|
2019-03-30 11:49:19 +01:00
|
|
|
$SUDO_CMD apt-get update >/dev/null 2>/dev/null
|
2018-08-21 22:01:50 +02:00
|
|
|
fi
|
|
|
|
else
|
2019-03-30 11:49:19 +01:00
|
|
|
$SUDO_CMD apt-get update >/dev/null 2>/dev/null
|
2018-08-21 22:01:50 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
apt_check_updates()
|
|
|
|
{
|
|
|
|
local NAME="$1"
|
|
|
|
local DETAILS="/dev/shm/${NAME}"
|
|
|
|
$SUDO_CMD apt-get upgrade -s 2>/dev/null | grep -E "^Inst" > $DETAILS || :
|
|
|
|
local COUNT=$(wc -l < "$DETAILS")
|
|
|
|
FNRET=128 # Unknown function return result
|
|
|
|
RESULT="" # Result output for upgrade
|
|
|
|
if [ $COUNT -gt 0 ]; then
|
|
|
|
RESULT="There is $COUNT updates available :\n$(cat $DETAILS)"
|
|
|
|
FNRET=1
|
|
|
|
else
|
|
|
|
RESULT="OK, no updates available"
|
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
rm $DETAILS
|
|
|
|
}
|
|
|
|
|
|
|
|
apt_install()
|
|
|
|
{
|
|
|
|
local PACKAGE=$1
|
|
|
|
DEBIAN_FRONTEND='noninteractive' apt-get -o Dpkg::Options::="--force-confdef" -o Dpkg::Options::="--force-confold" install $PACKAGE -y
|
|
|
|
FNRET=0
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
# Returns if a package is installed
|
|
|
|
#
|
|
|
|
|
|
|
|
is_pkg_installed()
|
|
|
|
{
|
|
|
|
PKG_NAME=$1
|
|
|
|
if $(dpkg -s $PKG_NAME 2> /dev/null | grep -q '^Status: install ') ; then
|
|
|
|
debug "$PKG_NAME is installed"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "$PKG_NAME is not installed"
|
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
}
|
2018-08-23 19:54:34 +02:00
|
|
|
|
2018-09-04 17:12:42 +02:00
|
|
|
|
|
|
|
verify_integrity_all_packages()
|
|
|
|
{
|
2018-12-02 17:47:10 +01:00
|
|
|
dpkg -V > /dev/shm/dpkg_verify_ret
|
|
|
|
if [ $(cat /dev/shm/dpkg_verify_ret | wc -l) -gt 0 ]; then
|
2018-09-04 17:12:42 +02:00
|
|
|
debug "Verify integrity all packages is fail"
|
2018-12-02 17:47:10 +01:00
|
|
|
cat /dev/shm/dpkg_verify_ret
|
2018-09-04 17:12:42 +02:00
|
|
|
FNRET=1
|
|
|
|
else
|
|
|
|
debug "Verify integrity all packages is OK"
|
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-11-07 05:25:57 +01:00
|
|
|
check_param_pair_by_pam()
|
2018-09-08 15:51:07 +02:00
|
|
|
{
|
2018-10-16 01:53:08 +02:00
|
|
|
LOCATION=$1
|
|
|
|
KEYWORD=$2
|
|
|
|
OPTION=$3
|
|
|
|
COMPARE=$4
|
|
|
|
CONDITION=$5
|
2018-09-08 09:04:54 +02:00
|
|
|
|
|
|
|
#Example:
|
2018-10-16 01:53:08 +02:00
|
|
|
#LOCATION="/etc/pam.d/common-password"
|
|
|
|
#LOCATION="/etc/pam.d/login"
|
2018-09-10 22:18:07 +02:00
|
|
|
#KEYWORD="pam_cracklib.so"
|
2018-09-07 11:44:27 +02:00
|
|
|
#OPTION="ocredit"
|
|
|
|
#COMPARE="gt"
|
|
|
|
#CONDITION="-1"
|
|
|
|
if [ -f "$LOCATION" ];then
|
2018-11-07 09:02:44 +01:00
|
|
|
RESULT=$(sed -e '/^#/d' -e '/^[ \t][ \t]*#/d' -e 's/#.*$//' -e '/^$/d' $LOCATION | grep -w "$KEYWORD.*$OPTION" | wc -l)
|
2018-09-08 15:51:07 +02:00
|
|
|
if [ "$RESULT" -eq 1 ]; then
|
|
|
|
debug "$KEYWORD $OPTION is conf"
|
|
|
|
cndt_value=$(sed -e '/^#/d' -e '/^[ \t][ \t]*#/d' -e 's/#.*$//' -e '/^$/d' $LOCATION | grep "$KEYWORD.*$OPTION" | tr "\t" " " | tr " " "\n" | sed -n "/$OPTION/p" | awk -F "=" '{print $2}')
|
|
|
|
if [ "$cndt_value" "-$COMPARE" "$CONDITION" ]; then
|
|
|
|
debug "$cndt_value -$COMPARE $CONDITION is ok"
|
2018-09-07 11:44:27 +02:00
|
|
|
FNRET=0
|
2018-09-08 15:51:07 +02:00
|
|
|
else
|
|
|
|
debug "$cndt_value -$COMPARE $CONDITION is not ok"
|
2018-09-08 16:27:47 +02:00
|
|
|
FNRET=5
|
2018-09-08 15:51:07 +02:00
|
|
|
fi
|
|
|
|
|
2018-09-07 11:44:27 +02:00
|
|
|
else
|
2018-09-08 15:51:07 +02:00
|
|
|
debug "$KEYWORD $OPTION is not conf"
|
2018-09-08 16:27:47 +02:00
|
|
|
FNRET=4
|
2018-09-07 11:44:27 +02:00
|
|
|
fi
|
|
|
|
else
|
2018-09-08 15:51:07 +02:00
|
|
|
debug "$LOCATION is not exist"
|
2018-09-08 16:27:47 +02:00
|
|
|
FNRET=3
|
2018-09-07 11:44:27 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-09-10 22:59:15 +02:00
|
|
|
# Only check option name
|
2018-11-05 21:31:36 +01:00
|
|
|
check_no_param_option_by_pam()
|
2018-09-10 22:59:15 +02:00
|
|
|
{
|
|
|
|
KEYWORD=$1
|
|
|
|
OPTION=$2
|
2018-10-26 22:12:56 +02:00
|
|
|
LOCATION=$3
|
2018-09-10 22:59:15 +02:00
|
|
|
|
|
|
|
#Example:
|
|
|
|
#KEYWORD="pam_unix.so"
|
|
|
|
#OPTION="sha512"
|
2018-10-26 22:12:56 +02:00
|
|
|
#LOCATION="/etc/pam.d/common-password"
|
2018-09-10 22:59:15 +02:00
|
|
|
|
|
|
|
if [ -f "$LOCATION" ];then
|
|
|
|
RESULT=$(sed -e '/^#/d' -e '/^[ \t][ \t]*#/d' -e 's/#.*$//' -e '/^$/d' $LOCATION | grep "$KEYWORD.*$OPTION" | wc -l)
|
|
|
|
echo $RESULT
|
|
|
|
if [ "$RESULT" -eq 1 ]; then
|
|
|
|
debug "$KEYWORD $OPTION is conf"
|
|
|
|
FNRET=0
|
|
|
|
else
|
|
|
|
debug "$KEYWORD $OPTION is not conf"
|
|
|
|
FNRET=4
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
debug "$LOCATION is not exist"
|
|
|
|
FNRET=3
|
|
|
|
fi
|
|
|
|
}
|
2018-09-09 17:13:16 +02:00
|
|
|
|
|
|
|
# Add password check option
|
2018-09-09 21:12:27 +02:00
|
|
|
add_option_to_password_check()
|
|
|
|
{
|
2018-09-09 17:13:16 +02:00
|
|
|
#Example:
|
|
|
|
#local PAMPWDFILE="/etc/pam.d/common-password"
|
|
|
|
#local KEYWORD="pam_cracklib.so"
|
|
|
|
#local OPTIONSTR="retry=3"
|
|
|
|
local PAMPWDFILE=$1
|
|
|
|
local KEYWORD=$2
|
|
|
|
local OPTIONSTR=$3
|
2018-09-09 21:12:27 +02:00
|
|
|
debug "Setting $OPTIONSTR for $KEYWORD"
|
2018-09-09 17:13:16 +02:00
|
|
|
backup_file "$PAMPWDFILE"
|
|
|
|
# For example :
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=3
|
2018-11-30 21:36:21 +01:00
|
|
|
sed -i "s;\(^password.*$KEYWORD.*\);\1 $OPTIONSTR;" $PAMPWDFILE
|
2018-09-09 17:13:16 +02:00
|
|
|
}
|
|
|
|
|
2018-10-26 22:12:56 +02:00
|
|
|
# Add session check option
|
|
|
|
add_option_to_session_check()
|
|
|
|
{
|
|
|
|
#Example:
|
|
|
|
#local PAMPWDFILE="/etc/pam.d/login"
|
|
|
|
#local KEYWORD="pam_lastlog.so"
|
|
|
|
#local OPTIONSTR="showfailed"
|
|
|
|
local PAMPWDFILE=$1
|
|
|
|
local KEYWORD=$2
|
|
|
|
local OPTIONSTR=$3
|
|
|
|
debug "Setting $OPTIONSTR for $KEYWORD"
|
|
|
|
backup_file "$PAMPWDFILE"
|
|
|
|
# For example :
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=3
|
2018-11-05 21:31:36 +01:00
|
|
|
sed -i "s;\(^session.*$KEYWORD.*\);\1 $OPTIONSTR;" $PAMPWDFILE
|
2018-10-26 22:12:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-10-16 02:21:51 +02:00
|
|
|
# Add auth check option
|
|
|
|
add_option_to_auth_check()
|
|
|
|
{
|
|
|
|
#Example:
|
2018-11-07 09:02:44 +01:00
|
|
|
#local PAMPWDFILE="/etc/pam.d/common-auth"
|
2018-10-16 02:21:51 +02:00
|
|
|
#local KEYWORD="pam_cracklib.so"
|
|
|
|
#local OPTIONSTR="retry=3"
|
|
|
|
local PAMPWDFILE=$1
|
|
|
|
local KEYWORD=$2
|
|
|
|
local OPTIONSTR=$3
|
|
|
|
debug "Setting $OPTIONSTR for $KEYWORD"
|
|
|
|
backup_file "$PAMPWDFILE"
|
|
|
|
# For example :
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=3
|
2018-11-05 21:31:36 +01:00
|
|
|
sed -i "s;\(^auth.*$KEYWORD.*\);\1 $OPTIONSTR;" $PAMPWDFILE
|
2018-10-16 02:21:51 +02:00
|
|
|
}
|
|
|
|
|
2018-09-09 21:12:27 +02:00
|
|
|
# Reset password check option value when option is not set a correct value
|
|
|
|
reset_option_to_password_check()
|
|
|
|
{
|
|
|
|
#Example:
|
|
|
|
#local PAMPWDFILE="/etc/pam.d/common-password"
|
|
|
|
#local KEYWORD="pam_cracklib.so"
|
|
|
|
#local OPTIONNAME="retry"
|
|
|
|
#local OPTIONVAL="3"
|
|
|
|
local PAMPWDFILE=$1
|
|
|
|
local KEYWORD=$2
|
|
|
|
local OPTIONNAME=$3
|
|
|
|
local OPTIONVAL=$4
|
|
|
|
debug "Setting $OPTION for $KEYWORD reset option value to $OPTIONVAL"
|
|
|
|
backup_file "$PAMPWDFILE"
|
|
|
|
# For example :
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=1
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=3
|
2018-11-05 21:31:36 +01:00
|
|
|
sed -i "s/${OPTIONNAME}=./${OPTIONNAME}=${OPTIONVAL}/" $PAMPWDFILE
|
2018-09-09 21:12:27 +02:00
|
|
|
}
|
2018-09-12 21:45:11 +02:00
|
|
|
|
2018-10-16 02:21:51 +02:00
|
|
|
# Reset auth check option value when option is not set a correct value
|
|
|
|
reset_option_to_auth_check()
|
|
|
|
{
|
|
|
|
#Example:
|
|
|
|
#local PAMPWDFILE="/etc/pam.d/common-password"
|
|
|
|
#local KEYWORD="pam_cracklib.so"
|
|
|
|
#local OPTIONNAME="retry"
|
|
|
|
#local OPTIONVAL="3"
|
|
|
|
local PAMPWDFILE=$1
|
|
|
|
local KEYWORD=$2
|
|
|
|
local OPTIONNAME=$3
|
|
|
|
local OPTIONVAL=$4
|
|
|
|
debug "Setting $OPTION for $KEYWORD reset option value to $OPTIONVAL"
|
|
|
|
backup_file "$PAMPWDFILE"
|
|
|
|
# For example :
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=1
|
|
|
|
# password requisite pam_cracklib.so minlen=8 difok=3 retry=3
|
2018-11-05 21:31:36 +01:00
|
|
|
sed -i "s/${OPTIONNAME}=.*/${OPTIONNAME}=${OPTIONVAL}/" $PAMPWDFILE
|
2018-10-16 02:21:51 +02:00
|
|
|
}
|
|
|
|
|
2018-09-12 21:45:11 +02:00
|
|
|
# Only check option name
|
|
|
|
check_auth_option_nullok_by_pam()
|
|
|
|
{
|
|
|
|
KEYWORD=$1
|
|
|
|
OPTION1=$2
|
|
|
|
OPTION2=$3
|
|
|
|
|
|
|
|
LOCATION="/etc/pam.d/common-auth"
|
|
|
|
|
|
|
|
#Example:
|
|
|
|
#KEYWORD="pam_unix.so"
|
|
|
|
#OPTION1="nullok"
|
|
|
|
#OPTION2="nullok_secure"
|
|
|
|
|
|
|
|
if [ -f "$LOCATION" ];then
|
|
|
|
RESULT=$(sed -e '/^#/d' -e '/^[ \t][ \t]*#/d' -e 's/#.*$//' -e '/^$/d' $LOCATION | grep "$KEYWORD.*$OPTION2" | wc -l)
|
|
|
|
if [ "$RESULT" -eq 1 ]; then
|
|
|
|
debug "$KEYWORD $OPTION2 is conf, that is error conf"
|
|
|
|
FNRET=5
|
|
|
|
else
|
|
|
|
debug "$KEYWORD $OPTION2 is not conf, that is ok"
|
|
|
|
RESULT=$(sed -e '/^#/d' -e '/^[ \t][ \t]*#/d' -e 's/#.*$//' -e '/^$/d' $LOCATION | grep "$KEYWORD.*$OPTION1" | wc -l)
|
|
|
|
if [ "$RESULT" -eq 1 ]; then
|
|
|
|
debug "$KEYWORD $OPTION1 is conf, that is error conf"
|
|
|
|
FNRET=4
|
|
|
|
else
|
|
|
|
debug "$KEYWORD $OPTION1 is not conf, that is ok"
|
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
debug "$LOCATION is not exist"
|
|
|
|
FNRET=3
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-04-09 10:31:57 +02:00
|
|
|
# Ensure is set accept for INPUT of loopback traffic
|
|
|
|
ensure_lo_traffic_input_is_accept()
|
|
|
|
{
|
|
|
|
IPS4=$(which iptables)
|
|
|
|
IPS6=$(which ip6tables)
|
|
|
|
# Check the loopback interface to accept INPUT traffic.
|
|
|
|
if [ $(${IPS4} -S | grep -c "^\-A INPUT \-i lo \-j ACCEPT") -ge 1 -o $(${IPS4} -S | grep -c "^\-A INPUT \-i 127.0.0.1 \-j ACCEPT") -ge 1 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip4tables loopback traffic INPUT has configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=0
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip4tables: loopback traffic INPUT is not configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
if [ $(${IPS6} -S | grep -c "^\-A INPUT \-i lo \-j ACCEPT") -ge 1 -o $(${IPS6} -S | grep -c "^\-A INPUT \-i ::/0 \-j ACCEPT") -ge 1 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables loopback traffic INPUT has configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=0
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: loopback traffic INPUT is not configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Ensure is set accept for OUTPUT of loopback traffic
|
|
|
|
ensure_lo_traffic_output_is_accept()
|
|
|
|
{
|
|
|
|
IPS4=$(which iptables)
|
|
|
|
IPS6=$(which ip6tables)
|
|
|
|
# Check the loopback interface to accept OUTPUT traffic.
|
|
|
|
if [ $(${IPS4} -S | grep -c "^\-A OUTPUT \-o lo \-j ACCEPT") -ge 1 -o $(${IPS4} -S | grep -c "^\-A OUTPUT \-o 127.0.0.1 \-j ACCEPT") -ge 1 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip4tables loopback traffic OUTPUT has configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=0
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip4tables: loopback traffic OUTPUT is not configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
if [ $(${IPS6} -S | grep -c "^\-A OUTPUT \-o lo \-j ACCEPT") -ge 1 -o $(${IPS6} -S | grep -c "^\-A OUTPUT \-o ::/0 \-j ACCEPT") -ge 1 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables loopback traffic OUTPUT has configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=0
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: loopback traffic OUTPUT is not configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Ensure is set deny for other interfaces INPUT of loopback traffic
|
|
|
|
ensure_lo_traffic_other_if_input_is_deny()
|
|
|
|
{
|
|
|
|
IPS4=$(which iptables)
|
|
|
|
IPS6=$(which ip6tables)
|
|
|
|
# all other interfaces to deny traffic to the loopback network.
|
|
|
|
if [ $(${IPS4} -S | grep -c "^\-A INPUT \-s 127.0.0.0/8 \-j DROP") -eq 0 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip4tables: loopback traffic INPUT deny from 127.0.0.0/8 is not configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
if [ $(${IPS6} -S | grep -c "^\-A INPUT \-s ::1 \-j DROP") -ge 0 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: loopback traffic INPUT deny from ::1 is not configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=1
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables loopback traffic INPUT deny from ::1 has configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip4tables loopback traffic INPUT deny from 127.0.0.0/8 has configured!"
|
2019-04-09 10:31:57 +02:00
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-04-11 20:50:30 +02:00
|
|
|
#Ensure is set accept for all outbound
|
|
|
|
check_outbound_connect_is_accept()
|
|
|
|
{
|
|
|
|
PATTERN="\-\-state NEW,ESTABLISHED \-j ACCEPT"
|
|
|
|
IPS4=$(which iptables)
|
|
|
|
IPS6=$(which ip6tables)
|
|
|
|
# $1 maybe is: tcp udp icmp
|
|
|
|
proto=$1
|
|
|
|
if [ $(${IPS4} -S | grep "^\-A OUTPUT" | grep "\-p ${proto}" | grep -c "$PATTERN") -eq 0 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Iptables: Protocol $proto outbound is not configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
if [ $(${IPS6} -S | grep "^\-A OUTPUT" | grep "\-p ${proto}" | grep -c "$PATTERN") -eq 0 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: Protocol $proto outbound is not configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=1
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: Protocol $proto outbound is configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Iptables: Protocol $proto outbound is configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#Ensure is set accept for input with ESTABLISHED
|
|
|
|
check_input_with_established_is_accept()
|
|
|
|
{
|
|
|
|
PATTERN="\-\-state ESTABLISHED \-j ACCEPT"
|
|
|
|
IPS4=$(which iptables)
|
|
|
|
IPS6=$(which ip6tables)
|
|
|
|
# $1 maybe is: tcp udp icmp
|
|
|
|
proto=$1
|
|
|
|
if [ $(${IPS4} -S | grep "^\-A INPUT" | grep "\-p ${proto}" | grep -c "$PATTERN") -eq 0 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Iptables: Protocol $proto INPUT is not configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
if [ $(${IPS6} -S | grep "^\-A INPUT" | grep "\-p ${proto}" | grep -c "$PATTERN") -eq 0 ]; then
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: Protocol $proto INPUT is not configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=1
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Ip6tables: Protocol $proto INPUT is configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
else
|
2019-04-14 11:56:05 +02:00
|
|
|
debug "Iptables: Protocol $proto INPUT is configured!"
|
2019-04-11 20:50:30 +02:00
|
|
|
FNRET=0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|