mirror of
https://github.com/hardenedlinux/harbian-audit.git
synced 2025-07-31 01:24:58 +02:00
Modify variable name: *REDHAT to *CENTOS.
This commit is contained in:
parent
3b61a0e406
commit
0989b9f4e3
@ -18,7 +18,7 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=3
|
HARDENING_LEVEL=3
|
||||||
|
|
||||||
OPTIONS='INACTIVE=30'
|
OPTIONS='INACTIVE=30'
|
||||||
OPTIONS_REDHAT='INACTIVE=0'
|
OPTIONS_CENTOS='INACTIVE=0'
|
||||||
SHA_FILE='/etc/shadow'
|
SHA_FILE='/etc/shadow'
|
||||||
DISABLE_V='-1'
|
DISABLE_V='-1'
|
||||||
FILE='/etc/default/useradd'
|
FILE='/etc/default/useradd'
|
||||||
@ -158,7 +158,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
:
|
:
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
OPTIONS=$OPTIONS_REDHAT
|
OPTIONS=$OPTIONS_CENTOS
|
||||||
else
|
else
|
||||||
warn "Current OS is not support!"
|
warn "Current OS is not support!"
|
||||||
fi
|
fi
|
||||||
|
@ -16,16 +16,16 @@ HARDENING_LEVEL=1
|
|||||||
|
|
||||||
FILE='/etc/gshadow-'
|
FILE='/etc/gshadow-'
|
||||||
PERMISSIONS='600'
|
PERMISSIONS='600'
|
||||||
PERMISSIONS_REDHAT='0'
|
PERMISSIONS_CENTOS='0'
|
||||||
USER='root'
|
USER='root'
|
||||||
GROUP='shadow'
|
GROUP='shadow'
|
||||||
GROUP_REDHAT='root'
|
GROUP_CENTOS='root'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
@ -46,8 +46,8 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
|
@ -16,16 +16,16 @@ HARDENING_LEVEL=1
|
|||||||
|
|
||||||
FILE='/etc/shadow'
|
FILE='/etc/shadow'
|
||||||
PERMISSIONS='640'
|
PERMISSIONS='640'
|
||||||
PERMISSIONS_REDHAT='0'
|
PERMISSIONS_CENTOS='0'
|
||||||
USER='root'
|
USER='root'
|
||||||
GROUP='shadow'
|
GROUP='shadow'
|
||||||
GROUP_REDHAT='root'
|
GROUP_CENTOS='root'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
@ -46,8 +46,8 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
|
@ -16,16 +16,16 @@ HARDENING_LEVEL=1
|
|||||||
|
|
||||||
FILE='/etc/gshadow'
|
FILE='/etc/gshadow'
|
||||||
PERMISSIONS='640'
|
PERMISSIONS='640'
|
||||||
PERMISSIONS_REDHAT='0'
|
PERMISSIONS_CENTOS='0'
|
||||||
USER='root'
|
USER='root'
|
||||||
GROUP='shadow'
|
GROUP='shadow'
|
||||||
GROUP_REDHAT='root'
|
GROUP_CENTOS='root'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
@ -46,8 +46,8 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
|
@ -16,16 +16,16 @@ HARDENING_LEVEL=1
|
|||||||
|
|
||||||
FILE='/etc/shadow-'
|
FILE='/etc/shadow-'
|
||||||
PERMISSIONS='600'
|
PERMISSIONS='600'
|
||||||
PERMISSIONS_REDHAT='0'
|
PERMISSIONS_CENTOS='0'
|
||||||
USER='root'
|
USER='root'
|
||||||
GROUP='shadow'
|
GROUP='shadow'
|
||||||
GROUP_REDHAT='root'
|
GROUP_CENTOS='root'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
@ -46,8 +46,8 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PERMISSIONS=$PERMISSIONS_REDHAT
|
PERMISSIONS=$PERMISSIONS_CENTOS
|
||||||
GROUP=$GROUP_REDHAT
|
GROUP=$GROUP_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
|
@ -18,7 +18,7 @@ HARDENING_LEVEL=2
|
|||||||
PARTITION="/tmp"
|
PARTITION="/tmp"
|
||||||
SERVICENAME="tmp.mount"
|
SERVICENAME="tmp.mount"
|
||||||
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
||||||
REDHAT_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
CENTOS_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
||||||
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -75,12 +75,12 @@ apply () {
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
if [ -e $REDHAT_SERVICEPATH ]; then
|
if [ -e $CENTOS_SERVICEPATH ]; then
|
||||||
$SUDO_CMD systemctl enable "$SERVICENAME"
|
$SUDO_CMD systemctl enable "$SERVICENAME"
|
||||||
$SUDO_CMD systemctl daemon-reload
|
$SUDO_CMD systemctl daemon-reload
|
||||||
$SUDO_CMD systemctl start "$SERVICENAME"
|
$SUDO_CMD systemctl start "$SERVICENAME"
|
||||||
else
|
else
|
||||||
crit "System unit file $REDHAT_SERVICEPATH is not exist!"
|
crit "System unit file $CENTOS_SERVICEPATH is not exist!"
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
@ -19,7 +19,7 @@ PARTITION="/tmp"
|
|||||||
OPTION="nodev"
|
OPTION="nodev"
|
||||||
SERVICENAME="tmp.mount"
|
SERVICENAME="tmp.mount"
|
||||||
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
||||||
REDHAT_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
CENTOS_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
||||||
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -50,7 +50,7 @@ audit () {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
UNITSERVICEPATH=$REDHAT_SERVICEPATH
|
UNITSERVICEPATH=$CENTOS_SERVICEPATH
|
||||||
fi
|
fi
|
||||||
if [ -e $UNITSERVICEPATH ]; then
|
if [ -e $UNITSERVICEPATH ]; then
|
||||||
has_mount_option_systemd $UNITSERVICEPATH $OPTION
|
has_mount_option_systemd $UNITSERVICEPATH $OPTION
|
||||||
@ -80,7 +80,7 @@ apply () {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
UNITSERVICEPATH=$REDHAT_SERVICEPATH
|
UNITSERVICEPATH=$CENTOS_SERVICEPATH
|
||||||
fi
|
fi
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$PARTITION is correctly set"
|
ok "$PARTITION is correctly set"
|
||||||
|
@ -19,7 +19,7 @@ PARTITION="/tmp"
|
|||||||
OPTION="nosuid"
|
OPTION="nosuid"
|
||||||
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
||||||
SERVICENAME="tmp.mount"
|
SERVICENAME="tmp.mount"
|
||||||
REDHAT_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
CENTOS_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
||||||
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -50,7 +50,7 @@ audit () {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
UNITSERVICEPATH=$REDHAT_SERVICEPATH
|
UNITSERVICEPATH=$CENTOS_SERVICEPATH
|
||||||
fi
|
fi
|
||||||
if [ -e $UNITSERVICEPATH ]; then
|
if [ -e $UNITSERVICEPATH ]; then
|
||||||
has_mount_option_systemd $UNITSERVICEPATH $OPTION
|
has_mount_option_systemd $UNITSERVICEPATH $OPTION
|
||||||
@ -80,7 +80,7 @@ apply () {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
UNITSERVICEPATH=$REDHAT_SERVICEPATH
|
UNITSERVICEPATH=$CENTOS_SERVICEPATH
|
||||||
fi
|
fi
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$PARTITION is correctly set"
|
ok "$PARTITION is correctly set"
|
||||||
|
@ -19,7 +19,7 @@ PARTITION="/tmp"
|
|||||||
OPTION="noexec"
|
OPTION="noexec"
|
||||||
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
SERVICEPATH_DEBIAN="/usr/share/systemd/tmp.mount"
|
||||||
SERVICENAME="tmp.mount"
|
SERVICENAME="tmp.mount"
|
||||||
REDHAT_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
CENTOS_SERVICEPATH="/usr/lib/systemd/system/tmp.mount"
|
||||||
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
DEBIAN_SERVICEPATH="/lib/systemd/system/tmp.mount"
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -50,7 +50,7 @@ audit () {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
UNITSERVICEPATH=$REDHAT_SERVICEPATH
|
UNITSERVICEPATH=$CENTOS_SERVICEPATH
|
||||||
fi
|
fi
|
||||||
if [ -e $UNITSERVICEPATH ]; then
|
if [ -e $UNITSERVICEPATH ]; then
|
||||||
has_mount_option_systemd $UNITSERVICEPATH $OPTION
|
has_mount_option_systemd $UNITSERVICEPATH $OPTION
|
||||||
@ -80,7 +80,7 @@ apply () {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
UNITSERVICEPATH=$DEBIAN_SERVICEPATH
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
UNITSERVICEPATH=$REDHAT_SERVICEPATH
|
UNITSERVICEPATH=$CENTOS_SERVICEPATH
|
||||||
fi
|
fi
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$PARTITION is correctly set"
|
ok "$PARTITION is correctly set"
|
||||||
|
@ -15,12 +15,12 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=3
|
HARDENING_LEVEL=3
|
||||||
|
|
||||||
PACKAGE='nis'
|
PACKAGE='nis'
|
||||||
PACKAGE_REDHAT='ypserv'
|
PACKAGE_CENTOS='ypserv'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
@ -34,7 +34,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
|
@ -16,7 +16,7 @@ HARDENING_LEVEL=2
|
|||||||
|
|
||||||
# Based on aptitude search '~Prsh-server'
|
# Based on aptitude search '~Prsh-server'
|
||||||
PACKAGES='rsh-server rsh-redone-server heimdal-servers'
|
PACKAGES='rsh-server rsh-redone-server heimdal-servers'
|
||||||
PACKAGE_REDHAT='rsh-server'
|
PACKAGE_CENTOS='rsh-server'
|
||||||
FILE='/etc/inetd.conf'
|
FILE='/etc/inetd.conf'
|
||||||
PATTERN='^(shell|login|exec)'
|
PATTERN='^(shell|login|exec)'
|
||||||
|
|
||||||
@ -43,11 +43,11 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
is_pkg_installed $PACKAGE_REDHAT
|
is_pkg_installed $PACKAGE_CENTOS
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
crit "$PACKAGE_REDHAT is installed!"
|
crit "$PACKAGE_CENTOS is installed!"
|
||||||
else
|
else
|
||||||
ok "$PACKAGE_REDHAT is absent"
|
ok "$PACKAGE_CENTOS is absent"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -91,12 +91,12 @@ apply_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
is_pkg_installed $PACKAGE_REDHAT
|
is_pkg_installed $PACKAGE_CENTOS
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
crit "$PACKAGE_REDHAT is installed, purging it"
|
crit "$PACKAGE_CENTOS is installed, purging it"
|
||||||
yum -y remove $PACKAGE_REDHAT
|
yum -y remove $PACKAGE_CENTOS
|
||||||
else
|
else
|
||||||
ok "$PACKAGE_REDHAT is absent"
|
ok "$PACKAGE_CENTOS is absent"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@ HARDENING_LEVEL=2
|
|||||||
PACKAGES='inetutils-talkd talkd'
|
PACKAGES='inetutils-talkd talkd'
|
||||||
FILE='/etc/inetd.conf'
|
FILE='/etc/inetd.conf'
|
||||||
PATTERN='^(talk|ntalk)'
|
PATTERN='^(talk|ntalk)'
|
||||||
PACKAGES_REDHAT='talk-server'
|
PACKAGES_CENTOS='talk-server'
|
||||||
|
|
||||||
audit_debian () {
|
audit_debian () {
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
@ -42,7 +42,7 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
for PACKAGE in $PACKAGES_REDHAT; do
|
for PACKAGE in $PACKAGES_CENTOS; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
crit "$PACKAGE is installed"
|
crit "$PACKAGE is installed"
|
||||||
@ -93,7 +93,7 @@ apply_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
for PACKAGE in $PACKAGES_REDHAT; do
|
for PACKAGE in $PACKAGES_CENTOS; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
crit "$PACKAGE is installed, purging it"
|
crit "$PACKAGE is installed, purging it"
|
||||||
|
@ -15,12 +15,12 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=2
|
HARDENING_LEVEL=2
|
||||||
|
|
||||||
PACKAGES='talk inetutils-talk'
|
PACKAGES='talk inetutils-talk'
|
||||||
PACKAGES_REDHAT='talk'
|
PACKAGES_CENTOS='talk'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -35,7 +35,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -18,7 +18,7 @@ HARDENING_LEVEL=2
|
|||||||
PACKAGES='telnetd inetutils-telnetd telnetd-ssl krb5-telnetd heimdal-servers'
|
PACKAGES='telnetd inetutils-telnetd telnetd-ssl krb5-telnetd heimdal-servers'
|
||||||
FILE='/etc/inetd.conf'
|
FILE='/etc/inetd.conf'
|
||||||
PATTERN='^telnet'
|
PATTERN='^telnet'
|
||||||
PACKAGE_REDHAT='telnet-server'
|
PACKAGE_CENTOS='telnet-server'
|
||||||
|
|
||||||
audit_debian () {
|
audit_debian () {
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
@ -43,11 +43,11 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
is_pkg_installed $PACKAGE_REDHAT
|
is_pkg_installed $PACKAGE_CENTOS
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
crit "$PACKAGE_REDHAT is installed"
|
crit "$PACKAGE_CENTOS is installed"
|
||||||
else
|
else
|
||||||
ok "$PACKAGE_REDHAT is absent"
|
ok "$PACKAGE_CENTOS is absent"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -92,12 +92,12 @@ apply_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
is_pkg_installed $PACKAGE_REDHAT
|
is_pkg_installed $PACKAGE_CENTOS
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
crit "$PACKAGE_REDHAT is installed, purging it"
|
crit "$PACKAGE_CENTOS is installed, purging it"
|
||||||
yum remove $PACKAGE_REDHAT -y
|
yum remove $PACKAGE_CENTOS -y
|
||||||
else
|
else
|
||||||
ok "$PACKAGE_REDHAT is absent"
|
ok "$PACKAGE_CENTOS is absent"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -15,12 +15,12 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=3
|
HARDENING_LEVEL=3
|
||||||
|
|
||||||
PACKAGES='openbsd-inetd xinetd rlinetd'
|
PACKAGES='openbsd-inetd xinetd rlinetd'
|
||||||
PACKAGES_REDHAT='xinetd'
|
PACKAGES_CENTOS='xinetd'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -35,7 +35,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -16,7 +16,7 @@ HARDENING_LEVEL=2
|
|||||||
|
|
||||||
PACKAGES='openssh-server openssh-client'
|
PACKAGES='openssh-server openssh-client'
|
||||||
SERVICE_NAME='ssh.service'
|
SERVICE_NAME='ssh.service'
|
||||||
SERVICE_NAME_REDHAT='sshd.service'
|
SERVICE_NAME_CENTOS='sshd.service'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
@ -30,7 +30,7 @@ audit () {
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
SERVICE_NAME=$SERVICE_NAME_REDHAT
|
SERVICE_NAME=$SERVICE_NAME_CENTOS
|
||||||
fi
|
fi
|
||||||
is_service_active $SERVICE_NAME
|
is_service_active $SERVICE_NAME
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
@ -57,7 +57,7 @@ apply () {
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
SERVICE_NAME=$SERVICE_NAME_REDHAT
|
SERVICE_NAME=$SERVICE_NAME_CENTOS
|
||||||
fi
|
fi
|
||||||
is_service_active $SERVICE_NAME
|
is_service_active $SERVICE_NAME
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
|
@ -17,12 +17,12 @@ HARDENING_EXCEPTION=http
|
|||||||
|
|
||||||
# Based on aptitude search '~Phttpd'
|
# Based on aptitude search '~Phttpd'
|
||||||
PACKAGES='nginx apache2 lighttpd micro-httpd mini-httpd yaws boa bozohttpd'
|
PACKAGES='nginx apache2 lighttpd micro-httpd mini-httpd yaws boa bozohttpd'
|
||||||
PACKAGES_REDHAT='httpd pcp-pmda-nginx'
|
PACKAGES_CENTOS='httpd pcp-pmda-nginx'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -41,7 +41,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -16,12 +16,12 @@ HARDENING_LEVEL=3
|
|||||||
HARDENING_EXCEPTION=http
|
HARDENING_EXCEPTION=http
|
||||||
|
|
||||||
PACKAGES='squid3 squid'
|
PACKAGES='squid3 squid'
|
||||||
PACKAGES_REDHAT='squid gssproxy haproxy'
|
PACKAGES_CENTOS='squid gssproxy haproxy'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -14,7 +14,7 @@ set -u # One variable unset, it's over
|
|||||||
|
|
||||||
HARDENING_LEVEL=4
|
HARDENING_LEVEL=4
|
||||||
VIRULSERVER='clamav-daemon'
|
VIRULSERVER='clamav-daemon'
|
||||||
VIRULSERVER_REDHAT='clamav-server clamav-data clamav-update clamav-filesystem clamav clamav-scanner-systemd clamav-devel clamav-lib clamav-server-systemd'
|
VIRULSERVER_CENTOS='clamav-server clamav-data clamav-update clamav-filesystem clamav clamav-scanner-systemd clamav-devel clamav-lib clamav-server-systemd'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
@ -58,10 +58,10 @@ apply () {
|
|||||||
fi
|
fi
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$VIRULSERVER_REDHAT is enable"
|
ok "$VIRULSERVER_CENTOS is enable"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Install $VIRULSERVER_REDHAT"
|
warn "Install $VIRULSERVER_CENTOS"
|
||||||
yum install -y $VIRULSERVER_REDHAT
|
yum install -y $VIRULSERVER_CENTOS
|
||||||
else
|
else
|
||||||
warn "Start server $VIRULSERVER"
|
warn "Start server $VIRULSERVER"
|
||||||
systemctl start $VIRULSERVER
|
systemctl start $VIRULSERVER
|
||||||
|
@ -16,12 +16,12 @@ HARDENING_LEVEL=3
|
|||||||
HARDENING_EXCEPTION=dns
|
HARDENING_EXCEPTION=dns
|
||||||
|
|
||||||
PACKAGES='avahi-daemon libavahi-common-data libavahi-common3 libavahi-core7'
|
PACKAGES='avahi-daemon libavahi-common-data libavahi-common3 libavahi-core7'
|
||||||
PKGS_PATTERN_REDHAT='avahi'
|
PKGS_PATTERN_CENTOS='avahi'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PKGS_PATTERN_REDHAT
|
PACKAGES=$PKGS_PATTERN_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PKGS_PATTERN_REDHAT
|
PACKAGES=$PKGS_PATTERN_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -16,12 +16,12 @@ HARDENING_LEVEL=3
|
|||||||
HARDENING_EXCEPTION=cups
|
HARDENING_EXCEPTION=cups
|
||||||
|
|
||||||
PACKAGES='libcups2 libcupscgi1 libcupsimage2 libcupsmime1 libcupsppdc1 cups-common cups-client cups-ppdc libcupsfilters1 cups-filters cups'
|
PACKAGES='libcups2 libcupscgi1 libcupsimage2 libcupsmime1 libcupsppdc1 cups-common cups-client cups-ppdc libcupsfilters1 cups-filters cups'
|
||||||
PACKAGES_REDHAT='cups'
|
PACKAGES_CENTOS='cups'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -16,12 +16,12 @@ HARDENING_LEVEL=3
|
|||||||
HARDENING_EXCEPTION=dhcp
|
HARDENING_EXCEPTION=dhcp
|
||||||
|
|
||||||
PACKAGES='udhcpd isc-dhcp-server'
|
PACKAGES='udhcpd isc-dhcp-server'
|
||||||
PACKAGES_REDHAT='dnsmasq'
|
PACKAGES_CENTOS='dnsmasq'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -16,12 +16,12 @@ HARDENING_LEVEL=3
|
|||||||
HARDENING_EXCEPTION=ldap
|
HARDENING_EXCEPTION=ldap
|
||||||
|
|
||||||
PACKAGES='slapd'
|
PACKAGES='slapd'
|
||||||
PACKAGES_REDHAT='openldap-servers'
|
PACKAGES_CENTOS='openldap-servers'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -16,12 +16,12 @@ HARDENING_LEVEL=3
|
|||||||
HARDENING_EXCEPTION=dns
|
HARDENING_EXCEPTION=dns
|
||||||
|
|
||||||
PACKAGES='bind9 unbound'
|
PACKAGES='bind9 unbound'
|
||||||
PACKAGES_REDHAT='bind unbound bind-utils'
|
PACKAGES_CENTOS='bind unbound bind-utils'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGES_REDHAT
|
PACKAGES=$PACKAGES_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -17,12 +17,12 @@ HARDENING_EXCEPTION=ftp
|
|||||||
|
|
||||||
# Based on aptitude search '~Pftp-server'
|
# Based on aptitude search '~Pftp-server'
|
||||||
PACKAGES='ftpd ftpd-ssl heimdal-servers inetutils-ftpd krb5-ftpd muddleftpd proftpd-basic pure-ftpd pure-ftpd-ldap pure-ftpd-mysql pure-ftpd-postgresql twoftpd-run vsftpd wzdftpd'
|
PACKAGES='ftpd ftpd-ssl heimdal-servers inetutils-ftpd krb5-ftpd muddleftpd proftpd-basic pure-ftpd pure-ftpd-ldap pure-ftpd-mysql pure-ftpd-postgresql twoftpd-run vsftpd wzdftpd'
|
||||||
PACKAGE_REDHAT='tftp-server vsftpd'
|
PACKAGE_CENTOS='tftp-server vsftpd'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGE_REDHAT
|
PACKAGES=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -41,7 +41,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGES=$PACKAGE_REDHAT
|
PACKAGES=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
for PACKAGE in $PACKAGES; do
|
for PACKAGE in $PACKAGES; do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -15,7 +15,7 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=3
|
HARDENING_LEVEL=3
|
||||||
|
|
||||||
PACKAGE='tcpd'
|
PACKAGE='tcpd'
|
||||||
PACKAGE_REDHAT='tcp_wrappers'
|
PACKAGE_CENTOS='tcp_wrappers'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
@ -26,7 +26,7 @@ audit () {
|
|||||||
ok "So PASS."
|
ok "So PASS."
|
||||||
return 0
|
return 0
|
||||||
else
|
else
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
@ -46,7 +46,7 @@ apply () {
|
|||||||
ok "So PASS."
|
ok "So PASS."
|
||||||
return 0
|
return 0
|
||||||
else
|
else
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
|
@ -19,9 +19,9 @@ HARDENING_LEVEL=2
|
|||||||
# Do as you want, but this script does not handle this
|
# Do as you want, but this script does not handle this
|
||||||
|
|
||||||
PACKAGES='iptables iptables-persistent'
|
PACKAGES='iptables iptables-persistent'
|
||||||
PACKAGES_REDHAT='iptables iptables-services nftables firewalld'
|
PACKAGES_CENTOS='iptables iptables-services nftables firewalld'
|
||||||
SERVICENAME='netfilter-persistent'
|
SERVICENAME='netfilter-persistent'
|
||||||
SERVICENAME_REDHAT='iptables ip6tables'
|
SERVICENAME_CENTOS='iptables ip6tables'
|
||||||
|
|
||||||
audit_debian () {
|
audit_debian () {
|
||||||
for PACKAGE in $PACKAGES
|
for PACKAGE in $PACKAGES
|
||||||
@ -48,7 +48,7 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
for PACKAGE in $PACKAGES_REDHAT
|
for PACKAGE in $PACKAGES_CENTOS
|
||||||
do
|
do
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET != 0 ]; then
|
if [ $FNRET != 0 ]; then
|
||||||
@ -61,7 +61,7 @@ audit_centos () {
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
for SERVICENAME in $SERVICENAME_REDHAT
|
for SERVICENAME in $SERVICENAME_CENTOS
|
||||||
do
|
do
|
||||||
if [ $(systemctl status ${SERVICENAME} | grep -c "Active:.active") -ne 1 ]; then
|
if [ $(systemctl status ${SERVICENAME} | grep -c "Active:.active") -ne 1 ]; then
|
||||||
crit "${SERVICENAME} service is not actived"
|
crit "${SERVICENAME} service is not actived"
|
||||||
@ -110,16 +110,16 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$PACKAGES_REDHAT is installed"
|
ok "$PACKAGES_CENTOS is installed"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
for PACKAGE in $PACKAGES_REDHAT
|
for PACKAGE in $PACKAGES_CENTOS
|
||||||
do
|
do
|
||||||
warn "$PACKAGE is absent, installing it"
|
warn "$PACKAGE is absent, installing it"
|
||||||
yum_install $PACKAGE
|
yum_install $PACKAGE
|
||||||
done
|
done
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "Enable ${SERVICENAME_REDHAT} service to actived"
|
warn "Enable ${SERVICENAME_CENTOS} service to actived"
|
||||||
for SERVICENAME in ${SERVICENAME_REDHAT}
|
for SERVICENAME in ${SERVICENAME_CENTOS}
|
||||||
do
|
do
|
||||||
is_service_enabled ${SERVICENAME}
|
is_service_enabled ${SERVICENAME}
|
||||||
if [ $FNRET = 1 ]; then
|
if [ $FNRET = 1 ]; then
|
||||||
|
@ -17,7 +17,7 @@ FILE='/etc/audit/rules.d/audit.rules'
|
|||||||
|
|
||||||
AUDIT_PARAMS_DEBIAN="-a always,exit -F path=/usr/lib/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh
|
AUDIT_PARAMS_DEBIAN="-a always,exit -F path=/usr/lib/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh
|
||||||
-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh"
|
-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh"
|
||||||
AUDIT_PARAMS_REDHAT="-a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh
|
AUDIT_PARAMS_CENTOS="-a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh
|
||||||
-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh"
|
-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh"
|
||||||
|
|
||||||
AUDIT_PARAMS=""
|
AUDIT_PARAMS=""
|
||||||
@ -75,7 +75,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ AUDIT_PARAMS_DEBIAN="-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1
|
|||||||
-a always,exit -F path=/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
-a always,exit -F path=/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
||||||
-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
||||||
-a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd"
|
-a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd"
|
||||||
AUDIT_PARAMS_REDHAT="-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
AUDIT_PARAMS_CENTOS="-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
||||||
-a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
-a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
||||||
-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd
|
||||||
-a always,exit -F path=/bin/chage -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd"
|
-a always,exit -F path=/bin/chage -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd"
|
||||||
@ -79,7 +79,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -21,7 +21,7 @@ AUDIT_PARAMS_DEBIAN="-a always,exit -F path=/bin/su -F perm=x -F auid>=1000 -F a
|
|||||||
-a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
-a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
||||||
-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
||||||
-a always,exit -F path=/usr/bin/chfn -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged-priv_change"
|
-a always,exit -F path=/usr/bin/chfn -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged-priv_change"
|
||||||
AUDIT_PARAMS_REDHAT="-a always,exit -F path=/bin/su -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
AUDIT_PARAMS_CENTOS="-a always,exit -F path=/bin/su -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
||||||
-a always,exit -F path=/bin/sudo -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
-a always,exit -F path=/bin/sudo -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
||||||
-a always,exit -F path=/bin/newgrp -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
-a always,exit -F path=/bin/newgrp -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
||||||
-a always,exit -F path=/bin/chsh -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
-a always,exit -F path=/bin/chsh -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change
|
||||||
@ -83,7 +83,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@ FILE='/etc/audit/rules.d/audit.rules'
|
|||||||
|
|
||||||
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix
|
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix
|
||||||
-a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix'
|
-a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix'
|
||||||
AUDIT_PARAMS_REDHAT='-a always,exit -F path=/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix
|
AUDIT_PARAMS_CENTOS='-a always,exit -F path=/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix
|
||||||
-a always,exit -F path=/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix'
|
-a always,exit -F path=/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-postfix'
|
||||||
|
|
||||||
AUDIT_PARAMS=""
|
AUDIT_PARAMS=""
|
||||||
@ -75,7 +75,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ HARDENING_LEVEL=4
|
|||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
|
||||||
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-cron'
|
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-cron'
|
||||||
AUDIT_PARAMS_REDHAT='-a always,exit -F path=/bin/crontab -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-cron'
|
AUDIT_PARAMS_CENTOS='-a always,exit -F path=/bin/crontab -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-cron'
|
||||||
AUDIT_PARAMS=""
|
AUDIT_PARAMS=""
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -72,7 +72,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ HARDENING_LEVEL=4
|
|||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
|
||||||
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-pam'
|
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-pam'
|
||||||
AUDIT_PARAMS_REDHAT='-a always,exit -F path=/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-pam'
|
AUDIT_PARAMS_CENTOS='-a always,exit -F path=/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-pam'
|
||||||
AUDIT_PARAMS=""
|
AUDIT_PARAMS=""
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -72,7 +72,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ FILE='/etc/audit/rules.d/audit.rules'
|
|||||||
HARDENING_LEVEL=4
|
HARDENING_LEVEL=4
|
||||||
|
|
||||||
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-usermod'
|
AUDIT_PARAMS_DEBIAN='-a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-usermod'
|
||||||
AUDIT_PARAMS_REDHAT='-a always,exit -F path=/sbin/usermod -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-usermod'
|
AUDIT_PARAMS_CENTOS='-a always,exit -F path=/sbin/usermod -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-usermod'
|
||||||
AUDIT_PARAMS=""
|
AUDIT_PARAMS=""
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
@ -72,7 +72,7 @@ check_config() {
|
|||||||
if [ $OS_RELEASE -eq 1 ]; then
|
if [ $OS_RELEASE -eq 1 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
AUDIT_PARAMS=$AUDIT_PARAMS_DEBIAN
|
||||||
elif [ $OS_RELEASE -eq 2 ]; then
|
elif [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -15,13 +15,13 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=4
|
HARDENING_LEVEL=4
|
||||||
|
|
||||||
PACKAGE='auditd'
|
PACKAGE='auditd'
|
||||||
PACKAGE_REDHAT='audit'
|
PACKAGE_CENTOS='audit'
|
||||||
SERVICE_NAME='auditd'
|
SERVICE_NAME='auditd'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET != 0 ]; then
|
if [ $FNRET != 0 ]; then
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
|
@ -16,7 +16,7 @@ set -e # One error, it's over
|
|||||||
HARDENING_LEVEL=4
|
HARDENING_LEVEL=4
|
||||||
|
|
||||||
SELINUX_PKG="selinux-basics"
|
SELINUX_PKG="selinux-basics"
|
||||||
SELINUX_PKG_REDHAT="selinux-policy"
|
SELINUX_PKG_CENTOS="selinux-policy"
|
||||||
|
|
||||||
SE_AUDIT_PARAMS="-a always,exit -F dir=/etc/selinux/ -F perm=wa -k MAC-policy
|
SE_AUDIT_PARAMS="-a always,exit -F dir=/etc/selinux/ -F perm=wa -k MAC-policy
|
||||||
-a always,exit -F dir=/usr/share/selinux/ -F perm=wa -k MAC-policy
|
-a always,exit -F dir=/usr/share/selinux/ -F perm=wa -k MAC-policy
|
||||||
@ -40,7 +40,7 @@ audit () {
|
|||||||
d_IFS=$IFS
|
d_IFS=$IFS
|
||||||
IFS=$'\n'
|
IFS=$'\n'
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
SELINUX_PKG=$SELINUX_PKG_REDHAT
|
SELINUX_PKG=$SELINUX_PKG_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $SELINUX_PKG
|
is_pkg_installed $SELINUX_PKG
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
@ -72,7 +72,7 @@ apply () {
|
|||||||
d_IFS=$IFS
|
d_IFS=$IFS
|
||||||
IFS=$'\n'
|
IFS=$'\n'
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
SELINUX_PKG=$SELINUX_PKG_REDHAT
|
SELINUX_PKG=$SELINUX_PKG_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $SELINUX_PKG
|
is_pkg_installed $SELINUX_PKG
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
|
@ -18,14 +18,14 @@ HARDENING_LEVEL=4
|
|||||||
AUDIT_PARAMS='-w /var/log/faillog -p wa -k logins
|
AUDIT_PARAMS='-w /var/log/faillog -p wa -k logins
|
||||||
-w /var/log/lastlog -p wa -k logins
|
-w /var/log/lastlog -p wa -k logins
|
||||||
-w /var/log/tallylog -p wa -k logins'
|
-w /var/log/tallylog -p wa -k logins'
|
||||||
AUDIT_PARAMS_REDHAT='-w /var/log/lastlog -p wa -k logins
|
AUDIT_PARAMS_CENTOS='-w /var/log/lastlog -p wa -k logins
|
||||||
-w /var/log/tallylog -p wa -k logins'
|
-w /var/log/tallylog -p wa -k logins'
|
||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
# define custom IFS and save default one
|
# define custom IFS and save default one
|
||||||
d_IFS=$IFS
|
d_IFS=$IFS
|
||||||
@ -45,7 +45,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
d_IFS=$IFS
|
d_IFS=$IFS
|
||||||
IFS=$'\n'
|
IFS=$'\n'
|
||||||
|
@ -17,14 +17,14 @@ HARDENING_LEVEL=4
|
|||||||
AUDIT_PARAMS='-w /var/run/utmp -p wa -k session
|
AUDIT_PARAMS='-w /var/run/utmp -p wa -k session
|
||||||
-w /var/log/wtmp -p wa -k session
|
-w /var/log/wtmp -p wa -k session
|
||||||
-w /var/log/btmp -p wa -k session'
|
-w /var/log/btmp -p wa -k session'
|
||||||
AUDIT_PARAMS_REDHAT='-w /var/log/wtmp -p wa -k session
|
AUDIT_PARAMS_CENTOS='-w /var/log/wtmp -p wa -k session
|
||||||
-w /var/log/btmp -p wa -k session'
|
-w /var/log/btmp -p wa -k session'
|
||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
# define custom IFS and save default one
|
# define custom IFS and save default one
|
||||||
d_IFS=$IFS
|
d_IFS=$IFS
|
||||||
@ -44,7 +44,7 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
AUDIT_PARAMS=$AUDIT_PARAMS_REDHAT
|
AUDIT_PARAMS=$AUDIT_PARAMS_CENTOS
|
||||||
fi
|
fi
|
||||||
d_IFS=$IFS
|
d_IFS=$IFS
|
||||||
IFS=$'\n'
|
IFS=$'\n'
|
||||||
|
@ -17,14 +17,14 @@ HARDENING_LEVEL=3
|
|||||||
PACKAGE="cron"
|
PACKAGE="cron"
|
||||||
SERVICE_NAME="cron"
|
SERVICE_NAME="cron"
|
||||||
|
|
||||||
PACKAGE_REDHAT="cronie"
|
PACKAGE_CENTOS="cronie"
|
||||||
SERVICE_NAME_REDHAT="crond"
|
SERVICE_NAME_CENTOS="crond"
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
SERVICE_NAME=$SERVICE_NAME_REDHAT
|
SERVICE_NAME=$SERVICE_NAME_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET != 0 ]; then
|
if [ $FNRET != 0 ]; then
|
||||||
@ -43,8 +43,8 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
SERVICE_NAME=$SERVICE_NAME_REDHAT
|
SERVICE_NAME=$SERVICE_NAME_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='maxclassrepeat'
|
OPTIONNAME='maxclassrepeat'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME le $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME le $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,10 +20,10 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
PACKAGE_REDHAT='libpwquality'
|
PACKAGE_CENTOS='libpwquality'
|
||||||
PAMLIBNAME_REDHAT='pam_pwquality.so'
|
PAMLIBNAME_CENTOS='pam_pwquality.so'
|
||||||
PATTERN_REDHAT='^password.*pam_pwquality.so'
|
PATTERN_CENTOS='^password.*pam_pwquality.so'
|
||||||
FILE_REDHAT='/etc/pam.d/system-auth'
|
FILE_CENTOS='/etc/pam.d/system-auth'
|
||||||
|
|
||||||
OPTIONNAME='retry'
|
OPTIONNAME='retry'
|
||||||
|
|
||||||
@ -33,10 +33,10 @@ CONDT_VAL=3
|
|||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
PAMLIBNAME=$PAMLIBNAME_REDHAT
|
PAMLIBNAME=$PAMLIBNAME_CENTOS
|
||||||
PATTERN=$PATTERN_REDHAT
|
PATTERN=$PATTERN_CENTOS
|
||||||
FILE=$FILE_REDHAT
|
FILE=$FILE_CENTOS
|
||||||
fi
|
fi
|
||||||
is_pkg_installed $PACKAGE
|
is_pkg_installed $PACKAGE
|
||||||
if [ $FNRET != 0 ]; then
|
if [ $FNRET != 0 ]; then
|
||||||
@ -64,10 +64,10 @@ audit () {
|
|||||||
# This function will be called if the script status is on enabled mode
|
# This function will be called if the script status is on enabled mode
|
||||||
apply () {
|
apply () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
PAMLIBNAME=$PAMLIBNAME_REDHAT
|
PAMLIBNAME=$PAMLIBNAME_CENTOS
|
||||||
PATTERN=$PATTERN_REDHAT
|
PATTERN=$PATTERN_CENTOS
|
||||||
FILE=$FILE_REDHAT
|
FILE=$FILE_CENTOS
|
||||||
fi
|
fi
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$PACKAGE is installed"
|
ok "$PACKAGE is installed"
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='minlen'
|
OPTIONNAME='minlen'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME ge $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME ge $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is less than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is less than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Set option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Set option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='dcredit'
|
OPTIONNAME='dcredit'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME le $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME le $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is not set greater than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is not set greater than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Set option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Set option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='ucredit'
|
OPTIONNAME='ucredit'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME le $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME le $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -99,15 +99,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Set option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Set option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='ocredit'
|
OPTIONNAME='ocredit'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME le $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME le $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='lcredit'
|
OPTIONNAME='lcredit'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME le $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME le $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='difok'
|
OPTIONNAME='difok'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME ge $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME ge $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is less than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is less than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='minclass'
|
OPTIONNAME='minclass'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME ge $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME ge $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is less than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is less than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is greater than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ PATTERN='^password.*pam_cracklib.so'
|
|||||||
FILE='/etc/pam.d/common-password'
|
FILE='/etc/pam.d/common-password'
|
||||||
|
|
||||||
# Redhat/CentOS default use pam_pwquality
|
# Redhat/CentOS default use pam_pwquality
|
||||||
FILE_REDHAT='/etc/security/pwquality.conf'
|
FILE_CENTOS='/etc/security/pwquality.conf'
|
||||||
|
|
||||||
OPTIONNAME='maxrepeat'
|
OPTIONNAME='maxrepeat'
|
||||||
|
|
||||||
@ -52,15 +52,15 @@ audit_debian () {
|
|||||||
}
|
}
|
||||||
|
|
||||||
audit_centos () {
|
audit_centos () {
|
||||||
check_param_pair_by_value $FILE_REDHAT $OPTIONNAME le $CONDT_VAL
|
check_param_pair_by_value $FILE_CENTOS $OPTIONNAME le $CONDT_VAL
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "Option $OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_REDHAT"
|
crit "Option $OPTIONNAME set condition is greater than $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
crit "Option $OPTIONNAME is not conf in $FILE_REDHAT"
|
crit "Option $OPTIONNAME is not conf in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -98,15 +98,15 @@ apply_debian () {
|
|||||||
|
|
||||||
apply_centos () {
|
apply_centos () {
|
||||||
if [ $FNRET = 0 ]; then
|
if [ $FNRET = 0 ]; then
|
||||||
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_REDHAT"
|
ok "$OPTIONNAME set condition is less than or equal to $CONDT_VAL in $FILE_CENTOS"
|
||||||
elif [ $FNRET = 1 ]; then
|
elif [ $FNRET = 1 ]; then
|
||||||
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_REDHAT"
|
warn "Reset option $OPTIONNAME to $CONDT_VAL in $FILE_CENTOS"
|
||||||
replace_in_file $FILE_REDHAT "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
replace_in_file $FILE_CENTOS "^$OPTIONNAME.*" "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 2 ]; then
|
elif [ $FNRET = 2 ]; then
|
||||||
warn "$OPTIONNAME is not conf, add to $FILE_REDHAT"
|
warn "$OPTIONNAME is not conf, add to $FILE_CENTOS"
|
||||||
add_end_of_file $FILE_REDHAT "$OPTIONNAME = $CONDT_VAL"
|
add_end_of_file $FILE_CENTOS "$OPTIONNAME = $CONDT_VAL"
|
||||||
elif [ $FNRET = 3 ]; then
|
elif [ $FNRET = 3 ]; then
|
||||||
crit "Config file $FILE_REDHAT is not exist!"
|
crit "Config file $FILE_CENTOS is not exist!"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -14,14 +14,14 @@ set -u # One variable unset, it's over
|
|||||||
HARDENING_LEVEL=3
|
HARDENING_LEVEL=3
|
||||||
|
|
||||||
PACKAGE='login'
|
PACKAGE='login'
|
||||||
PACKAGE_REDHAT='util-linux'
|
PACKAGE_CENTOS='util-linux'
|
||||||
PATTERN='^auth[[:space:]]*required[[:space:]]*pam_wheel.so'
|
PATTERN='^auth[[:space:]]*required[[:space:]]*pam_wheel.so'
|
||||||
FILE='/etc/pam.d/su'
|
FILE='/etc/pam.d/su'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
if [ $OS_RELEASE -eq 2 ]; then
|
if [ $OS_RELEASE -eq 2 ]; then
|
||||||
PACKAGE=$PACKAGE_REDHAT
|
PACKAGE=$PACKAGE_CENTOS
|
||||||
else
|
else
|
||||||
:
|
:
|
||||||
fi
|
fi
|
||||||
|
Loading…
x
Reference in New Issue
Block a user