Modify functions for firewall
This commit is contained in:
parent
0aa16f3e6d
commit
217c3cd020
|
@ -17,12 +17,9 @@ HARDENING_LEVEL=2
|
||||||
# Quick note here : CIS recommends your iptables rules to be persistent.
|
# Quick note here : CIS recommends your iptables rules to be persistent.
|
||||||
# Do as you want, but this script does not handle this
|
# Do as you want, but this script does not handle this
|
||||||
|
|
||||||
PARAM='SETRULE'
|
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
check_iptables_set ${PARAM}
|
if [ $(/sbin/iptables -S | grep -Ec "^-A|^-I") -eq 0 ]; then
|
||||||
if [ $FNRET != 0 ]; then
|
|
||||||
crit "Iptables is not set rule!"
|
crit "Iptables is not set rule!"
|
||||||
FNRET=1
|
FNRET=1
|
||||||
else
|
else
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
#
|
#
|
||||||
|
|
||||||
#
|
#
|
||||||
# 7.7.2 Ensure the Firewall is set rules of protect DOS attacks (Scored)
|
# 7.7.3 Ensure the Firewall is set rules of protect DOS attacks (Scored)
|
||||||
# Add this feature:Authors : Samson wen, Samson <sccxboy@gmail.com>
|
# Add this feature:Authors : Samson wen, Samson <sccxboy@gmail.com>
|
||||||
#
|
#
|
||||||
|
|
||||||
|
@ -17,13 +17,9 @@ HARDENING_LEVEL=2
|
||||||
# Quick note here : CIS recommends your iptables rules to be persistent.
|
# Quick note here : CIS recommends your iptables rules to be persistent.
|
||||||
# Do as you want, but this script does not handle this
|
# Do as you want, but this script does not handle this
|
||||||
|
|
||||||
PARAM='SETDOS'
|
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
audit () {
|
audit () {
|
||||||
check_iptables_set ${PARAM}
|
if [ $(/sbin/iptables -S | grep -E "\-m.*limit" | grep -Ec "\-\-limit-burst") -eq 0 ]; then
|
||||||
echo "fffffffffffffffffffffffffffffffffffff"
|
|
||||||
if [ $FNRET != 0 ]; then
|
|
||||||
crit "Iptables is not set rules of protect DOS attacks!"
|
crit "Iptables is not set rules of protect DOS attacks!"
|
||||||
FNRET=1
|
FNRET=1
|
||||||
else
|
else
|
||||||
|
|
23
lib/utils.sh
23
lib/utils.sh
|
@ -673,26 +673,3 @@ check_auth_option_nullok_by_pam()
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
check_iptables_set()
|
|
||||||
{
|
|
||||||
case $1 in
|
|
||||||
SETRULE)
|
|
||||||
COUNTLINE=$(/sbin/iptables -S | grep -Ec "^-A|^-I")
|
|
||||||
if [ ${COUNTLINE} -gt 0 ]; then
|
|
||||||
FNRET=0
|
|
||||||
else
|
|
||||||
FNRET=1
|
|
||||||
fi
|
|
||||||
;;
|
|
||||||
SETDOS)
|
|
||||||
COUNTLINE=$(/sbin/iptables -S | grep -E "\-m.*limit" | grep -Ec "\-\-limit-burst")
|
|
||||||
echo "fsfdsfdsfdfffffffffffffffff"
|
|
||||||
if [ ${COUNTLINE} -eq 0 ]; then
|
|
||||||
FNRET=1
|
|
||||||
else
|
|
||||||
FNRET=0
|
|
||||||
fi
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue