From 5669c59742acdcddb6095783533144fd0eb53341 Mon Sep 17 00:00:00 2001 From: Samson-W Date: Mon, 8 Oct 2018 19:16:06 +0800 Subject: [PATCH] Add 10.1.8 for audit and apply not authenticate whether set in sudoers conf file. --- .../10.1.8_remove_noauthenticate_sudoers.sh | 73 +++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100755 bin/hardening/10.1.8_remove_noauthenticate_sudoers.sh diff --git a/bin/hardening/10.1.8_remove_noauthenticate_sudoers.sh b/bin/hardening/10.1.8_remove_noauthenticate_sudoers.sh new file mode 100755 index 0000000..9dcf3ea --- /dev/null +++ b/bin/hardening/10.1.8_remove_noauthenticate_sudoers.sh @@ -0,0 +1,73 @@ +#!/bin/bash + +# +# harbian audit 7/8/9 Hardening +# + +# +# 10.1.8 Remove not authenticate option from the sudoers configuration (Scored) +# Authors : Samson wen, Samson +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +HARDENING_LEVEL=3 + +NOAUTH='!authenticate' +AUTHENTICATE='authenticate' +FILE='/etc/sudoers' +INCLUDFILE='/etc/sudoers.d/*' + +# This function will be called if the script status is on enabled / audit mode +audit () +{ + does_pattern_exist_in_file $FILE $NOAUTH + if [ $FNRET = 0 ]; then + crit "$NOAUTH is set on $FILE, it's error conf" + FNRET=1 + else + ok "$NOAUTH is not set on $FILE, it's ok" + if [ $(grep $NOAUTH $INCLUDFILE | wc -l) -gt 0 ]; then + crit "$NOAUTH is set on $INCLUDFILE, it's error conf" + FNRET=1 + else + ok "$NOAUTH is not set on $INCLUDFILE, it's ok" + FNRET=0 + fi + fi +} + +# This function will be called if the script status is on enabled mode +apply () { + if [ $FNRET = 0 ]; then + ok "APPLY: $NOAUTH is not set on $FILE, it's ok" + elif [ $FNRET = 1 ]; then + info "$NOAUTH is set on the $FILE or $INCLUDFILE, need remove" + backup_file $FILE $INCLUDFILE + chmod 640 $FILE $INCLUDFILE && sed -i -e "s/$NOAUTH/$AUTHENTICATE/g" $FILE $INCLUDFILE && chmod 440 $FILE $INCLUDFILE + fi +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ -r /etc/default/cis-hardening ]; then + . /etc/default/cis-hardening +fi +if [ -z "$CIS_ROOT_DIR" ]; then + echo "There is no /etc/default/cis-hardening file nor cis-hardening directory in current environment." + echo "Cannot source CIS_ROOT_DIR variable, aborting." + exit 128 +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +if [ -r $CIS_ROOT_DIR/lib/main.sh ]; then + . $CIS_ROOT_DIR/lib/main.sh +else + echo "Cannot find main.sh, have you correctly defined your root directory? Current value is $CIS_ROOT_DIR in /etc/default/cis-hardening" + exit 128 +fi