Add how to set firewall basic rules for after remediation.

This commit is contained in:
samson 2018-12-03 03:09:59 +08:00
parent ff5447d2fb
commit 5d3d94ecd0
1 changed files with 9 additions and 1 deletions

View File

@ -117,12 +117,20 @@ When exec --apply and set-hardening-level are set to 5 (the highest level), you
```
# sed -i "/^root/a\test ALL=(ALL:ALL) ALL" /etc/sudoers
```
4) Set basic iptables rules
Set the corresponding firewall rules according to the applications used. HardenedLinux community for Debian GNU/Linux firewall rules:
[etc.iptables.rules.v4.sh](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/examples/configurations/etc.iptables.rules.v4.sh)
5) Use the passwd command to change the passwords of all users, and change the password to a secure and reliable password entry with the same password complexity set by the pam_cracklib module.
6) Set firewall basic rules for the OS, to do the following:
```
$ sudo sudo bash docs/examples/configurations/etc.iptables.rules.v4.sh
# iptables-save > /etc/iptables/rules.v4
# ip6tables-save > /etc/iptables/rules.v6
```
## Hacking
**Getting the source**
@ -150,7 +158,7 @@ $ bash bin/hardening.sh --apply --only 99.99
## Document
### Harbian-audit benchmark for Debian GNU/Linux 9
This document is a description of the additions to the sections not included in the CIS reference documentation. Includes STIG reference documentation and additional checks recommended by the HardenedLinux community.
This document is a description of the additions to the sections not included in the [CIS reference documentation](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/CIS_Debian_Linux_8_Benchmark_v1.0.0.pdf). Includes STIG reference documentation and additional checks recommended by the HardenedLinux community.
[harbian audit Debian Linux 9 Benchmark](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/harbian_audit_Debian_9_Benchmark_v0.1.mkd)
### Manual Operation docs