Add audit and apply firewall(iptables) rules for 7.7.1 7.7.2

This commit is contained in:
Samson-W 2018-11-26 09:52:46 -05:00
parent be82ac5f41
commit 60be85163b
3 changed files with 104 additions and 13 deletions

View File

@ -0,0 +1,71 @@
#!/bin/bash
#
# harbian audit 7/8/9 Hardening
#
#
# 7.7.1 Ensure Firewall is active (Scored)
#
set -e # One error, it's over
set -u # One variable unset, it's over
HARDENING_LEVEL=2
# Quick note here : CIS recommends your iptables rules to be persistent.
# Do as you want, but this script does not handle this
PACKAGES='iptables iptables-persistent'
# This function will be called if the script status is on enabled / audit mode
audit () {
for PACKAGE in $PACKAGES
do
is_pkg_installed $PACKAGE
if [ $FNRET != 0 ]; then
crit "$PACKAGE is not installed!"
FNRET=1
break
else
ok "$PACKAGE is installed"
FNRET=0
fi
done
}
# This function will be called if the script status is on enabled mode
apply () {
if [ $FNRET = 0 ]; then
ok "$PACKAGES is installed"
else
for PACKAGE in $PACKAGES
do
warn "$PACKAGE is absent, installing it"
apt_install $PACKAGE
done
fi
}
# This function will check config parameters required
check_config() {
:
}
# Source Root Dir Parameter
if [ -r /etc/default/cis-hardening ]; then
. /etc/default/cis-hardening
fi
if [ -z "$CIS_ROOT_DIR" ]; then
echo "There is no /etc/default/cis-hardening file nor cis-hardening directory in current environment."
echo "Cannot source CIS_ROOT_DIR variable, aborting."
exit 128
fi
# Main function, will call the proper functions given the configuration (audit, enabled, disabled)
if [ -r $CIS_ROOT_DIR/lib/main.sh ]; then
. $CIS_ROOT_DIR/lib/main.sh
else
echo "Cannot find main.sh, have you correctly defined your root directory? Current value is $CIS_ROOT_DIR in /etc/default/cis-hardening"
exit 128
fi

View File

@ -1,11 +1,11 @@
#!/bin/bash #!/bin/bash
# #
# harbian audit 7/8/9 Hardening # harbian audit 9 Hardening
# #
# #
# 7.7 Ensure Firewall is active (Scored) # 7.7.2 Ensure the Firewall is set rules (Scored)
# #
set -e # One error, it's over set -e # One error, it's over
@ -16,27 +16,25 @@ HARDENING_LEVEL=2
# Quick note here : CIS recommends your iptables rules to be persistent. # Quick note here : CIS recommends your iptables rules to be persistent.
# Do as you want, but this script does not handle this # Do as you want, but this script does not handle this
PACKAGE='iptables' PARAM='SETRULE'
# This function will be called if the script status is on enabled / audit mode # This function will be called if the script status is on enabled / audit mode
audit () { audit () {
is_pkg_installed $PACKAGE check_iptables_set ${PARAM}
if [ $FNRET != 0 ]; then if [ $FNRET != 0 ]; then
crit "$PACKAGE is not installed!" crit "Iptables is not set rule!"
else else
ok "$PACKAGE is installed" ok "Iptables rules are set!"
fi fi
} }
# This function will be called if the script status is on enabled mode # This function will be called if the script status is on enabled mode
apply () { apply () {
is_pkg_installed $PACKAGE if [ $FNRET = 0 ]; then
if [ $FNRET = 0 ]; then ok "Iptables rules are set!"
ok "$PACKAGE is installed" else
else warn "Iptables rules are not set, need the administrator to manually add it."
crit "$PACKAGE is absent, installing it" fi
apt_install $PACKAGE
fi
} }
# This function will check config parameters required # This function will check config parameters required

View File

@ -673,3 +673,25 @@ check_auth_option_nullok_by_pam()
fi fi
} }
check_iptables_set()
{
case $1 in
SETRULE)
COUNT=$(iptables -S | grep -Ec "^-A|^-I")
if [ "${COUNT}" -gt 0 ]; then
FNRET=1
else
FNRET=0
fi
;;
SETDOS)
COUNT=$(iptables -S | grep "\-m.*limit" | grep -c "\-\-limit-burst")
if [ "${COUNT}" -eq 0 ]; then
FNRET=1
else
FNRET=0
fi
;;
esac
}