Add a function to detect MAC that has been activated.

This commit is contained in:
Samson-W 2020-06-04 02:52:06 +08:00
parent 2d1e57dca9
commit fc24c6bc35
2 changed files with 19 additions and 1 deletions

View File

@ -20,8 +20,13 @@ PATTERN="apparmor=1[[:space:]]*security=apparmor"
SETSTRING="apparmor=1 security=apparmor"
GRUBFILE='/etc/default/grub'
SERVICENAME='apparmor.service'
SELINUXSETSTRING="security=selinux"
audit_debian () {
if [ $(grep -c "${SELINUXSETSTRING}" /proc/cmdline) -eq 1 ]; then
ok "SELinux was actived. So pass."
return 0
fi
for PACKAGE in ${PACKAGES}
do
is_pkg_installed $PACKAGE
@ -79,6 +84,10 @@ audit () {
}
apply_debian () {
if [ $(grep -c "${SELINUXSETSTRING}" /proc/cmdline) -eq 1 ]; then
ok "SELinux was actived. So pass."
return 0
fi
if [ $FNRET = 0 ]; then
ok "AppArmor profiles is enable in the system "
elif [ $FNRET = 1 ]; then

View File

@ -16,8 +16,13 @@ HARDENING_LEVEL=3
PACKAGES='selinux-basics selinux-policy-default'
SETSTRING="security=selinux"
APPARMOR_RUN="/sys/kernel/security/apparmor/"
audit_debian () {
if [ -d APPARMOR_RUN ]; then
ok "AppArmor was actived. So pass."
return 0
fi
# Only support for Debian 10 (Buster)
is_debian_ge_10
if [ $FNRET = 0 ]; then
@ -80,6 +85,10 @@ audit () {
}
apply_debian () {
if [ -d $APPARMOR_RUN ]; then
ok "AppArmor was actived. So pass."
return 0
fi
if [ $FNRET = 0 ]; then
ok "SELinux is active and in Enforcing mode."
elif [ $FNRET = 1 ]; then
@ -92,7 +101,7 @@ apply_debian () {
warn "Set SELinux to activate."
selinux-activate
elif [ $FNRET = 3 ]; then
warn "Set SELinux to enforcing mode."
warn "Set SELinux to enforcing mode, and need reboot"
replace_in_file '/etc/selinux/config' 'SELINUX=.*' 'SELINUX=enforcing'
else
warn "SELinux check only support Debian 10."