lynis/include/tests_shells

286 lines
13 KiB
Plaintext
Raw Normal View History

2014-08-26 17:33:55 +02:00
#!/bin/sh
#################################################################################
#
# Lynis
# ------------------
#
2016-03-13 16:00:39 +01:00
# Copyright 2007-2013, Michael Boelen
# Copyright 2007-2019, CISOfy
2016-03-13 16:00:39 +01:00
#
# Website : https://cisofy.com
# Blog : http://linux-audit.com
# GitHub : https://github.com/CISOfy/lynis
2014-08-26 17:33:55 +02:00
#
# Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
# welcome to redistribute it under the terms of the GNU General Public License.
# See LICENSE file for usage of this software.
#
#################################################################################
#
# Shells
#
#################################################################################
#
IDLE_TIMEOUT=0
InsertSection "Shells"
#
#################################################################################
#
# bash
# Files (interactive login shells): /etc/profile $HOME/.bash_profile
# $HOME/.bash_login $HOME/.profile
# Files (interactive non-login shells): $HOME/.bash_rc
2019-04-09 06:52:00 +02:00
#
2014-08-26 17:33:55 +02:00
# csh/tcsh
# Files: /etc/csh.cshrc /etc/csh.login
2019-04-09 06:52:00 +02:00
#
2014-08-26 17:33:55 +02:00
# zsh
# Files: /etc/zshenv /etc/zsh/zshenv $HOME/.zshenv /etc/zprofile
# /etc/zsh/zprofile $HOME/.zprofile /etc/zshrc /etc/zsh/zshrc
# $ZDOTDIR/.zshrc /etc/zlogin /etc/zsh/zlogin
2017-04-23 20:06:54 +02:00
SHELL_LOGIN_FILES="${ROOTDIR}etc/csh.cshrc ${ROOTDIR}etc/csh.login ${ROOTDIR}etc/zshenv ${ROOTDIR}etc/zsh/zshenv
${ROOTDIR}etc/zprofile ${ROOTDIR}etc/zsh/zprofile ${ROOTDIR}etc/zshrc ${ROOTDIR}etc/zsh/zshrc
${ROOTDIR}etc/zlogin ${ROOTDIR}etc/zsh/zlogin"
2014-08-26 17:33:55 +02:00
#
#################################################################################
#
# Test : SHLL-6202
# Description : check all console TTYs in which root user can enter single user mode without password
Register --test-no SHLL-6202 --os FreeBSD --weight L --network NO --category security --description "Check console TTYs"
2014-08-26 17:33:55 +02:00
if [ ${SKIPTEST} -eq 0 ]; then
LogText "Test: Checking console TTYs"
2017-04-23 20:06:54 +02:00
FIND=$(${EGREPBINARY} '^console' ${ROOTDIR}etc/ttys | ${GREPBINARY} -v 'insecure')
if [ -z "${FIND}" ]; then
Display --indent 2 --text "- Checking console TTYs" --result "${STATUS_OK}" --color GREEN
LogText "Result: console is secured against single user mode without password."
2017-04-23 20:06:54 +02:00
else
Display --indent 2 --text "- Checking console TTYs" --result "${STATUS_WARNING}" --color RED
2017-05-03 10:42:34 +02:00
LogText "Result: Found insecure console in ${ROOTDIR}etc/ttys. Single user mode login without password allowed!"
LogText "Output ${ROOTDIR}etc/ttys:"
LogText "${FIND}"
2019-12-18 12:17:46 +01:00
ReportWarning "${TEST_NO}" "Found unprotected console in ${ROOTDIR}etc/ttys"
LogText "Possible solution: Change the console line from 'secure' to 'insecure'."
2014-08-26 17:33:55 +02:00
fi
fi
#
#################################################################################
#
# Test : SHLL-6211
2019-04-09 06:52:00 +02:00
# Description : Determine available shell according /etc/shells
Register --test-no SHLL-6211 --weight L --network NO --category security --description "Available and valid shells"
2014-08-26 17:33:55 +02:00
if [ ${SKIPTEST} -eq 0 ]; then
2017-04-23 20:06:54 +02:00
LogText "Test: Searching for ${ROOTDIR}etc/shells"
2017-05-03 10:42:34 +02:00
if [ -f ${ROOTDIR}etc/shells ]; then
LogText "Result: Found ${ROOTDIR}etc/shells file"
LogText "Test: Reading available shells from ${ROOTDIR}etc/shells"
2017-04-23 20:06:54 +02:00
SSHELLS=$(${GREPBINARY} "^/" ${ROOTDIR}etc/shells)
2014-08-26 17:33:55 +02:00
CSSHELLS=0; CSSHELLS_ALL=0
2017-05-03 10:42:34 +02:00
Display --indent 2 --text "- Checking shells from ${ROOTDIR}etc/shells"
2014-08-26 17:33:55 +02:00
for I in ${SSHELLS}; do
CSSHELLS_ALL=$((CSSHELLS_ALL + 1))
Report "available_shell[]=${I}"
2017-04-23 20:06:54 +02:00
# TODO add check for symlinked shells
2014-08-26 17:33:55 +02:00
if [ -f ${I} ]; then
LogText "Found installed shell: ${I}"
CSSHELLS=$((CSSHELLS + 1))
2017-04-23 20:06:54 +02:00
else
LogText "Shell ${I} not installed. Probably a dummy or non existing shell."
2014-08-26 17:33:55 +02:00
fi
done
2014-08-26 17:33:55 +02:00
Display --indent 4 --text "Result: found ${CSSHELLS_ALL} shells (valid shells: ${CSSHELLS})."
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: ${ROOTDIR}etc/shells not found, skipping test"
2014-08-26 17:33:55 +02:00
fi
fi
#
#################################################################################
#
# Test : SHLL-6220
2019-04-09 06:52:00 +02:00
# Description : Check for idle session killing tools or settings
Register --test-no SHLL-6220 --weight L --network NO --category security --description "Idle session killing tools or settings"
2014-08-26 17:33:55 +02:00
if [ ${SKIPTEST} -eq 0 ]; then
IDLE_TIMEOUT_METHOD=""
IDLE_TIMEOUT_READONLY=""
LogText "Test: Search for session timeout tools or settings in shell"
if IsRunning "timeoutd"; then
2014-08-26 17:33:55 +02:00
IDLE_TIMEOUT=1
2019-09-21 16:31:06 +02:00
LogText "Result: found timeoutd process to kill idle sessions"
IDLE_TIMEOUT_METHOD="timeout-daemon"
2014-08-26 17:33:55 +02:00
fi
if IsRunning "autolog"; then
2014-08-26 17:33:55 +02:00
IDLE_TIMEOUT=1
2019-09-21 16:31:06 +02:00
LogText "Result: found autolog process to kill idle sessions"
Report "session_timeout_method[]=autolog"
IDLE_TIMEOUT_METHOD="autolog"
2014-08-26 17:33:55 +02:00
fi
2017-04-23 20:06:54 +02:00
if [ -f ${ROOTDIR}etc/profile ]; then
# Determine if we can find a TMOUT value
2017-04-23 20:06:54 +02:00
FIND=$(${GREPBINARY} 'TMOUT=' ${ROOTDIR}etc/profile | ${TRBINARY} -d ' ' | ${TRBINARY} -d '\t' | ${GREPBINARY} -v "^#" | ${SEDBINARY} 's/export//' | ${SEDBINARY} 's/#.*//' | ${AWKBINARY} -F= '{ print $2 }')
# Determine if the value is exported (with export, readonly, or typeset)
2017-05-03 10:42:34 +02:00
FIND2=$(${GREPBINARY} '\(export\|readonly\|typeset -r\)[ \t]*TMOUT' ${ROOTDIR}etc/profile | ${GREPBINARY} -v "^#" | ${SEDBINARY} 's/#.*//' | ${AWKBINARY} '{ print $1 }')
2019-07-16 13:20:30 +02:00
if [ -n "${FIND}" ]; then
2014-08-26 17:33:55 +02:00
N=0; IDLE_TIMEOUT=1
for I in ${FIND}; do
LogText "Output: ${I}"
Report "session_timeout_value[]=${I}"
N=$((N + 1))
2014-08-26 17:33:55 +02:00
done
if [ ${N} -eq 1 ]; then
2017-05-03 10:42:34 +02:00
LogText "Result: found TMOUT value configured in ${ROOTDIR}etc/profile"
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: found several TMOUT values configured in ${ROOTDIR}etc/profile"
2014-08-26 17:33:55 +02:00
fi
IDLE_TIMEOUT_METHOD="profile"
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: could not find TMOUT setting in ${ROOTDIR}etc/profile"
2014-08-26 17:33:55 +02:00
fi
2019-07-16 13:20:30 +02:00
if [ -n "${FIND2}" ]; then
N=0;
for I in ${FIND2}; do
LogText "Output: ${I}"
if [ "${I}" = "readonly" -o "${I}" = "typeset" ]; then
N=$((N + 1))
fi
done
if [ ${N} -gt 0 ]; then
2017-05-03 10:42:34 +02:00
LogText "Result: found readonly setting in ${ROOTDIR}etc/profile (readonly or typeset -r)"
IDLE_TIMEOUT_READONLY=1
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: NO readonly setting found in ${ROOTDIR}etc/profile (readonly or typeset -r)"
IDLE_TIMEOUT_READONLY=0
fi
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: could not find export, readonly or typeset -r in ${ROOTDIR}etc/profile"
fi
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: skip ${ROOTDIR}etc/profile test, file not available on this system"
2014-08-26 17:33:55 +02:00
fi
2017-04-23 20:06:54 +02:00
if [ -d ${ROOTDIR}etc/profile.d ]; then
FIND=$(${LSBINARY} ${ROOTDIR}etc/profile.d/*.sh 2> /dev/null)
2019-07-16 13:20:30 +02:00
if [ -n "${FIND}" ]; then
# Determine if we can find a TMOUT value
FIND=$(${FINDBINARY} ${ROOTDIR}etc/profile.d -name "*.sh" -type f -exec cat {} \; 2> /dev/null | ${GREPBINARY} 'TMOUT=' | ${TRBINARY} -d ' ' | ${TRBINARY} -d '\t' | ${GREPBINARY} -v "^#" | ${SEDBINARY} 's/export//' | ${SEDBINARY} 's/#.*//' | ${AWKBINARY} -F= '{ print $2 }')
# Determine if the value is exported (with export, readonly, or typeset)
FIND2=$(${FINDBINARY} ${ROOTDIR}etc/profile.d -name "*.sh" -type f -exec cat {} \; 2> /dev/null | ${GREPBINARY} '\(export\|readonly\|typeset -r\)[ \t]*TMOUT' | ${GREPBINARY} -v "^#" | ${SEDBINARY} 's/#.*//' | ${AWKBINARY} '{ print $1 }')
2019-07-16 13:20:30 +02:00
if [ -n "${FIND}" ]; then
N=0; IDLE_TIMEOUT=1
for I in ${FIND}; do
LogText "Output: ${I}"
Report "session_timeout_value[]=${I}"
N=$((N + 1))
done
if [ ${N} -eq 1 ]; then
2017-05-03 10:42:34 +02:00
LogText "Result: found TMOUT value configured in one of the files in ${ROOTDIR}etc/profile.d directory"
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: found several TMOUT values configured in one of the files in ${ROOTDIR}etc/profile.d directory"
fi
IDLE_TIMEOUT_METHOD="profile.d"
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: could not find TMOUT setting in ${ROOTDIR}etc/profile.d/*.sh"
2014-08-26 17:33:55 +02:00
fi
# Check for readonly
2019-07-16 13:20:30 +02:00
if [ -n "${FIND2}" ]; then
N=0;
for I in ${FIND2}; do
LogText "Output: ${I}"
if [ "${I}" = "readonly" -o "${I}" = "typeset" ]; then
N=$((N + 1))
fi
done
if [ ${N} -gt 0 ]; then
2017-05-03 10:42:34 +02:00
LogText "Result: found readonly setting in ${ROOTDIR}etc/profile (readonly or typeset -r)"
IDLE_TIMEOUT_READONLY=1
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: NO readonly setting found in ${ROOTDIR}etc/profile (readonly or typeset -r)"
IDLE_TIMEOUT_READONLY=0
fi
2017-04-23 20:06:54 +02:00
else
2017-05-03 10:42:34 +02:00
LogText "Result: could not find export, readonly or typeset -r in ${ROOTDIR}etc/profile"
fi
2014-08-26 17:33:55 +02:00
fi
else
2017-05-03 10:42:34 +02:00
LogText "Result: skip ${ROOTDIR}etc/profile.d directory test, directory not available on this system"
2014-08-26 17:33:55 +02:00
fi
2019-07-16 13:20:30 +02:00
if [ -n "${IDLE_TIMEOUT_METHOD}" ]; then
Report "session_timeout_method[]=${IDLE_TIMEOUT_METHOD}"
fi
2019-07-16 13:20:30 +02:00
if [ -n "${IDLE_TIMEOUT_READONLY}" ]; then
Report "session_timeout_set_readonly=${IDLE_TIMEOUT_READONLY}"
fi
2014-08-26 17:33:55 +02:00
if [ ${IDLE_TIMEOUT} -eq 1 ]; then
Display --indent 4 --text "- Session timeout settings/tools" --result "${STATUS_FOUND}" --color GREEN
2014-08-26 17:33:55 +02:00
AddHP 3 3
else
Display --indent 4 --text "- Session timeout settings/tools" --result "${STATUS_NONE}" --color YELLOW
2014-08-26 17:33:55 +02:00
AddHP 1 3
fi
fi
#
#################################################################################
#
# Test : SHLL-6230
# Description : Check for umask values in shell configurations
SHELL_CONFIG_FILES="${ROOTDIR}etc/bashrc ${ROOTDIR}etc/bash.bashrc ${ROOTDIR}etc/bash.bashrc.local ${ROOTDIR}etc/csh.cshrc ${ROOTDIR}etc/profile"
Register --test-no SHLL-6230 --weight H --network NO --category security --description "Perform umask check for shell configurations"
if [ ${SKIPTEST} -eq 0 ]; then
FOUND=0
Display --indent 2 --text "- Checking default umask values"
for FILE in ${SHELL_CONFIG_FILES}; do
HARDENING_POSSIBLE=0
FIND=""
if [ -f ${FILE} ]; then
LogText "Result: file ${FILE} exists"
FOUND=1
FIND=$(${GREPBINARY} umask ${FILE} | ${SEDBINARY} 's/^[ \t]*//g' | ${SEDBINARY} 's/#.*$//' | ${GREPBINARY} -v "^$" | ${AWKBINARY} '{ print $2 }')
2017-05-03 10:42:34 +02:00
if IsEmpty "${FIND}"; then
LogText "Result: did not find umask configured in ${FILE}"
Display --indent 4 --text "- Checking default umask in ${FILE}" --result "${STATUS_NONE}" --color YELLOW
2017-04-23 20:06:54 +02:00
else
for UMASKVALUE in ${FIND}; do
LogText "Result: found umask ${UMASKVALUE} in ${FILE}"
case ${UMASKVALUE} in
027|0027|077|0077)
LogText "Result: umask ${UMASKVALUE} is considered a properly hardened value"
;;
*)
LogText "Result: umask ${UMASKVALUE} can be hardened "
HARDENING_POSSIBLE=1
;;
esac
done
if [ ${HARDENING_POSSIBLE} -eq 0 ]; then
Display --indent 4 --text "- Checking default umask in ${FILE}" --result "${STATUS_OK}" --color GREEN
AddHP 3 3
2017-04-23 20:06:54 +02:00
else
2019-01-14 18:49:49 +01:00
Display --indent 4 --text "- Checking default umask in ${FILE}" --result "${STATUS_WEAK}" --color YELLOW
AddHP 1 3
fi
fi
else
2017-04-23 20:06:54 +02:00
LogText "Result: file ${FILE} not found"
fi
done
fi
#
#################################################################################
2014-10-04 03:32:51 +02:00
#
2014-08-26 17:33:55 +02:00
Report "session_timeout_enabled=${IDLE_TIMEOUT}"
2014-08-26 17:33:55 +02:00
WaitForKeyPress
2014-08-26 17:33:55 +02:00
#
#================================================================================
# Lynis - Copyright 2007-2019, CISOfy - http://cisofy.com