2014-08-26 17:33:55 +02:00
|
|
|
#!/bin/sh
|
|
|
|
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Lynis
|
|
|
|
# ------------------
|
|
|
|
#
|
2016-03-13 16:00:39 +01:00
|
|
|
# Copyright 2007-2013, Michael Boelen
|
|
|
|
# Copyright 2013-2016, CISOfy
|
|
|
|
#
|
|
|
|
# Website : https://cisofy.com
|
|
|
|
# Blog : http://linux-audit.com
|
|
|
|
# GitHub : https://github.com/CISOfy/lynis
|
2014-08-26 17:33:55 +02:00
|
|
|
#
|
|
|
|
# Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
|
|
|
|
# welcome to redistribute it under the terms of the GNU General Public License.
|
|
|
|
# See LICENSE file for usage of this software.
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
APPARMORFOUND=0 # Set default for test MACF-6208
|
|
|
|
MAC_FRAMEWORK_ACTIVE=0 # Default no MAC framework active
|
|
|
|
RBAC_FRAMEWORK_ACTIVE=0 # Default no RBAC framework active
|
|
|
|
SELINUXFOUND=0
|
|
|
|
|
|
|
|
InsertSection "Security frameworks"
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Test : MACF-6204
|
|
|
|
# Description : Check if AppArmor is installed
|
2016-07-24 17:22:00 +02:00
|
|
|
Register --test-no MACF-6204 --weight L --network NO --category security --description "Check AppArmor presence"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
2016-09-10 16:12:44 +02:00
|
|
|
if [ -z "${AASTATUSBINARY}" ]; then
|
2014-09-08 23:51:27 +02:00
|
|
|
APPARMORFOUND=0
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: aa-status binary not found, AppArmor not installed"
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking presence AppArmor" --result "${STATUS_NOT_FOUND}" --color WHITE
|
2016-09-10 16:12:44 +02:00
|
|
|
else
|
2014-09-08 23:51:27 +02:00
|
|
|
APPARMORFOUND=1
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: aa-status binary found, AppArmor is installed"
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking presence AppArmor" --result "${STATUS_FOUND}" --color GREEN
|
2014-09-08 23:51:27 +02:00
|
|
|
fi
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Test : MACF-6208
|
|
|
|
# Description : Check AppArmor active status
|
|
|
|
if [ ${APPARMORFOUND} -eq 1 ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
2016-07-24 17:22:00 +02:00
|
|
|
Register --test-no MACF-6208 --preqs-met ${PREQS_MET} --weight L --network NO --category security --description "Check if AppArmor is enabled"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
2016-09-10 16:12:44 +02:00
|
|
|
if [ ! -z "${AASTATUSBINARY}" ]; then
|
2016-10-15 16:08:59 +02:00
|
|
|
CAN_READ_FILE=0
|
|
|
|
FILE="/sys/kernel/security/apparmor/profiles"
|
|
|
|
if [ -f ${FILE} ]; then
|
|
|
|
FIND=$(${CAT_BINARY} ${FILE} 2> /dev/null)
|
|
|
|
if [ $? -eq 0 ]; then CAN_READ_FILE=1; fi
|
2016-08-22 12:12:38 +02:00
|
|
|
else
|
2016-10-15 16:08:59 +02:00
|
|
|
LogText "File ${FILE} does not exist"
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
2016-10-15 16:08:59 +02:00
|
|
|
if [ ${CAN_READ_FILE} -eq 1 ]; then
|
|
|
|
LogText "Result: file ${FILE} is available and readable"
|
|
|
|
# Checking AppArmor status
|
|
|
|
# 0 if apparmor is enabled and policy is loaded.
|
|
|
|
# 1 if apparmor is not enabled/loaded.
|
|
|
|
# 2 if apparmor is enabled but no policy is loaded.
|
|
|
|
# 3 if control files are not available
|
|
|
|
# 4 if apparmor status can't be read
|
|
|
|
FIND=$(${AASTATUSBINARY} 2>&1 > /dev/null)
|
|
|
|
if [ $? -eq 0 ]; then
|
|
|
|
MAC_FRAMEWORK_ACTIVE=1
|
|
|
|
LogText "Result: AppArmor is enabled and a policy is loaded"
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "${STATUS_ENABLED}" --color GREEN
|
|
|
|
Report "apparmor_enabled=1"
|
|
|
|
Report "apparmor_policy_loaded=1"
|
|
|
|
AddHP 3 3
|
|
|
|
elif [ $? -eq 4 ]; then
|
|
|
|
LogText "Result: Can not determine status, most likely due to lacking permissions"
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "${STATUS_UNKNOWN}" --color RED
|
|
|
|
elif [ $? -eq 3 ]; then
|
|
|
|
LogText "Result: Can not check control files"
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "${STATUS_UNKNOWN}" --color RED
|
|
|
|
elif [ $? -eq 2 ]; then
|
|
|
|
LogText "Result: AppArmor is enabled, but no policy is loaded"
|
|
|
|
ReportSuggestion ${TEST_NO} "Load AppArmor policies"
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "NON-ACTIVE" --color GREEN
|
|
|
|
Report "apparmor_enabled=1"
|
|
|
|
Report "apparmor_policy_loaded=0"
|
|
|
|
AddHP 0 3
|
|
|
|
elif [ $? -eq 1 ]; then
|
|
|
|
LogText "Result: AppArmor is disabled"
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "${STATUS_DISABLED}" --color YELLOW
|
|
|
|
Report "apparmor_enabled=0"
|
|
|
|
AddHP 0 3
|
|
|
|
else
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "${STATUS_UNKNOWN}" --color RED
|
|
|
|
ReportException "${TEST_NO}:1" "Invalid or unknown AppArmor status detected"
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
LogText "Result: could not find or read ${FILE}"
|
|
|
|
Display --indent 4 --text "- Checking AppArmor status" --result "${STATUS_UNKNOWN}" --color YELLOW
|
|
|
|
ReportSuggestion "${TEST_NO}" "Check output of aa-status" "${FILE}" "text:Run aa-status"
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
LogText "Result: no aa-status binary available"
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Test : MACF-6232
|
|
|
|
# Description : Check SELINUX for installation
|
2016-07-24 17:22:00 +02:00
|
|
|
Register --test-no MACF-6232 --weight L --network NO --category security --description "Check SELINUX presence"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Test: checking if we have sestatus binary"
|
2016-09-10 16:12:44 +02:00
|
|
|
if [ ! -z "${SESTATUSBINARY}" ]; then
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: found sestatus binary (${SESTATUSBINARY})"
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking presence SELinux" --result "${STATUS_FOUND}" --color GREEN
|
2016-09-10 16:12:44 +02:00
|
|
|
else
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: sestatus binary NOT found"
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking presence SELinux" --result "${STATUS_NOT_FOUND}" --color WHITE
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Test : MACF-6234
|
|
|
|
# Description : Check SELINUX status
|
|
|
|
if [ ! "${SESTATUSBINARY}" = "" ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
2016-07-24 17:22:00 +02:00
|
|
|
Register --test-no MACF-6234 --preqs-met ${PREQS_MET} --weight L --network NO --category security --description "Check SELINUX status"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
|
|
# Status: Enabled/Disabled
|
2016-09-10 16:12:44 +02:00
|
|
|
FIND=$(${SESTATUSBINARY} | ${GREPBINARY} "^SELinux status" | ${AWKBINARY} '{ print $3 }')
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ "${FIND}" = "enabled" ]; then
|
|
|
|
MAC_FRAMEWORK_ACTIVE=1
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: SELinux framework is enabled"
|
|
|
|
Report "selinux_status=1"
|
2014-08-26 17:33:55 +02:00
|
|
|
SELINUXFOUND=1
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 4 --text "- Checking SELinux status" --result "${STATUS_ENABLED}" --color GREEN
|
2016-09-10 16:12:44 +02:00
|
|
|
FIND=$(${SESTATUSBINARY} | ${GREPBINARY} "^Current mode" | ${AWKBINARY} '{ print $3 }')
|
2015-12-21 21:17:15 +01:00
|
|
|
Report "selinux_mode=${FIND}"
|
2016-09-10 16:12:44 +02:00
|
|
|
FIND2=$(${SESTATUSBINARY} | ${GREPBINARY} "^Mode from config file" | ${AWKBINARY} '{ print $5 }')
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: current SELinux mode is ${FIND}"
|
|
|
|
LogText "Result: mode configured in config file is ${FIND2}"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ "${FIND}" = "${FIND2}" ]; then
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: Current SELinux mode is the same as in config file."
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 6 --text "- Checking current mode and config file" --result "${STATUS_OK}" --color GREEN
|
2016-09-10 16:12:44 +02:00
|
|
|
else
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: Current SELinux mode (${FIND}) is NOT the same as in config file (${FIND2})."
|
2016-08-10 07:12:54 +02:00
|
|
|
ReportWarning ${TEST_NO} "Current SELinux mode is different from config file (current: ${FIND}, config file: ${FIND2})"
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 6 --text "- Checking current mode and config file" --result "${STATUS_WARNING}" --color RED
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
Display --indent 8 --text "Current SELinux mode: ${FIND}"
|
|
|
|
else
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: SELinux framework is disabled"
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 4 --text "- Checking SELinux status" --result "${STATUS_DISABLED}" --color YELLOW
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Test : RBAC-6272
|
|
|
|
# Description : Check if grsecurity is installed
|
2016-05-03 10:58:05 +02:00
|
|
|
# Notes : We already checked grsecurity in osdetection
|
2016-07-24 17:22:00 +02:00
|
|
|
Register --test-no RBAC-6272 --weight L --network NO --category security --description "Check grsecurity presence"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
|
|
# Check Linux kernel configuration
|
2016-09-10 16:12:44 +02:00
|
|
|
if [ ! -z "${LINUXCONFIGFILE}" -a -f "${LINUXCONFIGFILE}" ]; then
|
|
|
|
FIND=$(${GREPBINARY} ^CONFIG_GRKERNSEC=y ${LINUXCONFIGFILE})
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ! "${FIND}" = "" ]; then
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: grsecurity available (in kernel config)"
|
2016-05-03 10:58:05 +02:00
|
|
|
GRSEC_FOUND=1
|
2016-09-10 16:12:44 +02:00
|
|
|
else
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: no grsecurity found in kernel config"
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
fi
|
2016-05-03 10:58:05 +02:00
|
|
|
if [ ${GRSEC_FOUND} -eq 1 ]; then
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking presence grsecurity" --result "${STATUS_FOUND}" --color GREEN
|
2014-08-26 17:33:55 +02:00
|
|
|
AddHP 3 3
|
2016-09-10 16:12:44 +02:00
|
|
|
else
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking presence grsecurity" --result "${STATUS_NOT_FOUND}" --color WHITE
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
# Test : MACF-6290
|
|
|
|
# Description : Check if at least one MAC framework is implemented
|
2016-07-24 17:22:00 +02:00
|
|
|
Register --test-no MACF-6290 --weight L --network NO --category security --description "Check for implemented MAC framework"
|
2014-08-26 17:33:55 +02:00
|
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
|
|
if [ ${MAC_FRAMEWORK_ACTIVE} -eq 1 ]; then
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking for implemented MAC framework" --result "${STATUS_OK}" --color GREEN
|
2014-08-26 17:33:55 +02:00
|
|
|
AddHP 3 3
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: found implemented MAC framework"
|
2016-09-10 16:12:44 +02:00
|
|
|
else
|
2016-06-18 11:14:01 +02:00
|
|
|
Display --indent 2 --text "- Checking for implemented MAC framework" --result "${STATUS_NONE}" --color YELLOW
|
2014-08-26 17:33:55 +02:00
|
|
|
AddHP 2 3
|
2015-12-21 21:17:15 +01:00
|
|
|
LogText "Result: found no implemented MAC framework"
|
2014-08-26 17:33:55 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
#################################################################################
|
|
|
|
#
|
|
|
|
|
2016-05-03 10:58:05 +02:00
|
|
|
Report "framework_grsecurity=${GRSEC_FOUND}"
|
2015-12-21 21:17:15 +01:00
|
|
|
Report "framework_selinux=${SELINUXFOUND}"
|
2014-08-26 17:33:55 +02:00
|
|
|
|
2016-04-28 12:31:57 +02:00
|
|
|
WaitForKeyPress
|
2014-08-26 17:33:55 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
#================================================================================
|
2016-03-13 16:03:46 +01:00
|
|
|
# Lynis - Security Auditing and System Hardening for Linux and UNIX - https://cisofy.com
|