Commit Graph

155 Commits

Author SHA1 Message Date
pyllyukko 4d5b41cb4e plugin_krb5_phase1: Added few more tests
* Check that admin principals have disallow_tgt_based attribute
* Check that regular user principals have requires_pre_auth and
  disallow_svr attributes
* Check for weak crypto
    * Use kdb5_util for this
2024-05-15 21:52:30 +03:00
pyllyukko ac526be452 Added initial version of a Kerberos plugin 2024-05-15 21:52:30 +03:00
gonzalo aec1f59432
Update binaries
Fix a showing error for grep --help on OpenBSD.

Discovered by me, fixed by  @mboelen
2024-05-04 07:52:47 +02:00
Michael Boelen d0c855d19b
Merge branch 'master' into issue-1338 2023-08-07 10:06:12 +02:00
rpmbuild 6e3cea8c87 use grep -E instead of egrep if possible 2023-07-30 09:37:10 +02:00
xnoguer 6f1797fb59 Using grep -E 2023-04-23 17:38:21 -04:00
Steve Kolenich a4bee8a329 Added two tests using apk (Alpine Package Keeper) to check for
installed packages and packages that can be upgraded
2021-09-01 16:00:01 -04:00
Michael Boelen 3a03af42aa
Fix: show 'egrep' instead of 'grep' when egrep is missing 2021-07-20 11:31:18 +02:00
Michael Boelen 6755ac45c2
Replaced tab with space 2021-07-20 11:30:23 +02:00
Christian Bourque 7b632bdbfa Initial draft for Cmd support 2021-04-02 00:37:29 +00:00
Michael Boelen da1c1eca10
Preparation for release 3.0.3 2021-01-07 15:22:19 +01:00
Michael Boelen 258b2bf05f
Merge pull request #1064 from Varbin/solaris-ips-svcs
Add support for Solaris services, run BOOT-5184 there
2020-12-15 14:16:18 +01:00
Simon Biewald f695488ca8 Quote binary variables during SUID/GID enumeration
Fixes cisofy/lynis#1078.

Signed-off-by: Simon Biewald <sbiewald@fam-biewald.de>
2020-11-21 01:34:18 +01:00
Simon Biewald 25278b6b38 Add support for Solaris services, run BOOT-5184 there
The Solaris IPS service manager (svcs) is now detected, and services
managed with it are enumerated.

Test BOOT-5184 now runs on Solaris, too, as SysV init scripts are
supported as well, even with IPS. SysV Init has been the traditional
init system on Solaris.
2020-10-25 21:51:12 +00:00
Thomas Sjögren 4671fb7fb9 add Synology Antivirus Essential malware scanner
Signed-off-by: Thomas Sjögren <konstruktoid@users.noreply.github.com>
2020-10-22 12:10:01 +02:00
Stéphane 67d04f2536
Add translate function for all sections
+ add EN and FR up to date languages files
2020-10-22 00:13:42 +02:00
Thomas Sjögren baf5f7ad4d add Microsoft Defender ATP, malware scanner
Signed-off-by: Thomas Sjögren <konstruktoid@users.noreply.github.com>
2020-07-21 23:56:47 +02:00
Michael Boelen ce3c80b44f
Merge pull request #883 from topimiettinen/check-encrypted-swap-devices
Check if system uses encrypted swap devices
2020-04-12 16:22:22 +02:00
Michael Boelen c5914c4e0f
Split count values so they are reported as individual items 2020-04-01 11:48:39 +02:00
Topi Miettinen 179f7d3442
Enhance binaries report
Report also number of set-uid and set-gid binaries found.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-31 19:09:57 +03:00
Brian Ginsbach 2b1d5fa46f Add NetBSD pkgsrc pkg_info to known binaries
The NetBSD pkgsrc package management system uses pkg_info for
determining information about packages. This is also the command
used in PKGS-7302.
2020-03-30 14:09:28 -05:00
Topi Miettinen 5c5cc43c6f
Check if system uses encrypted swap devices
Add test CRYP-7931 to check if the system uses any encrypted swap
devices.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-27 13:05:56 +02:00
Michael Boelen 3c3feecbfb
Merge pull request #824 from Varbin/master
Add detection of OpenNTPD
2020-03-24 13:29:02 +01:00
Michael Boelen dbfadc5446
Merge pull request #879 from topimiettinen/enhance-tomoyo-check
Enhance TOMOYO Linux check
2020-03-24 13:26:33 +01:00
Topi Miettinen e09fe98b89 Enhance TOMOYO Linux check
Count and log unconfined processes, which are not using policy
profile 3.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-23 18:44:21 +02:00
Topi Miettinen 8913374092 Run 'systemd-analyze security'
'systemd-analyze security' (available since systemd v240) makes a nice
overall evaluation of hardening levels of services in a system. More
details can be found with 'systemd-analyze security SERVICE' for each
service.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-23 17:31:32 +02:00
Michael Boelen 32cefdea0a
Merge pull request #878 from topimiettinen/check-ima-evm
Check IMA/EVM, dm-integrity and dm-verity statuses
2020-03-23 13:18:16 +01:00
Topi Miettinen 8ea39314f2
Check for dm-integrity and dm-verity
Detect tools for dm-integrity and dm-verity, check if some devices
in /dev/mapper/* use them and especially the system root device.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-23 10:35:38 +02:00
Topi Miettinen 203a4d3480
Check IMA/EVM status
Check for evmctl (Extended Verification Module) tool and system IMA (Integrity Measurement
Architecture) status.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-22 11:21:52 +02:00
Topi Miettinen 4a51ad031b
Check password hashing methods
Manual page crypt(5) gives recommendations for choosing password
hashing methods, so let's check if there are weakly encrypted
passwords in the system.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-21 12:50:38 +02:00
Michael Boelen 38310223a6
Updated date/year 2020-03-20 14:50:25 +01:00
Michael Boelen 8c0b42cdae
Merge pull request #861 from topimiettinen/enhance-selinux-check
Enhance SELinux checks
2020-03-20 14:00:57 +01:00
Topi Miettinen 820d2ec607
Check DNSSEC status with resolvectl when available
'resolvectl statistics' shows if DNSSEC is supported by
systemd-resolved and upstream DNS servers.

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-19 23:56:24 +02:00
Topi Miettinen fb9cdb5c43
Enhance SELinux checks
Display and log: permissive types (rules are not enforced), unconfined
processes (not confined by rules) and processes with initrc_t
type (generic type with weak rules).

Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
2020-03-19 19:45:37 +02:00
Michael Boelen d1db448c51
Skip pacman when it is the game instead of package manager 2020-03-17 13:02:59 +01:00
Kevin 42b2831f75 add basic xbps/void support 2020-02-21 08:06:24 +01:00
Simon Biewald c58e296bd3
add openntpd detection and a few tests for it 2020-01-08 18:53:15 +01:00
Michael Boelen f00447fd1b
Style change, add curly brackets 2019-12-06 15:55:59 +01:00
Kristian Schuster 4898e48e16
don't fail relative paths check with spaces in PATH 2019-10-22 21:43:37 +02:00
Kristian Schuster 7b52ff52c7
add check for disabled coredumps in etc/profile and systemd 2019-10-13 22:06:50 +02:00
Michael Boelen a1b6d463b2
Fixed a typo 2019-09-21 16:31:06 +02:00
Michael Boelen 36627a4eb7
Style improvements 2019-09-19 14:05:15 +02:00
Michael Boelen 5c38a0bdb4
Tests using lsof may ignore threads (if supported) 2019-09-13 11:47:39 +02:00
Michael Boelen a714568842
Merge pull request #731 from chr0mag/cryp-7930
[CRYP-7930] Modify to use 'lsblk' and 'cryptsetup'
2019-08-21 12:31:36 +02:00
Michael Boelen 48ba463376
Added support for swupd (Clear Linux OS) 2019-08-04 19:37:55 +02:00
Julian Phillips 84dd024887 [CRYP-7930] Modify to use 'lsblk' and 'cryptsetup'
There are several challenges with the existing method of using
/etc/crypttab:

1)encrypted rootfs partitions are not typically listed in this
file (users are prompted for password in early boot instead)

2)the 'luks' option is the default option so it is possible for
/etc/crypttab entries to never have this set explicitly and any
block device configured as such will be missed currently

3)any device mounted manually, or using any other mechanism aside
from /etc/crypttab will be missed

This commit executes 'cryptsetup isLuks' on every block device in
the system to determine whether it is a LUKS device. This handles
all 3 cases mentioned above.

Test case wording was also updated to reflect the fact that it
only checks for LUKS entrypted block devices. So, plain dm-crypt
and TrueCrypt/VeraCrypt block device encryption is not detected.
Nor is any file system level encryption such as eCryptfs, EncFs,
gocryptfs.
2019-07-17 16:18:12 -07:00
Michael Boelen fa8bad20db
Use -n instead of ! -z 2019-07-16 13:20:30 +02:00
Michael Boelen 96434508d4
Disable testing for other tools, as xxd is not present on all systems by default 2019-07-14 12:18:22 +02:00
Michael Boelen c639cb4f6e
Only check empty binaries when we did a full scan, as for some commands the binary scanning is not performed 2019-07-05 18:37:10 +02:00
Michael Boelen bc88775d0e
When PATH is defined, only locations from variable 2019-07-01 07:39:32 +02:00