mirror of https://github.com/CISOfy/lynis.git
1208 lines
59 KiB
Bash
1208 lines
59 KiB
Bash
#!/bin/sh
|
|
|
|
#################################################################################
|
|
#
|
|
# Lynis
|
|
# ------------------
|
|
#
|
|
# Copyright 2007-2016, Michael Boelen, CISOfy (michael.boelen@cisofy.com)
|
|
# Web site: https://cisofy.com
|
|
#
|
|
# Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
|
|
# welcome to redistribute it under the terms of the GNU General Public License.
|
|
# See LICENSE file for usage of this software.
|
|
#
|
|
#################################################################################
|
|
#
|
|
# User, Group and authentication tests
|
|
#
|
|
#################################################################################
|
|
#
|
|
LDAP_AUTH_ENABLED=0
|
|
LDAP_PAM_ENABLED=0
|
|
LDAP_CONF_LOCATIONS="/etc/ldap.conf /etc/ldap/ldap.conf /etc/openldap/ldap.conf /usr/local/etc/ldap.conf /usr/local/etc/openldap/ldap.conf"
|
|
PAM_FILE_LOCATIONS="/lib/i386-linux-gnu/security /lib/security /lib/x86_64-linux-gnu/security /lib64/security /usr/lib/security"
|
|
SUDOERS_LOCATIONS="/etc/sudoers /usr/local/etc/sudoers /usr/pkg/etc/sudoers"
|
|
SUDOERS_FILE=""
|
|
#
|
|
#################################################################################
|
|
#
|
|
InsertSection "Users, Groups and Authentication"
|
|
|
|
# Test : AUTH-9204
|
|
# Description : Check users with UID zero (0)
|
|
# Notes : Ignores :0: in file if match is in NIS related line
|
|
Register --test-no AUTH-9204 --weight L --network NO --description "Check users with an UID of zero"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
# Search accounts with UID 0
|
|
LogText "Test: Searching accounts with UID 0"
|
|
FIND=`grep ':0:' /etc/passwd | egrep -v '^#|^root:|^(\+:\*)?:0:0:::' | cut -d ":" -f1,3 | grep ':0'`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
Display --indent 2 --text "- Search administrator accounts" --result WARNING --color RED
|
|
LogText "Result: Found more than one administrator accounts"
|
|
ReportWarning "${TEST_NO}" "H" "Multiple users with UID 0 found in passwd file"
|
|
for I in ${FIND}; do
|
|
LogText "Administrator account: ${I}"
|
|
if [ "${I}" = "toor" ]; then
|
|
LogText "BSD note: default there is a user 'toor' installed. This account is considered useless unless it"
|
|
LogText "is assigned a password and used for daily operations or emergencies. ie: bad shell for root user."
|
|
ReportSuggestion ${TEST_NO} "Use vipw to delete the 'toor' user if not used."
|
|
fi
|
|
done
|
|
else
|
|
Display --indent 2 --text "- Search administrator accounts" --result OK --color GREEN
|
|
LogText "Result: No accounts found with UID 0 other than root."
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9208
|
|
# Description : Check non-unique accounts
|
|
Register --test-no AUTH-9208 --weight L --network NO --description "Check non-unique accounts in passwd file"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking for non-unique accounts"
|
|
if [ "${OS}" = "DragonFly" -o "${OS}" = "FreeBSD" -o "${OS}" = "NetBSD" -o "${OS}" = "OpenBSD" ]; then
|
|
PASSWD_FILE="/etc/master.passwd"
|
|
else
|
|
PASSWD_FILE="/etc/passwd"
|
|
fi
|
|
# Check password file
|
|
if [ -f ${PASSWD_FILE} ]; then
|
|
FIND=`grep -v '^#' ${PASSWD_FILE} | cut -d ':' -f3 | sort | uniq -d`
|
|
if [ "${FIND}" = "" ]; then
|
|
Display --indent 2 --text "- Checking for non-unique UIDs" --result OK --color GREEN
|
|
LogText "Result: all accounts found in ${PASSWD_FILE} are unique"
|
|
else
|
|
Display --indent 2 --text "- Checking for non-unique UIDs" --result WARNING --color RED
|
|
LogText "Result: found multiple accounts with same UID"
|
|
LogText "Output (non-unique UIDs): ${FIND}"
|
|
ReportWarning ${TEST_NO} "Multiple accounts found with same UID"
|
|
fi
|
|
else
|
|
Display --indent 2 --text "- Checking UIDs" --result SKIPPED --color WHITE
|
|
LogText "Result: test skipped, ${PASSWD_FILE} file not available"
|
|
fi
|
|
LogText "Remarks: Non unique UIDs can riskful for the system or part of a configuration mistake"
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9212
|
|
# Description : Test group file with chkgrp tool (ie FreeBSD)
|
|
if [ -f /usr/sbin/chkgrp ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9212 --preqs-met ${PREQS_MET} --weight L --network NO --description "Test group file"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
Display --indent 2 --text "- Checking chkgrp tool" --result FOUND --color GREEN
|
|
LogText "Result: /usr/sbin/chkgrp binary found. Using this to perform next test(s)."
|
|
LogText "Test: Testing consistency of /etc/group file"
|
|
FIND=`/usr/sbin/chkgrp | grep -v 'is fine'`
|
|
if [ "${FIND}" = "" ]; then
|
|
Display --indent 4 --text "- Checking consistency of /etc/group file" --result OK --color GREEN
|
|
LogText "Result: chkgrp test performed, Group file seems to be ok."
|
|
else
|
|
Display --indent 4 --text "- Checking consistency of /etc/group file" --result WARNING --color RED
|
|
LogText "Result: chkgrp found some errors. Run the tool manually to see details."
|
|
LogText "chkgrp output: ${FIND}"
|
|
ReportWarning ${TEST_NO} "M" "chkgrp reported inconsistencies in /etc/group file"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9216
|
|
# Description : Check /etc/group and shadow group files
|
|
if [ ! "${GRPCKBINARY}" = "" ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9216 --preqs-met ${PREQS_MET} --weight L --network NO --root-only YES --description "Check group and shadow group files"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
# Test : run grpck to test group files (most likely /etc/group and shadow group files)
|
|
# Expected result : 0 (exit code)
|
|
LogText "Test: Checking for grpck binary"
|
|
|
|
if [ "${OS}" = "Linux" ]; then
|
|
# Read only mode
|
|
FIND=`${GRPCKBINARY} -r 2> /dev/null ; echo $?`
|
|
elif [ "${OS}" = "AIX" ]; then
|
|
FIND=`${GRPCKBINARY} -n ALL 2> /dev/null ; echo $?`
|
|
else
|
|
FIND=`${GRPCKBINARY} 2> /dev/null ; echo $?`
|
|
fi
|
|
|
|
# Overrule for SuSE
|
|
if [ "${LINUX_VERSION}" = "SuSE" ]; then
|
|
FIND=`${GRPCKBINARY} -q -r > /dev/null ; echo $?`
|
|
fi
|
|
|
|
# Check exit-code
|
|
if [ "${FIND}" = "0" ]; then
|
|
Display --indent 2 --text "- Checking consistency of group files (grpck)" --result OK --color GREEN
|
|
LogText "Result: grpck binary didn't find any errors in the group files"
|
|
else
|
|
Display --indent 2 --text "- Checking consistency of group files (grpck)" --result WARNING --color RED
|
|
ReportWarning ${TEST_NO} "M" "grpck binary found errors in one or more group files"
|
|
ReportSuggestion ${TEST_NO} "Run grpck manually and check your group files"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9218
|
|
# Description : Check login shells for passwordless accounts
|
|
# Notes : Results should be checked
|
|
Register --test-no AUTH-9218 --os FreeBSD --weight L --network NO --description "Check harmful login shells"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FOUND=0
|
|
LogText "Test: Checking login shells"
|
|
if [ -f /etc/master.passwd ]; then
|
|
# Check for all shells, except: (/usr)/sbin/nologin /nonexistent
|
|
FIND=`grep "[a-z]:\*:" /etc/master.passwd | egrep -v '^#|/sbin/nologin|/usr/sbin/nologin|/nonexistent' | sed 's/ /!space!/g'`
|
|
if [ "${FIND}" = "" ]; then
|
|
Display --indent 2 --text "- Checking login shells" --result OK --color GREEN
|
|
else
|
|
Display --indent 2 --text "- Checking login shells" --result WARNING --color RED
|
|
for I in ${FIND}; do
|
|
I=`echo ${I} | sed 's/!space!/ /g'`
|
|
J=`echo ${I} | awk -F: '{ print $10 }'`
|
|
LogText "Output: ${I}"
|
|
if [ "${J}" = "" ]; then
|
|
LogText "Result: found no shell on line"
|
|
else
|
|
LogText "Result: found possible harmful shell ${J}"
|
|
if [ -f ${J} ]; then
|
|
LogText "Result: shell ${J} does exist"
|
|
FOUND=1
|
|
else
|
|
LogText "Result: shell ${J} does not exist"
|
|
ReportSuggestion ${TEST_NO} "Determine if account is needed, as shell ${J} does not exist"
|
|
fi
|
|
fi
|
|
done
|
|
if [ ${FOUND} -eq 1 ]; then
|
|
ReportWarning ${TEST_NO} "H" "Possible harmful shell found (for passwordless account!)"
|
|
fi
|
|
fi
|
|
else
|
|
Display --indent 2 --text "- Checking login shells" --result SKIPPED --color WHITE
|
|
LogText "Result: No /etc/master.passwd file found"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9222
|
|
# Description : Check for non unique groups
|
|
Register --test-no AUTH-9222 --weight L --network NO --description "Check for non unique groups"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking for non unique group ID's in /etc/group"
|
|
FIND=`grep -v '^#' /etc/group | grep -v '^$' | awk -F: '{ print $3 }' | sort | uniq -d`
|
|
if [ "${FIND}" = "" ]; then
|
|
Display --indent 2 --text "- Checking non unique group ID's" --result OK --color GREEN
|
|
LogText "Result: All group ID's are unique"
|
|
else
|
|
Display --indent 2 --text "- Checking non unique group ID's" --result WARNING --color RED
|
|
LogText "Result: Found the same group ID multiple times"
|
|
LogText "Output: ${FIND}"
|
|
ReportWarning ${TEST_NO} "H" "Found multiple groups with same group ID"
|
|
#ReportSuggestion ${TEST_NO} "Check your /etc/group file and correct inconsistencies"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9226
|
|
# Description : Check non unique group names
|
|
if [ -f /etc/group ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9226 --preqs-met ${PREQS_MET} --weight L --network NO --description "Check non unique group names"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking for non unique group names in /etc/group"
|
|
FIND=`grep -v '^#' /etc/group | grep -v '^$' | awk -F: '{ print $1 }' | sort | uniq -d`
|
|
if [ "${FIND}" = "" ]; then
|
|
Display --indent 2 --text "- Checking non unique group names" --result OK --color GREEN
|
|
LogText "Result: All group names are unique"
|
|
else
|
|
Display --indent 2 --text "- Checking non unique group names" --result WARNING --color WARNING
|
|
LogText "Result: Found the same group name multiple times"
|
|
LogText "Output: ${FIND}"
|
|
ReportWarning ${TEST_NO} "M" "Found inconsistencies in group file (multiple occurences of a single group)"
|
|
ReportSuggestion ${TEST_NO} "Check your /etc/group file and correct inconsistencies"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9228
|
|
# Description : Check password file consistency with pwck
|
|
# Notes : Operating systems include Linux, Solaris
|
|
if [ -x /usr/sbin/pwck ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9228 --preqs-met ${PREQS_MET} --weight L --network NO --description "Check password file consistency with pwck"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking password file consistency (pwck)"
|
|
TESTED=0
|
|
case ${OS} in
|
|
"Linux")
|
|
FIND=`/usr/sbin/pwck -q -r 2> /dev/null; echo $?`
|
|
TESTED=1
|
|
;;
|
|
"Solaris")
|
|
FIND=`/usr/sbin/pwck 2> /dev/null; echo $?`
|
|
TESTED=1
|
|
;;
|
|
*)
|
|
LogText "Dev: found /usr/sbin/pwck, but unsure how to call it on this operating system"
|
|
;;
|
|
esac
|
|
# Only display if this test has been executed
|
|
if [ ${TESTED} -eq 1 -a "${FIND}" = "0" ]; then
|
|
Display --indent 2 --text "- Checking password file consistency" --result OK --color GREEN
|
|
LogText "Result: pwck check didn't find any problems"
|
|
AddHP 2 2
|
|
else
|
|
Display --indent 2 --text "- Checking password file consistency" --result WARNING --color RED
|
|
LogText "Result: pwck found one or more errors/warnings in the password file."
|
|
ReportWarning ${TEST_NO} "M" "pwck found one or more errors/warnings in the password file"
|
|
ReportSuggestion ${TEST_NO} "Run pwck manually and correct found issues."
|
|
AddHP 0 2
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9234
|
|
# Description : Query user accounts
|
|
# Notes : HPUX > 100
|
|
# MacOS: need to be improved (just reading passwd file is not enough)
|
|
# OpenBSD/NetBSD: unknown
|
|
# Arch Linux / CentOS / Ubuntu: 1000+
|
|
Register --test-no AUTH-9234 --weight L --network NO --description "Query user accounts"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Read system users (including root user) from /etc/passwd"
|
|
FIND=""
|
|
|
|
case ${OS} in
|
|
"FreeBSD")
|
|
LogText "FreeBSD real users output (ID = 0, or 1000+, but not 65534):"
|
|
FIND=`awk -F: '($3 >= 1000) && ($3 != 65534) || ($3 == 0) { print $1","$3 }' /etc/passwd`
|
|
;;
|
|
|
|
"Linux")
|
|
LogText "Linux real users output (ID = 0, or 500+, but not 65534):"
|
|
FIND=`awk -F: '($3 >= 1000) && ($3 != 65534) || ($3 == 0) { print $1","$3 }' /etc/passwd`
|
|
;;
|
|
|
|
"OpenBSD")
|
|
LogText "OpenBSD real users output (ID = 0, or 1000-60000, but not 32767):"
|
|
FIND=`awk -F: '($3 >= 1000) && ($3 <= 60000) && ($3 != 32767) || ($3 == 0) { print $1","$3 }' /etc/passwd`
|
|
;;
|
|
|
|
"Solaris")
|
|
LogText "Solaris real users output (ID =0, or 100+, but not 60001/65534):"
|
|
FIND=`awk -F: '($3 >= 100 && $3 != 60001 && $3 != 65534) || ($3 == 0) { print $1","$3 }' /etc/passwd`
|
|
;;
|
|
*)
|
|
# Want to help improving Lynis? Determine what user IDs belong to normal user accounts
|
|
ReportException "${TEST_NO}:1" "Can not determine user accounts"
|
|
;;
|
|
esac
|
|
|
|
# Check if we got any output
|
|
if [ "${FIND}" = "" ]; then
|
|
Display --indent 4 --text "Result: No users found/unknown result"
|
|
LogText "Result: Querying of system users skipped"
|
|
Display --indent 2 --text "- Query system users (non daemons)" --result UNKNOWN --color YELLOW
|
|
else
|
|
Display --indent 2 --text "- Query system users (non daemons)" --result DONE --color GREEN
|
|
for I in ${FIND}; do
|
|
LogText "Real user: ${I}"
|
|
Report "real_user[]=${I}"
|
|
done
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9240
|
|
# Description : Query NIS+ authentication support
|
|
Register --test-no AUTH-9240 --weight L --network NO --description "Query NIS+ authentication support"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if [ -f /etc/nsswitch.conf ]; then
|
|
FIND=`egrep "^passwd" /etc/nsswitch.conf | egrep "compat|nisplus"`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: NIS+ authentication not enabled"
|
|
Display --indent 2 --text "- Checking NIS+ authentication support" --result "NOT ENABLED" --color WHITE
|
|
else
|
|
FIND2=`egrep "^passwd_compat" /etc/nsswitch.conf | grep "nisplus"`
|
|
FIND3=`egrep "^passwd" /etc/nsswitch.conf | grep "nisplus"`
|
|
if [ ! "${FIND2}" = "" -o ! "${FIND3}" = "" ]; then
|
|
LogText "Result: NIS+ authentication enabled"
|
|
Display --indent 2 --text "- Checking NIS+ authentication support" --result "ENABLED" --color GREEN
|
|
else
|
|
LogText "Result: NIS+ authentication not enabled"
|
|
Display --indent 2 --text "- Checking NIS+ authentication support" --result "NOT ENABLED" --color WHITE
|
|
fi
|
|
fi
|
|
else
|
|
LogText "Result: /etc/nsswitch.conf not found"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9242
|
|
# Description : Query NIS authentication support
|
|
Register --test-no AUTH-9242 --weight L --network NO --description "Query NIS authentication support"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if [ -f /etc/nsswitch.conf ]; then
|
|
FIND=`egrep "^passwd" /etc/nsswitch.conf | egrep "compat|nis" | grep -v "nisplus"`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: NIS authentication not enabled"
|
|
Display --indent 2 --text "- Checking NIS authentication support" --result "NOT ENABLED" --color WHITE
|
|
else
|
|
FIND2=`egrep "^passwd_compat" /etc/nsswitch.conf | grep "nis" | grep -v "nisplus"`
|
|
FIND3=`egrep "^passwd" /etc/nsswitch.conf | grep "nis" | grep -v "nisplus"`
|
|
if [ ! "${FIND2}" = "" -o ! "${FIND3}" = "" ]; then
|
|
LogText "Result: NIS authentication enabled"
|
|
Display --indent 2 --text "- Checking NIS authentication support" --result "ENABLED" --color GREEN
|
|
else
|
|
LogText "Result: NIS authentication not enabled"
|
|
Display --indent 2 --text "- Checking NIS authentication support" --result "NOT ENABLED" --color WHITE
|
|
fi
|
|
fi
|
|
else
|
|
LogText "Result: /etc/nsswitch.conf not found"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9250
|
|
# Description : Check for sudoers file
|
|
Register --test-no AUTH-9250 --weight L --network NO --description "Checking sudoers file"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FOUND=0
|
|
for I in ${SUDOERS_LOCATIONS}; do
|
|
LogText "Test: checking presence ${I}"
|
|
if [ -f ${I} ]; then
|
|
FOUND=1
|
|
SUDOERS_FILE="${I}"
|
|
LogText "Result: found file (${SUDOERS_FILE})"
|
|
else
|
|
LogText "Result: file ${I} not found"
|
|
fi
|
|
done
|
|
if [ ${FOUND} -eq 1 ]; then
|
|
LogText "Result: sudoers file found (${SUDOERS_FILE})"
|
|
Display --indent 2 --text "- Checking sudoers file" --result FOUND --color GREEN
|
|
else
|
|
LogText "Result: sudoers file NOT found"
|
|
Display --indent 2 --text "- Checking sudoers file" --result "NOT FOUND" --color YELLOW
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9252
|
|
# Description : Check for sudoers file permissions
|
|
if [ ! "${SUDOERS_FILE}" = "" ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9252 --preqs-met ${PREQS_MET} --weight L --network NO --description "Check sudoers file"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: checking sudoers file (${SUDOERS_FILE}) permissions"
|
|
FIND=`ls -l ${SUDOERS_FILE} | cut -c 2-10`
|
|
LogText "Result: Found file permissions: ${FIND}"
|
|
if [ "${FIND}" = "rw-------" -o "${FIND}" = "rw-rw----" -o "${FIND}" = "r--r-----" ]; then
|
|
LogText "Result: file ${SUDOERS_FILE} has correct permissions"
|
|
Display --indent 4 --text "- Check sudoers file permissions" --result OK --color GREEN
|
|
else
|
|
LogText "Result: file has possibly unsafe file permissions"
|
|
Display --indent 4 --text "- Check sudoers file permissions" --result WARNING --color RED
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9254
|
|
# Description : Solaris test to check passwordless accounts
|
|
Register --test-no AUTH-9254 --os Solaris --weight L --network NO --description "Solaris passwordless accounts"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FIND=`logins -p | awk '{ print $1 }'`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: no passwordless accounts found"
|
|
Display --indent 2 --text "- Checking passwordless accounts on Solaris" --result OK --color GREEN
|
|
else
|
|
for I in ${FIND}; do
|
|
ReportWarning ${TEST_NO} "H" "Found passwordless account (${I})"
|
|
done
|
|
Display --indent 2 --text "- Checking passwordless accounts on Solaris" --result WARNING --color RED
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9262
|
|
# Description : Search for PAM password strength testing libraries
|
|
Register --test-no AUTH-9262 --weight L --network NO --description "Checking presence password strength testing tools (PAM)"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FOUND=0
|
|
FOUND_CRACKLIB=0
|
|
FOUND_PASSWDQC=0
|
|
|
|
# Cracklib
|
|
LogText "Searching cracklib PAM module"
|
|
for I in ${PAM_FILE_LOCATIONS}; do
|
|
if [ -f ${I}/pam_cracklib.so ]; then
|
|
FOUND_CRACKLIB=1
|
|
LogText "Result: found pam_cracklib.so (crack library PAM) in ${I}"
|
|
fi
|
|
done
|
|
if [ ${FOUND_CRACKLIB} -eq 1 ]; then
|
|
LogText "Result: pam_cracklib.so found"
|
|
Report "pam_cracklib=1"
|
|
AddHP 3 3
|
|
FOUND=1
|
|
else
|
|
LogText "Result: pam_cracklib.so NOT found (crack library PAM)"
|
|
AddHP 1 3
|
|
fi
|
|
|
|
# Passwd quality control
|
|
LogText "Searching passwdqc PAM module"
|
|
for I in ${PAM_FILE_LOCATIONS}; do
|
|
if [ -f ${I}/pam_passwdqc.so ]; then
|
|
FOUND_PASSWDQC=1
|
|
LogText "Result: found pam_passwdqc.so (passwd quality control PAM) in ${I}"
|
|
fi
|
|
done
|
|
if [ ${FOUND_PASSWDQC} -eq 1 ]; then
|
|
LogText "Result: pam_passwdqc.so found"
|
|
Report "pam_passwdqc=1"
|
|
AddHP 3 3
|
|
FOUND=1
|
|
else
|
|
LogText "Result: pam_passwdqc.so NOT found (passwd quality control PAM)"
|
|
AddHP 1 3
|
|
fi
|
|
|
|
if [ ${FOUND} -eq 0 ]; then
|
|
Display --indent 2 --text "- Checking PAM password strength tools" --result "SUGGESTION" --color YELLOW
|
|
LogText "Result: no PAM modules for password strength testing found"
|
|
ReportSuggestion ${TEST_NO} "Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc"
|
|
else
|
|
Display --indent 2 --text "- Checking PAM password strength tools" --result OK --color GREEN
|
|
LogText "Result: found at least one PAM module for password strength testing"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9264
|
|
# Description : Scan /etc/pam.conf file
|
|
Register --test-no AUTH-9264 --weight L --network NO --description "Checking presence pam.conf"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking file /etc/pam.conf"
|
|
if [ -f /etc/pam.conf ]; then
|
|
LogText "Result: file /etc/pam.conf exists"
|
|
Display --indent 2 --text "- Checking PAM configuration files (pam.conf)" --result FOUND --color GREEN
|
|
LogText "Test: searching PAM configuration files"
|
|
FIND=`grep -v "^#" /etc/pam.conf | grep -v "^$" | sed 's/[[:space:]]/ /g' | sed 's/ / /g' | sed 's/ /:space:/g'`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: File has no configuration options defined (empty, or only filled with comments and empty lines)"
|
|
else
|
|
LogText "Result: found one or more configuration lines"
|
|
for I in ${FIND}; do
|
|
I=`echo ${I} | sed 's/:space:/ /g'`
|
|
LogText "Found line: ${I}"
|
|
done
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/pam.conf could not be found"
|
|
Display --indent 2 --text "- Checking PAM configuration file (pam.conf)" --result "NOT FOUND" --color WHITE
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9266
|
|
# Description : Searching available PAM configurations (/etc/pam.d)
|
|
Register --test-no AUTH-9266 --weight L --network NO --description "Checking presence pam.d files"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking directory /etc/pam.d"
|
|
if [ -d /etc/pam.d ]; then
|
|
LogText "Result: directory /etc/pam.d exists"
|
|
Display --indent 2 --text "- Checking PAM configuration files (pam.d)" --result FOUND --color GREEN
|
|
LogText "Test: searching PAM configuration files"
|
|
FIND=`find /etc/pam.d -type f -print | sort`
|
|
for I in ${FIND}; do
|
|
LogText "Found file: ${I}"
|
|
done
|
|
else
|
|
LogText "Result: directory /etc/pam.d could not be found"
|
|
Display --indent 2 --text "- Checking PAM configuration files (pam.d)" --result "NOT FOUND" --color WHITE
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9268
|
|
# Description : Searching available PAM files
|
|
# Notes : PAM is used on AIX, Linux, HPUX, Solaris
|
|
if [ ${OS} = "AIX" -o ${OS} = "Linux" -o ${OS} = "HPUX" -o ${OS} = "Solaris" ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9268 --preqs-met ${PREQS_MET} --weight L --network NO --description "Checking presence pam.d files"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FOUND=0
|
|
LogText "Test: Searching pam modules"
|
|
for I in ${PAM_FILE_LOCATIONS}; do
|
|
LogText "Test: Checking ${I}"
|
|
if [ -d ${I} -a ! -L ${I} ]; then
|
|
LogText "Result: directory ${I} exists"
|
|
FIND=`find ${I} -type f -name "*.so" -print | sort`
|
|
if [ ! "${FIND}" = "" ]; then FOUND=1; fi
|
|
for I in ${FIND}; do
|
|
LogText "Found file: ${I}"
|
|
Report "pam_module[]=${I}"
|
|
done
|
|
else
|
|
LogText "Result: directory ${I} could not be found or is a symlink to another directory"
|
|
fi
|
|
done
|
|
# Check if we found at least one module
|
|
if [ ${FOUND} -eq 0 ]; then
|
|
Display --indent 2 --text "- Checking PAM modules" --result "NOT FOUND" --color WHITE
|
|
LogText "Result: no PAM modules found"
|
|
else
|
|
Display --indent 2 --text "- Checking PAM modules" --result FOUND --color GREEN
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9278
|
|
# Description : Search LDAP support in PAM files
|
|
Register --test-no AUTH-9278 --weight L --network NO --description "Checking LDAP pam status"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: checking presence /etc/pam.d/common-auth"
|
|
if [ -f /etc/pam.d/common-auth ]; then
|
|
LogText "Result: file /etc/pam.d/common-auth exists"
|
|
LogText "Test: checking presence LDAP module"
|
|
FIND=`grep "^auth.*ldap" /etc/pam.d/common-auth`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
LogText "Result: LDAP module present"
|
|
LogText "Output: ${FIND}"
|
|
Display --indent 2 --text "- Checking LDAP module in PAM" --result FOUND --color GREEN
|
|
LDAP_AUTH_ENABLED=1
|
|
LDAP_PAM_ENABLED=1
|
|
else
|
|
LogText "Result: LDAP module not found"
|
|
Display --indent 2 --text "- Checking LDAP module in PAM" --result "NOT FOUND" --color WHITE
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/pam.d/common-auth not found, skipping test"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9282 and AUTH-9283
|
|
# Note : Every Linux based operating system seem to have different passwd
|
|
# options, so we have to check the version first.
|
|
if [ "${OS}" = "Linux" ]; then
|
|
if [ ${OS_REDHAT_OR_CLONE} -eq 0 ]; then
|
|
case ${LINUX_VERSION} in
|
|
"SuSE")
|
|
PREQS_MET="YES"
|
|
FIND=`passwd -a -S 2> /dev/null | awk '{ if ($2=="P" && $5=="99999") print $1 }'`
|
|
FIND2=`passwd -a -S 2> /dev/null | awk '{ if ($2=="NP") print $1 }'`
|
|
;;
|
|
*)
|
|
PREQS_MET="YES"
|
|
FIND=`passwd --all --status 2> /dev/null | awk '{ if ($2=="P" && $5=="99999") print $1 }'`
|
|
FIND2=`passwd --all --status 2> /dev/null | awk '{ if ($2=="NP") print $1 }'`
|
|
;;
|
|
esac
|
|
else
|
|
LogText "Result: skipping test for this Linux version"
|
|
ReportManual "AUTH-9282:01"
|
|
PREQS_MET="NO"
|
|
FIND=""
|
|
FIND2=""
|
|
fi
|
|
else
|
|
PREQS_MET="NO"
|
|
fi
|
|
|
|
# Test : AUTH-9282
|
|
# Description : Search password protected accounts without expire (Linux)
|
|
Register --test-no AUTH-9282 --preqs-met ${PREQS_MET} --weight L --network NO --description "Checking password protected account without expire date"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking Linux version and password expire date status"
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: all accounts seem to have an expire date"
|
|
Display --indent 2 --text "- Checking accounts without expire date" --result OK --color GREEN
|
|
else
|
|
LogText "Result: found one or more accounts with expire date set"
|
|
for I in ${FIND}; do
|
|
LogText "Account without expire date: ${I}"
|
|
done
|
|
Display --indent 2 --text "- Checking accounts without expire date" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "When possible set expire dates for all password protected accounts"
|
|
fi
|
|
fi
|
|
# Test : AUTH-9283
|
|
# Description : Search passwordless accounts
|
|
Register --test-no AUTH-9283 --preqs-met ${PREQS_MET} --weight L --network NO --description "Checking accounts without password"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking passwordless accounts"
|
|
if [ "${FIND2}" = "" ]; then
|
|
LogText "Result: all accounts seem to have a password"
|
|
Display --indent 2 --text "- Checking accounts without password" --result OK --color GREEN
|
|
else
|
|
LogText "Result: found one or more accounts without password"
|
|
for I in ${FIND2}; do
|
|
LogText "Account without password: ${I}"
|
|
Report "account_without_password=${I}"
|
|
done
|
|
Display --indent 2 --text "- Checking accounts without password" --result WARNING --color RED
|
|
ReportWarning ${TEST_NO} "Found accounts without password"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9286
|
|
# Description : Check user password aging
|
|
# Notes : MIN = minimum age, avoid rotation of passwords too quickly
|
|
# : MAX = maximum age, ensure regular change of passwords
|
|
if [ -f /etc/login.defs ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9286 --preqs-met ${PREQS_MET} --weight L --network NO --description "Checking user password aging"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking PASS_MIN_DAYS option in /etc/login.defs "
|
|
FIND=`grep "^PASS_MIN_DAYS" /etc/login.defs | awk '{ if ($1=="PASS_MIN_DAYS") { print $2 } }'`
|
|
if [ "${FIND}" = "" -o "${FIND}" = "0" ]; then
|
|
LogText "Result: password minimum age is not configured"
|
|
Display --indent 2 --text "- Checking user password aging (minimum)" --result DISABLED --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Configure minimum password age in /etc/login.defs"
|
|
AddHP 0 1
|
|
else
|
|
LogText "Result: password needs to be at least ${FIND} days old"
|
|
PASSWORD_MINIMUM_DAYS=${FIND}
|
|
Display --indent 2 --text "- Checking user password aging (minimum)" --result CONFIGURED --color GREEN
|
|
AddHP 3 3
|
|
fi
|
|
|
|
LogText "Test: Checking PASS_MAX_DAYS option in /etc/login.defs "
|
|
FIND=`grep "^PASS_MAX_DAYS" /etc/login.defs | awk '{ if ($1=="PASS_MAX_DAYS") { print $2 } }'`
|
|
if [ "${FIND}" = "" -o "${FIND}" = "99999" ]; then
|
|
LogText "Result: password aging limits are not configured"
|
|
Display --indent 2 --text "- Checking user password aging (maximum)" --result DISABLED --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Configure maximum password age in /etc/login.defs"
|
|
AddHP 0 1
|
|
else
|
|
LogText "Result: max password age is ${FIND} days"
|
|
PASSWORD_MAXIMUM_DAYS=${FIND}
|
|
Display --indent 2 --text "- Checking user password aging (maximum)" --result CONFIGURED --color GREEN
|
|
AddHP 3 3
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9288
|
|
# Description : Determine which accounts have an expired password
|
|
# Notes : This test might not work yet on all platforms
|
|
if [ -f /etc/shadow ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9288 --preqs-met ${PREQS_MET} --weight L --network NO --description "Checking for expired passwords"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if FileIsReadable /etc/shadow; then
|
|
DAYS_SINCE_EPOCH=$((`date --utc +%s`/86400))
|
|
logtext "Data: Days since epoch is ${DAYS_SINCE_EPOCH}"
|
|
LogText "Test: collecting accounts which have an expired password (last day changed + maximum change time)"
|
|
# Skip fields with a !, *, or x (field $3 is last changed, $5 is maximum changed)
|
|
FIND=`egrep -v ":[\!\*x]:" /etc/shadow | awk -v today=${DAYS_SINCE_EPOCH} -F: '{ if (today>$3+$5) { print $1 }}'`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
for ACCOUNT in ${FIND}; do
|
|
LogText "Result: password of user ${ACCOUNT} has been expired"
|
|
Report "account_password_expired[]=${ACCOUNT}"
|
|
done
|
|
AddHP 0 10
|
|
Display --indent 2 --text "- Checking expired passwords" --result FOUND --color RED
|
|
ReportSuggestion "${TEST_NO}" "Delete accounts which are no longer used"
|
|
else
|
|
LogText "Result: good, no passwords have been expired"
|
|
Display --indent 2 --text "- Checking expired passwords" --result OK --color GREEN
|
|
AddHP 10 10
|
|
fi
|
|
else
|
|
Display --indent 2 --text "- Checking expired passwords" --result SKIPPED --color YELLOW
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9304
|
|
# Description : Check if single user mode login is properly configured in Solaris
|
|
# Notes : sulogin should be called from svm script (Solaris <10) in /etc/rcS.d
|
|
Register --test-no AUTH-9304 --os Solaris --weight L --network NO --description "Check single user login configuration"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
# Check if file exists (Solaris 10 does not have this file by default)
|
|
if [ -f /etc/default/sulogin ]; then
|
|
LogText "Result: file /etc/default/sulogin exists"
|
|
LogText "Test: checking presence PASSREQ=NO"
|
|
FIND=`grep "^PASSREQ=NO" /etc/default/sulogin`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: option not present or configured to request a password at single user mode login"
|
|
Display --indent 2 --text "- Checking Solaris /etc/default/sulogin file" --result OK --color GREEN
|
|
AddHP 1 1
|
|
else
|
|
LogText "Result: option present, no password needed at single user mode login"
|
|
Display --indent 2 --text "- Checking Solaris /etc/default/sulogin file" --result WARNING --color RED
|
|
ReportWarning ${TEST_NO} "H" "No password needed for single user mode login"
|
|
AddHP 0 1
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/default/sulogin does not exist"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9306
|
|
# Description : Check if authentication is needed to boot the system
|
|
# Notes : :d_boot_authenticate: is a good option for production machines to
|
|
# avoid unauthorized booting of systems. Option :d_boot_autentication@:
|
|
# disabled a required login.
|
|
Register --test-no AUTH-9306 --os HP-UX --weight L --network NO --description "Check single boot authentication"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
# Check if file exists
|
|
LogText "Test: Searching /tcb/files/auth/system/default"
|
|
if [ -f /tcb/files/auth/system/default ]; then
|
|
LogText "Result: file /tcb/files/auth/system/default exists"
|
|
LogText "Test: checking presence :d_boot_authenticate@:"
|
|
FIND=`grep "^:d_boot_authenticate@" /tcb/files/auth/system/default`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: option not set, password is needed at boot"
|
|
Display --indent 2 --text "- Checking HP-UX boot authentication" --result OK --color GREEN
|
|
AddHP 1 1
|
|
else
|
|
LogText "Result: option present, no password needed at single user mode login"
|
|
Display --indent 2 --text "- Checking HP-UX boot authentication" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Set password for system boot"
|
|
AddHP 0 1
|
|
fi
|
|
else
|
|
LogText "Result: file /tcb/files/auth/system/default does not exist"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9308
|
|
# Description : Check single user mode login for Linux
|
|
Register --test-no AUTH-9308 --os Linux --weight L --network NO --description "Check single user login configuration"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FOUND=0
|
|
# Check if file exists
|
|
LogText "Test: Searching /etc/inittab"
|
|
if [ -f /etc/inittab ]; then
|
|
LogText "Result: file /etc/inittab exists"
|
|
LogText "Test: checking presence sulogin for single user mode"
|
|
FIND=`egrep "^~~:S:(respawn|wait):/sbin/sulogin" /etc/inittab`
|
|
FIND2=`egrep "^su:S:(respawn|wait):/sbin/sulogin" /etc/inittab`
|
|
if [ ! "${FIND}" = "" -o ! "${FIND2}" = "" ]; then
|
|
FOUND=1
|
|
LogText "Result: found sulogin, so single user is protected"
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/inittab does not exist"
|
|
fi
|
|
|
|
# Check if file exists
|
|
LogText "Test: Searching /etc/sysconfig/init"
|
|
if [ -f /etc/sysconfig/init ]; then
|
|
LogText "Result: file /etc/sysconfig/init exists"
|
|
LogText "Test: checking presence sulogin for single user mode"
|
|
FIND=`grep "^SINGLE=/sbin/sulogin" /etc/sysconfig/init`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
FOUND=1
|
|
LogText "Result: found sulogin, so single user is protected"
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/inittab does not exist"
|
|
fi
|
|
if [ -f /etc/inittab -o -f /etc/sysconfig/init ]; then
|
|
if [ ${FOUND} -eq 0 ]; then
|
|
LogText "Result: option not set, no password needed at single user mode boot"
|
|
Display --indent 2 --text "- Checking Linux single user mode authentication" --result WARNING --color RED
|
|
ReportWarning ${TEST_NO} "L" "No password set for single mode"
|
|
ReportSuggestion ${TEST_NO} "Set password for single user mode to minimize physical access attack surface"
|
|
AddHP 0 2
|
|
else
|
|
LogText "Result: option set, password is needed at single user mode boot"
|
|
Display --indent 2 --text "- Checking Linux single user mode authentication" --result OK --color GREEN
|
|
AddHP 2 2
|
|
fi
|
|
else
|
|
LogText "Result: No inittab or init file found, unsure if system is protected"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9328
|
|
# Description : Check default umask in common files
|
|
# Notes: This test should be moved later to shells section
|
|
# /etc/login.defs
|
|
# pam_umask
|
|
Register --test-no AUTH-9328 --weight L --network NO --description "Default umask values"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
Display --indent 2 --text "- Determining default umask"
|
|
|
|
# /etc/profile
|
|
LogText "Test: Checking /etc/profile"
|
|
if [ -f /etc/profile ]; then
|
|
LogText "Result: file /etc/profile exists"
|
|
LogText "Test: Checking umask value in /etc/profile"
|
|
FIND=`grep "umask" /etc/profile | sed 's/^[ \t]*//' | grep -v "^#" | awk '{ print $2 }'`
|
|
FIND2=`grep "umask" /etc/profile | sed 's/^[ \t]*//' | grep -v "^#" | awk '{ print $2 }' | wc -l`
|
|
WEAK_UMASK=0
|
|
FOUND_UMASK=0
|
|
if [ "${FIND2}" = "0" ]; then
|
|
LogText "Result: did not find umask in /etc/profile"
|
|
#YYY possibly weak umask
|
|
elif [ "${FIND2}" = "1" ]; then
|
|
LogText "Result: found umask (prefixed with spaces)"
|
|
FOUND_UMASK=1
|
|
if [ ! "${FIND}" = "077" -a ! "${FIND}" = "027" ]; then
|
|
LogText "Result: found umask ${FIND}, which could be more strict"
|
|
WEAK_UMASK=1
|
|
AddHP 1 2
|
|
else
|
|
LogText "Result: found umask ${FIND}, which is fine"
|
|
AddHP 2 2
|
|
fi
|
|
# Found more than 1 umask value in profile
|
|
else
|
|
LogText "Result: found multiple umask values configured in /etc/profile"
|
|
FOUND_UMASK=1
|
|
for I in ${FIND}; do
|
|
if [ ! "${I}" = "077" -a ! "${I}" = "027" ]; then
|
|
LogText "Result: umask ${I} could be more strict"
|
|
WEAK_UMASK=1
|
|
AddHP 1 2
|
|
else
|
|
LogText "Result: Found umask ${I}, which is fine"
|
|
AddHP 2 2
|
|
fi
|
|
done
|
|
fi
|
|
|
|
if [ ${FOUND_UMASK} -eq 1 ]; then
|
|
if [ ${WEAK_UMASK} -eq 0 ]; then
|
|
Display --indent 4 --text "- Checking umask (/etc/profile)" --result OK --color GREEN
|
|
AddHP 2 2
|
|
else
|
|
Display --indent 4 --text "- Checking umask (/etc/profile)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/profile could be more strict like 027"
|
|
AddHP 0 2
|
|
fi
|
|
else
|
|
LogText "Result: found no umask. Please check if this is correct"
|
|
Display --indent 4 --text "- Checking umask (/etc/profile)" --result "NOT FOUND" --color YELLOW
|
|
ReportException "${TEST_NO}:01"
|
|
ReportManual "AUTH-9328:01"
|
|
AddHP 0 2
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/profile does not exist"
|
|
fi
|
|
|
|
# /etc/passwd
|
|
LogText "Test: Checking umask entries in /etc/passwd (pam_umask)"
|
|
if [ -f /etc/passwd ]; then
|
|
LogText "Result: file /etc/passwd exists"
|
|
LogText "Test: Checking umask value in /etc/passwd"
|
|
FIND=`grep "umask=" /etc/passwd`
|
|
if [ "${FIND}" = "" ]; then
|
|
ReportManual "AUTH-9328:03"
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/passwd does not exist"
|
|
fi
|
|
|
|
# /etc/login.defs
|
|
LogText "Test: Checking /etc/login.defs"
|
|
if [ -f /etc/login.defs ]; then
|
|
LogText "Result: file /etc/login.defs exists"
|
|
LogText "Test: Checking umask value in /etc/login.defs"
|
|
FIND=`grep "^UMASK" /etc/login.defs | awk '{ print $2 }'`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: umask value is not configured (most likely it will have the default 022 value)"
|
|
Display --indent 4 --text "- Checking umask (/etc/login.defs)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/login.defs could not be found and defaults usually to 022, which could be more strict like 027"
|
|
AddHP 1 2
|
|
elif [ "${FIND}" = "077" -o "${FIND}" = "027" ]; then
|
|
LogText "Result: umask is ${FIND}, which is fine"
|
|
Display --indent 4 --text "- Checking umask (/etc/login.defs)" --result OK --color GREEN
|
|
AddHP 2 2
|
|
else
|
|
LogText "Result: found umask ${FIND}, which could be improved"
|
|
Display --indent 4 --text "- Checking umask (/etc/login.defs)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/login.defs could be more strict like 027"
|
|
AddHP 0 2
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/login.defs does not exist"
|
|
fi
|
|
|
|
# Red Hat /etc/init.d/functions
|
|
LogText "Test: Checking /etc/init.d/functions"
|
|
if [ -f /etc/init.d/functions ]; then
|
|
LogText "Result: file /etc/init.d/functions exists"
|
|
LogText "Test: Checking umask value in /etc/init.d/functions"
|
|
FIND=`grep "^umask" /etc/init.d/functions | awk '{ print $2 }'`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: umask is not configured"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/functions)" --result NONE --color WHITE
|
|
elif [ "${FIND}" = "077" -o "${FIND}" = "027" ]; then
|
|
LogText "Result: umask is ${FIND}, which is fine"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/functions)" --result OK --color GREEN
|
|
AddHP 2 2
|
|
else
|
|
LogText "Result: found umask ${FIND}, which could be improved"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/functions)" --result SUGGESTION --color YELLOW
|
|
AddHP 0 2
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/init.d/functions does not exist"
|
|
fi
|
|
|
|
# /etc/init.d/rc
|
|
LogText "Test: Checking /etc/init.d/rc"
|
|
if [ -f /etc/init.d/rc ]; then
|
|
LogText "Result: file /etc/init.d/rc exists"
|
|
LogText "Test: Checking UMASK value in /etc/init.d/rc"
|
|
FIND=`grep -i "^UMASK" /etc/init.d/rc | awk '{ print $2 }'`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: UMASK value is not configured (most likely it will have the default 022 value)"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/rc)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/init.d/rc could not be found and defaults usually to 022, which could be more strict like 027"
|
|
AddHP 1 2
|
|
elif [ "${FIND}" = "077" -o "${FIND}" = "027" ]; then
|
|
LogText "Result: umask is ${FIND}, which is fine"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/rc)" --result OK --color GREEN
|
|
AddHP 2 2
|
|
else
|
|
LogText "Result: found umask ${FIND}, which could be improved"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/rc)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/init.d/rc could be more strict like 027"
|
|
AddHP 0 2
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/init.d/rc does not exist"
|
|
fi
|
|
|
|
# FreeBSD
|
|
if [ -f /etc/login.conf ]; then
|
|
FOUND=0
|
|
WEAK_UMASK=0
|
|
LogText "Result: file /etc/login.conf exists"
|
|
FIND=`grep "umask" /etc/login.conf | sed 's/#.*//' | sed -E 's/^[[:cntrl:]]//' | grep -v '^$' | awk -F: '{ print $2}' | awk -F= '{ if ($1=="umask") { print $2 }}'`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
for UMASK_VALUE in ${FIND}; do
|
|
case ${UMASK_VALUE} in
|
|
027|0027|077|0077)
|
|
LogText "Result: found umask value ${UMASK_VALUE}, which is fine"
|
|
AddHP 2 2
|
|
FOUND=1
|
|
;;
|
|
*)
|
|
AddHP 0 2
|
|
FOUND=1
|
|
WEAK_UMASK=1
|
|
LogText "Result: found umask value ${UMASK_VALUE}, which can be more strict"
|
|
;;
|
|
esac
|
|
done
|
|
fi
|
|
if [ ${FOUND} -eq 1 ]; then
|
|
if [ ${WEAK_UMASK} -eq 0 ]; then
|
|
Display --indent 4 --text "- Checking umask (/etc/login.conf)" --result OK --color GREEN
|
|
else
|
|
Display --indent 4 --text "- Checking umask (/etc/login.conf)" --result WEAK --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Umask in /etc/login.conf could be more strict like 027"
|
|
fi
|
|
else
|
|
LogText "Result: no umask setting found in /etc/login.conf, which is unexpected"
|
|
Display --indent 4 --text "- Checking umask (/etc/login.conf)" --result NONE --color YELLOW
|
|
fi
|
|
fi
|
|
|
|
# /etc/init.d/rcS
|
|
LogText "Test: Checking /etc/init.d/rcS"
|
|
if [ -f /etc/init.d/rcS ]; then
|
|
LogText "Result: file /etc/init.d/rcS exists"
|
|
LogText "Test: Checking if script runs another script."
|
|
FIND=`grep -i "^exec " /etc/init.d/rcS | awk '{ print $2 }'`
|
|
if [ "${FIND}" = "" ]; then
|
|
FIND2=`grep -i "^UMASK" /etc/init.d/rcS | awk '{ print $2 }'`
|
|
if [ "${FIND2}" = "" ]; then
|
|
LogText "Result: UMASK value is not configured (most likely it will have the default 022 value)"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/rcS)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/init.d/rcS could not be found and defaults usually to 022, which could be more strict like 027"
|
|
AddHP 1 2
|
|
elif [ "${FIND2}" = "077" -o "${FIND2}" = "027" ]; then
|
|
LogText "Result: umask is ${FIND2}, which is fine"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/rcS)" --result OK --color GREEN
|
|
AddHP 2 2
|
|
else
|
|
LogText "Result: found umask ${FIND2}, which could be improved"
|
|
Display --indent 4 --text "- Checking umask (/etc/init.d/rcS)" --result SUGGESTION --color YELLOW
|
|
ReportSuggestion ${TEST_NO} "Default umask in /etc/init.d/rcS could be more strict like 027"
|
|
AddHP 0 2
|
|
fi
|
|
else
|
|
# Improve check
|
|
LogText "Result: exec line present in file, setting of umask not needed in this script"
|
|
LogText "Output: ${FIND}"
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/init.d/rcS does not exist"
|
|
fi
|
|
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9340
|
|
# Description : Solaris account locking
|
|
Register --test-no AUTH-9340 --os Solaris --weight L --network NO --description "Solaris account locking"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FOUND=0
|
|
if [ -f /etc/security/policy.conf ]; then
|
|
LogText "Result: found /etc/security/policy.conf"
|
|
FIND=`grep "^LOCK_AFTER_RETRIES" /etc/security/policy.conf`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
FOUND=1
|
|
LogText "Result: account locking option set"
|
|
LogText "Output: ${FIND}"
|
|
AddHP 2 2
|
|
else
|
|
LogText "Result: option LOCK_AFTER_RETRIES not set"
|
|
AddHP 1 2
|
|
fi
|
|
else
|
|
LogText "Result: /etc/security/policy.conf does not exist"
|
|
fi
|
|
# If policy.conf does not exist, we most likely deal with a Solaris version below 10
|
|
# and we proceed with checking the softer option RETRIES in /etc/default/login
|
|
# which does not lock account, but discourages brute force password attacks.
|
|
if [ ${FOUND} -eq 0 ]; then
|
|
LogText "Test: checking /etc/default/login"
|
|
if [ -f /etc/default/login ]; then
|
|
LogText "Result: file /etc/default/login exists"
|
|
FIND=`grep "^RETRIES" /etc/default/login`
|
|
if [ ! "${FIND}" = "" ]; then
|
|
FOUND=1
|
|
LogText "Result: retries option configured"
|
|
LogText "Output: ${FIND}"
|
|
AddHP 2 2
|
|
else
|
|
LogText "Result: retries option not configured"
|
|
AddHP 1 2
|
|
fi
|
|
else
|
|
LogText "Result: file /etc/default/login does not exist"
|
|
fi
|
|
fi
|
|
if [ ${FOUND} -eq 1 ]; then
|
|
Display --indent 2 --text "- Checking account locking" --result "ENABLED" --color GREEN
|
|
else
|
|
Display --indent 2 --text "- Checking account locking" --result "NOT ENABLED" --color YELLOW
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9402
|
|
# Description : Query LDAP authentication support
|
|
Register --test-no AUTH-9402 --weight L --network NO --description "Query LDAP authentication support"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if [ -f /etc/nsswitch.conf ]; then
|
|
FIND=`egrep "^passwd" /etc/nsswitch.conf | grep "ldap"`
|
|
if [ "${FIND}" = "" ]; then
|
|
LogText "Result: LDAP authentication not enabled"
|
|
Display --indent 2 --text "- Checking LDAP authentication support" --result "NOT ENABLED" --color WHITE
|
|
else
|
|
LogText "Result: LDAP authentication enabled"
|
|
Display --indent 2 --text "- Checking LDAP authentication support" --result "ENABLED" --color GREEN
|
|
LDAP_AUTH_ENABLED=1
|
|
fi
|
|
else
|
|
LogText "Result: /etc/nsswitch.conf not found"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9406
|
|
# Description : Check LDAP servers in client configuration
|
|
if [ ${LDAP_AUTH_ENABLED} -eq 1 ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9406 --preqs-met ${PREQS_MET} --weight L --network NO --description "Query LDAP servers in client configuration"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: checking ldap.conf options"
|
|
for I in ${LDAP_CONF_LOCATIONS}; do
|
|
LogText "Test: checking ${I}"
|
|
if [ -f ${I} ]; then
|
|
LogText "Result: file ${I} exists, LDAP being used"
|
|
LDAP_CLIENT_CONFIG_FILE="${I}"
|
|
LogText "Test: checking LDAP servers in file ${I}"
|
|
FIND2=`egrep "^host " ${I} | awk '{ print $2 }'`
|
|
for I in ${FIND2}; do
|
|
Display --indent 6 --text "LDAP server: ${I}"
|
|
LogText "Result: found LDAP server ${I}"
|
|
Report "ldap_server[]=${I}"
|
|
done
|
|
else
|
|
LogText "Result: ${I} does NOT exist"
|
|
fi
|
|
done
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : AUTH-9408
|
|
# Description : Logging of failed login attempts
|
|
if [ -f /etc/login.defs ]; then PREQS_MET="YES"; else PREQS_MET="NO"; fi
|
|
Register --test-no AUTH-9408 --preqs-met ${PREQS_MET} --weight L --network NO --description "Logging of failed login attempts via /etc/login.defs"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Checking FAILLOG_ENAB option in /etc/login.defs "
|
|
FIND=`grep "^FAILLOG_ENAB" /etc/login.defs | awk '{ if ($1=="FAILLOG_ENAB") { print $2 } }'`
|
|
# Search for enabled status (yes), otherwise consider it to be disabled (e.g. empty, or other value)
|
|
if [ "${FIND}" = "yes" ]; then
|
|
AUTH_FAILED_LOGINS_LOGGED=1
|
|
LogText "Result: failed login attempts are logged in /var/log/faillog"
|
|
Display --indent 2 --text "- Logging failed login attempts" --result ENABLED --color GREEN
|
|
AddHP 3 3
|
|
else
|
|
LogText "Result: failed login attempts are not logged"
|
|
Display --indent 2 --text "- Logging failed login attempts" --result DISABLED --color YELLOW
|
|
#ReportSuggestion ${TEST_NO} "Configure failed login attempts to be logged in /var/log/faillog"
|
|
AddHP 0 1
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
|
|
Report "auth_failed_logins_logged=${AUTH_FAILED_LOGINS_LOGGED}"
|
|
Report "ldap_auth_enabled=${LDAP_AUTH_ENABLED}"
|
|
Report "ldap_pam_enabled=${LDAP_PAM_ENABLED}"
|
|
if [ ! "${LDAP_CLIENT_CONFIG_FILE}" = "" ]; then
|
|
Report "ldap_config_file=${LDAP_CLIENT_CONFIG_FILE}"
|
|
fi
|
|
Report "password_min_days=${PASSWORD_MINIMUM_DAYS}"
|
|
Report "password_max_days=${PASSWORD_MAXIMUM_DAYS}"
|
|
|
|
wait_for_keypress
|
|
|
|
#
|
|
#================================================================================
|
|
# Lynis - Copyright 2007-2016, Michael Boelen, CISOfy - https://cisofy.com
|