mirror of https://github.com/CISOfy/lynis.git
456 lines
24 KiB
Bash
456 lines
24 KiB
Bash
#!/bin/sh
|
|
|
|
#################################################################################
|
|
#
|
|
# Lynis
|
|
# ------------------
|
|
#
|
|
# Copyright 2007-2013, Michael Boelen
|
|
# Copyright 2007-2021, CISOfy
|
|
#
|
|
# Website : https://cisofy.com
|
|
# Blog : http://linux-audit.com
|
|
# GitHub : https://github.com/CISOfy/lynis
|
|
#
|
|
# Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
|
|
# welcome to redistribute it under the terms of the GNU General Public License.
|
|
# See LICENSE file for usage of this software.
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Databases
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Paths to DATADIR
|
|
sMYSQLDBPATHS="${ROOTDIR}var/lib/mysql"
|
|
# Paths to my.cnf
|
|
sMYCNFLOCS="${ROOTDIR}etc/mysql/my.cnf ${ROOTDIR}usr/etc/my.cnf"
|
|
REDIS_CONFIGURATION_FILES=""
|
|
REDIS_CONFIGURATION_FOUND=0
|
|
|
|
MYSQL_RUNNING=0
|
|
DATABASE_ENGINE_RUNNING=0
|
|
MONGODB_RUNNING=0
|
|
POSTGRESQL_RUNNING=0
|
|
ORACLE_RUNNING=0
|
|
DB2_RUNNING=0
|
|
REDIS_RUNNING=0
|
|
#
|
|
#################################################################################
|
|
#
|
|
InsertSection "${SECTION_DATABASES}"
|
|
|
|
# Test : DBS-1804
|
|
# Description : Check if MySQL is being used
|
|
Register --test-no DBS-1804 --weight L --network NO --category security --description "Checking active MySQL process"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FIND=$(${PSBINARY} ax | ${EGREPBINARY} "mariadb|mysqld|mysqld_safe" | ${GREPBINARY} -v "grep")
|
|
if [ -z "${FIND}" ]; then
|
|
if [ ${DEBUG} -eq 1 ]; then Display --indent 2 --text "- MySQL process status" --result "${STATUS_NOT_FOUND}" --color WHITE --debug; fi
|
|
LogText "Result: MySQL process not active"
|
|
else
|
|
Display --indent 2 --text "- MySQL process status" --result "${STATUS_FOUND}" --color GREEN
|
|
LogText "Result: MySQL is active"
|
|
MYSQL_RUNNING=1
|
|
DATABASE_ENGINE_RUNNING=1
|
|
Report "mysql_running=${MYSQL_RUNNING}"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1808
|
|
# Description : Check MySQL data directory
|
|
#Register --test-no DBS-1808 --weight L --network NO --category security --description "Checking MySQL data directory"
|
|
#if [ ${SKIPTEST} -eq 0 ]; then
|
|
#fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1812
|
|
# Description : Check data directory permissions
|
|
#Register --test-no DBS-1812 --weight L --network NO --category security --description "Checking MySQL data directory permissions"
|
|
#if [ ${SKIPTEST} -eq 0 ]; then
|
|
#fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1816
|
|
# Description : Check empty MySQL root password
|
|
# Notes : Only perform test when MySQL is running and client is available
|
|
if [ -n "${MYSQLCLIENTBINARY}" -a ${MYSQL_RUNNING} -eq 1 ]; then PREQS_MET="YES"; SKIPREASON=""; else PREQS_MET="NO"; SKIPREASON="MySQL not installed, or not running"; fi
|
|
Register --test-no DBS-1816 --preqs-met ${PREQS_MET} --skip-reason "${SKIPREASON}" --weight L --network NO --category security --description "Checking MySQL root password"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
LogText "Test: Trying to login to local MySQL server without password"
|
|
|
|
# "-u root --password=" avoids ~/.my.cnf authentication settings
|
|
# "plugin = 'mysql_native_password' AND authentication_string = ''" avoids false positives when secure plugins are used
|
|
FIND=$(${MYSQLCLIENTBINARY} --default-auth=mysql_native_password --no-defaults -u root --password= --silent --batch --execute="SELECT count(*) FROM mysql.user WHERE user = 'root' AND plugin = 'mysql_native_password' AND authentication_string = ''" mysql > /dev/null 2>&1; echo $?)
|
|
if [ "${FIND}" = "0" ]; then
|
|
LogText "Result: Login succeeded, no MySQL root password set!"
|
|
ReportWarning "${TEST_NO}" "No MySQL root password set"
|
|
Display --indent 4 --text "- Checking empty MySQL root password" --result "${STATUS_WARNING}" --color RED
|
|
AddHP 0 5
|
|
else
|
|
LogText "Result: Login did not succeed, so a MySQL root password is set"
|
|
if IsVerbose; then Display --indent 4 --text "- Checking MySQL root password" --result "${STATUS_OK}" --color GREEN; fi
|
|
AddHP 2 2
|
|
fi
|
|
else
|
|
LogText "Test skipped, MySQL daemon not running or no MySQL client available"
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1818
|
|
# Description : Check MongoDB status
|
|
Register --test-no DBS-1818 --weight L --network NO --category security --description "Check status of MongoDB server"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if IsRunning "mongod"; then
|
|
MONGODB_RUNNING=1
|
|
DATABASE_ENGINE_RUNNING=1
|
|
Report "mongodb_running=1"
|
|
Display --indent 2 --text "- MongoDB status" --result "${STATUS_FOUND}" --color GREEN
|
|
fi
|
|
fi
|
|
|
|
# Test : DBS-1820
|
|
# Description : Check empty MongoDB authorization
|
|
# Notes : Authentication can be set via command line or configuration file
|
|
Register --test-no DBS-1820 --weight L --network NO --category security --description "Check for authorization in MongoDB"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
MONGODB_AUTHORIZATION_ENABLED=0
|
|
if [ ${MONGODB_RUNNING} -eq 1 ]; then
|
|
|
|
MONGO_CONF_FILES="${ROOTDIR}etc/mongod.conf ${ROOTDIR}etc/mongodb.conf"
|
|
for FILE in ${MONGO_CONF_FILES}; do
|
|
if [ -f ${FILE} ]; then
|
|
LogText "Result: found MongoDB configuration file (${FILE})"
|
|
# YAML with quotes
|
|
if [ ${MONGODB_AUTHORIZATION_ENABLED} -eq 0 ]; then
|
|
LogText "Test: determine authorization setting in new style YAML format"
|
|
AUTH_IN_CONFIG=$(${GREPBINARY} "authorization: \"enabled\"" ${FILE} | ${GREPBINARY} -E -v "(^#|#auth)")
|
|
if HasData "${AUTH_IN_CONFIG}"; then
|
|
LogText "Result: GOOD, found authorization option enabled in configuration file (YAML format with quotes)"
|
|
MONGODB_AUTHORIZATION_ENABLED=1
|
|
fi
|
|
fi
|
|
# YAML without quotes
|
|
if [ ${MONGODB_AUTHORIZATION_ENABLED} -eq 0 ]; then
|
|
AUTH_IN_CONFIG=$(${GREPBINARY} "authorization: enabled" ${FILE} | ${GREPBINARY} -E -v "(^#|#auth)")
|
|
if HasData "${AUTH_IN_CONFIG}"; then
|
|
LogText "Result: GOOD, found authorization option enabled in configuration file (YAML format without quotes)"
|
|
MONGODB_AUTHORIZATION_ENABLED=1
|
|
fi
|
|
fi
|
|
# Old style
|
|
if [ ${MONGODB_AUTHORIZATION_ENABLED} -eq 0 ]; then
|
|
LogText "Result: did NOT find authorization option enabled in configuration file (with YAML format)"
|
|
LogText "Test: now searching for old style configuration (auth = true) in configuration file"
|
|
AUTH_IN_CONFIG=$(${GREPBINARY} "auth = true" ${FILE} | ${GREPBINARY} -v "noauth" | ${GREPBINARY} -E -v "(^#|#auth)")
|
|
if IsEmpty "${AUTH_IN_CONFIG}"; then
|
|
LogText "Result: did NOT find auth = true in configuration file"
|
|
else
|
|
LogText "Result: GOOD, found authorization option enabled in configuration file (old format)"
|
|
MONGODB_AUTHORIZATION_ENABLED=1
|
|
fi
|
|
fi
|
|
else
|
|
LogText "Result: configuration file ${FILE} not found"
|
|
fi
|
|
done
|
|
|
|
# Now check authorization on the command line
|
|
if [ ${MONGODB_AUTHORIZATION_ENABLED} -eq 0 ]; then
|
|
if HasData "${PGREPBINARY}"; then
|
|
AUTH_ON_CMDLINE=$(for I in $(${PGREPBINARY} mongo); do cat /proc/${I}/cmdline | xargs -0 echo | ${GREPBINARY} -E "\-\-auth( |$)"; done)
|
|
if [ -n "${AUTH_ON_CMDLINE}" ]; then LogText "Result: found authorization enabled via mongod parameter"; MONGODB_AUTHORIZATION_ENABLED=1; fi
|
|
else
|
|
LogText "Result: skipped this part of the test, as pgrep is not available"
|
|
fi
|
|
fi
|
|
if [ ${MONGODB_AUTHORIZATION_ENABLED} -eq 0 ]; then
|
|
LogText "Result: no authorization enabled via parameter or configuration file"
|
|
Report "mongodb_authorization_disabled=1"
|
|
ReportWarning "${TEST_NO}" "MongoDB instance allows any user to access databases"
|
|
Display --indent 4 --text "- Checking MongoDB authorization" --result "${STATUS_DISABLED}" --color RED
|
|
else
|
|
if IsVerbose; then Display --indent 4 --text "- Checking MongoDB authorization" --result "${STATUS_ENABLED}" --color GREEN; fi
|
|
fi
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1826
|
|
# Description : Check if PostgreSQL is being used
|
|
Register --test-no DBS-1826 --weight L --network NO --category security --description "Checking active PostgreSQL processes"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if IsRunning "postgres"; then
|
|
Display --indent 2 --text "- PostgreSQL processes status" --result "${STATUS_FOUND}" --color GREEN
|
|
LogText "Result: PostgreSQL is active"
|
|
POSTGRESQL_RUNNING=1
|
|
DATABASE_ENGINE_RUNNING=1
|
|
Report "postgresql_running=${POSTGRESQL_RUNNING}"
|
|
else
|
|
if [ ${DEBUG} -eq 1 ]; then Display --indent 2 --text "- PostgreSQL processes status" --result "${STATUS_NOT_FOUND}" --color WHITE --debug; fi
|
|
LogText "Result: PostgreSQL process not active"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1828
|
|
# Description : Test PostgreSQL configuration file(s)
|
|
#
|
|
# Authentication:
|
|
# /var/lib/pgsql/data/pg_hba.conf
|
|
#
|
|
# Configuration
|
|
# Arch /var/lib/postgres/data/postgresql.conf
|
|
# CentOS/Fedora /var/lib/pgsql/data/postgresql.conf
|
|
# Ubuntu /etc/postgresql/x.y/main/postgresql.conf
|
|
|
|
if [ "${POSTGRESQL_RUNNING}" -eq 1 ]; then PREQS_MET="YES"; SKIPREASON=""; else PREQS_MET="NO"; SKIPREASON="PostgreSQL not installed or not running"; fi
|
|
|
|
Register --test-no DBS-1828 --preqs-met ${PREQS_MET} --weight L --network NO --category security --description "Test PostgreSQL configuration"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FIND_PATHS="${ROOTDIR}etc/postgres ${ROOTDIR}var/lib/postgres/data ${ROOTDIR}usr/local/pgsql/data"
|
|
CONFIG_FILES=$(${FINDBINARY} -L ${FIND_PATHS} -type f -name "*.conf" -print0 2> /dev/null | ${TRBINARY} -cd '[:print:]\0' | ${TRBINARY} -d '\n' | ${TRBINARY} '\0' '\n' | xargs -i sh -c 'test -r "{}" && echo "{}"' | ${SEDBINARY} "s/ /:space:/g")
|
|
for CF in ${CONFIG_FILES}; do
|
|
Report "postgresql_config_file[]=${CF}"
|
|
LogText "Found configuration file (${CF})"
|
|
if IsWorldReadable ${CF}; then
|
|
LogText "Result: configuration file ${CF} is world readable, this might leak sensitive information!"
|
|
ReportWarning "${TEST_NO}" "PostgreSQL configuration file ${CF} is world readable and might leak sensitive details" "${CF}" "Use chmod 600 to change file permissions"
|
|
else
|
|
LogText "Result: great, configuration file ${CF} is not world readable"
|
|
fi
|
|
done
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1840
|
|
# Description : Check if Oracle is being used
|
|
# Notes : tnslsnr: Oracle listener
|
|
# pmon: process monitor
|
|
# smon: system monitor
|
|
# dbwr: database writer
|
|
# lgwr: log writer
|
|
# arch: archiver (optional)
|
|
# ckpt: checkpoint (optional)
|
|
# reco: recovery (optional)
|
|
Register --test-no DBS-1840 --weight L --network NO --category security --description "Checking active Oracle processes"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
FIND=$(${PSBINARY} ax | ${EGREPBINARY} "ora_pmon|ora_smon|tnslsnr" | ${GREPBINARY} -v "grep")
|
|
if [ -z "${FIND}" ]; then
|
|
if [ ${DEBUG} -eq 1 ]; then Display --indent 2 --text "- Oracle processes status" --result "${STATUS_NOT_FOUND}" --color WHITE --debug; fi
|
|
LogText "Result: Oracle process(es) not active"
|
|
else
|
|
Display --indent 2 --text "- Oracle processes status" --result "${STATUS_FOUND}" --color GREEN
|
|
LogText "Result: Oracle is active"
|
|
ORACLE_RUNNING=1
|
|
DATABASE_ENGINE_RUNNING=1
|
|
Report "oracle_running=${ORACLE_RUNNING}"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1842
|
|
# Description : Check Oracle home paths from oratab
|
|
#Register --test-no DBS-1842 --weight L --network NO --category security --description "Checking Oracle home paths"
|
|
#if [ ${SKIPTEST} -eq 0 ]; then
|
|
# if [ -f /etc/oratab ]; then
|
|
# FIND=$(${GREPBINARY} -v "#" /etc/oratab | ${AWKBINARY} -F: "{ print $2 }")
|
|
# fi
|
|
#fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1860
|
|
# Description : Checks if a DB2 instance is currently running
|
|
Register --test-no DBS-1860 --weight L --network NO --category security --description "Checking active DB2 instances"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if IsRunning db2sysc; then
|
|
Display --indent 2 --text "- DB2 instance running" --result "${STATUS_FOUND}" --color GREEN
|
|
LogText "Result: At least one DB2 instance is running"
|
|
DB2_RUNNING=1
|
|
DATABASE_ENGINE_RUNNING=1
|
|
Report "db2_running=${DB2_RUNNING}"
|
|
else
|
|
if [ ${DEBUG} -eq 1 ]; then Display --indent 2 --text "- DB2 instance running" --result "${STATUS_NOT_FOUND}" --color WHITE --debug; fi
|
|
LogText "Result: No DB2 instances are running"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1880
|
|
# Description : Determine if redis is running
|
|
Register --test-no DBS-1880 --weight L --network NO --category security --description "Check for active Redis server"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
if IsRunning redis-server; then
|
|
Display --indent 2 --text "- Redis (server) status" --result "${STATUS_FOUND}" --color GREEN
|
|
LogText "Result: Redis is running"
|
|
REDIS_RUNNING=1
|
|
DATABASE_ENGINE_RUNNING=1
|
|
Report "redis_server_running=${REDIS_RUNNING}"
|
|
else
|
|
if [ ${DEBUG} -eq 1 ]; then Display --indent 2 --text "- Redis (server) status" --result "${STATUS_NOT_FOUND}" --color WHITE --debug; fi
|
|
LogText "Result: No Redis processes are running"
|
|
fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1882
|
|
# Description : Determine Redis configuration
|
|
if [ ${REDIS_RUNNING} -eq 1 ]; then PREQS_METS="YES"; else PREQS_MET="NO"; SKIPREASON="Redis not running"; fi
|
|
Register --test-no DBS-1882 --weight L --network NO --preqs-met "${PREQS_MET}" --skip-reason "${SKIPREASON}" --category security --description "Redis configuration file"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
PATHS="${ROOTDIR}etc/redis ${ROOTDIR}usr/local/etc/redis ${ROOTDIR}usr/local/redis/etc"
|
|
if [ ${QNAP_DEVICE} -eq 1 ]; then
|
|
PATHS="${PATHS} ${ROOTDIR}share/CACHEDEV1_DATA/.qpkg/QKVM/usr/etc/redis.conf"
|
|
fi
|
|
ALLFILES=$(${LSBINARY} ${ROOTDIR}etc/redis.conf 2> /dev/null)
|
|
FOUND=0
|
|
for DIR in ${PATHS}; do
|
|
LogText "Action: scanning directory (${DIR}) for Redis configuration files"
|
|
FILES=$(${LSBINARY} ${DIR}/*.conf 2> /dev/null)
|
|
if [ -n "${FILES}" ]; then
|
|
ALLFILES="${ALLFILES} ${FILES}"
|
|
else
|
|
LogText "Result: no configuration files found in this directory"
|
|
fi
|
|
done
|
|
for CONFFILE in ${ALLFILES}; do
|
|
if FileIsReadable ${CONFFILE}; then
|
|
LogText "Action: checking if ${CONFFILE} is a Sentinel configuration file"
|
|
# Exclude Sentinel configuration file
|
|
FIND=$(${GREPBINARY} "^sentinel " ${CONFFILE})
|
|
if [ -n "${FIND}" ]; then
|
|
LogText "Result: file is a Sentinel configuration file, skipping it"
|
|
else
|
|
LogText "Result: file is NOT a Sentinel configuration file. Now scanning if it is a Redis configuration file"
|
|
FIND=$(${GREPBINARY} "Redis" ${CONFFILE})
|
|
if [ -n "${FIND}" ]; then
|
|
REDIS_CONFIGURATION_FILES="${REDIS_CONFIGURATION_FILES} ${CONFFILE}"
|
|
REDIS_CONFIGURATION_FOUND=1
|
|
LogText "Result: found a Redis configuration file (${CONFFILE})"
|
|
else
|
|
LogText "Result: this file does not look like a Redis file (${CONFFILE})"
|
|
fi
|
|
fi
|
|
else
|
|
LogText "Could not read this file, so skipping it"
|
|
fi
|
|
done
|
|
# Sort the list of discovered configuration files so we can make them unique
|
|
REDIS_CONFIGURATION_FILES=$(echo ${REDIS_CONFIGURATION_FILES} | ${SEDBINARY} 's/^ //' | ${TRBINARY} ' ' '\n' | ${SORTBINARY} -u | ${TRBINARY} '\n' ' ')
|
|
for FILE in ${REDIS_CONFIGURATION_FILES}; do
|
|
if IsWorldReadable ${FILE}; then
|
|
LogText "Result: configuration file ${FILE} is world readable, this might leak sensitive information!"
|
|
ReportWarning "${TEST_NO}" "Redis configuration file ${FILE} is world readable and might leak sensitive details" "${FILE}" "Use chmod 640 to change file permissions"
|
|
else
|
|
LogText "Result: great, configuration file ${FILE} is not world readable"
|
|
fi
|
|
done
|
|
if [ ${REDIS_CONFIGURATION_FOUND} -eq 0 ]; then ReportException "${TEST_NO}" "Found Redis, but no configuration file. Report this if you know where it is located on your system."; fi
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1884
|
|
# Description : Determine Redis configuration option: requirepass
|
|
if [ ${REDIS_RUNNING} -eq 1 -a ${REDIS_CONFIGURATION_FOUND} -eq 1 ]; then PREQS_METS="YES"; else PREQS_MET="NO"; SKIPREASON="Redis not running, or no configuration file found"; fi
|
|
Register --test-no DBS-1884 --weight L --network NO --preqs-met "${PREQS_MET}" --skip-reason "${SKIPREASON}" --category security --description "Redis: requirepass option configured"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
for FILE in ${REDIS_CONFIGURATION_FILES}; do
|
|
if FileIsReadable ${FILE}; then
|
|
if SearchItem "^requirepass" "${FILE}" "--sensitive"; then
|
|
LogText "Result: found 'requirepass' configured"
|
|
AddHP 3 3
|
|
Display --indent 4 --text "- Redis (requirepass configured)" --result "${STATUS_FOUND}" --color GREEN
|
|
Report "redis_requirepass=1"
|
|
else
|
|
AddHP 0 3
|
|
Display --indent 4 --text "- Redis (requirepass configured)" --result "${STATUS_NOT_FOUND}" --color YELLOW
|
|
ReportSuggestion "${TEST_NO}" "Configure the 'requirepass' setting for Redis" "${FILE}" "text:configure 'requirepass' setting in ${FILE}"
|
|
Report "redis_requirepass=0"
|
|
fi
|
|
else
|
|
LogText "Result: test skipped, as we can't read configuration file"
|
|
fi
|
|
done
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1886
|
|
# Description : Determine Redis configuration option: rename-command CONFIG
|
|
if [ ${REDIS_RUNNING} -eq 1 -a ${REDIS_CONFIGURATION_FOUND} -eq 1 ]; then PREQS_METS="YES"; else PREQS_MET="NO"; SKIPREASON="Redis not running, or no configuration found"; fi
|
|
Register --test-no DBS-1886 --weight L --network NO --preqs-met "${PREQS_MET}" --skip-reason "${SKIPREASON}" --category security --description "Redis: rename-command CONFIG used"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
for FILE in ${REDIS_CONFIGURATION_FILES}; do
|
|
if FileIsReadable ${FILE}; then
|
|
if SearchItem "^rename-command CONFIG" "${FILE}" "--sensitive"; then
|
|
LogText "Result: found 'rename-command CONFIG' configured"
|
|
AddHP 3 3
|
|
Display --indent 4 --text "- Redis (rename of CONFIG command)" --result "${STATUS_FOUND}" --color GREEN
|
|
Report "redis_rename_command_config=1"
|
|
else
|
|
AddHP 0 3
|
|
Display --indent 4 --text "- Redis (rename of CONFIG command)" --result "${STATUS_NOT_FOUND}" --color YELLOW
|
|
ReportSuggestion "${TEST_NO}" "Use the 'rename-command CONFIG' setting for Redis" "${FILE}" "text:configure 'rename-command CONFIG' in ${FILE}"
|
|
Report "redis_rename_command_config=0"
|
|
fi
|
|
else
|
|
LogText "Result: test skipped, as we can't read configuration file"
|
|
fi
|
|
done
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
# Test : DBS-1888
|
|
# Description : Determine Redis configuration option: bind on localhost
|
|
if [ ${REDIS_RUNNING} -eq 1 -a ${REDIS_CONFIGURATION_FOUND} -eq 1 ]; then PREQS_METS="YES"; else PREQS_MET="NO"; SKIPREASON="Redis not running, or no configuration found"; fi
|
|
Register --test-no DBS-1888 --weight L --network NO --preqs-met "${PREQS_MET}" --skip-reason "${SKIPREASON}" --category security --description "Redis: bind on localhost"
|
|
if [ ${SKIPTEST} -eq 0 ]; then
|
|
for FILE in ${REDIS_CONFIGURATION_FILES}; do
|
|
if FileIsReadable ${FILE}; then
|
|
if SearchItem "^bind (localhost|127\.)" "${FILE}" "--sensitive"; then
|
|
LogText "Result: found 'bind on localhost' configured"
|
|
AddHP 3 3
|
|
Display --indent 4 --text "- Redis (bind on localhost)" --result "${STATUS_FOUND}" --color GREEN
|
|
Report "redis_bind_localhost=1"
|
|
else
|
|
AddHP 0 3
|
|
Display --indent 4 --text "- Redis (bind on localhost)" --result "${STATUS_NOT_FOUND}" --color YELLOW
|
|
ReportSuggestion "${TEST_NO}" "Use 'bind' setting to listen on localhost for Redis instance" "${FILE}" "text:configure 'bind localhost' in ${FILE}"
|
|
Report "redis_bind_localhost=0"
|
|
fi
|
|
else
|
|
LogText "Result: test skipped, as we can't read configuration file"
|
|
fi
|
|
done
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
if [ ${DATABASE_ENGINE_RUNNING} -eq 0 ]; then
|
|
Display --indent 4 --text "No database engines found"
|
|
fi
|
|
#
|
|
#################################################################################
|
|
#
|
|
|
|
WaitForKeyPress
|
|
|
|
#
|
|
#================================================================================
|
|
# Lynis - Security Auditing and System Hardening for Linux and UNIX - https://cisofy.com
|