2020-11-27 09:22:47 +01:00
|
|
|
# shellcheck shell=bash
|
2019-02-14 18:10:46 +01:00
|
|
|
# run-shellcheck
|
|
|
|
test_audit() {
|
|
|
|
describe Running on blank host
|
|
|
|
register_test retvalshouldbe 0
|
|
|
|
dismiss_count_for_test
|
|
|
|
# shellcheck disable=2154
|
|
|
|
run blank /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
|
|
|
|
2021-01-21 11:02:08 +01:00
|
|
|
if [ -f "/.dockerenv" ]; then
|
|
|
|
skip "SKIPPED on docker"
|
|
|
|
else
|
|
|
|
describe Tests purposely failing
|
|
|
|
sysctl -w net.ipv4.conf.all.accept_source_route=1 net.ipv4.conf.default.accept_source_route=1 net.ipv6.conf.all.accept_source_route=1 net.ipv6.conf.default.accept_source_route=1 2>/dev/null
|
|
|
|
register_test retvalshouldbe 1
|
|
|
|
register_test contain "net.ipv4.conf.all.accept_source_route was not set to 0"
|
|
|
|
register_test contain "net.ipv4.conf.default.accept_source_route was not set to 0"
|
|
|
|
register_test contain "net.ipv6.conf.all.accept_source_route was not set to 0"
|
|
|
|
register_test contain "net.ipv6.conf.default.accept_source was not set to 0"
|
|
|
|
|
|
|
|
run noncompliant /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
|
|
|
|
|
|
|
describe correcting situation
|
|
|
|
sed -i 's/audit/enabled/' /opt/debian-cis/etc/conf.d/"${script}".cfg
|
|
|
|
/opt/debian-cis/bin/hardening/"${script}".sh --apply || true
|
|
|
|
|
|
|
|
describe Checking resolved state
|
|
|
|
register_test retvalshouldbe 0
|
|
|
|
register_test contain "correctly set to 0"
|
|
|
|
register_test contain "net.ipv4.conf.all.accept_source_route correctly set to 0"
|
|
|
|
register_test contain "net.ipv4.conf.default.accept_source_route correctly set to 0"
|
|
|
|
register_test contain "net.ipv6.conf.all.accept_source_route correctly set to 0"
|
|
|
|
register_test contain "net.ipv6.conf.default.accept_source correctly set to 0"
|
|
|
|
run resolved /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
|
|
|
fi
|
2019-02-14 18:10:46 +01:00
|
|
|
}
|