2020-11-27 09:22:47 +01:00
# shellcheck shell=bash
2019-02-14 18:10:46 +01:00
# run-shellcheck
test_audit( ) {
describe Running on blank host
2020-10-29 11:18:31 +01:00
register_test retvalshouldbe 1
register_test contain "openssh-server is installed"
2019-02-14 18:10:46 +01:00
# shellcheck disable=2154
run blank /opt/debian-cis/bin/hardening/" ${ script } " .sh --audit-all
2020-10-29 11:18:31 +01:00
describe Correcting situation
# `apply` performs a service reload after each change in the config file
# the service needs to be started for the reload to succeed
service ssh start
# if the audit script provides "apply" option, enable and run it
sed -i 's/audit/enabled/' /opt/debian-cis/etc/conf.d/" ${ script } " .cfg
/opt/debian-cis/bin/hardening/" ${ script } " .sh || true
describe Checking resolved state
register_test retvalshouldbe 0
register_test contain "[ OK ] ^Ciphers[[:space:]]*chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr is present in /etc/ssh/sshd_config"
run resolved /opt/debian-cis/bin/hardening/" ${ script } " .sh --audit-all
2019-02-14 18:10:46 +01:00
}