2020-11-27 09:22:47 +01:00
|
|
|
# shellcheck shell=bash
|
2019-02-14 18:10:46 +01:00
|
|
|
# run-shellcheck
|
|
|
|
test_audit() {
|
|
|
|
describe Running on blank host
|
2020-10-29 11:18:31 +01:00
|
|
|
register_test retvalshouldbe 1
|
|
|
|
register_test contain "openssh-server is installed"
|
2019-02-14 18:10:46 +01:00
|
|
|
# shellcheck disable=2154
|
|
|
|
run blank /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
2020-12-04 14:08:01 +01:00
|
|
|
|
2021-04-27 16:04:13 +02:00
|
|
|
echo "MaxAuthTries 2" >>/etc/ssh/sshd_config
|
|
|
|
|
|
|
|
describe Running restrictive
|
|
|
|
register_test retvalshouldbe 0
|
|
|
|
register_test contain "[ OK ] 2 is lower than recommended 4"
|
|
|
|
run restrictive /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
|
|
|
|
|
|
|
# delete last line
|
|
|
|
sed -i '$ d' /etc/ssh/sshd_config
|
|
|
|
echo "MaxAuthTries 6" >>/etc/ssh/sshd_config
|
|
|
|
|
|
|
|
describe Running too permissive
|
|
|
|
register_test retvalshouldbe 1
|
|
|
|
register_test contain "[ KO ] 6 is higher than recommended 4"
|
|
|
|
run permissive /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
|
|
|
|
2020-10-29 11:18:31 +01:00
|
|
|
describe Correcting situation
|
|
|
|
# `apply` performs a service reload after each change in the config file
|
|
|
|
# the service needs to be started for the reload to succeed
|
|
|
|
service ssh start
|
|
|
|
# if the audit script provides "apply" option, enable and run it
|
|
|
|
sed -i 's/audit/enabled/' /opt/debian-cis/etc/conf.d/"${script}".cfg
|
|
|
|
/opt/debian-cis/bin/hardening/"${script}".sh || true
|
2019-02-14 18:10:46 +01:00
|
|
|
|
2020-10-29 11:18:31 +01:00
|
|
|
describe Checking resolved state
|
|
|
|
register_test retvalshouldbe 0
|
|
|
|
register_test contain "[ OK ] ^MaxAuthTries[[:space:]]*4 is present in /etc/ssh/sshd_config"
|
|
|
|
run resolved /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
|
2019-02-14 18:10:46 +01:00
|
|
|
}
|