fix: enhance test 99.1.3 speed for large /etc/sudoers.d folders (#188)

Signed-off-by: Stephane Lesimple <stephane.lesimple@corp.ovh.com>
This commit is contained in:
Stéphane Lesimple 2023-07-18 17:28:35 +02:00 committed by GitHub
parent a6ad528087
commit 6135c3d0e5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 26 additions and 66 deletions

View File

@ -23,56 +23,39 @@ DIRECTORY="/etc/sudoers.d"
# improves readability in audit report # improves readability in audit report
REGEX="ALL = \( ALL( : ALL)? \)( NOPASSWD:)? ALL" REGEX="ALL = \( ALL( : ALL)? \)( NOPASSWD:)? ALL"
EXCEPT="" EXCEPT=""
MAX_FILES_TO_LOG=0
# This function will be called if the script status is on enabled / audit mode # This function will be called if the script status is on enabled / audit mode
audit() { audit() {
# expand spaces to [[:space:]]* # expand spaces to [[:space:]]*
# shellcheck disable=2001 # shellcheck disable=2001
REGEX="$(echo "$REGEX" | sed 's/ /[[:space:]]*/g')" REGEX="$(echo "$REGEX" | sed 's/ /[[:space:]]*/g')"
matched_files=""
local skiplog # check for pattern in $FILE
skiplog=0 if $SUDO_CMD grep -Eq "$REGEX" "$FILE"; then
if [ $MAX_FILES_TO_LOG != 0 ]; then # Will log/warn below, once we've scanned everything,
# if we have more than $MAX_FILES_TO_LOG files in $DIRECTORY, we'll reduce # because we must also check for patterns that are excused
# logging in the loop, to avoid flooding the logs and getting timed out matched_files="$FILE"
local nbfiles elif [ $? -gt 1 ]; then
# shellcheck disable=2012 # (find is too slow and calls fstatat() for each file) # ret > 1 means other grep error we must report
nbfiles=$(ls -f "$DIRECTORY" | wc -l) crit "Couldn't grep for pattern in $FILE"
if [ "$nbfiles" -gt "$MAX_FILES_TO_LOG" ]; then else
skiplog=1 # no match, it's ok
info "Found $nbfiles files in $DIRECTORY (> $MAX_FILES_TO_LOG), we won't log every file we check" :
fi
fi fi
FILES="" # check for pattern in whole $DIRECTORY
if $SUDO_CMD [ ! -r "$FILE" ]; then
crit "$FILE is not readable"
return
fi
FILES="$FILE"
if $SUDO_CMD [ ! -d "$DIRECTORY" ]; then if $SUDO_CMD [ ! -d "$DIRECTORY" ]; then
debug "$DIRECTORY does not exist" debug "$DIRECTORY does not exist"
elif $SUDO_CMD [ ! -x "$DIRECTORY" ]; then elif $SUDO_CMD [ ! -x "$DIRECTORY" ]; then
crit "Cannot browse $DIRECTORY" crit "Cannot browse $DIRECTORY"
else else
FILES="$FILES $($SUDO_CMD ls -1 $DIRECTORY | sed s=^=$DIRECTORY/=)" info "Will check for $($SUDO_CMD ls -f "$DIRECTORY" | wc -l) files within $DIRECTORY"
matched_files="$matched_files $($SUDO_CMD grep -REl "$REGEX" "$DIRECTORY" || true)"
fi fi
for file in $FILES; do
if $SUDO_CMD [ ! -r "$file" ]; then # now check for pattern exceptions, and crit for each file otherwise
debug "$file is not readable, but it might just have disappeared since we've listed the folder contents, re-check that it exists" for file in $matched_files; do
if $SUDO_CMD [ -e "$file" ]; then
crit "$file is not readable"
else
debug "$file has disappeared, ignore it"
continue
fi
else
if ! $SUDO_CMD grep -E "$REGEX" "$file" &>/dev/null; then
if [ $skiplog = 0 ]; then
ok "There is no carte-blanche sudo permission in $file"
fi
else
RET=$($SUDO_CMD grep -E "$REGEX" "$file" | sed 's/\t/#/g;s/ /#/g') RET=$($SUDO_CMD grep -E "$REGEX" "$file" | sed 's/\t/#/g;s/ /#/g')
for line in $RET; do for line in $RET; do
if grep -q "$(echo "$line" | cut -d '#' -f 1)" <<<"$EXCEPT"; then if grep -q "$(echo "$line" | cut -d '#' -f 1)" <<<"$EXCEPT"; then
@ -83,10 +66,7 @@ audit() {
# shellcheck disable=2001 # shellcheck disable=2001
crit "$(echo "$line" | sed 's/#/ /g') is present in $file" crit "$(echo "$line" | sed 's/#/ /g') is present in $file"
done done
fi
fi
done done
} }
# This function will be called if the script status is on enabled mode # This function will be called if the script status is on enabled mode
@ -101,13 +81,6 @@ status=audit
# Put EXCEPTION account names here, space separated # Put EXCEPTION account names here, space separated
EXCEPT="root %root %sudo %wheel" EXCEPT="root %root %sudo %wheel"
# If we find more than this amount of files in sudoers.d/,
# we'll reduce the logging in the loop to avoid getting
# timed out because we spend too much time logging.
# Using 0 disables this feature and will never reduce the
# logging, regardless of the number of files.
MAX_FILES_TO_LOG=0
EOF EOF
} }
# This function will check config parameters required # This function will check config parameters required

View File

@ -28,19 +28,6 @@ test_audit() {
register_test contain "[ OK ] jeantestuser ALL = (ALL) NOPASSWD:ALL is present in /etc/sudoers.d/jeantestuser but was EXCUSED because jeantestuser is part of exceptions" register_test contain "[ OK ] jeantestuser ALL = (ALL) NOPASSWD:ALL is present in /etc/sudoers.d/jeantestuser but was EXCUSED because jeantestuser is part of exceptions"
run userexcept /opt/debian-cis/bin/hardening/"${script}".sh --audit-all run userexcept /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
# testing the MAX_FILES_TO_LOG config option
echo 'MAX_FILES_TO_LOG=1' >>/opt/debian-cis/etc/conf.d/"${script}".cfg
describe Testing with MAX_FILES_TO_LOG=1
register_test retvalshouldbe 0
register_test contain "won't log every file we check"
run maxlogfiles_1 /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
echo 'MAX_FILES_TO_LOG=9999' >>/opt/debian-cis/etc/conf.d/"${script}".cfg
describe Testing with MAX_FILES_TO_LOG=9999
register_test retvalshouldbe 0
register_test contain "There is no carte-blanche sudo permission in"
run maxlogfiles_9999 /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
rm -f /etc/sudoers.d/jeantestuser rm -f /etc/sudoers.d/jeantestuser
userdel jeantestuser userdel jeantestuser
} }