From dbc24bb8d74a41bad9e813112616e72d190fc4a5 Mon Sep 17 00:00:00 2001 From: "thibault.dewailly" Date: Sat, 16 Apr 2016 15:10:14 +0200 Subject: [PATCH] 13.1_remove_empry_password_field.sh --- .../13.1_remove_empry_password_field.sh | 60 +++++++++++++++++++ .../13.1_remove_empry_password_field.cfg | 2 + etc/hardening.cfg | 2 +- 3 files changed, 63 insertions(+), 1 deletion(-) create mode 100755 bin/hardening/13.1_remove_empry_password_field.sh create mode 100644 etc/conf.d/13.1_remove_empry_password_field.cfg diff --git a/bin/hardening/13.1_remove_empry_password_field.sh b/bin/hardening/13.1_remove_empry_password_field.sh new file mode 100755 index 0000000..db05a19 --- /dev/null +++ b/bin/hardening/13.1_remove_empry_password_field.sh @@ -0,0 +1,60 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# Authors : Thibault Dewailly, OVH +# + +# +# 13.1 Ensure Password Fields are Not Empty (Scored) +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +FILE='/etc/shadow' + +# This function will be called if the script status is on enabled / audit mode +audit () { + info "Checking if accounts have empty passwords" + RESULT=$(/bin/cat $FILE | /usr/bin/awk -F: '($2 == "" ) { print $1 }') + if [ ! -z "$RESULT" ]; then + crit "Some accounts have empty passwords" + crit $RESULT + else + ok "All accounts have a password" + fi +} + +# This function will be called if the script status is on enabled mode +apply () { + RESULT=$(/bin/cat $FILE | /usr/bin/awk -F: '($2 == "" ) { print $1 }') + if [ ! -z "$RESULT" ]; then + warn "Some accounts have empty passwords" + for ACCOUNT in $RESULT; do + info "Locking $ACCOUNT" + passwd -l $ACCOUNT >/dev/null 2>&1 + done + else + ok "All accounts have a password" + fi +} + +# This function will check config parameters required +check_config() { + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/etc/conf.d/13.1_remove_empry_password_field.cfg b/etc/conf.d/13.1_remove_empry_password_field.cfg new file mode 100644 index 0000000..e1e4502 --- /dev/null +++ b/etc/conf.d/13.1_remove_empry_password_field.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=enabled diff --git a/etc/hardening.cfg b/etc/hardening.cfg index d7cbc71..2697cd8 100644 --- a/etc/hardening.cfg +++ b/etc/hardening.cfg @@ -4,6 +4,6 @@ # Valid values are debug info ok warning error LOGLEVEL=debug -# Backup directory, every file touched by hardennign will be backuped here, with versionning +# Backup directory, every file modified by hardening will be backuped here, with versionning # Means that if a file is modified more than once during the process, you will have hardening step diffs in the folder BACKUPDIR="$CIS_ROOT_DIR/tmp/backups"