#!/bin/sh ################################################################################# # # Lynis # ------------------ # # Copyright 2007-2013, Michael Boelen # Copyright 2007-2018, CISOfy # # Website : https://cisofy.com # Blog : http://linux-audit.com # GitHub : https://github.com/CISOfy/lynis # # Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are # welcome to redistribute it under the terms of the GNU General Public License. # See LICENSE file for usage of this software. # ################################################################################# # InsertSection "Hardening" # COMPILER_INSTALLED is initialised before HARDEN_COMPILERS_NEEDED=0 # ################################################################################# # # Test : HRDN-7220 # Description : Check for installed compilers # Notes : No suggestion for hardening compilers, as HRDN-7222 will take care of that Register --test-no HRDN-7220 --weight L --network NO --category security --description "Check if one or more compilers are installed" if [ ${SKIPTEST} -eq 0 ]; then LogText "Test: Check if one or more compilers can be found on the system" if [ ${COMPILER_INSTALLED} -eq 0 ]; then LogText "Result: no compilers found" Display --indent 4 --text "- Installed compiler(s)" --result "${STATUS_NOT_FOUND}" --color GREEN AddHP 3 3 else LogText "Result: found installed compiler. See top of logfile which compilers have been found or use ${GREPBINARY} to filter on 'compiler'" Display --indent 4 --text "- Installed compiler(s)" --result "${STATUS_FOUND}" --color RED AddHP 1 3 fi fi # ################################################################################# # # Test : HRDN-7222 # Description : Check for permissions of installed compilers Register --test-no HRDN-7222 --weight L --network NO --category security --description "Check compiler permissions" if [ ${SKIPTEST} -eq 0 ]; then LogText "Test: Check if one or more compilers can be found on the system" HARDEN_COMPILERS_NEEDED=0 if [ ${COMPILER_INSTALLED} -eq 0 ]; then LogText "Result: no compilers found" else # as if [ ! -z "${ASBINARY}" ]; then LogText "Test: Check file permissions for as (Assembler)" if IsWorldExecutable ${ASBINARY}; then LogText "Binary: found ${ASBINARY} (world executable)" Report "compiler_world_executable[]=${ASBINARY}" AddHP 2 3 HARDEN_COMPILERS_NEEDED=1 else AddHP 3 3 fi fi # gcc if [ ! -z "${GCCBINARY}" ]; then LogText "Test: Check file permissions for GCC compiler" if IsWorldExecutable ${GCCBINARY}; then LogText "Binary: found ${GCCBINARY} (world executable)" Report "compiler_world_executable[]=${GCCBINARY}" AddHP 2 3 HARDEN_COMPILERS_NEEDED=1 else AddHP 3 3 fi fi # Report suggestion is one or more compilers can be better hardened if [ ${HARDEN_COMPILERS_NEEDED} -eq 1 ]; then LogText "Result: at least one compiler could be better hardened by restricting executable access to root or group only" ReportSuggestion ${TEST_NO} "Harden compilers like restricting access to root user only" fi # TODO check if compilers have a specific group (like compiler, or NOT root/wheel) # Display --indent 4 --text "- Installed compiler(s)" --result "${STATUS_FOUND}" --color RED # /usr/bin/*cc* # /usr/bin/*++* # /usr/bin/ld # (and 700 or 750 permissions) fi fi # ################################################################################# # # Test : HRDN-7230 # Description : Check for installed malware scanners Register --test-no HRDN-7230 --weight L --network NO --category security --description "Check for malware scanner" if [ ${SKIPTEST} -eq 0 ]; then LogText "Test: Check if a malware scanner is installed" if [ ${MALWARE_SCANNER_INSTALLED} -eq 1 ]; then LogText "Result: found at least one malware scanner" Display --indent 4 --text "- Installed malware scanner" --result "${STATUS_FOUND}" --color GREEN AddHP 3 3 else LogText "Result: no malware scanner found" if [ "${MACHINE_ROLE}" = "personal" ]; then Display --indent 4 --text "- Installed malware scanner" --result "${STATUS_NOT_FOUND}" --color YELLOW else Display --indent 4 --text "- Installed malware scanner" --result "${STATUS_NOT_FOUND}" --color RED fi ReportSuggestion ${TEST_NO} "Harden the system by installing at least one malware scanner, to perform periodic file system scans" "-" "Install a tool like rkhunter, chkrootkit, OSSEC" AddHP 1 3 LogText "Result: no malware scanner found" fi fi # ################################################################################# # # LogText "--------------------------------------------------------------------" # LogText "| System part | Preferred value | Actual value | Points |" # LogText "| [!] Compiler installed | 0 | [${COMPILER_INSTALLED}] | x |" # LogText "| [V] Malware scanner installed | 1 | [x] | x |" # LogText "| [V] Packet filter enabled | 1 | [x] | x |" # LogText "--------------------------------------------------------------------" # LogText "| [!]: Hardening possible, [V]: Hardening performed, [ ]: Unknown " # LogText "--------------------------------------------------------------------" # ################################################################################# # Report "compiler_installed=${COMPILER_INSTALLED}" WaitForKeyPress # #================================================================================ # Lynis - Security Auditing and System Hardening for Linux and UNIX - https://cisofy.com