• linux安全配置检查脚本_v0.8


    脚本环境:RHEL6.*

    脚本说明:该脚本作用为纯执行检测不涉及更改配置等操作,与直接上来就改安全配置等基线脚本相比相对安全一些。虽然如此,在你执行该脚本之前仍然建议你备份或快照一下目标系统。

    代码部分:

    #! /bin/bash
    cat <<EOF
    *************************************************************************
    linux安全配置扫描脚本:
    1. 输出结果也可以在当前目录的out.txt中查看
    2. 检查范围:
     -》账号策略检查
     -》账号注销检查
     -》GRUB密码检查
     -》LILO密码检查
     -》非root账号但UID为0的用户检查
     -》/etc/profile中umask默认值检查
     -》/etc/csh.cshrc中umask默认值检查
     -》/etc/bashrc中umask默认值检查
     -》重要文件权限检查
     -》内核文件dump配置检查
    
    *************************************************************************
    EOF
    rm -rf ./out.txt
    echo -e "
    "
    echo "[1] 账号策略检查中..."
    passmax=`cat /etc/login.defs | grep PASS_MAX_DAYS | grep -v ^# | awk '{print $2}'`
    passmin=`cat /etc/login.defs | grep PASS_MIN_DAYS | grep -v ^# | awk '{print $2}'`
    passlen=`cat /etc/login.defs | grep PASS_MIN_LEN | grep -v ^# | awk '{print $2}'`
    passage=`cat /etc/login.defs | grep PASS_WARN_AGE | grep -v ^# | awk '{print $2}'`
    if [ $passmax -le 90 -a $passmax -gt 0 ];then
    echo " [OK]口令生存周期为${passmax}天,符合要求" >> out.txt
    else
    echo " [ X ] 口令生存周期为${passmax}天,不符合要求,建议设置不大于90天" >> out.txt
    fi
    if [ $passmin -ge 6 ];then
    echo " [OK]口令更改最小时间间隔为${passmin}天,符合要求" >> out.txt
    else
    echo " [ X ] 口令更改最小时间间隔为${passmin}天,不符合要求,建议设置大于等于6天" >> out.txt
    fi
    if [ $passlen -ge 8 ];then
    echo " [OK]口令最小长度为${passlen},符合要求" >> out.txt
    else
    echo " [ X ] 口令最小长度为${passlen},不符合要求,建议设置最小长度大于等于8" >> out.txt
    fi
    if [ $passage -ge 30 -a $passage -lt $passmax ];then
    echo " [OK]口令过期警告时间天数为${passage},符合要求" >> out.txt
    else
    echo " [ X ] 口令过期警告时间天数为${passage},不符合要求,建议设置大于等于30并小于口令生存周期" >> out.txt
    fi
    echo "..."
    echo 'check over'
    echo -e "
    "
    echo "[2] 账号注销检查中..."
    TMOUT=`cat /etc/profile | grep TMOUT | awk -F[=] '{print $2}'`
    if [ ! $TMOUT ];then
    echo " [ X ] 账号超时不存在自动注销,不符合要求,建议设置小于600秒" >> out.txt
    else
    if [ $TMOUT -le 600 -a $TMOUT -ge 10 ] ; then
    echo " [ √ ] 账号超时时间${TMOUT}秒,符合要求" >> out.txt
    else
    echo " [ X ] 账号超时时间$TMOUT秒,不符合要求,建议设置小于600秒" >> out.txt
    fi
    fi
    echo "..."
    echo 'check over'
    echo -e "
    "
    echo "[3] GRUB密码检查中..."
    grup_pwd=`cat /etc/grub.conf | grep -v ^# | grep password 2> /dev/null`
    if [ $? -eq 0 ];then
    echo " [ √ ] 已设置grub密码,符合要求" >> out.txt
    else
    echo " [ X ] 没有设置grub密码,不符合要求,建议设置grub密码" >> out.txt
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    echo "[4] LILO密码检查中..."
    if [ ! -f /etc/lilo.conf ] ; then
    echo " [ √ ] lilo.conf配置文件不存在,系统可能不是通过LILO引导" >> out.txt
    else
    lilo_pwd=`cat /etc/lilo.conf | grep -v ^# | grep password &> /dev/null`
    if [ $? -eq 0 ];then
    echo " [ √ ] 已设置lilo密码,符合要求" >> out.txt
    else
    echo " [ X ] 没有设置lilo密码,不符合要求,建议设置lilo密码(操作有风险,需慎重!)" >> out.txt
    fi
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    echo "[5] 非root账号但UID为0的用户检查中..."
    UIDS=`awk -F[:] 'NR!=1{print $3}' /etc/passwd`
    flag=0
    for i in $UIDS
    do
      if [ $i = 0 ];then
         flag=1
      fi
    done
      if [ $flag != 1 ];then
        echo " [ √ ] 不存在root账号外的UID为0的异常用户" >> out.txt
      else
        echo " [ X ] 存在非root但UID为0的异常用户,请立刻进行排查" >> out.txt
      fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    echo "[6] /etc/profile中umask默认值检查中..."
    umask1=`cat /etc/profile | grep umask | grep -v '^#' | awk '{print $2}'`
    flags=0
    
    for i in $umask1
    do
      if [ $i = "027" ];then
        flags=1
      fi
    done
    if [ $flags = 1 ];then
      echo " [ √ ] /etc/profile文件中所设置的umask为${i},符合要求" >> out.txt
    else
      echo " [ X ] /etc/profile文件中所设置的umask为${i},不符合要求" >> out.txt
      echo "      【理论上建议设置值为027,但因系统重要程度不同请根据具体情况慎重操作,如不确定请暂忽略此项】" >> out.txt
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    
    echo "[7] /etc/csh.cshrc中umask默认值检查中..."
    umask2=`cat /etc/csh.cshrc | grep umask | grep -v '^#' | awk '{print $2}'`
    flags=0
    
    for i in $umask2
    do
      if [ $i = "027" ];then
        flags=1
      fi
    done
    if [ $flags = 1 ];then
      echo " [ √ ] /etc/csh.cshrc文件中所设置的umask为${i},符合要求" >> out.txt
    else
      echo " [ X ] /etc/csh.cshrc文件中所设置的umask为${i},不符合要求" >> out.txt
      echo "      【理论上建议设置值为027,但因系统重要程度不同请根据具体情况慎重操作,如不确定请暂忽略此项】" >> out.txt
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    
    echo "[8] /etc/bashrc中umask默认值检查中..."
    umask3=`cat /etc/bashrc | grep umask | grep -v '^    #' | awk '{print $2}'`
    flags=0
    
    for i in $umask3
    do
      if [ $i = "027" ];then
        flags=1
      fi
    done
    if [ $flags = 1 ];then
      echo " [ √ ] /etc/bashrc文件中所设置的umask为${i},符合要求" >> out.txt
    else
      echo " [ X ] /etc/bashrc文件中所设置的umask为${i},不符合要求" >> out.txt
      echo "      【理论上建议设置值为027,但因系统重要程度不同请根据具体情况慎重操作,如不确定请暂忽略此项】" >> out.txt
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    
    echo "[9] 重要文件权限检查中..."
    file1=`ls -l /etc/passwd | awk '{print $1}'`
    if [ $file1 = "-rw-r--r--." ];then
      echo " [ √ ] /etc/passwd文件权限为644,符合要求" >> out.txt
    else
      echo " [ X ] /etc/passwd文件权限为[$file1.],不符合要求" >> out.txt
    fi
    
    file2=`ls -l /etc/shadow | awk '{print $1}'`
    if [ $file2 = "-rw-r--r--." ] || [ $file2 = "----------." ];then
      echo " [ √ ] /etc/shadow文件权限为400或000,符合要求" >> out.txt
    else
      echo " [ X ] /etc/shadow文件权限为${file2},不符合要求" >> out.txt
    fi
    
    file3=`ls -l /etc/group | awk '{print $1}'`
    if [ $file3 = "-rw-r--r--." ];then
      echo " [ √ ] /etc/group文件权限为644,符合要求" >> out.txt
    else
      echo " [ X ] /etc/group文件权限为$file3,不符合要求" >> out.txt
    fi
    
    file4=`ls -l /etc/securetty | awk '{print $1}'`
    if [ $file4 = "-rw-------." ];then
      echo " [ √ ] /etc/security文件权限为600,符合要求" >> out.txt
    else
      echo " [ X ] /etc/security文件权限不为600,不符合要求,建议设置权限为600" >> out.txt
    fi
    
    file5=`ls -l /etc/services | awk '{print $1}'`
    if [ $file5 = "-rw-r--r--." ];then
      echo " [ √ ] /etc/services文件权限为644,符合要求" >> out.txt
    else
      echo " [ X ] /etc/services文件权限不为644,不符合要求,建议设置权限为644" >> out.txt
    fi
    
    file6=`ls -l /etc/xinetd.conf | awk '{print $1}'`
    if [ !-f $file6 ];then
      echo " [ √ ] /etc/xinetd.conf文件不存在,暂略此项" >> out.txt
    else
      if [ $file6 = "-rw-------." ];then
        echo " [ √ ] /etc/xinetd.conf文件权限为600,符合要求" >> out.txt
      else
        echo " [ X ] /etc/xinetd.conf文件权限不为600,不符合要求,建议设置权限为600" >> out.txt
      fi
    fi
    
    file7=`ls -l /etc/grub.conf | awk '{print $1}'`
    if [ $file7 = "-rw-------." ];then
      echo " [ √ ] /etc/grub.conf文件权限为600,符合要求" >> out.txt
    else
      echo " [ X ] /etc/grub.conf文件权限为$file7,不符合要求,建议设置权限为600" >> out.txt
    fi
    
    file8=`ls -l /etc/lilo.conf | awk '{print $1}'`
    if [ -f /etc/lilo.conf ];then
      if [ $file8 = "-rw-------" ];then
        echo " [ √ ] /etc/lilo.conf文件权限为600,符合要求" >> out.txt
      else
        echo " [ X ] /etc/lilo.conf文件权限不为600,不符合要求,建议设置权限为600" >> out.txt
      fi
    else
      echo " [ √ ] /etc/lilo.conf文件不存在,暂略此项" >> out.txt
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    
    echo "[10] 内核文件dump配置检查中..."
    cat /etc/security/limits.conf | grep -v ^# | grep core
    if [ $? = 0 ];then
      #soft=`cat /etc/security/limits.conf| grep -V ^# | grep core | awk {print $2}`
      soft=`cat /etc/security/limits.conf| grep -v '^#' | awk '{print $2}'` &> /dev/null
      for i in $soft
      do
        if [ $i = "soft" ];then
          echo -e " [ √ ] 内核文件dump配置检查[*	soft	core	0]已经设置" >> out.txt
        fi
        if [ $i = "hard" ];then
          echo -e " [ √ ] 内核文件dump配置检查[*	hard	core	0]已经设置" >> out.txt 
        fi
      done
    else
      echo -e " [ X ] 没有设置core,建议在/etc/security/limits.conf中添加[*	soft	core	0]和[*	hard	core	0]" >> out.txt
    fi
    echo "..."
    echo "check over"
    echo -e "
    "
    
    
    echo "--------------------------------------------------------------------------"
    echo ""
    echo "扫描结果:"
    echo ""
    cat ./out.txt
    echo ""
    echo "--------------------------------------------------------------------------"
    echo ""

     执行结果:

    [root@localhost ~]# ./linuxCheck.sh 
    *************************************************************************
    linux安全配置扫描脚本:
    1. 输出结果也可以在当前目录的out.txt中查看
    2. 检查范围:
     -》账号策略检查
     -》账号注销检查
     -》GRUB密码检查
     -》LILO密码检查
     -》非root账号但UID为0的用户检查
     -》/etc/profile中umask默认值检查
     -》/etc/csh.cshrc中umask默认值检查
     -》/etc/bashrc中umask默认值检查
     -》重要文件权限检查
     -》内核文件dump配置检查
    
    *************************************************************************
    
    
    [1] 账号策略检查中...
    ...
    check over
    
    
    [2] 账号注销检查中...
    ...
    check over
    
    
    [3] GRUB密码检查中...
    ...
    check over
    
    
    [4] LILO密码检查中...
    ...
    check over
    
    
    [5] 非root账号但UID为0的用户检查中...
    ...
    check over
    
    
    [6] /etc/profile中umask默认值检查中...
    ...
    check over
    
    
    [7] /etc/csh.cshrc中umask默认值检查中...
    ...
    check over
    
    
    [8] /etc/bashrc中umask默认值检查中...
    ...
    check over
    
    
    [9] 重要文件权限检查中...
    ls: cannot access /etc/xinetd.conf: No such file or directory
    ls: cannot access /etc/lilo.conf: No such file or directory
    ...
    check over
    
    
    [10] 内核文件dump配置检查中...
    * soft    core            0
    ...
    check over
    
    
    --------------------------------------------------------------------------
    
    扫描结果:
    
     [ X ] 口令生存周期为99999天,不符合要求,建议设置不大于90天
     [ X ] 口令更改最小时间间隔为0天,不符合要求,建议设置大于等于6天
     [ X ] 口令最小长度为5,不符合要求,建议设置最小长度大于等于8
     [ X ] 口令过期警告时间天数为7,不符合要求,建议设置大于等于30并小于口令生存周期
     [ X ] 账号超时不存在自动注销,不符合要求,建议设置小于600秒
     [ √ ] 已设置grub密码,符合要求
     [ √ ] lilo.conf配置文件不存在,系统可能不是通过LILO引导
     [ √ ] 不存在root账号外的UID为0的异常用户
     [ X ] /etc/profile文件中所设置的umask为022,不符合要求
          【理论上建议设置值为027,但因系统重要程度不同请根据具体情况慎重操作,如不确定请暂忽略此项】
     [ X ] /etc/csh.cshrc文件中所设置的umask为022,不符合要求
          【理论上建议设置值为027,但因系统重要程度不同请根据具体情况慎重操作,如不确定请暂忽略此项】
     [ X ] /etc/bashrc文件中所设置的umask为022,不符合要求
          【理论上建议设置值为027,但因系统重要程度不同请根据具体情况慎重操作,如不确定请暂忽略此项】
     [ √ ] /etc/passwd文件权限为644,符合要求
     [ √ ] /etc/shadow文件权限为400或000,符合要求
     [ √ ] /etc/group文件权限为644,符合要求
     [ √ ] /etc/security文件权限为600,符合要求
     [ √ ] /etc/services文件权限为644,符合要求
     [ √ ] /etc/xinetd.conf文件不存在,暂略此项
     [ X ] /etc/grub.conf文件权限为lrwxrwxrwx.,不符合要求,建议设置权限为600
     [ √ ] /etc/lilo.conf文件不存在,暂略此项
     [ √ ] 内核文件dump配置检查[*    soft    core    0]已经设置
     [ √ ] 内核文件dump配置检查[*    hard    core    0]已经设置
    
    --------------------------------------------------------------------------
  • 相关阅读:
    log4c demo
    c连接redis
    1108. IP 地址无效化
    1295. 统计位数为偶数的数字
    LCP 1. 猜数字
    1281. 整数的各位积和之差
    1313. 解压缩编码列表
    仿射变换及其变换矩阵的理解
    RNN 与 LSTM 的原理详解
    网络深度对深度学习模型性能有什么影响?
  • 原文地址:https://www.cnblogs.com/tdcqma/p/7920301.html
Copyright © 2020-2023  润新知