首頁>技術>

概述

今天主要分享一個Linux主機安全基線指令碼,僅供參考。

基線檢查內容:

[1] 賬號策略檢查

[2] 登入超時檢查

[3] 特權使用者檢查

[4] 空登入口令使用者檢查

[5] sudo許可權使用者檢查

[6] 使用者預設許可權檢查

[7] 系統關鍵目錄許可權檢查

[8] ssh配置檢查

[9] 系統ping服務檢查

[10] 系統telnet服務檢查

[11] 遠端連線的安全性配置檢查

[12] 異常隱含檔案檢查

[13] syslog登入事件檢查

[14] 日誌稽核功能檢查

[15] 系統core dump狀態檢查

安全基線檢查指令碼
#! /bin/bash ####################################### linux主機安全基線檢查# copyright by hwb# date:2020-12-17######################################scanner_time=`date '+%Y-%m-%d_%H:%M:%S'`scanner_log="/tmp/checkResult_${scanner_time}.log"uptime=$(uptime | sed 's/.*up \([^,]*\), .*/\1/')#呼叫函式庫[ -f /etc/init.d/functions ] && source /etc/init.d/functionsexport PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/root/binsource /etc/profile#Require root to run this script.[ $(id -u) -gt 0 ] && echo "請用root使用者執行此指令碼!" && exit 1#報錯日誌記錄[ -f ${scanner_log} ] || touch ${scanner_log}function getSystemStatus(){    echo ""    if [ -e /etc/sysconfig/i18n ];then        default_LANG="$(grep "LANG=" /etc/sysconfig/i18n | grep -v "^#" | awk -F '"' '{print $2}')"    else        default_LANG=$LANG    fi    export LANG="en_US.UTF-8"    Release=$(cat /etc/redhat-release 2>/dev/null)    Kernel=$(uname -r)    OS=$(uname -o)    Hostname=$(uname -n)    SELinux=$(/usr/sbin/sestatus | grep "SELinux status: " | awk '{print $3}')    LastReboot=$(who -b | awk '{print $3,$4}')    uptime=$(uptime | sed 's/.*up \([^,]*\), .*/\1/')    echo "     系統:$OS"    echo " 發行版本:$Release"    echo "     核心:$Kernel"    echo "   主機名:$Hostname"    echo "  SELinux:$SELinux"    echo "語言/編碼:$default_LANG"    echo " 掃描時間:$(date +'%F %T')"    echo " 最後啟動:$LastReboot"    echo " 執行時間:$uptime"    export LANG="$default_LANG"}bk_safe(){  echo ""  echo -e "\033[33m********************************Linux主機安全基線檢查***********************************\033[0m"  echo ""  echo -e "\033[36m 輸出結果"/tmp/bk_safe_$scanner_time.txt" \033[0m"  echo ""    echo "" >> ${scanner_log}  echo "***********************`hostname -s` 主機安全檢查結果********************************"  >> ${scanner_log}  getSystemStatus >> ${scanner_log}   echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`賬號策略檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[1] 賬號策略檢查中..." /bin/true    passmax=`cat /etc/login.defs | grep PASS_MAX_DAYS | grep -v ^# | awk '{print $2}'`  passmin=`cat /etc/login.defs | grep PASS_MIN_DAYS | grep -v ^# | awk '{print $2}'`  passlen=`cat /etc/login.defs | grep PASS_MIN_LEN | grep -v ^# | awk '{print $2}'`  passage=`cat /etc/login.defs | grep PASS_WARN_AGE | grep -v ^# | awk '{print $2}'`  if [ $passmax -le 90 -a $passmax -gt 0 ];then    echo "[Y] 口令生存週期為${passmax}天,符合要求" >> ${scanner_log}  else    echo "[N] 口令生存週期為${passmax}天,不符合要求,建議設定不大於90天" >> ${scanner_log}  fi  if [ $passmin -ge 6 ];then    echo "[Y] 口令更改最小時間間隔為${passmin}天,符合要求" >> ${scanner_log}  else    echo "[N] 口令更改最小時間間隔為${passmin}天,不符合要求,建議設定大於等於6天" >> ${scanner_log}  fi  if [ $passlen -ge 8 ];then    echo "[Y] 口令最小長度為${passlen},符合要求" >> ${scanner_log}  else    echo "[N] 口令最小長度為${passlen},不符合要求,建議設定最小長度大於等於8" >> ${scanner_log}  fi   if [ $passage -ge 30 -a $passage -lt $passmax ];then    echo "[Y] 口令過期警告時間天數為${passage},符合要求" >> ${scanner_log}  else    echo "[N] 口令過期警告時間天數為${passage},不符合要求,建議設定大於等於30並小於口令生存週期" >> ${scanner_log}  fi  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`登入超時檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}    action "[2] 登入超時檢查中..." /bin/true  checkTimeout=$(cat /etc/profile | grep TMOUT | awk -F[=] '{print $2}')  if [ $? -eq 0 ];then    TMOUT=`cat /etc/profile | grep TMOUT | awk -F[=] '{print $2}'`    if [ $TMOUT -le 600 -a $TMOUT -ge 10 ];then      echo "[Y] 賬號超時時間${TMOUT}秒,符合要求" >> ${scanner_log}    else      echo "[N] 賬號超時時間${TMOUT}秒,不符合要求,建議設定小於600秒">> ${scanner_log}    fi  else    echo "[N] 賬號超時不存在自動登出,不符合要求,建議設定小於600秒" >> ${scanner_log}  fi    echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`特權使用者檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}    action "[3] 特權使用者檢查中..." /bin/true  UIDS=`awk -F[:] 'NR!=1{print $3}' /etc/passwd`  flag=0  for i in $UIDS  do    if [ $i = 0 ];then       flag=1    fi  done  if [ $flag != 1 ];then    echo "[Y] 不存在root賬號外的UID為0的異常使用者" >> ${scanner_log}  else    echo "[N] 存在非root但UID為0的異常使用者,請立刻進行排查" >> ${scanner_log}  fi    echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`空登入口令使用者檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[4] 空登入口令使用者檢查中..." /bin/true    userlist=`awk -F: 'length($2)==0 {print $1}' /etc/shadow`  [ ! $userlist ] && echo "[Y] 不存在空登入口令使用者"  >> ${scanner_log}  for i in $userlist  do    echo "[N] $i登入密碼為空,不符合要求,建議為該使用者設定密碼!"  >> ${scanner_log}  done  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`具有sudo許可權使用者檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}    action "[5] sudo許可權使用者檢查中..." /bin/true  sudolist=`cat /etc/sudoers |grep -v '^#' |grep -v Defaults| grep -v '^$'`  echo "$sudolist"  >> ${scanner_log}    echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`使用者預設許可權檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[6] 使用者預設許可權檢查中..." /bin/true  umask1=`cat /etc/profile | grep umask | grep -v ^# | awk '{print $2}'`  umask2=`cat /etc/csh.cshrc | grep umask | grep -v ^# | awk '{print $2}'`  umask3=`cat /etc/bashrc | grep umask | grep -v ^# | awk 'NR!=1{print $2}'`  flags=0  for i in $umask1  do    if [ $i != "027" ];then      echo "[N] /etc/profile檔案中所所設定的umask為${i},不符合要求,建議設定為027" >> ${scanner_log}      flags=1      break    fi  done  if [ $flags == 0 ];then    echo "[Y] /etc/profile檔案中所設定的umask為${i},符合要求" >> ${scanner_log}  fi     flags=0  for i in $umask2  do    if [ $i != "027" ];then      echo "[N] /etc/csh.cshrc檔案中所所設定的umask為${i},不符合要求,建議設定為027" >> ${scanner_log}      flags=1      break    fi  done    if [ $flags == 0 ];then    echo "[Y] /etc/csh.cshrc檔案中所設定的umask為${i},符合要求" >> ${scanner_log}  fi  flags=0  for i in $umask3  do    if [ $i != "027" ];then      echo "[N] /etc/bashrc檔案中所設定的umask為${i},不符合要求,建議設定為027" >> ${scanner_log}      flags=1      break    fi  done  if [ $flags == 0 ];then    echo "[Y] /etc/bashrc檔案中所設定的umask為${i},符合要求" >> ${scanner_log}  fi    echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`系統關鍵目錄許可權檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[7] 系統關鍵目錄許可權檢查中..." /bin/true  file1=`ls -l /etc/passwd | awk '{print $1}'`  file2=`ls -l /etc/shadow | awk '{print $1}'`  file3=`ls -l /etc/group | awk '{print $1}'`  file4=`ls -l /etc/securetty | awk '{print $1}'`  file5=`ls -l /etc/services | awk '{print $1}'`  #檢測檔案許可權為400的檔案  if [ $file2 = "-r--------" ];then    echo "[Y] /etc/shadow檔案許可權為400,符合要求" >> ${scanner_log}  else    echo "[N] /etc/shadow檔案許可權不為400,不符合要求,建議設定許可權為400" >> ${scanner_log}  fi  #檢測檔案許可權為600的檔案  if [ $file4 = "-rw-------" ];then    echo "[Y] /etc/security檔案許可權為600,符合要求" >> ${scanner_log}  else    echo "[N] /etc/security檔案許可權不為600,不符合要求,建議設定許可權為600" >> ${scanner_log}  fi  #檢測檔案許可權為644的檔案  if [ $file1 = "-rw-r--r--" ];then    echo "[Y] /etc/passwd檔案許可權為644,符合要求" >> ${scanner_log}  else    echo "[N] /etc/passwd檔案許可權不為644,不符合要求,建議設定許可權為644" >> ${scanner_log}  fi  if [ $file5 = "-rw-r--r--" ];then    echo "[Y] /etc/services檔案許可權為644,符合要求" >> ${scanner_log}  else    echo "[N] /etc/services檔案許可權不為644,不符合要求,建議設定許可權為644" >> ${scanner_log}  fi  if [ $file3 = "-rw-r--r--" ];then    echo "[Y] /etc/group檔案許可權為644,符合要求" >> ${scanner_log}  else    echo "[N] /etc/group檔案許可權不為644,不符合要求,建議設定許可權為644" >> ${scanner_log}  fi    echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`SSH配置檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[8] ssh配置檢查中..." /bin/true    remoteLogin=$(cat /etc/ssh/sshd_config | grep -v ^# |grep "PermitRootLogin no")  if [ $? -eq 0 ];then    echo "[Y] 已經設定root不能遠端登陸,符合要求" >> ${scanner_log}  else    echo "[N] 已經設定root能遠端登陸,不符合要求,建議/etc/ssh/sshd_config新增PermitRootLogin no引數" >> ${scanner_log}  fi  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`ping服務檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[9] 系統ping服務檢查中..." /bin/true    pingd=`cat /proc/sys/net/ipv4/icmp_echo_ignore_all`  if [ "$pingd" = "1" ]; then    echo "[Y] 伺服器已禁ping" >> ${scanner_log}  else    echo "[N] 伺服器未禁ping" >> ${scanner_log}  fi  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`telnet服務檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[10] 系統telnet服務檢查中..." /bin/true    telnetd=`rpm -qa|grep telnet | wc -l`  if [ $telnetd = "0" ]; then    echo "[Y] 系統未安裝telnet服務 " >> ${scanner_log}  else	echo "[N] 檢測到安裝了telnet服務,不符合要求,建議禁用telnet服務" >> ${scanner_log}  fi  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`遠端連線的安全性配置檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[11] 遠端連線的安全性配置檢查中..." /bin/true  fileNetrc=`find / -xdev -mount -name .netrc -print 2> /dev/null`  if [  -z "${fileNetrc}" ];then    echo "[Y] 不存在.netrc檔案,符合要求" >> ${scanner_log}  else    echo "[N] 存在.netrc檔案,不符合要求" >> ${scanner_log}  fi  fileRhosts=`find / -xdev -mount -name .rhosts -print 2> /dev/null`  if [ -z "$fileRhosts" ];then    echo "[Y] 不存在.rhosts檔案,符合要求" >> ${scanner_log}  else    echo "[N] 存在.rhosts檔案,不符合要求" >> ${scanner_log}  fi  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`異常隱含檔案檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[12] 異常隱含檔案檢查中..." /bin/true  hideFile=$(find / -xdev -mount \( -name "..*" -o -name "...*" \) 2> /dev/null)  if [  -z "${hideFile}" ];then    echo "[Y] 不存在隱藏檔案,符合要求" >> ${scanner_log}  else    echo "[N] 存在隱藏檔案,建議仔細檢查:" >> ${scanner_log}	for i in ${hideFile}	do	 echo $i >> ${scanner_log}	done  fi    echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`syslog登入事件檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[13] syslog登入事件檢查中..." /bin/true    if [  -f "/etc/syslog.conf" ];then    logFile=$(cat /etc/syslog.conf | grep -V ^# | grep authpriv.*)    if [ ! -z "${logFile}" ];then      echo "[Y] 存在儲存authpirv的日誌檔案" >> ${scanner_log}    else      echo "[N] 不存在儲存authpirv的日誌檔案" >> ${scanner_log}    fi  else    echo "[N] 不存在/etc/syslog.conf檔案,建議對所有登入事件都記錄" >> ${scanner_log}  fi      echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`日誌稽核功能檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[14] 日誌稽核功能檢查中..." /bin/true    auditdStatus=$(service auditd status 2> /dev/null)  if [ $? = 0 ];then    echo "[Y] 系統日誌稽核功能已開啟,符合要求" >> ${scanner_log}  fi  if [ $? = 3 ];then    echo "[N] 系統日誌稽核功能已關閉,不符合要求,建議service auditd start開啟" >> ${scanner_log}  fi  echo "" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  echo "`hostname -s`系統core dump狀態檢查結果" >> ${scanner_log}  echo "****************************************************" >> ${scanner_log}  action "[15] 系統core dump狀態檢查中..." /bin/true    limitsFile=$(cat /etc/security/limits.conf | grep -V ^# | grep core)  if [ $? -eq 0 ];then    soft=`cat /etc/security/limits.conf | grep -V ^# | grep core | awk {print $2}`    for i in $soft    do      if [ "$i"x = "soft"x ];then        echo "[Y] * soft core 0 已經設定" >> ${scanner_log}      fi      if [ "$i"x = "hard"x ];then        echo "[Y] * hard core 0 已經設定" >> ${scanner_log}      fi    done  else     echo "[N] 沒有設定core,建議在/etc/security/limits.conf中新增* soft core 0和* hard core 0" >> ${scanner_log}  fi    echo ""  cat  ${scanner_log}  echo ""}bk_safe
執行結果

後面會分享更多devops和DBA方面內容,感興趣的朋友可以關注下!

12
最新評論
  • BSA-TRITC(10mg/ml) TRITC-BSA 牛血清白蛋白改性標記羅丹明
  • 華為裝置配置QOS對內網IP限速