More security compliance modifications 05/4005/5
authordave kormann <davek@research.att.com>
Wed, 23 Dec 2020 17:28:14 +0000 (12:28 -0500)
committerd k <davek@research.att.com>
Tue, 12 Jan 2021 18:32:41 +0000 (18:32 +0000)
More small changes to satisfy lynis scans.  Mostly low-impact,
except for a fix to vol_mgmt.sh to ensure that newly-created
volume mounts are more likely to have appropriate permissions.

Signed-off-by: dave kormann <davek@research.att.com>
Change-Id: I384646458db9638487c928379590ed94f6b4be48

infra-ansible.spec
roles/ops-hardening/tasks/main.yaml
roles/partfs_rootdisk/scripts/vol_mgmt.sh
roles/ssh_conf_hardening/tasks/main.yaml

index b873d1a..97eb198 100644 (file)
@@ -15,7 +15,7 @@
 
 Name:           infra-ansible
 Version:        %{_version}
-Release:        9%{?dist}
+Release:        10%{?dist}
 Summary:        Contains ansible playbook and roles for Akraino rec blueprint
 License:        %{_platform_licence}
 Source0:        %{name}-%{version}.tar.gz
index 24e52c1..1ce68f2 100644 (file)
     regexp: '^SHA_CRYPT_MIN_ROUNDS[\s]*[0-9]*$'
     line: 'SHA_CRYPT_MIN_ROUNDS   5000'
 
+- name: "Set maximum number of password hash rounds"
+  lineinfile:
+    path: /etc/login.defs
+    regexp: '^SHA_CRYPT_MAX_ROUNDS[\s]*[0-9]*$'
+    line: 'SHA_CRYPT_MAX_ROUNDS   10000'
+
 #
 # Linux Failed password attempts
 #
     - { name: 'kernel.randomize_va_space', value: 2 }
     - { name: 'kernel.core_pattern', value: '/var/core/core'}
     - { name: 'kernel.kptr_restrict', value: 2 }
+    - { name: 'kernel.sysrq', value: 0 }
+    - { name: 'kernel.yama.ptrace_scope', value: 3 }
 
 #
 # Configure core dump
index 85214fe..f99c3fe 100755 (executable)
@@ -54,6 +54,9 @@ if [ ! -d $evac_dir ];then
   mkdir -p "$evac_dir"
 fi
 
+# mirror the permissions of the existing directory
+oPerm=`stat -c '%a' ${evac_dir}`
+'
 if [ ! -b $mount_vol_dev ];then
   echo "Provided volume $mount_vol_dev is not a block device!!"
   exit 1
@@ -115,6 +118,7 @@ rm -rf ${evac_dir}/*
 mount $evac_dir
 
 chown ${owner}:${group} ${evac_dir}
+chmod ${oPerm} ${evac_dir}
 
 cp -rpf $tmp_dir/* ${evac_dir}/
 rm -rf $tmp_dir
index 66d4bce..b9d86f5 100644 (file)
     insertafter: '^[\s]*ListenAddress 0.0.0.0'
     line: 'ListenAddress ::'
 
+- name: Enable verbose logging for SSH daemon
+  ssh_conf:
+    regexp: '[\s]*LogLevel"
+    values: "LogLevel VERBOSE"
+
 - name: "Disable Kerberos Authentication"
   ssh_conf:
     regexp: '[\s]*KerberosAuthentication'