1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252
|
#!/bin/sh
#
# tiger - A UN*X security checking system
# Copyright (C) 1993 Douglas Lee Schales, David K. Hess, David R. Safford
#
# Please see the file `COPYING' for the complete copyright notice.
#
# check_accounts - 06/14/93
#
#
# 12/26/2001 jfs Added Tiger_Accounts_Trust to define valid users which will
# not be so thoroughly checked. Useful for UN*X systems that
# ship with a default number of administrative (but disabled) users
# for services/files (like Debian GNU/Linux)
#
# 04/28/93 dls Added -L to 'ls' so we get the permissions off the file
# instead of the link.
#
# 04/27/93 dls Rename from check_passwd to check_accounts
# Now checks *all* accounts, not just disabled ones
# and checks config files in home directories for
# writability.
#
#-----------------------------------------------------------------------------
#
TigerInstallDir='.'
#
# Set default base directory.
# Order or preference:
# -B option
# TIGERHOMEDIR environment variable
# TigerInstallDir installed location
#
basedir=${TIGERHOMEDIR:=$TigerInstallDir}
for parm
do
case $parm in
-B) basedir=$2; break;;
esac
done
#
# Verify that a config file exists there, and if it does
# source it.
#
[ ! -r $basedir/config ] && {
echo "--ERROR-- [init002e] No 'config' file in \`$basedir'."
exit 1
}
. $basedir/config
#
# Grab subroutines
#
. $BASEDIR/initdefs
#
# If run in test mode (-t) this will verify that all required
# elements are set.
#
[ "$Tiger_TESTMODE" = 'Y' ] && {
haveallcmds AWK CAT CHECK_CRON GEN_PASSWD_SETS GREP JOIN LS RM OUTPUTMETHOD SGREP TR || exit 1
haveallfiles ETCSHELLS BASEDIR WORKDIR || exit 1
haveallvars TESTLINK HOSTNAME
echo "--CONFIG-- [init003c] $0: Configuration ok..."
exit 0
}
#------------------------------------------------------------------------
echo
echo "# Performing check of user accounts..."
haveallcmds GREP GEN_PASSWD_SETS LS CAT AWK JOIN OUTPUTMETHOD || exit 1
haveallfiles WORKDIR BASEDIR || exit 1
haveallcmds CHECK_CRON || CHECK_CRON=
haveallvars HOSTNAME
check_disabled()
{
while read user home host shell uid
do
[ ! -n "$shell" ] && shell=/bin/sh
[ $TESTEXEC $shell ] && {
eval "
case \"$shell\" in
$shcase)
# Just in case: some sanity checks
[ -z "$Tiger_Accounts_Trust" ] && Tiger_Accounts_Trust=-1
[ -z "$uid" ] && uid=-1
[ $uid -gt $Tiger_Accounts_Trust ] && \
message WARN acc001w \"\" \"Login ID $user is disabled, but still has a valid shell ($shell).\"
;;
*) [ $TESTEXEC $shell -a ! -c $shell ] &&
message INFO acc002i \"\" \"Login ID $user is disabled, and has a shell of $shell.\"
;;
esac "
}
[ "$host" = "$HOSTNAME" ] && {
[ -d $home/ ] && {
[ -s $home/.forward ] && $SGREP '\|' $home/.forward &&
message WARN acc003w "" "Login ID $user is disabled, but has a .forward file which executes commands."
[ -s $home/.rhosts ] && {
owner=`$LS -ld $home/.rhosts | $AWK '{print $3}'`
[ "$owner" = "$user" ] && {
message WARN acc004w "" "Login ID $user is disabled, but has a .rhosts file"
}
}
}
}
[ -n "$CHECK_CRON" -a "`$CHECK_CRON $user`" = 'YES' ] &&
message WARN acc005w "" "Login ID $user is disabled, but has a 'cron' file or cron entries."
done
}
check_users()
{
while read user home host shell
do
[ "$host" = "$HOSTNAME" ] && {
[ -d $home/ ] && {
getpermit $home/ | {
read _f owner group ur uw ux gr gw gx or ow ox suid sgid sticky
# Note: in Debian GNU/Linux systems, there might be one user in a single
# group so this check does
# TODO: make it check if there are more than a single user in the group
# and if it is = owmer
[ "${gw}${ow}" != '00' ] && [ "$owner" != "$group" ] && {
str="Login ID $user's home directory ($home) has"
case "$gw$ow" in
01) str="$str world write"
mode='o-w';;
10) str="$str group \`$group' write"
mode='g-w';;
11) str="$str group \`$group' and world write"
mode='go-w';;
esac
message WARN acc006w "" "${str} access."
changelog "WARN : chmod : $mode : $home/."
}
}
[ -s $home/.hushlogin ] &&
message ALERT acc007a '' "Logon ID $user has a non-zero length .hushlogin"
dotfiles=${USERDOTFILES:-".cshrc .profile .login .exrc .forward"}
for file in $dotfiles
do
[ -f $home/$file ] && {
getpermit $home/$file | {
read _f owner group ur uw ux gr gw gx or ow ox suid sgid stk
[ "${gw}${ow}" != '00' ] && {
str="Login ID $user's $file config file has"
case "$gw$ow" in
01) str="$str world write"
mode='o-w';;
10) str="$str group \`$group' write"
mode='g-w';;
11) str="$str group \`$group' and world write"
mode='go-w';;
esac
message WARN acc008w '' "${str} access."
changelog "WARN : chmod : $mode : $home/$file"
}
}
}
done
}
}
done
}
shcase='/bin/sh|/bin/csh'
[ -n "$ETCSHELLS" -a -s "$ETCSHELLS" ] && {
shells=`$GREP -v '^#' $ETCSHELLS`
shcase=`echo $shells | $TR ' ' '|'`
}
saveifs=$IFS
{
if [ -n "$Tiger_PasswdFiles" ]; then
$CAT "$Tiger_PasswdFiles" > $WORKDIR/pass.list.$$
else
$GEN_PASSWD_SETS $WORKDIR/pass.list.$$
fi
}
while read passwd_set
do
source=`$CAT $passwd_set.src`
echo "# Checking accounts from $source."
IFS=:
while read user pass uid gid gecos homedir shell
do
IFS=$saveifs
[ "$pass" = ' ' ] && pass=''
comment='no'
msgid=
[ "$PASSWD_COMMENTS_ALLOWED" != 'Y' ] && {
case $user in
"#*") cmsg='Comments are not allowed in password file.'; msgid='c';;
*) cmsg='';;
esac
}
if [ ! -n "$pass" ]; then
if [ "$user" = 'sync' ]; then
# [ "$shell" != '/bin/sync' ] && {
# message ALERT acc009a '' "Login ID 'sync' does not have password, and shell is not /bin/sync."
# }
:
elif [ "$uid" = 0 ]; then
message ALERT acc010a$msgid "$cmsg" "Login ID $user is UID=0 and does not have a password."
else
message WARN acc011w$msgid "$cmsg" "Login ID $user does not have a password."
fi
elif [ "$uid" = 0 -a "$user" != "root" ]; then
message WARN acc012w$msgid "$cmsg" "Login ID $user has uid == 0."
elif [ "$comment" = 'yes' ]; then
message WARN acc013w "" 'Comments are not allowed in password file.'
fi
IFS=:
done < $passwd_set
IFS=$saveifs
$AWK -F: '{print $1, $6}' $passwd_set |
$BASEDIR/util/${GETFSHOST:=getfs-std} > $WORKDIR/home.hosts.$$
$GREP -v '^[^:]*:[a-zA-Z0-9\./,]*:' $passwd_set |
$AWK -F: '{if($2 != " ")printf("%s %s %s %s\n", $1, $6, $7, $3);}' |
$JOIN -o 1.1 1.2 2.3 1.3 1.4 - $WORKDIR/home.hosts.$$ |
check_disabled
$AWK -F: '{printf("%s %s %s\n", $1, $6, $7);}' $passwd_set |
$JOIN -o 1.1 1.2 2.3 1.3 - $WORKDIR/home.hosts.$$ |
check_users
[ ! -n "$Tiger_PasswdFiles" ] && delete $passwd_set $passwd_set.src
delete $WORKDIR/home.hosts.$$
done < $WORKDIR/pass.list.$$ |
$OUTPUTMETHOD
delete $WORKDIR/pass.list.$$
#
exit 0
#
exit 0
#
exit 0
|