Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IPTables scan to be flexible if running on desktop/workstation vs server #1171

Open
sbe-arg opened this issue Jun 16, 2021 · 0 comments
Open

Comments

@sbe-arg
Copy link

sbe-arg commented Jun 16, 2021

Is your feature request related to a problem? Please describe.
When running audit system on workstation with fewer logical iptables like drop input everything, allow all out, allow in established returns, it does not meet the required limit of 5 iptables or more. While this config is robust for workstations and weak on servers it makes workstation hardening complex for no reason.

Describe the solution you'd like
Identify if lynis running server or workstation/desktop on os and lower the iptables minimum count.
Leveraging different scoring for desktop vs server images could provide a more realistic effort to workstation hardening. Same relates to other checks not just iptables.

Required changes
IPTables count.

Additional context
This is an example of the iptables in place. iptables --list

Chain INPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere             state RELATED,ESTABLISHED
ACCEPT     all  --  localhost            anywhere            

Chain FORWARD (policy DROP)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination  
@CISOfy CISOfy deleted a comment from github-actions bot Jul 30, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant