Download Latest Version LinuxSA-1.0.0-Beta.zip (533.2 kB)
Email in envelope

Get an email when there's a new version of LinuxSA

Home / 1.0.0 Beta
Name Modified Size InfoDownloads / Week
Parent folder
LinuxSA-1.0.0-Beta.zip 2015-04-14 533.2 kB
LinuxSA-1.0.0-Beta.tar.gz 2015-04-14 1.5 MB
README 2015-04-14 4.0 kB
Totals: 3 Items   2.0 MB 0
                           Linux Security Assessment
                                 Apr 14, 2015

W. David Ashley
w.david.ashley@gmail.com


The Linux Security Assessment (LinuxSA) tool provides an automated method of assessing
the security settings of a Linux distributions. It has been tested on the following
distributions.

Red Hat 6 and 7
CentOS 7
Fedora 20 and 21
openSUSE 13.2
SuSE 11
Ubuntu 14.10
Linux Mint 17.1

LinuxSA uses the "Guide to the Secure Configuration of Red Hat Enterprise Linux 5"
published by the National Security Agency (NSA) as the specification for\ assessment
activities. This document is freely available from the US Government at
https://www.nsa.gov/ia/_files/os/redhat/NSA_RHEL_5_GUIDE_v4.2.pdf
The LinuxSA assessment tool is generally organized to reflect this document so finding
a specific assessment activity is as easy as possible.

Altouugh the NSA document has not been updated for later versions of Red Hat or
other non RPM-based operating systems, LinuxSA has updated the assessment mechanisms to
reflect RHEL 6 and 7 as well as Fedora, SuSE, Ubuntu, and OpenSuSE. All efforts will be
made to continue updating LinuxSA to support newer operating system releases and services.


Requirements
============

1. This tools is meant to be run from your laptop or workstation. But it can also be
   installed on the target machine and run locally. Running it locally is the safest
   method. If you choose to run linuxsa.py remotely, be sure that the local machine
   is on a safe internal network. Running linuxsa.py over the Internet can obviously 
   be very unsafe.
2. Python 2.7 or later is required. Version 2.5 might work but has not been tested.
3. The target Linux distribution must be configured as follows:
   a. A remote target machine must have at least one network interface that allows a
      standard user or root to login via ssh.
   b. In order to eliminate the prompts for the user's password you should utilize the
      remote user's SSH public key and install it into the local machine containing LinuxSA.
      SSH keys are not required if the local machine is also the target machine.
   c. For Windows you should install the latest version of Putty to provide SSH.
4 The Publican document system is required to build the output report. You will need to
  install the Publican RPM or the Publican-Installer-xxx.exe for Windows. There is also
  a version for Mac OSX and DEB-based systems (see the Publican Users's Guide).

Notes
=====

1. The linuxsa.py and other commands assume the the current directory is the directory
   where the linixsa.py command resides. All LinuxSA commands should be run with this as the
   current directory.
2. Before creating the report you should copy the files from the report_skel subdirectory to
   the report subdirectory using the cpreport command. Please be aware that cpreport
   will remove all files from the report directory tree every time you run it. So if you 
   have a report that needs to be saved you should do that before running cpreport.
3. Edit the report/en-US/report.xml and report.ent files and apply the customer name and the
   current date to the files.
4. Now run the linuxsa.py command. There are two optional arguments that can be passed to the 
   command. You can get help by providing the --help argument.
5. After running the linuxsa.py script you should review the output and make any
   changes/additions necessary to the report/en-US/summary.xml file. There are any number
   of items you may want to note concerning both specific and general security settings of
   the customer's target host. After you make your additions you can rebuild the report.
6. The buildrpt script will build the the report only on a Linux machine. You will need to
   manually run the necessary commands on Windows.
7. Be sure to save the output PDF report to a safe location. It contains valuable information
   that could be used to exploit weaknesses in the target system. 

Source: README, updated 2015-04-14