aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorEugeni Dodonov <eugeni@mandriva.org>2009-02-25 19:28:19 +0000
committerEugeni Dodonov <eugeni@mandriva.org>2009-02-25 19:28:19 +0000
commit332d81647c83f596e5305fe64e34519c202bda29 (patch)
treeb7d2865c38e5d503b2dc4b7d03513f25f0a61ebe
parent6d650cb43b8532bb9f6060511603e999b0c3ff1c (diff)
downloadmsec-332d81647c83f596e5305fe64e34519c202bda29.tar
msec-332d81647c83f596e5305fe64e34519c202bda29.tar.gz
msec-332d81647c83f596e5305fe64e34519c202bda29.tar.bz2
msec-332d81647c83f596e5305fe64e34519c202bda29.tar.xz
msec-332d81647c83f596e5305fe64e34519c202bda29.zip
Added support for categories of security items.
-rw-r--r--src/msec/config.py24
-rwxr-xr-xsrc/msec/msecgui.py24
2 files changed, 26 insertions, 22 deletions
diff --git a/src/msec/config.py b/src/msec/config.py
index 2b98c84..03da2eb 100644
--- a/src/msec/config.py
+++ b/src/msec/config.py
@@ -112,6 +112,28 @@ SETTINGS = {'BASE_LEVEL': ("libmsec.base_level",
# text for disabled options
OPTION_DISABLED=_("System default")
+# settings organizes by category
+# system security settings
+SETTINGS_SYSTEM = ["ENABLE_POLICYKIT", "ENABLE_SUDO", "ENABLE_MSEC_CRON",
+ "ENABLE_PAM_WHEEL_FOR_SU", "ENABLE_SULOGIN", "CREATE_SERVER_LINK", "ENABLE_AT_CRONTAB",
+ "ALLOW_ROOT_LOGIN", "ALLOW_USER_LIST", "ENABLE_PASSWORD", "ALLOW_AUTOLOGIN",
+ "ENABLE_CONSOLE_LOG", "ENABLE_PAM_WHEEL_FOR_SU", "CREATE_SERVER_LINK",
+ "ALLOW_XAUTH_FROM_ROOT", "ALLOW_REBOOT", "SHELL_HISTORY_SIZE", "SHELL_TIMEOUT", "PASSWORD_LENGTH",
+ "PASSWORD_HISTORY", "USER_UMASK", "ROOT_UMASK",
+ ]
+# network security settings
+SETTINGS_NETWORK = ["ACCEPT_BOGUS_ERROR_RESPONSES", "ACCEPT_BROADCASTED_ICMP_ECHO", "ACCEPT_ICMP_ECHO",
+ "ALLOW_REMOTE_ROOT_LOGIN", "ALLOW_X_CONNECTIONS", "ALLOW_XSERVER_TO_LISTEN",
+ "AUTHORIZE_SERVICES", "ENABLE_DNS_SPOOFING_PROTECTION", "ENABLE_IP_SPOOFING_PROTECTION",
+ "ENABLE_LOG_STRANGE_PACKETS",
+ ]
+# periodic checks
+SETTINGS_PERIODIC = ["CHECK_PERMS", "CHECK_USER_FILES", "CHECK_SUID_ROOT", "CHECK_SUID_MD5", "CHECK_SGID",
+ "CHECK_WRITABLE", "CHECK_UNOWNED", "CHECK_PROMISC", "CHECK_OPEN_PORT", "CHECK_PASSWD",
+ "CHECK_SHADOW", "CHECK_CHKROOTKIT", "CHECK_RPM", "CHECK_SHOSTS", "TTY_WARN", "SYSLOG_WARN",
+ "MAIL_EMPTY_CONTENT",
+ ]
+
# localized help
try:
from help import HELP
@@ -134,7 +156,7 @@ def find_doc(msec, option, cached=None):
# option not found in HELP, lets look in docstring
# get description from function comments
func = msec.get_action(callback)
- if func:
+ if func.__doc__:
doc = func.__doc__.strip()
else:
# well, no luck. Just use the callback then
diff --git a/src/msec/msecgui.py b/src/msec/msecgui.py
index a93ffb4..90e9721 100755
--- a/src/msec/msecgui.py
+++ b/src/msec/msecgui.py
@@ -694,15 +694,7 @@ class MsecGui:
vbox.pack_start(entry, False, False)
# system security options
- options_view, model = self.create_treeview(["ENABLE_APPARMOR", "ENABLE_POLICYKIT",
- "ENABLE_SUDO", "ENABLE_MSEC_CRON", "ENABLE_PAM_WHEEL_FOR_SU",
- "ENABLE_SULOGIN", "CREATE_SERVER_LINK", "ENABLE_AT_CRONTAB",
- "ALLOW_ROOT_LOGIN", "ALLOW_USER_LIST", "ENABLE_PASSWORD",
- "ALLOW_AUTOLOGIN", "ENABLE_CONSOLE_LOG",
- "ENABLE_PAM_WHEEL_FOR_SU", "CREATE_SERVER_LINK", "ALLOW_XAUTH_FROM_ROOT",
- "ALLOW_REBOOT", "SHELL_HISTORY_SIZE", "SHELL_TIMEOUT", "PASSWORD_LENGTH",
- "PASSWORD_HISTORY", "USER_UMASK", "ROOT_UMASK",
- ])
+ options_view, model = self.create_treeview(config.SETTINGS_SYSTEM)
self.current_options_view[id] = (model, self.msecconfig)
vbox.pack_start(options_view)
@@ -717,12 +709,7 @@ class MsecGui:
vbox.pack_start(entry, False, False)
# network security options
- options_view, model = self.create_treeview(["ACCEPT_BOGUS_ERROR_RESPONSES", "ACCEPT_BROADCASTED_ICMP_ECHO",
- "ACCEPT_ICMP_ECHO", "ALLOW_REMOTE_ROOT_LOGIN",
- "ALLOW_X_CONNECTIONS", "ALLOW_XSERVER_TO_LISTEN",
- "AUTHORIZE_SERVICES", "ENABLE_DNS_SPOOFING_PROTECTION",
- "ENABLE_IP_SPOOFING_PROTECTION", "ENABLE_LOG_STRANGE_PACKETS",
- ])
+ options_view, model = self.create_treeview(config.SETTINGS_NETWORK)
self.current_options_view[id] = (model, self.msecconfig)
vbox.pack_start(options_view)
@@ -743,12 +730,7 @@ class MsecGui:
vbox.pack_start(self.periodic_checks, False, False)
# network security options
- options_view, model = self.create_treeview(["CHECK_PERMS", "CHECK_USER_FILES", "CHECK_SUID_ROOT", "CHECK_SUID_MD5",
- "CHECK_SGID", "CHECK_WRITABLE", "CHECK_UNOWNED",
- "CHECK_PROMISC", "CHECK_OPEN_PORT", "CHECK_PASSWD",
- "CHECK_SHADOW", "CHECK_CHKROOTKIT", "CHECK_RPM",
- "CHECK_SHOSTS", "TTY_WARN", "SYSLOG_WARN", "MAIL_EMPTY_CONTENT",
- ])
+ options_view, model = self.create_treeview(config.SETTINGS_PERIODIC)
vbox.pack_start(options_view)
# see if these tests are enabled