File tree Expand file tree Collapse file tree 2 files changed +10
-11
lines changed Expand file tree Collapse file tree 2 files changed +10
-11
lines changed Original file line number Diff line number Diff line change 231
231
control 'ssh-22' do
232
232
impact 1.0
233
233
title 'Client: CRYPTO_POLICY'
234
- desc 'Verifies, that we are not running CRYPTO_POLICY and our settings from ssh_config are effective'
235
- only_if ( 'OS has CRYPTO_POLICY ' ) do
236
- file ( '/etc/sysconfig/sshd' ) . exist? && file ( '/etc/sysconfig/sshd' ) . content . match? ( /CRYPTO_POLICY/ )
234
+ desc 'Verifies, that we are not running CRYPTO_POLICY and our settings from ssh_config are effective (affects el8+ and fedora) '
235
+ only_if ( 'ssh client supports -G option ' ) do
236
+ bash ( 'ssh -G localhost' ) . exit_status . equal? ( 0 )
237
237
end
238
238
239
239
describe bash ( 'ssh -G localhost' ) do
240
- its ( 'exit_status' ) { should eq 0 }
241
240
its ( 'stdout' ) { should match ( 'ciphers ' + ssh_crypto . valid_ciphers ) }
242
241
its ( 'stdout' ) { should match ( 'kexalgorithms ' + ssh_crypto . valid_kexs ) }
243
242
its ( 'stdout' ) { should match ( 'macs ' + ssh_crypto . valid_macs ) }
Original file line number Diff line number Diff line change 508
508
impact 1.0
509
509
title 'Server: CRYPTO_POLICY'
510
510
desc 'Verifies, that we are not running CRYPTO_POLICY and our settings from sshd_config are effective'
511
- only_if ( 'OS has CRYPTO_POLICY ' ) do
512
- file ( '/etc/sysconfig/ sshd' ) . exist? && file ( '/etc/sysconfig/sshd' ) . content . match? ( /CRYPTO_POLICY/ )
511
+ only_if ( 'sshd with options is running ' ) do
512
+ processes ( ' sshd -D' ) . exists?
513
513
end
514
514
515
- describe bash ( "pgrep -af 'sshd -D'" ) do
516
- its ( 'exit_status ' ) { should eq 0 }
517
- its ( 'stdout ' ) { should_not match ( ' -oCiphers' ) }
518
- its ( 'stdout ' ) { should_not match ( ' -oKexAlgorithms' ) }
519
- its ( 'stdout ' ) { should_not match ( ' -oHostKeyAlgorithms' ) }
515
+ describe processes ( 'sshd -D' ) do
516
+ its ( 'entries.length ' ) { should eq 1 }
517
+ its ( 'commands.first ' ) { should_not match ( / -oCiphers/ ) }
518
+ its ( 'commands.first ' ) { should_not match ( / -oKexAlgorithms/ ) }
519
+ its ( 'commands.first ' ) { should_not match ( / -oHostKeyAlgorithms/ ) }
520
520
end
521
521
end
You can’t perform that action at this time.
0 commit comments