Skip to content

Commit 40e7c02

Browse files
authored
Merge pull request #17 from netpicker/netpicker-adding-linting
added more refs and modified pytests accordingly
2 parents e2d7d8c + bc4e126 commit 40e7c02

File tree

131 files changed

+958
-954
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+958
-954
lines changed

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_112_enable_aaa_authentication_login.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,5 @@
55
name='rule_112_enable_aaa_authentication_login',
66
platform=['cisco_ios', 'cisco_xe']
77
)
8-
98
def rule_112_enable_aaa_authentication_login(configuration,ref):
109
assert 'aaa authentication login' in configuration, ref
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
@medium(
2+
name='rule_114_set_login_authentication_for_line_vty_ted',
3+
platform=['cisco_ios', 'cisco_xe'],
4+
commands=dict(chk_con='show running-config | sec line con',chk_vty='show running-config | sec line vty')
5+
)
6+
def rule_114_set_login_authentication_for_line_vty_ted(commands,ref):
7+
assert 'login authentication' in commands.chk_con, ref
8+
assert 'login authentication' in commands.chk_vty, ref
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
.rule_114_set_login_authentication_for_line_vty:
2+
3+
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/d1/sec-cr-k1.html#GUID- 297BDF33-4841-441C-83F3-4DA51C3C7284
5+
6+
7+
Remediation: Configure management lines to require login using the default or a named AAA authentication list. This configuration must be set individually for all line types. hostname(config)#line vty {line-number} [<em>ending-line-number] hostname(config-line)#login authentication {default | aaa_list_name}
8+
9+
.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_114_set_login_authentication_for_line_vty_ted.py

Lines changed: 0 additions & 9 deletions
This file was deleted.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
from comfy.compliance import medium
22

3+
34
@medium(
45
name='rule_115_set_login_authentication_for_ip_http_ed',
56
platform=['cisco_ios', 'cisco_xe']
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
.rule_115_set_login_authentication_for_ip_http:
2+
3+
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/d1/sec-cr-k1.html#GUID- 297BDF33-4841-441C-83F3-4DA51C3C7284
5+
6+
7+
Remediation: Configure management lines to require login using the default or a named AAA authentication list. This configuration must be set individually for all line types. hostname#(config)ip http secure-server hostname#(config)ip http authentication {default | _aaa\_list\_name_}
8+
9+
.

CIS/Cisco_ios/12_access_rules/rule_1210_set_http_secure_server_limit.py

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,8 @@
22

33

44
@medium(
5-
name='rule_1210_set_http_secure_server_limit',
6-
platform=['cisco_ios', 'cisco_xe']
5+
name='rule_1210_set_http_secure_server_limit',
6+
platform=['cisco_ios', 'cisco_xe']
77
)
8-
def rule_1210_set_http_secure_server_limit(configuration):
9-
remediation = (f"""
10-
Remediation: hostname(config)#ip http max-connections 2
11-
12-
""")
13-
14-
assert 'ip http max-connections' in configuration, remediation
8+
def rule_1210_set_http_secure_server_limit(configuration,ref):
9+
assert 'ip http max-connections' in configuration, ref
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
.rule_1210_set_http_secure_server_limit:
2+
3+
4+
Reference:
5+
6+
7+
Remediation: hostname(config)#ip http max-connections 2
8+
9+
.

CIS/Cisco_ios/12_access_rules/rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip.py renamed to CIS/Cisco_ios/12_access_rules/rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip_http.py

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,7 @@
55
name='rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip',
66
platform=['cisco_ios', 'cisco_xe']
77
)
8-
def rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip(configuration):
9-
uri = (
10-
"http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-768"
11-
"05E6F-9E89-4457-A9DC-5944C8FE5419"
12-
)
13-
14-
remediation = (f"""
15-
Remediation: ip http timeout-policy idle 600 life <nnnn> requests <nn>
16-
17-
References: {uri}
18-
19-
""")
8+
def rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip(configuration,ref):
209
if "no ip http" not in configuration:
2110
timeout_found = False
2211
for line in configuration:
@@ -25,10 +14,10 @@ def rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip(configurati
2514
if match:
2615
timeout_found = True
2716
seconds = int(match.group(1))
28-
assert seconds < 600, remediation
17+
assert seconds < 600, remediation,ref
2918
if not timeout_found:
30-
assert False, remediation
19+
assert False, remediation,ref
3120
else:
32-
assert True, remeidation
21+
assert True, remeidation,ref
3322

3423

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
.rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip_http:
2+
3+
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-76805E6F-9E89-4457-A9DC-5944C8FE5419
5+
6+
7+
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8+
ip http timeout-policy idle 600 life {nnnn} requests {nn}
9+
10+
.

0 commit comments

Comments
 (0)