From a86bac896352f73e95cb3381b7ba1886322e4f1eb096c1845c463b6c06507b33 Mon Sep 17 00:00:00 2001 From: "Marc S. Weidner BOT" Date: Mon, 2 Jun 2025 07:32:11 +0000 Subject: [PATCH] DEPLOY BOT: Auto-Generate *.html from *.md [skip ci] --- .html/AUDIT_DNSSEC.html | 180 +++++ .html/AUDIT_HAVEGED.html | 309 ++++++++ .html/AUDIT_LYNIS.html | 783 +++++++++++++++++++ .html/AUDIT_SSH.html | 212 +++++ .html/CCLA-1.0.html | 223 ++++++ .html/CHANGELOG.html | 178 +++++ .html/CODING_CONVENTION.html | 250 ++++++ .html/CONTRIBUTING.html | 184 +++++ .html/CREDITS.html | 186 +++++ .html/DOCUMENTATION.html | 300 +++++++ .html/README.html | 577 ++++++++++++++ .html/REFERENCES.html | 241 ++++++ .html/SECURITY.html | 185 +++++ README.html | 405 ++++++++++ SECURITY.html | 13 + config/includes.chroot/preseed/CCLA-1.0.html | 51 ++ docs/AUDIT_DNSSEC.html | 8 + docs/AUDIT_HAVEGED.html | 137 ++++ docs/AUDIT_LYNIS.html | 611 +++++++++++++++ docs/AUDIT_SSH.html | 40 + docs/CHANGELOG.html | 6 + docs/CODING_CONVENTION.html | 78 ++ docs/CONTRIBUTING.html | 12 + docs/CREDITS.html | 14 + docs/DOCUMENTATION.html | 128 +++ docs/LICENSES/CCLA-1.0.html | 53 ++ docs/REFERENCES.html | 69 ++ 27 files changed, 5433 insertions(+) create mode 100644 .html/AUDIT_DNSSEC.html create mode 100644 .html/AUDIT_HAVEGED.html create mode 100644 .html/AUDIT_LYNIS.html create mode 100644 .html/AUDIT_SSH.html create mode 100644 .html/CCLA-1.0.html create mode 100644 .html/CHANGELOG.html create mode 100644 .html/CODING_CONVENTION.html create mode 100644 .html/CONTRIBUTING.html create mode 100644 .html/CREDITS.html create mode 100644 .html/DOCUMENTATION.html create mode 100644 .html/README.html create mode 100644 .html/REFERENCES.html create mode 100644 .html/SECURITY.html create mode 100644 README.html create mode 100644 SECURITY.html create mode 100644 config/includes.chroot/preseed/CCLA-1.0.html create mode 100644 docs/AUDIT_DNSSEC.html create mode 100644 docs/AUDIT_HAVEGED.html create mode 100644 docs/AUDIT_LYNIS.html create mode 100644 docs/AUDIT_SSH.html create mode 100644 docs/CHANGELOG.html create mode 100644 docs/CODING_CONVENTION.html create mode 100644 docs/CONTRIBUTING.html create mode 100644 docs/CREDITS.html create mode 100644 docs/DOCUMENTATION.html create mode 100644 docs/LICENSES/CCLA-1.0.html create mode 100644 docs/REFERENCES.html diff --git a/.html/AUDIT_DNSSEC.html b/.html/AUDIT_DNSSEC.html new file mode 100644 index 0000000..52ea038 --- /dev/null +++ b/.html/AUDIT_DNSSEC.html @@ -0,0 +1,180 @@ + + + + + + + ./docs/AUDIT_DNSSEC.md + + + +
+

./docs/AUDIT_DNSSEC.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. DNSSEC Status

+

This is an auto-generated overview of the DNSSEC status of coresecret.dev at the time of the last human-initiated push event.

+

DNSSEC Status

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/AUDIT_HAVEGED.html b/.html/AUDIT_HAVEGED.html new file mode 100644 index 0000000..09ecccc --- /dev/null +++ b/.html/AUDIT_HAVEGED.html @@ -0,0 +1,309 @@ + + + + + + + ./docs/AUDIT_HAVEGED.md + + + +
+

./docs/AUDIT_HAVEGED.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Haveged Audit on Netcup RS 2000 G11

+
Mon May 19|root@live:~/>>0|~$ haveged -n 0 | dieharder -g 200 -a
+haveged: command socket is listening at fd 3
+Writing unlimited bytes to stdout
+#=============================================================================#
+#            dieharder version 3.31.1 Copyright 2003 Robert G. Brown          #
+#=============================================================================#
+   rng_name    |rands/second|   Seed   |
+stdin_input_raw|  1.77e+07  |1806134257|
+#=============================================================================#
+        test_name   |ntup| tsamples |psamples|  p-value |Assessment
+#=============================================================================#
+   diehard_birthdays|   0|       100|     100|0.21358950|  PASSED
+      diehard_operm5|   0|   1000000|     100|0.23365564|  PASSED
+  diehard_rank_32x32|   0|     40000|     100|0.33364435|  PASSED
+    diehard_rank_6x8|   0|    100000|     100|0.83680113|  PASSED
+   diehard_bitstream|   0|   2097152|     100|0.89183344|  PASSED
+        diehard_opso|   0|   2097152|     100|0.95817018|  PASSED
+        diehard_oqso|   0|   2097152|     100|0.25923499|  PASSED
+         diehard_dna|   0|   2097152|     100|0.28604687|  PASSED
+diehard_count_1s_str|   0|    256000|     100|0.25146863|  PASSED
+diehard_count_1s_byt|   0|    256000|     100|0.64817854|  PASSED
+ diehard_parking_lot|   0|     12000|     100|0.68180941|  PASSED
+    diehard_2dsphere|   2|      8000|     100|0.52576112|  PASSED
+    diehard_3dsphere|   3|      4000|     100|0.02636962|  PASSED
+     diehard_squeeze|   0|    100000|     100|0.81226498|  PASSED
+        diehard_sums|   0|       100|     100|0.54642776|  PASSED
+        diehard_runs|   0|    100000|     100|0.98440072|  PASSED
+        diehard_runs|   0|    100000|     100|0.75118526|  PASSED
+       diehard_craps|   0|    200000|     100|0.93104571|  PASSED
+       diehard_craps|   0|    200000|     100|0.45994663|  PASSED
+ marsaglia_tsang_gcd|   0|  10000000|     100|0.38263075|  PASSED
+ marsaglia_tsang_gcd|   0|  10000000|     100|0.16784328|  PASSED
+         sts_monobit|   1|    100000|     100|0.26368088|  PASSED
+            sts_runs|   2|    100000|     100|0.10069666|  PASSED
+          sts_serial|   1|    100000|     100|0.53426480|  PASSED
+          sts_serial|   2|    100000|     100|0.95654933|  PASSED
+          sts_serial|   3|    100000|     100|0.75042664|  PASSED
+          sts_serial|   3|    100000|     100|0.27693306|  PASSED
+          sts_serial|   4|    100000|     100|0.79225401|  PASSED
+          sts_serial|   4|    100000|     100|0.49273684|  PASSED
+          sts_serial|   5|    100000|     100|0.58017632|  PASSED
+          sts_serial|   5|    100000|     100|0.39423250|  PASSED
+          sts_serial|   6|    100000|     100|0.72811005|  PASSED
+          sts_serial|   6|    100000|     100|0.94342669|  PASSED
+          sts_serial|   7|    100000|     100|0.98343053|  PASSED
+          sts_serial|   7|    100000|     100|0.74692814|  PASSED
+          sts_serial|   8|    100000|     100|0.56538653|  PASSED
+          sts_serial|   8|    100000|     100|0.91826111|  PASSED
+          sts_serial|   9|    100000|     100|0.63502589|  PASSED
+          sts_serial|   9|    100000|     100|0.28959825|  PASSED
+          sts_serial|  10|    100000|     100|0.74650890|  PASSED
+          sts_serial|  10|    100000|     100|0.95475310|  PASSED
+          sts_serial|  11|    100000|     100|0.35838186|  PASSED
+          sts_serial|  11|    100000|     100|0.80481197|  PASSED
+          sts_serial|  12|    100000|     100|0.74700860|  PASSED
+          sts_serial|  12|    100000|     100|0.49849890|  PASSED
+          sts_serial|  13|    100000|     100|0.55828107|  PASSED
+          sts_serial|  13|    100000|     100|0.23244603|  PASSED
+          sts_serial|  14|    100000|     100|0.23080285|  PASSED
+          sts_serial|  14|    100000|     100|0.83936220|  PASSED
+          sts_serial|  15|    100000|     100|0.64411755|  PASSED
+          sts_serial|  15|    100000|     100|0.99255934|  PASSED
+          sts_serial|  16|    100000|     100|0.00563047|  PASSED
+          sts_serial|  16|    100000|     100|0.31608374|  PASSED
+         rgb_bitdist|   1|    100000|     100|0.64550890|  PASSED
+         rgb_bitdist|   2|    100000|     100|0.87656240|  PASSED
+         rgb_bitdist|   3|    100000|     100|0.67169827|  PASSED
+         rgb_bitdist|   4|    100000|     100|0.44406906|  PASSED
+         rgb_bitdist|   5|    100000|     100|0.67772729|  PASSED
+         rgb_bitdist|   6|    100000|     100|0.73853919|  PASSED
+         rgb_bitdist|   7|    100000|     100|0.86999808|  PASSED
+         rgb_bitdist|   8|    100000|     100|0.01313259|  PASSED
+         rgb_bitdist|   9|    100000|     100|0.55009611|  PASSED
+         rgb_bitdist|  10|    100000|     100|0.70726109|  PASSED
+         rgb_bitdist|  11|    100000|     100|0.03154815|  PASSED
+         rgb_bitdist|  12|    100000|     100|0.84462282|  PASSED
+rgb_minimum_distance|   2|     10000|    1000|0.83132423|  PASSED
+rgb_minimum_distance|   3|     10000|    1000|0.68188237|  PASSED
+rgb_minimum_distance|   4|     10000|    1000|0.51409655|  PASSED
+rgb_minimum_distance|   5|     10000|    1000|0.42544360|  PASSED
+    rgb_permutations|   2|    100000|     100|0.66313395|  PASSED
+    rgb_permutations|   3|    100000|     100|0.95535890|  PASSED
+    rgb_permutations|   4|    100000|     100|0.45758425|  PASSED
+    rgb_permutations|   5|    100000|     100|0.98313853|  PASSED
+      rgb_lagged_sum|   0|   1000000|     100|0.41578816|  PASSED
+      rgb_lagged_sum|   1|   1000000|     100|0.76861829|  PASSED
+      rgb_lagged_sum|   2|   1000000|     100|0.43447789|  PASSED
+      rgb_lagged_sum|   3|   1000000|     100|0.49698037|  PASSED
+      rgb_lagged_sum|   4|   1000000|     100|0.02212798|  PASSED
+      rgb_lagged_sum|   5|   1000000|     100|0.04465057|  PASSED
+      rgb_lagged_sum|   6|   1000000|     100|0.10526977|  PASSED
+      rgb_lagged_sum|   7|   1000000|     100|0.79849751|  PASSED
+      rgb_lagged_sum|   8|   1000000|     100|0.83675235|  PASSED
+      rgb_lagged_sum|   9|   1000000|     100|0.37604856|  PASSED
+      rgb_lagged_sum|  10|   1000000|     100|0.46712205|  PASSED
+      rgb_lagged_sum|  11|   1000000|     100|0.16098525|  PASSED
+      rgb_lagged_sum|  12|   1000000|     100|0.81557499|  PASSED
+      rgb_lagged_sum|  13|   1000000|     100|0.11553821|  PASSED
+      rgb_lagged_sum|  14|   1000000|     100|0.85637944|  PASSED
+      rgb_lagged_sum|  15|   1000000|     100|0.91125298|  PASSED
+      rgb_lagged_sum|  16|   1000000|     100|0.59747378|  PASSED
+      rgb_lagged_sum|  17|   1000000|     100|0.70077562|  PASSED
+      rgb_lagged_sum|  18|   1000000|     100|0.66815407|  PASSED
+      rgb_lagged_sum|  19|   1000000|     100|0.04941226|  PASSED
+      rgb_lagged_sum|  20|   1000000|     100|0.37939018|  PASSED
+      rgb_lagged_sum|  21|   1000000|     100|0.42653722|  PASSED
+      rgb_lagged_sum|  22|   1000000|     100|0.86316011|  PASSED
+      rgb_lagged_sum|  23|   1000000|     100|0.43038293|  PASSED
+      rgb_lagged_sum|  24|   1000000|     100|0.34472083|  PASSED
+      rgb_lagged_sum|  25|   1000000|     100|0.73741194|  PASSED
+      rgb_lagged_sum|  26|   1000000|     100|0.05584980|  PASSED
+      rgb_lagged_sum|  27|   1000000|     100|0.80601600|  PASSED
+      rgb_lagged_sum|  28|   1000000|     100|0.99361052|  PASSED
+      rgb_lagged_sum|  29|   1000000|     100|0.27812997|  PASSED
+      rgb_lagged_sum|  30|   1000000|     100|0.94547008|  PASSED
+      rgb_lagged_sum|  31|   1000000|     100|0.02400797|  PASSED
+      rgb_lagged_sum|  32|   1000000|     100|0.98890248|  PASSED
+     rgb_kstest_test|   0|     10000|    1000|0.53680166|  PASSED
+     dab_bytedistrib|   0|  51200000|       1|0.38634245|  PASSED
+             dab_dct| 256|     50000|       1|0.02760776|  PASSED
+Preparing to run test 207.  ntuple = 0
+        dab_filltree|  32|  15000000|       1|0.47264235|  PASSED
+        dab_filltree|  32|  15000000|       1|0.49416126|  PASSED
+Preparing to run test 208.  ntuple = 0
+       dab_filltree2|   0|   5000000|       1|0.12940766|  PASSED
+       dab_filltree2|   1|   5000000|       1|0.40415388|  PASSED
+Preparing to run test 209.  ntuple = 0
+        dab_monobit2|  12|  65000000|       1|0.51567978|  PASSED
+haveged: Cannot write data in file: Broken pipe
+tot tests(BA8): A:1/1 B:1/1  last entropy estimate 8.00294
+fills: 470064, generated: 229.5 G bytes
+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/AUDIT_LYNIS.html b/.html/AUDIT_LYNIS.html new file mode 100644 index 0000000..81692bb --- /dev/null +++ b/.html/AUDIT_LYNIS.html @@ -0,0 +1,783 @@ + + + + + + + ./docs/AUDIT_LYNIS.md + + + +
+

./docs/AUDIT_LYNIS.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Lynis Audit:

+
[ Lynis 3.1.4 ]
+
+################################################################################
+  Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
+  welcome to redistribute it under the terms of the GNU General Public License.
+  See the LICENSE file for details about using this software.
+
+  2007-2024, CISOfy - https://cisofy.com/lynis/
+  Enterprise support available (compliance, plugins, interface and tools)
+################################################################################
+
+
+[+] Initializing program
+------------------------------------
+  - Detecting OS...                                           [ DONE ]
+  - Checking profiles...                                      [ DONE ]
+
+  ---------------------------------------------------
+  Program version:           3.1.4
+  Operating system:          Linux
+  Operating system name:     Debian
+  Operating system version:  12
+  Kernel version:            6.12.22+bpo
+  Hardware platform:         x86_64
+  Hostname:                  live
+  ---------------------------------------------------
+  Profiles:                  /etc/lynis/default.prf
+  Log file:                  /var/log/lynis.log
+  Report file:               /var/log/lynis-report.dat
+  Report version:            1.0
+  Plugin directory:          /usr/share/lynis/plugins
+  ---------------------------------------------------
+  Auditor:                   Centurion_Intelligence_Consulting_Agency
+  Language:                  en
+  Test category:             all
+  Test group:                all
+  ---------------------------------------------------
+  - Program update status...                                  [ NO UPDATE ]
+
+[+] System tools
+------------------------------------
+  - Scanning available tools...
+  - Checking system binaries...
+
+[+] Plugins (phase 1)
+------------------------------------
+ Note: plugins have more extensive tests and may take several minutes to complete
+
+  - Plugins enabled                                           [ NONE ]
+
+[+] Boot and services
+------------------------------------
+  - Service Manager                                           [ systemd ]
+  - Checking UEFI boot                                        [ ENABLED ]
+  - Checking Secure Boot                                      [ DISABLED ]
+    - Boot loader                                             [ NONE FOUND ]
+  - Check running services (systemctl)                        [ DONE ]
+        Result: found 17 running services
+  - Check enabled services at boot (systemctl)                [ DONE ]
+        Result: found 24 enabled services
+  - Check startup files (permissions)                         [ OK ]
+  - Running 'systemd-analyze security'
+      Unit name (exposure value) and predicate
+      --------------------------------
+    - auditd.service (value=8.7)                              [ EXPOSED ]
+    - chrony.service (value=3.5)                              [ PROTECTED ]
+    - clamav-daemon.service (value=3.5)                       [ PROTECTED ]
+    - cron.service (value=9.6)                                [ UNSAFE ]
+    - dbus.service (value=9.6)                                [ UNSAFE ]
+    - dm-event.service (value=9.5)                            [ UNSAFE ]
+    - emergency.service (value=9.5)                           [ UNSAFE ]
+    - fail2ban.service (value=6.5)                            [ MEDIUM ]
+    - getty@tty1.service (value=9.6)                          [ UNSAFE ]
+    - haveged.service (value=3.0)                             [ PROTECTED ]
+    - ifup@ens3.service (value=9.5)                           [ UNSAFE ]
+    - ifup@ens4.service (value=9.5)                           [ UNSAFE ]
+    - lvm2-lvmpolld.service (value=9.5)                       [ UNSAFE ]
+    - polkit.service (value=9.6)                              [ UNSAFE ]
+    - rc-local.service (value=9.6)                            [ UNSAFE ]
+    - rescue.service (value=9.5)                              [ UNSAFE ]
+    - rsyslog.service (value=9.6)                             [ UNSAFE ]
+    - ssh.service (value=9.6)                                 [ UNSAFE ]
+    - systemd-ask-password-console.service (value=9.4)        [ UNSAFE ]
+    - systemd-ask-password-wall.service (value=9.4)           [ UNSAFE ]
+    - systemd-fsckd.service (value=9.5)                       [ UNSAFE ]
+    - systemd-initctl.service (value=9.4)                     [ UNSAFE ]
+    - systemd-journald.service (value=4.3)                    [ PROTECTED ]
+    - systemd-logind.service (value=2.8)                      [ PROTECTED ]
+    - systemd-networkd.service (value=2.6)                    [ PROTECTED ]
+    - systemd-udevd.service (value=7.1)                       [ MEDIUM ]
+    - unattended-upgrades.service (value=9.6)                 [ UNSAFE ]
+    - usbguard-dbus.service (value=9.6)                       [ UNSAFE ]
+    - usbguard.service (value=2.8)                            [ PROTECTED ]
+    - user@0.service (value=9.8)                              [ UNSAFE ]
+    - uuidd.service (value=5.8)                               [ MEDIUM ]
+
+[+] Kernel
+------------------------------------
+  - Checking default runlevel                                 [ runlevel 5 ]
+  - Checking CPU support (NX/PAE)
+    CPU support: PAE and/or NoeXecute supported               [ FOUND ]
+  - Checking kernel version and release                       [ DONE ]
+  - Checking kernel type                                      [ DONE ]
+  - Checking loaded kernel modules                            [ DONE ]
+      Found 84 active modules
+  - Checking Linux kernel configuration file                  [ FOUND ]
+  - Checking default I/O kernel scheduler                     [ NOT FOUND ]
+  - Checking for available kernel update                      [ OK ]
+  - Checking core dumps configuration
+    - configuration in systemd conf files                     [ DEFAULT ]
+    - configuration in /etc/profile                           [ DEFAULT ]
+    - 'hard' configuration in /etc/security/limits.conf       [ DISABLED ]
+    - 'soft' configuration in /etc/security/limits.conf       [ DISABLED ]
+    - Checking setuid core dumps configuration                [ DISABLED ]
+  - Check if reboot is needed                                 [ NO ]
+
+[+] Memory and Processes
+------------------------------------
+  - Checking /proc/meminfo                                    [ FOUND ]
+  - Searching for dead/zombie processes                       [ NOT FOUND ]
+  - Searching for IO waiting processes                        [ NOT FOUND ]
+  - Search prelink tooling                                    [ NOT FOUND ]
+
+[+] Users, Groups and Authentication
+------------------------------------
+  - Administrator accounts                                    [ OK ]
+  - Unique UIDs                                               [ OK ]
+  - Consistency of group files (grpck)                        [ OK ]
+  - Unique group IDs                                          [ OK ]
+  - Unique group names                                        [ OK ]
+  - Password file consistency                                 [ OK ]
+  - Password hashing methods                                  [ OK ]
+  - Password hashing rounds (minimum)                         [ CONFIGURED ]
+  - Query system users (non daemons)                          [ DONE ]
+  - NIS+ authentication support                               [ NOT ENABLED ]
+  - NIS authentication support                                [ NOT ENABLED ]
+  - Sudoers file(s)                                           [ FOUND ]
+    - Permissions for directory: /etc/sudoers.d               [ OK ]
+    - Permissions for: /etc/sudoers                           [ OK ]
+    - Permissions for: /etc/sudoers.d/README                  [ OK ]
+    - Permissions for: /etc/sudoers.d/live                    [ OK ]
+  - PAM password strength tools                               [ OK ]
+  - PAM configuration files (pam.conf)                        [ FOUND ]
+  - PAM configuration files (pam.d)                           [ FOUND ]
+  - PAM modules                                               [ FOUND ]
+  - LDAP module in PAM                                        [ NOT FOUND ]
+  - Accounts without expire date                              [ OK ]
+  - Accounts without password                                 [ OK ]
+  - Locked accounts                                           [ OK ]
+  - User password aging (minimum)                             [ CONFIGURED ]
+  - User password aging (maximum)                             [ CONFIGURED ]
+  - Checking expired passwords                                [ OK ]
+  - Checking Linux single user mode authentication            [ OK ]
+  - Determining default umask
+    - umask (/etc/profile)                                    [ NOT FOUND ]
+    - umask (/etc/login.defs)                                 [ OK ]
+  - LDAP authentication support                               [ NOT ENABLED ]
+  - Logging failed login attempts                             [ ENABLED ]
+
+[+] Kerberos
+------------------------------------
+  - Check for Kerberos KDC and principals                     [ NOT FOUND ]
+
+[+] Shells
+------------------------------------
+  - Checking shells from /etc/shells
+    Result: found 12 shells (valid shells: 12).
+    - Session timeout settings/tools                          [ FOUND ]
+  - Checking default umask values
+    - Checking default umask in /etc/bash.bashrc              [ NONE ]
+    - Checking default umask in /etc/profile                  [ NONE ]
+
+[+] File systems
+------------------------------------
+  - Checking mount points
+    - Checking /home mount point                              [ SUGGESTION ]
+    - Checking /tmp mount point                               [ OK ]
+    - Checking /var mount point                               [ SUGGESTION ]
+  - Query swap partitions (fstab)                             [ NONE ]
+  - Testing swap partitions                                   [ OK ]
+  - Testing /proc mount (hidepid)                             [ SUGGESTION ]
+  - Checking for old files in /tmp                            [ OK ]
+  - Checking /tmp sticky bit                                  [ OK ]
+  - Checking /var/tmp sticky bit                              [ OK ]
+  - ACL support root file system                              [ ENABLED ]
+  - Mount options of /                                        [ NON DEFAULT ]
+  - Mount options of /dev                                     [ PARTIALLY HARDENED ]
+  - Mount options of /dev/shm                                 [ PARTIALLY HARDENED ]
+  - Mount options of /run                                     [ HARDENED ]
+  - Mount options of /tmp                                     [ PARTIALLY HARDENED ]
+  - Total without nodev:11 noexec:13 nosuid:9 ro or noexec (W^X): 9 of total 33
+  - Checking Locate database                                  [ FOUND ]
+  - Disable kernel support of some filesystems
+    - Module cramfs is blacklisted                            [ OK ]
+    - Module freevxfs is blacklisted                          [ OK ]
+    - Module hfs is blacklisted                               [ OK ]
+    - Module hfsplus is blacklisted                           [ OK ]
+    - Module jffs2 is blacklisted                             [ OK ]
+    - Module udf is blacklisted                               [ OK ]
+
+[+] USB Devices
+------------------------------------
+  - Checking usb-storage driver (modprobe config)             [ DISABLED ]
+  - Checking USB devices authorization                        [ ENABLED ]
+  - Checking USBGuard                                         [ FOUND ]
+    - Configuration                                           [ FOUND ]
+      - Restore controller device state                       [ false ]
+      - Rule for controllers connected before daemon starts   [ keep ]
+      - Rule for devices connected before daemon starts       [ allow ]
+      - Rule for devices inserted after daemon starts         [ apply-policy ]
+      - Rule for devices not in RuleFile                      [ block ]
+    - RuleFile                                                [ FOUND ]
+      - Controllers & Devices allow                           [ 2 ]
+      - Controllers & Devices block                           [ 0 ]
+      - Controllers & Devices reject                          [ 0 ]
+
+[+] Storage
+------------------------------------
+  - Checking firewire ohci driver (modprobe config)           [ DISABLED ]
+
+[+] NFS
+------------------------------------
+  - Check running NFS daemon                                  [ NOT FOUND ]
+
+[+] Name services
+------------------------------------
+  - Searching DNS domain name                                 [ FOUND ]
+      Domain name: local
+  - Checking /etc/hosts
+    - Duplicate entries in hosts file                         [ NONE ]
+    - Presence of configured hostname in /etc/hosts           [ FOUND ]
+    - Hostname mapped to localhost                            [ NOT FOUND ]
+    - Localhost mapping to IP address                         [ OK ]
+
+[+] Ports and packages
+------------------------------------
+  - Searching package managers
+    - Searching dpkg package manager                          [ FOUND ]
+      - Querying package manager
+    - Query unpurged packages                                 [ NONE ]
+    - debsums utility                                         [ FOUND ]
+      - Cron job for debsums                                  [ FOUND ]
+  - Checking security repository in sources.list file         [ OK ]
+  - Checking APT package database                             [ OK ]
+  - Checking vulnerable packages (apt-get only)               [ DONE ]
+  - Checking upgradeable packages                             [ NONE ]
+  - Checking package audit tool                               [ INSTALLED ]
+    Found: apt-get
+  - Toolkit for automatic upgrades (unattended-upgrade)       [ FOUND ]
+
+[+] Networking
+------------------------------------
+  - Checking IPv6 configuration                               [ ENABLED ]
+      Configuration method                                    [ MANUAL ]
+      IPv6 only                                               [ NO ]
+  - Checking configured nameservers
+    - Testing nameservers
+        Nameserver: 135.181.207.105                           [ OK ]
+        Nameserver: 89.58.62.53                               [ OK ]
+    - Minimal of 2 responsive nameservers                     [ OK ]
+  - Checking default gateway                                  [ DONE ]
+  - Getting listening ports (TCP/UDP)                         [ DONE ]
+  - Checking promiscuous interfaces                           [ OK ]
+  - Checking waiting connections                              [ OK ]
+  - Checking status DHCP client                               [ RUNNING ]
+  - Checking for ARP monitoring software                      [ NOT FOUND ]
+  - Uncommon network protocols                                [ NOT FOUND ]
+
+[+] Printers and Spools
+------------------------------------
+  - Checking cups daemon                                      [ NOT FOUND ]
+  - Checking lp daemon                                        [ NOT RUNNING ]
+
+[+] Software: e-mail and messaging
+------------------------------------
+
+[+] Software: firewalls
+------------------------------------
+  - Checking iptables kernel module                           [ FOUND ]
+    - Checking iptables policies of chains                    [ FOUND ]
+      - Chain INPUT (table: filter, target: DROP)             [ DROP ]
+      - Chain INPUT (table: security, target: ACCEPT)         [ ACCEPT ]
+    - Checking for empty ruleset                              [ OK ]
+    - Checking for unused rules                               [ FOUND ]
+  - Checking host based firewall                              [ ACTIVE ]
+
+[+] Software: webserver
+------------------------------------
+  - Checking Apache                                           [ NOT FOUND ]
+  - Checking nginx                                            [ NOT FOUND ]
+
+[+] SSH Support
+------------------------------------
+  - Checking running SSH daemon                               [ FOUND ]
+    - Searching SSH configuration                             [ FOUND ]
+    - OpenSSH option: AllowTcpForwarding                      [ OK ]
+    - OpenSSH option: ClientAliveCountMax                     [ OK ]
+    - OpenSSH option: ClientAliveInterval                     [ OK ]
+    - OpenSSH option: FingerprintHash                         [ OK ]
+    - OpenSSH option: GatewayPorts                            [ OK ]
+    - OpenSSH option: IgnoreRhosts                            [ OK ]
+    - OpenSSH option: LoginGraceTime                          [ OK ]
+    - OpenSSH option: LogLevel                                [ OK ]
+    - OpenSSH option: MaxAuthTries                            [ OK ]
+    - OpenSSH option: MaxSessions                             [ OK ]
+    - OpenSSH option: PermitRootLogin                         [ OK ]
+    - OpenSSH option: PermitUserEnvironment                   [ OK ]
+    - OpenSSH option: PermitTunnel                            [ OK ]
+    - OpenSSH option: Port                                    [ OK ]
+    - OpenSSH option: PrintLastLog                            [ OK ]
+    - OpenSSH option: StrictModes                             [ OK ]
+    - OpenSSH option: TCPKeepAlive                            [ OK ]
+    - OpenSSH option: UseDNS                                  [ OK ]
+    - OpenSSH option: X11Forwarding                           [ OK ]
+    - OpenSSH option: AllowAgentForwarding                    [ OK ]
+    - OpenSSH option: AllowUsers                              [ FOUND ]
+    - OpenSSH option: AllowGroups                             [ NOT FOUND ]
+
+[+] SNMP Support
+------------------------------------
+  - Checking running SNMP daemon                              [ NOT FOUND ]
+
+[+] Databases
+------------------------------------
+    No database engines found
+
+[+] LDAP Services
+------------------------------------
+  - Checking OpenLDAP instance                                [ NOT FOUND ]
+
+[+] PHP
+------------------------------------
+  - Checking PHP                                              [ NOT FOUND ]
+
+[+] Squid Support
+------------------------------------
+  - Checking running Squid daemon                             [ NOT FOUND ]
+
+[+] Logging and files
+------------------------------------
+  - Checking for a running log daemon                         [ OK ]
+    - Checking Syslog-NG status                               [ NOT FOUND ]
+    - Checking systemd journal status                         [ FOUND ]
+    - Checking Metalog status                                 [ NOT FOUND ]
+    - Checking RSyslog status                                 [ FOUND ]
+    - Checking RFC 3195 daemon status                         [ NOT FOUND ]
+    - Checking minilogd instances                             [ NOT FOUND ]
+    - Checking wazuh-agent daemon status                      [ NOT FOUND ]
+  - Checking logrotate presence                               [ OK ]
+  - Checking remote logging                                   [ NOT ENABLED ]
+  - Checking log directories (static list)                    [ DONE ]
+  - Checking open log files                                   [ DONE ]
+  - Checking deleted files in use                             [ DONE ]
+
+[+] Insecure services
+------------------------------------
+  - Installed inetd package                                   [ NOT FOUND ]
+  - Installed xinetd package                                  [ OK ]
+    - xinetd status                                           [ NOT ACTIVE ]
+  - Installed rsh client package                              [ OK ]
+  - Installed rsh server package                              [ OK ]
+  - Installed telnet client package                           [ OK ]
+  - Installed telnet server package                           [ NOT FOUND ]
+  - Checking NIS client installation                          [ OK ]
+  - Checking NIS server installation                          [ OK ]
+  - Checking TFTP client installation                         [ OK ]
+  - Checking TFTP server installation                         [ OK ]
+
+[+] Banners and identification
+------------------------------------
+  - /etc/issue                                                [ FOUND ]
+    - /etc/issue contents                                     [ OK ]
+  - /etc/issue.net                                            [ FOUND ]
+    - /etc/issue.net contents                                 [ OK ]
+
+[+] Scheduled tasks
+------------------------------------
+  - Checking crontab and cronjob files                        [ DONE ]
+
+[+] Accounting
+------------------------------------
+  - Checking accounting information                           [ OK ]
+  - Checking sysstat accounting data                          [ ENABLED ]
+  - Checking auditd                                           [ ENABLED ]
+    - Checking audit rules                                    [ OK ]
+    - Checking audit configuration file                       [ OK ]
+    - Checking auditd log file                                [ FOUND ]
+
+[+] Time and Synchronization
+------------------------------------
+  - NTP daemon found: chronyd                                 [ FOUND ]
+  - Checking for a running NTP daemon or client               [ OK ]
+
+[+] Cryptography
+------------------------------------
+  - Checking for expired SSL certificates [0/139]             [ NONE ]
+
+  [WARNING]: Test CRYP-7902 had a long execution: 20.445007 seconds
+
+  - Found 0 encrypted and 0 unencrypted swap devices in use.  [ OK ]
+  - Kernel entropy is sufficient                              [ YES ]
+  - HW RNG & rngd                                             [ NO ]
+  - SW prng                                                   [ YES ]
+  - MOR variable not found                                    [ WEAK ]
+
+[+] Virtualization
+------------------------------------
+
+[+] Containers
+------------------------------------
+
+[+] Security frameworks
+------------------------------------
+  - Checking presence AppArmor                                [ FOUND ]
+    - Checking AppArmor status                                [ DISABLED ]
+  - Checking presence SELinux                                 [ NOT FOUND ]
+  - Checking presence TOMOYO Linux                            [ NOT FOUND ]
+  - Checking presence grsecurity                              [ NOT FOUND ]
+  - Checking for implemented MAC framework                    [ NONE ]
+
+[+] Software: file integrity
+------------------------------------
+  - Checking file integrity tools
+    - AIDE                                                    [ FOUND ]
+      - AIDE config file                                      [ FOUND ]
+      - AIDE database                                         [ FOUND ]
+  - dm-integrity (status)                                     [ DISABLED ]
+  - dm-verity (status)                                        [ DISABLED ]
+      - AIDE config (Checksum)                                [ OK ]
+  - Checking presence integrity tool                          [ FOUND ]
+
+[+] Software: System tooling
+------------------------------------
+  - Checking automation tooling
+    - Ansible artifact                                        [ FOUND ]
+  - Automation tooling                                        [ FOUND ]
+  - Checking presence of Fail2ban                             [ FOUND ]
+    - Checking Fail2ban jails                                 [ ENABLED ]
+  - Checking for IDS/IPS tooling                              [ FOUND ]
+
+[+] Software: Malware
+------------------------------------
+  - Checking chkrootkit                                       [ FOUND ]
+  - Checking Rootkit Hunter                                   [ FOUND ]
+  - Checking ClamAV scanner                                   [ FOUND ]
+  - Malware software components                               [ FOUND ]
+    - Active agent                                            [ NOT FOUND ]
+    - Rootkit scanner                                         [ FOUND ]
+
+[+] File Permissions
+------------------------------------
+  - Starting file permissions check
+    File: /etc/cron.allow                                     [ OK ]
+    File: /etc/crontab                                        [ OK ]
+    File: /etc/group                                          [ OK ]
+    File: /etc/group-                                         [ OK ]
+    File: /etc/hosts.allow                                    [ OK ]
+    File: /etc/hosts.deny                                     [ OK ]
+    File: /etc/issue                                          [ OK ]
+    File: /etc/issue.net                                      [ OK ]
+    File: /etc/motd                                           [ OK ]
+    File: /etc/passwd                                         [ OK ]
+    File: /etc/passwd-                                        [ OK ]
+    File: /etc/ssh/sshd_config                                [ OK ]
+    Directory: /root/.ssh                                     [ OK ]
+    Directory: /etc/cron.d                                    [ OK ]
+    Directory: /etc/cron.daily                                [ OK ]
+    Directory: /etc/cron.hourly                               [ OK ]
+    Directory: /etc/cron.weekly                               [ OK ]
+    Directory: /etc/cron.monthly                              [ OK ]
+
+[+] Home directories
+------------------------------------
+  - Permissions of home directories                           [ OK ]
+  - Ownership of home directories                             [ OK ]
+  - Checking shell history files                              [ OK ]
+
+[+] Kernel Hardening
+------------------------------------
+  - Comparing sysctl key pairs with scan profile
+    - dev.tty.ldisc_autoload (exp: 0)                         [ OK ]
+    - fs.protected_fifos (exp: 2)                             [ OK ]
+    - fs.protected_hardlinks (exp: 1)                         [ OK ]
+    - fs.protected_regular (exp: 2)                           [ OK ]
+    - fs.protected_symlinks (exp: 1)                          [ OK ]
+    - fs.suid_dumpable (exp: 0)                               [ OK ]
+    - kernel.core_uses_pid (exp: 1)                           [ OK ]
+    - kernel.ctrl-alt-del (exp: 0)                            [ OK ]
+    - kernel.dmesg_restrict (exp: 1)                          [ OK ]
+    - kernel.kptr_restrict (exp: 2)                           [ OK ]
+    - kernel.modules_disabled (exp: 1)                        [ OK ]
+    - kernel.perf_event_paranoid (exp: 2 3 4)                 [ OK ]
+    - kernel.randomize_va_space (exp: 2)                      [ OK ]
+    - kernel.sysrq (exp: 0)                                   [ OK ]
+    - kernel.unprivileged_bpf_disabled (exp: 1)               [ OK ]
+    - kernel.yama.ptrace_scope (exp: 1 2 3)                   [ OK ]
+    - net.core.bpf_jit_harden (exp: 2)                        [ OK ]
+    - net.ipv4.conf.all.accept_redirects (exp: 0)             [ OK ]
+    - net.ipv4.conf.all.accept_source_route (exp: 0)          [ OK ]
+    - net.ipv4.conf.all.bootp_relay (exp: 0)                  [ OK ]
+    - net.ipv4.conf.all.forwarding (exp: 0)                   [ OK ]
+    - net.ipv4.conf.all.log_martians (exp: 1)                 [ OK ]
+    - net.ipv4.conf.all.mc_forwarding (exp: 0)                [ OK ]
+    - net.ipv4.conf.all.proxy_arp (exp: 0)                    [ OK ]
+    - net.ipv4.conf.all.rp_filter (exp: 1)                    [ OK ]
+    - net.ipv4.conf.all.send_redirects (exp: 0)               [ OK ]
+    - net.ipv4.conf.default.accept_redirects (exp: 0)         [ OK ]
+    - net.ipv4.conf.default.accept_source_route (exp: 0)      [ OK ]
+    - net.ipv4.conf.default.log_martians (exp: 1)             [ OK ]
+    - net.ipv4.icmp_echo_ignore_broadcasts (exp: 1)           [ OK ]
+    - net.ipv4.icmp_ignore_bogus_error_responses (exp: 1)     [ OK ]
+    - net.ipv4.tcp_syncookies (exp: 1)                        [ OK ]
+    - net.ipv4.tcp_timestamps (exp: 0 1)                      [ OK ]
+    - net.ipv6.conf.all.accept_redirects (exp: 0)             [ OK ]
+    - net.ipv6.conf.all.accept_source_route (exp: 0)          [ OK ]
+    - net.ipv6.conf.default.accept_redirects (exp: 0)         [ OK ]
+    - net.ipv6.conf.default.accept_source_route (exp: 0)      [ OK ]
+
+[+] Hardening
+------------------------------------
+    - Installed compiler(s)                                   [ FOUND ]
+    - Installed malware scanner                               [ FOUND ]
+    - Non-native binary formats                               [ FOUND ]
+
+[+] Custom tests
+------------------------------------
+  - Running custom tests...                                   [ NONE ]
+
+[+] Plugins (phase 2)
+------------------------------------
+
+================================================================================
+
+  -[ Lynis 3.1.4 Results ]-
+
+  Great, no warnings
+
+  Suggestions (5):
+  ----------------------------
+  * Consider hardening system services [BOOT-5264]
+    - Details  : Run '/usr/bin/systemd-analyze security SERVICE' for each service
+    - Related resources
+      * Article: Systemd features to secure service files: https://linux-audit.com/systemd/systemd-features-to-secure-units-and-services/
+      * Website: https://cisofy.com/lynis/controls/BOOT-5264/
+
+  * To decrease the impact of a full /home file system, place /home on a separate partition [FILE-6310]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/FILE-6310/
+
+  * To decrease the impact of a full /var file system, place /var on a separate partition [FILE-6310]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/FILE-6310/
+
+  * Check iptables rules to see which rules are currently not used [FIRE-4513]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/FIRE-4513/
+
+  * Enable logging to an external logging host for archiving purposes and additional protection [LOGG-2154]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/LOGG-2154/
+
+  Follow-up:
+  ----------------------------
+  - Show details of a test (lynis show details TEST-ID)
+  - Check the logfile for all details (less /var/log/lynis.log)
+  - Read security controls texts (https://cisofy.com)
+  - Use --upload to upload data to central system (Lynis Enterprise users)
+
+================================================================================
+
+  Lynis security scan details:
+
+  Hardening index : 92 [##################  ]
+  Tests performed : 261
+  Plugins enabled : 0
+
+  Components:
+  - Firewall               [V]
+  - Malware scanner        [V]
+
+  Scan mode:
+  Normal [V]  Forensics [ ]  Integration [ ]  Pentest [ ]
+
+  Lynis modules:
+  - Compliance status      [?]
+  - Security audit         [V]
+  - Vulnerability scan     [V]
+
+  Files:
+  - Test and debug information      : /var/log/lynis.log
+  - Report data                     : /var/log/lynis-report.dat
+
+================================================================================
+
+  Lynis 3.1.4
+
+  Auditing, system hardening, and compliance for UNIX-based systems
+  (Linux, macOS, BSD, and others)
+
+  2007-2024, CISOfy - https://cisofy.com/lynis/
+  Enterprise support available (compliance, plugins, interface and tools)
+
+================================================================================
+
+  [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/AUDIT_SSH.html b/.html/AUDIT_SSH.html new file mode 100644 index 0000000..6c7d15c --- /dev/null +++ b/.html/AUDIT_SSH.html @@ -0,0 +1,212 @@ + + + + + + + ./docs/AUDIT_SSH.md + + + +
+

./docs/AUDIT_SSH.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. SSH Audit by ssh-audit.com

+

CISS.2025.debian.live.builder

+

3. SSH Audit by https://github.com/jtesta/ssh-audit

+
# general
+(gen) banner: SSH-2.0-OpenSSH_9.2p1
+(gen) software: OpenSSH 9.2p1
+(gen) compatibility: OpenSSH 9.9+, Dropbear SSH 2020.79+
+(gen) compression: disabled
+
+# key exchange algorithms
+(kex) sntrup761x25519-sha512@openssh.com  -- [info] available since OpenSSH 8.5
+                                          `- [info] default key exchange from OpenSSH 9.0 to 9.8
+                                          `- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
+(kex) sntrup761x25519-sha512              -- [info] available since OpenSSH 9.9
+                                          `- [info] default key exchange since OpenSSH 9.9
+                                          `- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
+(kex) kex-strict-s-v00@openssh.com        -- [info] pseudo-algorithm that denotes the peer supports a stricter key exchange method as a counter-measure to the Terrapin attack (CVE-2023-48795)
+
+# host-key algorithms
+(key) ssh-ed25519                         -- [info] available since OpenSSH 6.5, Dropbear SSH 2020.79
+(key) rsa-sha2-512                        -- [info] available since OpenSSH 7.2
+(key) rsa-sha2-256                        -- [info] available since OpenSSH 7.2, Dropbear SSH 2020.79
+
+# encryption algorithms (ciphers)
+(enc) aes256-gcm@openssh.com              -- [info] available since OpenSSH 6.2
+(enc) aes256-ctr                          -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
+
+# message authentication code algorithms
+(mac) hmac-sha2-512-etm@openssh.com       -- [info] available since OpenSSH 6.2
+(mac) hmac-sha2-256-etm@openssh.com       -- [info] available since OpenSSH 6.2
+
+# algorithm recommendations (for OpenSSH 9.2)
+(rec) +aes128-ctr                         -- enc algorithm to append
+(rec) +aes128-gcm@openssh.com             -- enc algorithm to append
+(rec) +aes192-ctr                         -- enc algorithm to append
+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/CCLA-1.0.html b/.html/CCLA-1.0.html new file mode 100644 index 0000000..2cba60c --- /dev/null +++ b/.html/CCLA-1.0.html @@ -0,0 +1,223 @@ + + + + + + + ./config/includes.chroot/preseed/CCLA-1.0.md + + + +
+

./config/includes.chroot/preseed/CCLA-1.0.md

+
+

Centurion Commercial License Agreement 1.0

+

1. General Terms

+

1.1. This Subscription License Agreement ("Agreement") governs the commercial use of the Software ("Software").

+

1.2. Private and open-source usage of the Software remains governed by the EUPL-1.2 license.

+

1.3. By purchasing and using the Software under this Agreement, you ("Licensee") agree to the terms outlined below.

+

1.4. Only the English version of this Agreement shall be legally binding. Translations are provided for convenience only.

+

2. Grant of License

+

2.1. Subject-to-payment of applicable subscription fees, Licensor grants Licensee a

+ +

right to use the Software for commercial purposes.

+

2.2. This license is valid only for the duration of the subscription period and under the scope defined in this Agreement.

+

3. Subscription Fees and Payment

+

3.1. Licensee agrees to pay the subscription fees as specified in the pricing agreement. These fees are non-refundable.

+

3.2. Licensor reserves the right to modify subscription fees upon 30 days' written notice.

+

4. Restrictions

+

4.1. Licensee shall not:

+ +

4.2. The Software may not be used for illegal or unethical purposes.

+

5. Support and Updates

+

5.1. Licensor will provide updates and support for the Software during the subscription period, as detailed in the accompanying support agreement.

+

5.2. Support services may include bug fixes, patches, and minor updates. Major updates may incur additional fees.

+

6. Termination

+

6.1. This Agreement is valid for the subscription term unless terminated earlier:

+ +

6.2. Upon termination, Licensee must cease all uses of the Software and delete all copies.

+

7. Liability and Warranty

+

7.1. The Software is provided "as is" without warranties of any kind, except as required by law.

+

7.2. Licensors' liability is limited to the number of subscription fees paid by Licensee in the preceding 12 months.

+

8. Governing Law

+

8.1. This Agreement shall be governed by the laws of Portugal.

+

8.2. Disputes arising under this Agreement shall be subject to the exclusive jurisdiction of the courts of Portugal.

+

9. Miscellaneous

+

9.1. Any changes to this Agreement must be in writing and signed by both parties.

+

9.2. If any provision of this Agreement is found invalid, the remaining provisions shall remain enforceable.

+

10. Contact Information

+ +
+

This Subscription License Agreement was last updated at 09.05.2025.

+ + diff --git a/.html/CHANGELOG.html b/.html/CHANGELOG.html new file mode 100644 index 0000000..d477be1 --- /dev/null +++ b/.html/CHANGELOG.html @@ -0,0 +1,178 @@ + + + + + + + ./docs/CHANGELOG.md + + + +
+

./docs/CHANGELOG.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

TBA

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/CODING_CONVENTION.html b/.html/CODING_CONVENTION.html new file mode 100644 index 0000000..c29c2ae --- /dev/null +++ b/.html/CODING_CONVENTION.html @@ -0,0 +1,250 @@ + + + + + + + ./docs/CODING_CONVENTION.md + + + +
+

./docs/CODING_CONVENTION.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Coding Style

+

2.1. PR

+

You'd make the life of the maintainers easier if you submit only one patch with one functional change per PR.

+

2.2 Documentation

+

Some people really read that ! New features would need to be documented in the appropriate section in usage() and in ~/docs/DOCUMENTATION.md.

+

2.3. Coding

+

2.3.1. Shell / bash

+

Bash is actually quite powerful—not only with respect to sockets. It's not as mighty as perl or python, but there are a lot of neat features. Here's how you make use of them. Besides those short hints here, there's a wealth of information there.

+ +

2.3.2. Shell specific

+ +

2.3.3. Variables

+ +

3. Misc

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/CONTRIBUTING.html b/.html/CONTRIBUTING.html new file mode 100644 index 0000000..871898a --- /dev/null +++ b/.html/CONTRIBUTING.html @@ -0,0 +1,184 @@ + + + + + + + ./docs/CONTRIBUTING.md + + + +
+

./docs/CONTRIBUTING.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Contributors

+

X

+

I would like to express my sincere gratitude to Mr., Who-wants-to-live-forever, for his gracious support and insightful and profound criticism.

+

Ζ

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/CREDITS.html b/.html/CREDITS.html new file mode 100644 index 0000000..cde3bad --- /dev/null +++ b/.html/CREDITS.html @@ -0,0 +1,186 @@ + + + + + + + ./docs/CREDITS.md + + + +
+

./docs/CREDITS.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Credits

+

2.2. Authors

+

2.3. Contributors

+

X

+

I would like to express my sincere gratitude to Mr., Who-wants-to-live-forever, for his gracious support and insightful and profound criticism.

+

Ζ

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/DOCUMENTATION.html b/.html/DOCUMENTATION.html new file mode 100644 index 0000000..e14a48b --- /dev/null +++ b/.html/DOCUMENTATION.html @@ -0,0 +1,300 @@ + + + + + + + ./docs/DOCUMENTATION.md + + + +
+

./docs/DOCUMENTATION.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Usage

+
CISS.debian.live.builder
+Master V8.03.127.2025.06.02
+
+(c) Marc S. Weidner, 2018 - 2025
+(p) Centurion Press, 2024 - 2025
+
+https://coresecret.eu/
+
+A lightweight Shell Wrapper for building a hardened Debian Bookworm Live ISO Image.
+
+"./ciss_live_builder.sh <option>", where <option> is one or more of:
+
+  --help, -h
+    What you're looking at.
+
+  --architecture <STRING> one of <amd64 | arm64>
+    A string reflecting the architecture of the Live System.
+    MUST be provided.
+
+  --build-directory </path/to/build_directory>
+    Where the Debian Live Build Image should be generated.
+    MUST be provided.
+
+  --change-splash <STRING> one of <club | hexagon>
+    A string reflecting the GRub Boot Screen Splash you want to use.
+    If omitted defaults to "./.archive/background/club.png".
+
+  --cdi (Experimental Feature)
+    This option generates a boot menu entry to start the forthcoming
+    'CISS.debian.installer', which will be executed after
+    the system has successfully booted up.
+
+  --contact, -c
+    Displays contact information of the author.
+
+  --control <INTEGER>
+    An integer that reflects the version of your Live ISO Image.
+    MUST be provided.
+
+  --debug
+    Enables debug logging for the main program routine. Detailed logging
+    information are written to "/tmp/ciss_live_builder_3764286.log"
+
+  --dhcp-centurion
+    If a DHCP lease is provided, the provider's nameserver will be overridden,
+    and only the hardened, privacy-focused Centurion DNS servers will be used:
+    - https://dns01.eddns.eu/
+    - https://dns02.eddns.de/
+
+  --jump-host <IP | IP | ... >
+    Provide up to 10 IPs for /etc/host.allow whitelisting of SSH access.
+    Could be either IPv4 and / or IPv6 addresses and / or CCDIR notation.
+    If provided, than it MUST be a <SPACE> separated list.
+    IPv6 addresses MUST be encapsulated with [], e.g., [1234::abcd/64].
+
+  --log-statistics-only
+    Provides statistic only after successful building a
+    CISS.debian.live-ISO. While enabling "--log-statistics-only"
+    the argument "--build-directory" MUST be provided while
+    all further options MUST be omitted.
+
+  --provider-netcup-ipv6 
+    Activates IPv6 support for Netcup Root Server. One unique
+    IPv6 address MUST be provided in this case.
+
+  --renice-priority <PRIORITY>
+    Reset the nice priority value of the script and all its children
+    to the desired PRIORITY. MUST be an integer (between "-19" and 19).
+    Negative (higher) values MUST be enclosed in double quotes '"'.
+
+  --reionice-priority <CLASS> <PRIORITY>
+    Reset the ionice priority value of the script and all its children
+    to the desired CLASS. MUST be an integer:
+    1: realtime
+    2: best-effort
+    3: idle
+    defaults to "2".
+    PRIORITY MUST be an integer:
+    between 0 (highest) and 7 (lowest) priority.
+    defaults to "4".
+    A real-time I/O process can significantly slow down other processes
+    or even cause them to starve if it continuously requests I/O.
+
+  --root-password-file </path/to/password.txt>
+    Password file for 'root', if given, MUST be a string of 20 to 64 characters,
+    and MUST NOT contain the special character '"'.
+    If the argument is omitted, no further login authentication is required for
+    the local console. The root password is hashed with an 16 Byte '/dev/random'
+    generated SALT and SHA512 Hashing function and 8,388,608 rounds. Immediately
+    after Hash generation all Variables containing plain password fragments are
+    deleted. Password file SHOULD be 0400 and root:root and is deleted without
+    further prompt after password hash has been successfully generated via:
+    shred -vfzu 5 -f.
+    No tracing of any plain text password fragment in any debug log.
+
+  --ssh-port <INTEGER>
+    The desired Port SSH should listen to.
+    If not provided defaults to Port 22.
+
+  --ssh-pubkey </path/to/.ssh/>
+    Imports the SSH Public Key(s) from the FILE 'authorized_keys' of the
+    specified PATH into the Live ISO. MUST be provided.
+
+  --version, -v
+    Displays version of ./ciss_live_builder.sh.
+
+NOTES:
+  - You MUST be root to run this script.
+
+Contact:
+  - https://coresecret.eu/
+  - security@coresecret.eu
+    - PGP Key 2D98 07F4 1030 1776 597E BDC9 9F54 8853 35A3 C9AD
+      - https://keys.openpgp.org/vks/v1/by-fingerprint/2D9807F410301776597EBDC99F54885335A3C9AD
+

3. Booting

+

3.1. Grub Menu

+

Boot Menu

+

3.2. Integrity checks

+

Integrity Check

+

Integrity Success

+

3.3. Console Login

+

Console Login

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/README.html b/.html/README.html new file mode 100644 index 0000000..433cba5 --- /dev/null +++ b/.html/README.html @@ -0,0 +1,577 @@ + + + + + + + ./README.md + + + +
+

./README.md

+
+

Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge  

+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

This shell wrapper automates the creation of a Debian Bookworm live ISO hardened according to the latest best practices in server and service security. It integrates into your build pipeline to deliver an isolated, robust environment suitable for cloud deployment or unattended installations via the forthcoming CISS.debian.installer. Find here more information to download the latest ISO available. To download the latest public available CISS.debian.live.builder ISO, see: tba.

+

Check out more:

+ +

1.1. Preliminary Remarks

+

1.1.1. HSM

+

Please note that all my signing keys are stored in an HSM and that the signing environment is air-gapped. The next step is to move to a room-gapped environment. ^^

+

1.1.2. HSTS and DNSSEC

+

Please note that coresecret.dev is included in the (HSTS Preload List) and always serves the headers:

+
add_header Expect-CT                 "max-age=86400, enforce"                       always;
+add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" always;
+

Additionally, the entire zone is dual-signed with DNSSEC. See the current DNSSEC status at DNSSEC Audit Report

+

1.2. Immutable Source-of-Truth System

+

This live ISO establishes a secure, fully deterministic, integrity self-verifying boot environment based entirely on static source-code definitions. All configurations, system components, and installation routines are embedded during build time and locked for runtime immutability. This ensures that the live environment functions as a trusted Source of Truth — not only for boot-time operations, but for deploying entire systems in a secure and reproducible way.

+

Once booted, the environment optionally launches a fully scripted installer, via the forthcoming CISS.debian.installer, yet to deploy, that provisions the target system (the hardware the DVD is running on). The installer pulls no external dependencies besides of the necessary Debian debootstrap and Debian Packages and never exposes the target system in a not secure manner to the internet during installation. It operates strictly from within the verified image content, providing fully secured provisioning. Combined with checksum verification, activated by default, at boot and strict firewall defaults, this architecture guarantees that what is executed has not been tampered with and corresponds exactly to the intended source definition.

+

An even more secure deployment variant — an unattended and headless version — can be built without any active network interface or shell-access, also via the forthcoming CISS.debian.installer. Such a version performs all verification steps autonomously, provisions the target device from embedded source artifacts, and reboots into a fully encrypted system image. The system then awaits the decryption passphrase input via an embedded Dropbear SSH server (SSH PubKey only) in the initramfs, exposing no ports without cryptographic hardened access, while also the /boot partition could be encrypted via the built-in support of grub2 (2.12-1~bpo12+1).

+

This approach provides a fully reproducible, audit-friendly, and tamper-resistant provisioning workflow rooted entirely in source-defined infrastructure logic.

+

After build and configuration, the following audit reports can be generated:

+ +

1.2. Preview

+

CISS.debian.live.builder

+

1.3. Caution. Significant information for those considering using D-I.

+

The Debian Installer (d-i) will ALWAYS boot a new system.

+

Regardless of whether you start it:

+ +

The following happens in all cases:

+ +

The Debian Installer loads:

+ +

This means function status of the CISS.2025.debian.live.builder ISO after d-i start:

+ +

2. Features & Rationale

+

Below is a breakdown of each hardening component, with a summary of why each is critical to your security posture.

+

2.1. Kernel Hardening

+

2.1.1. Boot Parameters

+ +

2.1.2. CPU Vulnerability Mitigations

+ +

2.1.3. Kernel Self-Protection

+ +

2.1.4. Local Kernel Hardening

+ +
###########################################################################################
+# Globals: Wrapper for loading CISS.2025 hardened Kernel Parameters
+# Arguments:
+#  none
+###########################################################################################
+# shellcheck disable=SC2317
+sysp() {
+  sysctl -p /etc/sysctl.d/99_local.hardened
+  # sleep 1
+  sysctl -a | grep -E 'kernel|vm|net' > /var/log/sysctl_check"$(date +"%Y-%m-%d_%H:%M:%S")".log
+}
+ +

Warning Once applied, some hardening settings cannot be undone via sysctl without a reboot, and dynamic module loading remains disabled until the next boot. Automatic enforcement at startup is therefore omitted by design—run sysp() manually and plan a reboot to apply or revert these controls.

+

2.2. Module Blacklisting

+ +

2.3. Network Hardening

+ +

2.4. Core Dump & Kernel Hardening

+ +

2.5. Entropy Collection Improvements

+ +

2.6. Permissions & Authentication

+ +

2.7. High-Security Baseline (Lynis Audit)

+ +

2.8. SSH Tunnel & Access Security

+ +

2.9. UFW Hardening

+ +

2.10. Fail2Ban Enhancements

+ +

2.11. NTPsec & Chrony

+ +

3. Script Features & Rationale

+

3.1. Input Validation & Security

+ +

3.2. Debug Mode with Detailed Logging

+ +

3.3. Secure Debug Logging

+ +

3.4. Secure Password Handling

+ +

3.5. Variable Declaration & Validation

+ +

3.6. Pure Bash Implementation

+ +

3.7. Bash Error Handling

+ +
set -o errexit   # Exit script when a command exits with non-zero status (same as "set -e").
+set -o errtrace  # Inherit ERR traps in subshells (same as "set -E").
+set -o functrace # Inherit DEBUG and RETURN traps in subshells (same as "set -T").
+set -o nounset   # Exit script on use of an undefined variable (same as "set -u").
+set -o pipefail  # Return the exit status of the last failed command in a pipeline.
+set -o noclobber # Prevent overwriting files via redirection (same as "set -C").
+ +

4. Prerequisites

+ +

5. Installation & Usage

+

5.1. Interactive CLI / Dialog Wrapper

+
    +
  1. Clone the repository:

    +
    git clone https://git.coresecret.dev/msw/CISS.debian.live.builder.git
    +cd CISS.debian.live.builder
  2. +
  3. Preparation:

    +
      +
    1. Ensure you are root.
    2. +
    3. Create the build directory mkdir /opt/livebuild.
    4. +
    5. Place your desired SSH public key in the authorized_keys file, for example, in the /opt/gitea/CISS.debian.live.builder directory.
    6. +
    7. Place your desired Password in the password.txt file, for example, in the /opt/gitea/CISS.debian.live.builder directory.
    8. +
    9. Make any other changes you need to.
    10. +
  4. +
  5. Run the config builder script ./ciss_live_builder.sh and the integrated lb build command (example):

    +
    chmod 0700 ./ciss_live_builder.sh
    +./ciss_live_builder.sh --architecture amd64 \
    +                       --build-directory /opt/livebuild \
    +                       --change-splash hexagon \
    +                       --control 384 \
    +                       --debug \
    +                       --dhcp-centurion \
    +                       --jump-host 10.0.0.128 [c0de:4711:0815:4242::1] [2abc:4711:0815:4242::1]/64 \
    +                       --provider-netcup-ipv6 [c0de:4711:0815:4242::ffff] \
    +                       --renice-priority "-19" \
    +                       --reionice-priority 1 2 \
    +                       --root-password-file /opt/gitea/CISS.debian.live.builder/password.txt \
    +                       --ssh-port 4242 \
    +                       --ssh-pubkey /opt/gitea/CISS.debian.live.builder
  6. +
  7. Locate your ISO in the --build-directory.

  8. +
  9. Boot from the ISO and login to the live image via the console, or the multi-layer secured coresecret SSH tunnel.

  10. +
  11. Type sysp for the final kernel hardening features.

  12. +
  13. Check the boot log with jboot and via ssf that all services are up.

  14. +
  15. Finally, audit your environment with lsadt for a comprehensive Lynis audit.

  16. +
  17. Type celp for some shortcuts.

  18. +
+

5.2. CI/CD Gitea Runner Workflow Example

+
    +
  1. Clone the repository:

    +
    git clone https://git.coresecret.dev/msw/CISS.debian.live.builder.git
    +cd CISS.debian.live.builder
  2. +
  3. Edit the .gitea/workflows/generate-iso.yaml file according to your requirements. Ensure that the trigger file .gitea/trigger/t_generate.iso.yaml and the counter are updated. Change all the necessary {{ secrets.VAR }}. Push your commits to trigger the workflow. Then download your final ISO from the specified Location.

  4. +
+
#...
+    steps:
+      - name: Preparing SSH Setup, SSH Deploy Key, Known Hosts, .config.
+        run: |
+          rm -rf ~/.ssh && mkdir -m700 ~/.ssh
+
+          ### Private Key
+          echo "${{ secrets.CHANGE_ME }}" >| ~/.ssh/id_ed25519
+          chmod 600 ~/.ssh/id_ed25519
+#...
+      ### https://github.com/actions/checkout/issues/1843
+      - name: Using manual clone via SSH to circumvent Gitea SHA-256 object issues.
+        run: |
+          git clone --branch "${GITHUB_REF_NAME}" ssh://git@CHANGE_ME .
+#...
+      - name: Importing the 'CI PGP DEPLOY ONLY' key.
+        run: |
+          ### GPG-Home relative to the Runner Workspace to avoid changing global files.
+          export GNUPGHOME="$(pwd)/.gnupg"
+          mkdir -m700 "${GNUPGHOME}"
+          echo "${{ secrets.CHANGE_ME }}" >| ci-bot.sec.asc
+#...
+      - name: Configuring Git for signed CI/DEPLOY commits.
+        run: |
+          export GNUPGHOME="$(pwd)/.gnupg"
+          git config user.name "CHANGE_ME"
+          git config user.email "CHANGE_ME"
+#...
+      - name: Preparing the build environment.
+        run: |
+          mkdir -p /opt/config
+          mkdir -p /opt/livebuild
+          echo "${{ secrets.CHANGE_ME }}" >| /opt/config/password.txt
+          echo "${{ secrets.CHANGE_ME }}" >| /opt/config/authorized_keys
+#...
+      - name: Starting CISS.debian.live.builder. This may take a while ...
+        run: |
+          chmod 0700 ciss_live_builder.sh && chown root:root ciss_live_builder.sh
+          timestamp=$(date -u +"%Y_%m_%d_%H_%M_Z")
+          ### Change "--autobuild=" to the specific kernel version you need: '6.12.22+bpo-amd64'.
+          ./ciss_live_builder.sh \
+            --autobuild=CHANGE_ME \
+            --architecture CHANGE_ME \
+            --build-directory /opt/livebuild \
+            --control "${timestamp}" \
+            --jump-host "${{ secrets.CHANGE_ME }}" \
+            --root-password-file /opt/config/password.txt \
+            --ssh-port CHANGE_ME \
+            --ssh-pubkey /opt/config
+#...
+      ### SKIP OR CHANGE ALL REMAINING STEPS
+

6. Licensing & Compliance

+

This repository is fully SPDX-compliant. All source files include appropriate SPDX license identifiers and headers to ensure clear and unambiguous licensing. You can verify compliance by reviewing the top of each file, which follows the SPDX standard for license expressions and metadata.

+

7. Disclaimer

+

This README is provided "as-is" without any warranty. Review your organization's policies before deploying to production.

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/REFERENCES.html b/.html/REFERENCES.html new file mode 100644 index 0000000..0ed7f7c --- /dev/null +++ b/.html/REFERENCES.html @@ -0,0 +1,241 @@ + + + + + + + ./docs/REFERENCES.md + + + +
+

./docs/REFERENCES.md

+
+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Resources

+ + + + + + + + + + + + +

2.6.1. Error handling

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/.html/SECURITY.html b/.html/SECURITY.html new file mode 100644 index 0000000..2e933aa --- /dev/null +++ b/.html/SECURITY.html @@ -0,0 +1,185 @@ + + + + + + + ./SECURITY.md + + + +
+

./SECURITY.md

+
+

Security Policy

+

Reporting vulnerabilities

+

Please send your vulnerability reports to security@coresecret.eu

+

To make sure that your report reaches me, please:

+

Include the words CISS.debian.live.builder and vulnerability to the subject line as well as a short description of the vulnerability.

+

Make sure that the message body contains a clear description of the vulnerability.

+

If you have not received a reply to your email within seven days, please make sure to follow up with me again at security@coresecret.eu

+

Once again, make sure that the word vulnerability is in the subject line.

+

My security policy is available at:

+

https://coresecret.eu/security-policy/

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ + + diff --git a/README.html b/README.html new file mode 100644 index 0000000..d04ea00 --- /dev/null +++ b/README.html @@ -0,0 +1,405 @@ +

Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge   Static Badge  

+

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

This shell wrapper automates the creation of a Debian Bookworm live ISO hardened according to the latest best practices in server and service security. It integrates into your build pipeline to deliver an isolated, robust environment suitable for cloud deployment or unattended installations via the forthcoming CISS.debian.installer. Find here more information to download the latest ISO available. To download the latest public available CISS.debian.live.builder ISO, see: tba.

+

Check out more:

+ +

1.1. Preliminary Remarks

+

1.1.1. HSM

+

Please note that all my signing keys are stored in an HSM and that the signing environment is air-gapped. The next step is to move to a room-gapped environment. ^^

+

1.1.2. HSTS and DNSSEC

+

Please note that coresecret.dev is included in the (HSTS Preload List) and always serves the headers:

+
add_header Expect-CT                 "max-age=86400, enforce"                       always;
+add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" always;
+

Additionally, the entire zone is dual-signed with DNSSEC. See the current DNSSEC status at DNSSEC Audit Report

+

1.2. Immutable Source-of-Truth System

+

This live ISO establishes a secure, fully deterministic, integrity self-verifying boot environment based entirely on static source-code definitions. All configurations, system components, and installation routines are embedded during build time and locked for runtime immutability. This ensures that the live environment functions as a trusted Source of Truth — not only for boot-time operations, but for deploying entire systems in a secure and reproducible way.

+

Once booted, the environment optionally launches a fully scripted installer, via the forthcoming CISS.debian.installer, yet to deploy, that provisions the target system (the hardware the DVD is running on). The installer pulls no external dependencies besides of the necessary Debian debootstrap and Debian Packages and never exposes the target system in a not secure manner to the internet during installation. It operates strictly from within the verified image content, providing fully secured provisioning. Combined with checksum verification, activated by default, at boot and strict firewall defaults, this architecture guarantees that what is executed has not been tampered with and corresponds exactly to the intended source definition.

+

An even more secure deployment variant — an unattended and headless version — can be built without any active network interface or shell-access, also via the forthcoming CISS.debian.installer. Such a version performs all verification steps autonomously, provisions the target device from embedded source artifacts, and reboots into a fully encrypted system image. The system then awaits the decryption passphrase input via an embedded Dropbear SSH server (SSH PubKey only) in the initramfs, exposing no ports without cryptographic hardened access, while also the /boot partition could be encrypted via the built-in support of grub2 (2.12-1~bpo12+1).

+

This approach provides a fully reproducible, audit-friendly, and tamper-resistant provisioning workflow rooted entirely in source-defined infrastructure logic.

+

After build and configuration, the following audit reports can be generated:

+ +

1.2. Preview

+

CISS.debian.live.builder

+

1.3. Caution. Significant information for those considering using D-I.

+

The Debian Installer (d-i) will ALWAYS boot a new system.

+

Regardless of whether you start it:

+ +

The following happens in all cases:

+ +

The Debian Installer loads:

+ +

This means function status of the CISS.2025.debian.live.builder ISO after d-i start:

+ +

2. Features & Rationale

+

Below is a breakdown of each hardening component, with a summary of why each is critical to your security posture.

+

2.1. Kernel Hardening

+

2.1.1. Boot Parameters

+ +

2.1.2. CPU Vulnerability Mitigations

+ +

2.1.3. Kernel Self-Protection

+ +

2.1.4. Local Kernel Hardening

+ +
###########################################################################################
+# Globals: Wrapper for loading CISS.2025 hardened Kernel Parameters
+# Arguments:
+#  none
+###########################################################################################
+# shellcheck disable=SC2317
+sysp() {
+  sysctl -p /etc/sysctl.d/99_local.hardened
+  # sleep 1
+  sysctl -a | grep -E 'kernel|vm|net' > /var/log/sysctl_check"$(date +"%Y-%m-%d_%H:%M:%S")".log
+}
+ +

Warning Once applied, some hardening settings cannot be undone via sysctl without a reboot, and dynamic module loading remains disabled until the next boot. Automatic enforcement at startup is therefore omitted by design—run sysp() manually and plan a reboot to apply or revert these controls.

+

2.2. Module Blacklisting

+ +

2.3. Network Hardening

+ +

2.4. Core Dump & Kernel Hardening

+ +

2.5. Entropy Collection Improvements

+ +

2.6. Permissions & Authentication

+ +

2.7. High-Security Baseline (Lynis Audit)

+ +

2.8. SSH Tunnel & Access Security

+ +

2.9. UFW Hardening

+ +

2.10. Fail2Ban Enhancements

+ +

2.11. NTPsec & Chrony

+ +

3. Script Features & Rationale

+

3.1. Input Validation & Security

+ +

3.2. Debug Mode with Detailed Logging

+ +

3.3. Secure Debug Logging

+ +

3.4. Secure Password Handling

+ +

3.5. Variable Declaration & Validation

+ +

3.6. Pure Bash Implementation

+ +

3.7. Bash Error Handling

+ +
set -o errexit   # Exit script when a command exits with non-zero status (same as "set -e").
+set -o errtrace  # Inherit ERR traps in subshells (same as "set -E").
+set -o functrace # Inherit DEBUG and RETURN traps in subshells (same as "set -T").
+set -o nounset   # Exit script on use of an undefined variable (same as "set -u").
+set -o pipefail  # Return the exit status of the last failed command in a pipeline.
+set -o noclobber # Prevent overwriting files via redirection (same as "set -C").
+ +

4. Prerequisites

+ +

5. Installation & Usage

+

5.1. Interactive CLI / Dialog Wrapper

+
    +
  1. Clone the repository:

    +
    git clone https://git.coresecret.dev/msw/CISS.debian.live.builder.git
    +cd CISS.debian.live.builder
  2. +
  3. Preparation:

    +
      +
    1. Ensure you are root.
    2. +
    3. Create the build directory mkdir /opt/livebuild.
    4. +
    5. Place your desired SSH public key in the authorized_keys file, for example, in the /opt/gitea/CISS.debian.live.builder directory.
    6. +
    7. Place your desired Password in the password.txt file, for example, in the /opt/gitea/CISS.debian.live.builder directory.
    8. +
    9. Make any other changes you need to.
    10. +
  4. +
  5. Run the config builder script ./ciss_live_builder.sh and the integrated lb build command (example):

    +
    chmod 0700 ./ciss_live_builder.sh
    +./ciss_live_builder.sh --architecture amd64 \
    +                       --build-directory /opt/livebuild \
    +                       --change-splash hexagon \
    +                       --control 384 \
    +                       --debug \
    +                       --dhcp-centurion \
    +                       --jump-host 10.0.0.128 [c0de:4711:0815:4242::1] [2abc:4711:0815:4242::1]/64 \
    +                       --provider-netcup-ipv6 [c0de:4711:0815:4242::ffff] \
    +                       --renice-priority "-19" \
    +                       --reionice-priority 1 2 \
    +                       --root-password-file /opt/gitea/CISS.debian.live.builder/password.txt \
    +                       --ssh-port 4242 \
    +                       --ssh-pubkey /opt/gitea/CISS.debian.live.builder
  6. +
  7. Locate your ISO in the --build-directory.

  8. +
  9. Boot from the ISO and login to the live image via the console, or the multi-layer secured coresecret SSH tunnel.

  10. +
  11. Type sysp for the final kernel hardening features.

  12. +
  13. Check the boot log with jboot and via ssf that all services are up.

  14. +
  15. Finally, audit your environment with lsadt for a comprehensive Lynis audit.

  16. +
  17. Type celp for some shortcuts.

  18. +
+

5.2. CI/CD Gitea Runner Workflow Example

+
    +
  1. Clone the repository:

    +
    git clone https://git.coresecret.dev/msw/CISS.debian.live.builder.git
    +cd CISS.debian.live.builder
  2. +
  3. Edit the .gitea/workflows/generate-iso.yaml file according to your requirements. Ensure that the trigger file .gitea/trigger/t_generate.iso.yaml and the counter are updated. Change all the necessary {{ secrets.VAR }}. Push your commits to trigger the workflow. Then download your final ISO from the specified Location.

  4. +
+
#...
+    steps:
+      - name: Preparing SSH Setup, SSH Deploy Key, Known Hosts, .config.
+        run: |
+          rm -rf ~/.ssh && mkdir -m700 ~/.ssh
+
+          ### Private Key
+          echo "${{ secrets.CHANGE_ME }}" >| ~/.ssh/id_ed25519
+          chmod 600 ~/.ssh/id_ed25519
+#...
+      ### https://github.com/actions/checkout/issues/1843
+      - name: Using manual clone via SSH to circumvent Gitea SHA-256 object issues.
+        run: |
+          git clone --branch "${GITHUB_REF_NAME}" ssh://git@CHANGE_ME .
+#...
+      - name: Importing the 'CI PGP DEPLOY ONLY' key.
+        run: |
+          ### GPG-Home relative to the Runner Workspace to avoid changing global files.
+          export GNUPGHOME="$(pwd)/.gnupg"
+          mkdir -m700 "${GNUPGHOME}"
+          echo "${{ secrets.CHANGE_ME }}" >| ci-bot.sec.asc
+#...
+      - name: Configuring Git for signed CI/DEPLOY commits.
+        run: |
+          export GNUPGHOME="$(pwd)/.gnupg"
+          git config user.name "CHANGE_ME"
+          git config user.email "CHANGE_ME"
+#...
+      - name: Preparing the build environment.
+        run: |
+          mkdir -p /opt/config
+          mkdir -p /opt/livebuild
+          echo "${{ secrets.CHANGE_ME }}" >| /opt/config/password.txt
+          echo "${{ secrets.CHANGE_ME }}" >| /opt/config/authorized_keys
+#...
+      - name: Starting CISS.debian.live.builder. This may take a while ...
+        run: |
+          chmod 0700 ciss_live_builder.sh && chown root:root ciss_live_builder.sh
+          timestamp=$(date -u +"%Y_%m_%d_%H_%M_Z")
+          ### Change "--autobuild=" to the specific kernel version you need: '6.12.22+bpo-amd64'.
+          ./ciss_live_builder.sh \
+            --autobuild=CHANGE_ME \
+            --architecture CHANGE_ME \
+            --build-directory /opt/livebuild \
+            --control "${timestamp}" \
+            --jump-host "${{ secrets.CHANGE_ME }}" \
+            --root-password-file /opt/config/password.txt \
+            --ssh-port CHANGE_ME \
+            --ssh-pubkey /opt/config
+#...
+      ### SKIP OR CHANGE ALL REMAINING STEPS
+

6. Licensing & Compliance

+

This repository is fully SPDX-compliant. All source files include appropriate SPDX license identifiers and headers to ensure clear and unambiguous licensing. You can verify compliance by reviewing the top of each file, which follows the SPDX standard for license expressions and metadata.

+

7. Disclaimer

+

This README is provided "as-is" without any warranty. Review your organization's policies before deploying to production.

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/SECURITY.html b/SECURITY.html new file mode 100644 index 0000000..08b7744 --- /dev/null +++ b/SECURITY.html @@ -0,0 +1,13 @@ +

Security Policy

+

Reporting vulnerabilities

+

Please send your vulnerability reports to security@coresecret.eu

+

To make sure that your report reaches me, please:

+

Include the words CISS.debian.live.builder and vulnerability to the subject line as well as a short description of the vulnerability.

+

Make sure that the message body contains a clear description of the vulnerability.

+

If you have not received a reply to your email within seven days, please make sure to follow up with me again at security@coresecret.eu

+

Once again, make sure that the word vulnerability is in the subject line.

+

My security policy is available at:

+

https://coresecret.eu/security-policy/

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/config/includes.chroot/preseed/CCLA-1.0.html b/config/includes.chroot/preseed/CCLA-1.0.html new file mode 100644 index 0000000..ed73304 --- /dev/null +++ b/config/includes.chroot/preseed/CCLA-1.0.html @@ -0,0 +1,51 @@ +

Centurion Commercial License Agreement 1.0

+

1. General Terms

+

1.1. This Subscription License Agreement ("Agreement") governs the commercial use of the Software ("Software").

+

1.2. Private and open-source usage of the Software remains governed by the EUPL-1.2 license.

+

1.3. By purchasing and using the Software under this Agreement, you ("Licensee") agree to the terms outlined below.

+

1.4. Only the English version of this Agreement shall be legally binding. Translations are provided for convenience only.

+

2. Grant of License

+

2.1. Subject-to-payment of applicable subscription fees, Licensor grants Licensee a

+ +

right to use the Software for commercial purposes.

+

2.2. This license is valid only for the duration of the subscription period and under the scope defined in this Agreement.

+

3. Subscription Fees and Payment

+

3.1. Licensee agrees to pay the subscription fees as specified in the pricing agreement. These fees are non-refundable.

+

3.2. Licensor reserves the right to modify subscription fees upon 30 days' written notice.

+

4. Restrictions

+

4.1. Licensee shall not:

+ +

4.2. The Software may not be used for illegal or unethical purposes.

+

5. Support and Updates

+

5.1. Licensor will provide updates and support for the Software during the subscription period, as detailed in the accompanying support agreement.

+

5.2. Support services may include bug fixes, patches, and minor updates. Major updates may incur additional fees.

+

6. Termination

+

6.1. This Agreement is valid for the subscription term unless terminated earlier:

+ +

6.2. Upon termination, Licensee must cease all uses of the Software and delete all copies.

+

7. Liability and Warranty

+

7.1. The Software is provided "as is" without warranties of any kind, except as required by law.

+

7.2. Licensors' liability is limited to the number of subscription fees paid by Licensee in the preceding 12 months.

+

8. Governing Law

+

8.1. This Agreement shall be governed by the laws of Portugal.

+

8.2. Disputes arising under this Agreement shall be subject to the exclusive jurisdiction of the courts of Portugal.

+

9. Miscellaneous

+

9.1. Any changes to this Agreement must be in writing and signed by both parties.

+

9.2. If any provision of this Agreement is found invalid, the remaining provisions shall remain enforceable.

+

10. Contact Information

+ +
+

This Subscription License Agreement was last updated at 09.05.2025.

diff --git a/docs/AUDIT_DNSSEC.html b/docs/AUDIT_DNSSEC.html new file mode 100644 index 0000000..11dde58 --- /dev/null +++ b/docs/AUDIT_DNSSEC.html @@ -0,0 +1,8 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. DNSSEC Status

+

This is an auto-generated overview of the DNSSEC status of coresecret.dev at the time of the last human-initiated push event.

+

DNSSEC Status

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/AUDIT_HAVEGED.html b/docs/AUDIT_HAVEGED.html new file mode 100644 index 0000000..5c9e399 --- /dev/null +++ b/docs/AUDIT_HAVEGED.html @@ -0,0 +1,137 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Haveged Audit on Netcup RS 2000 G11

+
Mon May 19|root@live:~/>>0|~$ haveged -n 0 | dieharder -g 200 -a
+haveged: command socket is listening at fd 3
+Writing unlimited bytes to stdout
+#=============================================================================#
+#            dieharder version 3.31.1 Copyright 2003 Robert G. Brown          #
+#=============================================================================#
+   rng_name    |rands/second|   Seed   |
+stdin_input_raw|  1.77e+07  |1806134257|
+#=============================================================================#
+        test_name   |ntup| tsamples |psamples|  p-value |Assessment
+#=============================================================================#
+   diehard_birthdays|   0|       100|     100|0.21358950|  PASSED
+      diehard_operm5|   0|   1000000|     100|0.23365564|  PASSED
+  diehard_rank_32x32|   0|     40000|     100|0.33364435|  PASSED
+    diehard_rank_6x8|   0|    100000|     100|0.83680113|  PASSED
+   diehard_bitstream|   0|   2097152|     100|0.89183344|  PASSED
+        diehard_opso|   0|   2097152|     100|0.95817018|  PASSED
+        diehard_oqso|   0|   2097152|     100|0.25923499|  PASSED
+         diehard_dna|   0|   2097152|     100|0.28604687|  PASSED
+diehard_count_1s_str|   0|    256000|     100|0.25146863|  PASSED
+diehard_count_1s_byt|   0|    256000|     100|0.64817854|  PASSED
+ diehard_parking_lot|   0|     12000|     100|0.68180941|  PASSED
+    diehard_2dsphere|   2|      8000|     100|0.52576112|  PASSED
+    diehard_3dsphere|   3|      4000|     100|0.02636962|  PASSED
+     diehard_squeeze|   0|    100000|     100|0.81226498|  PASSED
+        diehard_sums|   0|       100|     100|0.54642776|  PASSED
+        diehard_runs|   0|    100000|     100|0.98440072|  PASSED
+        diehard_runs|   0|    100000|     100|0.75118526|  PASSED
+       diehard_craps|   0|    200000|     100|0.93104571|  PASSED
+       diehard_craps|   0|    200000|     100|0.45994663|  PASSED
+ marsaglia_tsang_gcd|   0|  10000000|     100|0.38263075|  PASSED
+ marsaglia_tsang_gcd|   0|  10000000|     100|0.16784328|  PASSED
+         sts_monobit|   1|    100000|     100|0.26368088|  PASSED
+            sts_runs|   2|    100000|     100|0.10069666|  PASSED
+          sts_serial|   1|    100000|     100|0.53426480|  PASSED
+          sts_serial|   2|    100000|     100|0.95654933|  PASSED
+          sts_serial|   3|    100000|     100|0.75042664|  PASSED
+          sts_serial|   3|    100000|     100|0.27693306|  PASSED
+          sts_serial|   4|    100000|     100|0.79225401|  PASSED
+          sts_serial|   4|    100000|     100|0.49273684|  PASSED
+          sts_serial|   5|    100000|     100|0.58017632|  PASSED
+          sts_serial|   5|    100000|     100|0.39423250|  PASSED
+          sts_serial|   6|    100000|     100|0.72811005|  PASSED
+          sts_serial|   6|    100000|     100|0.94342669|  PASSED
+          sts_serial|   7|    100000|     100|0.98343053|  PASSED
+          sts_serial|   7|    100000|     100|0.74692814|  PASSED
+          sts_serial|   8|    100000|     100|0.56538653|  PASSED
+          sts_serial|   8|    100000|     100|0.91826111|  PASSED
+          sts_serial|   9|    100000|     100|0.63502589|  PASSED
+          sts_serial|   9|    100000|     100|0.28959825|  PASSED
+          sts_serial|  10|    100000|     100|0.74650890|  PASSED
+          sts_serial|  10|    100000|     100|0.95475310|  PASSED
+          sts_serial|  11|    100000|     100|0.35838186|  PASSED
+          sts_serial|  11|    100000|     100|0.80481197|  PASSED
+          sts_serial|  12|    100000|     100|0.74700860|  PASSED
+          sts_serial|  12|    100000|     100|0.49849890|  PASSED
+          sts_serial|  13|    100000|     100|0.55828107|  PASSED
+          sts_serial|  13|    100000|     100|0.23244603|  PASSED
+          sts_serial|  14|    100000|     100|0.23080285|  PASSED
+          sts_serial|  14|    100000|     100|0.83936220|  PASSED
+          sts_serial|  15|    100000|     100|0.64411755|  PASSED
+          sts_serial|  15|    100000|     100|0.99255934|  PASSED
+          sts_serial|  16|    100000|     100|0.00563047|  PASSED
+          sts_serial|  16|    100000|     100|0.31608374|  PASSED
+         rgb_bitdist|   1|    100000|     100|0.64550890|  PASSED
+         rgb_bitdist|   2|    100000|     100|0.87656240|  PASSED
+         rgb_bitdist|   3|    100000|     100|0.67169827|  PASSED
+         rgb_bitdist|   4|    100000|     100|0.44406906|  PASSED
+         rgb_bitdist|   5|    100000|     100|0.67772729|  PASSED
+         rgb_bitdist|   6|    100000|     100|0.73853919|  PASSED
+         rgb_bitdist|   7|    100000|     100|0.86999808|  PASSED
+         rgb_bitdist|   8|    100000|     100|0.01313259|  PASSED
+         rgb_bitdist|   9|    100000|     100|0.55009611|  PASSED
+         rgb_bitdist|  10|    100000|     100|0.70726109|  PASSED
+         rgb_bitdist|  11|    100000|     100|0.03154815|  PASSED
+         rgb_bitdist|  12|    100000|     100|0.84462282|  PASSED
+rgb_minimum_distance|   2|     10000|    1000|0.83132423|  PASSED
+rgb_minimum_distance|   3|     10000|    1000|0.68188237|  PASSED
+rgb_minimum_distance|   4|     10000|    1000|0.51409655|  PASSED
+rgb_minimum_distance|   5|     10000|    1000|0.42544360|  PASSED
+    rgb_permutations|   2|    100000|     100|0.66313395|  PASSED
+    rgb_permutations|   3|    100000|     100|0.95535890|  PASSED
+    rgb_permutations|   4|    100000|     100|0.45758425|  PASSED
+    rgb_permutations|   5|    100000|     100|0.98313853|  PASSED
+      rgb_lagged_sum|   0|   1000000|     100|0.41578816|  PASSED
+      rgb_lagged_sum|   1|   1000000|     100|0.76861829|  PASSED
+      rgb_lagged_sum|   2|   1000000|     100|0.43447789|  PASSED
+      rgb_lagged_sum|   3|   1000000|     100|0.49698037|  PASSED
+      rgb_lagged_sum|   4|   1000000|     100|0.02212798|  PASSED
+      rgb_lagged_sum|   5|   1000000|     100|0.04465057|  PASSED
+      rgb_lagged_sum|   6|   1000000|     100|0.10526977|  PASSED
+      rgb_lagged_sum|   7|   1000000|     100|0.79849751|  PASSED
+      rgb_lagged_sum|   8|   1000000|     100|0.83675235|  PASSED
+      rgb_lagged_sum|   9|   1000000|     100|0.37604856|  PASSED
+      rgb_lagged_sum|  10|   1000000|     100|0.46712205|  PASSED
+      rgb_lagged_sum|  11|   1000000|     100|0.16098525|  PASSED
+      rgb_lagged_sum|  12|   1000000|     100|0.81557499|  PASSED
+      rgb_lagged_sum|  13|   1000000|     100|0.11553821|  PASSED
+      rgb_lagged_sum|  14|   1000000|     100|0.85637944|  PASSED
+      rgb_lagged_sum|  15|   1000000|     100|0.91125298|  PASSED
+      rgb_lagged_sum|  16|   1000000|     100|0.59747378|  PASSED
+      rgb_lagged_sum|  17|   1000000|     100|0.70077562|  PASSED
+      rgb_lagged_sum|  18|   1000000|     100|0.66815407|  PASSED
+      rgb_lagged_sum|  19|   1000000|     100|0.04941226|  PASSED
+      rgb_lagged_sum|  20|   1000000|     100|0.37939018|  PASSED
+      rgb_lagged_sum|  21|   1000000|     100|0.42653722|  PASSED
+      rgb_lagged_sum|  22|   1000000|     100|0.86316011|  PASSED
+      rgb_lagged_sum|  23|   1000000|     100|0.43038293|  PASSED
+      rgb_lagged_sum|  24|   1000000|     100|0.34472083|  PASSED
+      rgb_lagged_sum|  25|   1000000|     100|0.73741194|  PASSED
+      rgb_lagged_sum|  26|   1000000|     100|0.05584980|  PASSED
+      rgb_lagged_sum|  27|   1000000|     100|0.80601600|  PASSED
+      rgb_lagged_sum|  28|   1000000|     100|0.99361052|  PASSED
+      rgb_lagged_sum|  29|   1000000|     100|0.27812997|  PASSED
+      rgb_lagged_sum|  30|   1000000|     100|0.94547008|  PASSED
+      rgb_lagged_sum|  31|   1000000|     100|0.02400797|  PASSED
+      rgb_lagged_sum|  32|   1000000|     100|0.98890248|  PASSED
+     rgb_kstest_test|   0|     10000|    1000|0.53680166|  PASSED
+     dab_bytedistrib|   0|  51200000|       1|0.38634245|  PASSED
+             dab_dct| 256|     50000|       1|0.02760776|  PASSED
+Preparing to run test 207.  ntuple = 0
+        dab_filltree|  32|  15000000|       1|0.47264235|  PASSED
+        dab_filltree|  32|  15000000|       1|0.49416126|  PASSED
+Preparing to run test 208.  ntuple = 0
+       dab_filltree2|   0|   5000000|       1|0.12940766|  PASSED
+       dab_filltree2|   1|   5000000|       1|0.40415388|  PASSED
+Preparing to run test 209.  ntuple = 0
+        dab_monobit2|  12|  65000000|       1|0.51567978|  PASSED
+haveged: Cannot write data in file: Broken pipe
+tot tests(BA8): A:1/1 B:1/1  last entropy estimate 8.00294
+fills: 470064, generated: 229.5 G bytes
+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/AUDIT_LYNIS.html b/docs/AUDIT_LYNIS.html new file mode 100644 index 0000000..dbca81c --- /dev/null +++ b/docs/AUDIT_LYNIS.html @@ -0,0 +1,611 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Lynis Audit:

+
[ Lynis 3.1.4 ]
+
+################################################################################
+  Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
+  welcome to redistribute it under the terms of the GNU General Public License.
+  See the LICENSE file for details about using this software.
+
+  2007-2024, CISOfy - https://cisofy.com/lynis/
+  Enterprise support available (compliance, plugins, interface and tools)
+################################################################################
+
+
+[+] Initializing program
+------------------------------------
+  - Detecting OS...                                           [ DONE ]
+  - Checking profiles...                                      [ DONE ]
+
+  ---------------------------------------------------
+  Program version:           3.1.4
+  Operating system:          Linux
+  Operating system name:     Debian
+  Operating system version:  12
+  Kernel version:            6.12.22+bpo
+  Hardware platform:         x86_64
+  Hostname:                  live
+  ---------------------------------------------------
+  Profiles:                  /etc/lynis/default.prf
+  Log file:                  /var/log/lynis.log
+  Report file:               /var/log/lynis-report.dat
+  Report version:            1.0
+  Plugin directory:          /usr/share/lynis/plugins
+  ---------------------------------------------------
+  Auditor:                   Centurion_Intelligence_Consulting_Agency
+  Language:                  en
+  Test category:             all
+  Test group:                all
+  ---------------------------------------------------
+  - Program update status...                                  [ NO UPDATE ]
+
+[+] System tools
+------------------------------------
+  - Scanning available tools...
+  - Checking system binaries...
+
+[+] Plugins (phase 1)
+------------------------------------
+ Note: plugins have more extensive tests and may take several minutes to complete
+
+  - Plugins enabled                                           [ NONE ]
+
+[+] Boot and services
+------------------------------------
+  - Service Manager                                           [ systemd ]
+  - Checking UEFI boot                                        [ ENABLED ]
+  - Checking Secure Boot                                      [ DISABLED ]
+    - Boot loader                                             [ NONE FOUND ]
+  - Check running services (systemctl)                        [ DONE ]
+        Result: found 17 running services
+  - Check enabled services at boot (systemctl)                [ DONE ]
+        Result: found 24 enabled services
+  - Check startup files (permissions)                         [ OK ]
+  - Running 'systemd-analyze security'
+      Unit name (exposure value) and predicate
+      --------------------------------
+    - auditd.service (value=8.7)                              [ EXPOSED ]
+    - chrony.service (value=3.5)                              [ PROTECTED ]
+    - clamav-daemon.service (value=3.5)                       [ PROTECTED ]
+    - cron.service (value=9.6)                                [ UNSAFE ]
+    - dbus.service (value=9.6)                                [ UNSAFE ]
+    - dm-event.service (value=9.5)                            [ UNSAFE ]
+    - emergency.service (value=9.5)                           [ UNSAFE ]
+    - fail2ban.service (value=6.5)                            [ MEDIUM ]
+    - getty@tty1.service (value=9.6)                          [ UNSAFE ]
+    - haveged.service (value=3.0)                             [ PROTECTED ]
+    - ifup@ens3.service (value=9.5)                           [ UNSAFE ]
+    - ifup@ens4.service (value=9.5)                           [ UNSAFE ]
+    - lvm2-lvmpolld.service (value=9.5)                       [ UNSAFE ]
+    - polkit.service (value=9.6)                              [ UNSAFE ]
+    - rc-local.service (value=9.6)                            [ UNSAFE ]
+    - rescue.service (value=9.5)                              [ UNSAFE ]
+    - rsyslog.service (value=9.6)                             [ UNSAFE ]
+    - ssh.service (value=9.6)                                 [ UNSAFE ]
+    - systemd-ask-password-console.service (value=9.4)        [ UNSAFE ]
+    - systemd-ask-password-wall.service (value=9.4)           [ UNSAFE ]
+    - systemd-fsckd.service (value=9.5)                       [ UNSAFE ]
+    - systemd-initctl.service (value=9.4)                     [ UNSAFE ]
+    - systemd-journald.service (value=4.3)                    [ PROTECTED ]
+    - systemd-logind.service (value=2.8)                      [ PROTECTED ]
+    - systemd-networkd.service (value=2.6)                    [ PROTECTED ]
+    - systemd-udevd.service (value=7.1)                       [ MEDIUM ]
+    - unattended-upgrades.service (value=9.6)                 [ UNSAFE ]
+    - usbguard-dbus.service (value=9.6)                       [ UNSAFE ]
+    - usbguard.service (value=2.8)                            [ PROTECTED ]
+    - user@0.service (value=9.8)                              [ UNSAFE ]
+    - uuidd.service (value=5.8)                               [ MEDIUM ]
+
+[+] Kernel
+------------------------------------
+  - Checking default runlevel                                 [ runlevel 5 ]
+  - Checking CPU support (NX/PAE)
+    CPU support: PAE and/or NoeXecute supported               [ FOUND ]
+  - Checking kernel version and release                       [ DONE ]
+  - Checking kernel type                                      [ DONE ]
+  - Checking loaded kernel modules                            [ DONE ]
+      Found 84 active modules
+  - Checking Linux kernel configuration file                  [ FOUND ]
+  - Checking default I/O kernel scheduler                     [ NOT FOUND ]
+  - Checking for available kernel update                      [ OK ]
+  - Checking core dumps configuration
+    - configuration in systemd conf files                     [ DEFAULT ]
+    - configuration in /etc/profile                           [ DEFAULT ]
+    - 'hard' configuration in /etc/security/limits.conf       [ DISABLED ]
+    - 'soft' configuration in /etc/security/limits.conf       [ DISABLED ]
+    - Checking setuid core dumps configuration                [ DISABLED ]
+  - Check if reboot is needed                                 [ NO ]
+
+[+] Memory and Processes
+------------------------------------
+  - Checking /proc/meminfo                                    [ FOUND ]
+  - Searching for dead/zombie processes                       [ NOT FOUND ]
+  - Searching for IO waiting processes                        [ NOT FOUND ]
+  - Search prelink tooling                                    [ NOT FOUND ]
+
+[+] Users, Groups and Authentication
+------------------------------------
+  - Administrator accounts                                    [ OK ]
+  - Unique UIDs                                               [ OK ]
+  - Consistency of group files (grpck)                        [ OK ]
+  - Unique group IDs                                          [ OK ]
+  - Unique group names                                        [ OK ]
+  - Password file consistency                                 [ OK ]
+  - Password hashing methods                                  [ OK ]
+  - Password hashing rounds (minimum)                         [ CONFIGURED ]
+  - Query system users (non daemons)                          [ DONE ]
+  - NIS+ authentication support                               [ NOT ENABLED ]
+  - NIS authentication support                                [ NOT ENABLED ]
+  - Sudoers file(s)                                           [ FOUND ]
+    - Permissions for directory: /etc/sudoers.d               [ OK ]
+    - Permissions for: /etc/sudoers                           [ OK ]
+    - Permissions for: /etc/sudoers.d/README                  [ OK ]
+    - Permissions for: /etc/sudoers.d/live                    [ OK ]
+  - PAM password strength tools                               [ OK ]
+  - PAM configuration files (pam.conf)                        [ FOUND ]
+  - PAM configuration files (pam.d)                           [ FOUND ]
+  - PAM modules                                               [ FOUND ]
+  - LDAP module in PAM                                        [ NOT FOUND ]
+  - Accounts without expire date                              [ OK ]
+  - Accounts without password                                 [ OK ]
+  - Locked accounts                                           [ OK ]
+  - User password aging (minimum)                             [ CONFIGURED ]
+  - User password aging (maximum)                             [ CONFIGURED ]
+  - Checking expired passwords                                [ OK ]
+  - Checking Linux single user mode authentication            [ OK ]
+  - Determining default umask
+    - umask (/etc/profile)                                    [ NOT FOUND ]
+    - umask (/etc/login.defs)                                 [ OK ]
+  - LDAP authentication support                               [ NOT ENABLED ]
+  - Logging failed login attempts                             [ ENABLED ]
+
+[+] Kerberos
+------------------------------------
+  - Check for Kerberos KDC and principals                     [ NOT FOUND ]
+
+[+] Shells
+------------------------------------
+  - Checking shells from /etc/shells
+    Result: found 12 shells (valid shells: 12).
+    - Session timeout settings/tools                          [ FOUND ]
+  - Checking default umask values
+    - Checking default umask in /etc/bash.bashrc              [ NONE ]
+    - Checking default umask in /etc/profile                  [ NONE ]
+
+[+] File systems
+------------------------------------
+  - Checking mount points
+    - Checking /home mount point                              [ SUGGESTION ]
+    - Checking /tmp mount point                               [ OK ]
+    - Checking /var mount point                               [ SUGGESTION ]
+  - Query swap partitions (fstab)                             [ NONE ]
+  - Testing swap partitions                                   [ OK ]
+  - Testing /proc mount (hidepid)                             [ SUGGESTION ]
+  - Checking for old files in /tmp                            [ OK ]
+  - Checking /tmp sticky bit                                  [ OK ]
+  - Checking /var/tmp sticky bit                              [ OK ]
+  - ACL support root file system                              [ ENABLED ]
+  - Mount options of /                                        [ NON DEFAULT ]
+  - Mount options of /dev                                     [ PARTIALLY HARDENED ]
+  - Mount options of /dev/shm                                 [ PARTIALLY HARDENED ]
+  - Mount options of /run                                     [ HARDENED ]
+  - Mount options of /tmp                                     [ PARTIALLY HARDENED ]
+  - Total without nodev:11 noexec:13 nosuid:9 ro or noexec (W^X): 9 of total 33
+  - Checking Locate database                                  [ FOUND ]
+  - Disable kernel support of some filesystems
+    - Module cramfs is blacklisted                            [ OK ]
+    - Module freevxfs is blacklisted                          [ OK ]
+    - Module hfs is blacklisted                               [ OK ]
+    - Module hfsplus is blacklisted                           [ OK ]
+    - Module jffs2 is blacklisted                             [ OK ]
+    - Module udf is blacklisted                               [ OK ]
+
+[+] USB Devices
+------------------------------------
+  - Checking usb-storage driver (modprobe config)             [ DISABLED ]
+  - Checking USB devices authorization                        [ ENABLED ]
+  - Checking USBGuard                                         [ FOUND ]
+    - Configuration                                           [ FOUND ]
+      - Restore controller device state                       [ false ]
+      - Rule for controllers connected before daemon starts   [ keep ]
+      - Rule for devices connected before daemon starts       [ allow ]
+      - Rule for devices inserted after daemon starts         [ apply-policy ]
+      - Rule for devices not in RuleFile                      [ block ]
+    - RuleFile                                                [ FOUND ]
+      - Controllers & Devices allow                           [ 2 ]
+      - Controllers & Devices block                           [ 0 ]
+      - Controllers & Devices reject                          [ 0 ]
+
+[+] Storage
+------------------------------------
+  - Checking firewire ohci driver (modprobe config)           [ DISABLED ]
+
+[+] NFS
+------------------------------------
+  - Check running NFS daemon                                  [ NOT FOUND ]
+
+[+] Name services
+------------------------------------
+  - Searching DNS domain name                                 [ FOUND ]
+      Domain name: local
+  - Checking /etc/hosts
+    - Duplicate entries in hosts file                         [ NONE ]
+    - Presence of configured hostname in /etc/hosts           [ FOUND ]
+    - Hostname mapped to localhost                            [ NOT FOUND ]
+    - Localhost mapping to IP address                         [ OK ]
+
+[+] Ports and packages
+------------------------------------
+  - Searching package managers
+    - Searching dpkg package manager                          [ FOUND ]
+      - Querying package manager
+    - Query unpurged packages                                 [ NONE ]
+    - debsums utility                                         [ FOUND ]
+      - Cron job for debsums                                  [ FOUND ]
+  - Checking security repository in sources.list file         [ OK ]
+  - Checking APT package database                             [ OK ]
+  - Checking vulnerable packages (apt-get only)               [ DONE ]
+  - Checking upgradeable packages                             [ NONE ]
+  - Checking package audit tool                               [ INSTALLED ]
+    Found: apt-get
+  - Toolkit for automatic upgrades (unattended-upgrade)       [ FOUND ]
+
+[+] Networking
+------------------------------------
+  - Checking IPv6 configuration                               [ ENABLED ]
+      Configuration method                                    [ MANUAL ]
+      IPv6 only                                               [ NO ]
+  - Checking configured nameservers
+    - Testing nameservers
+        Nameserver: 135.181.207.105                           [ OK ]
+        Nameserver: 89.58.62.53                               [ OK ]
+    - Minimal of 2 responsive nameservers                     [ OK ]
+  - Checking default gateway                                  [ DONE ]
+  - Getting listening ports (TCP/UDP)                         [ DONE ]
+  - Checking promiscuous interfaces                           [ OK ]
+  - Checking waiting connections                              [ OK ]
+  - Checking status DHCP client                               [ RUNNING ]
+  - Checking for ARP monitoring software                      [ NOT FOUND ]
+  - Uncommon network protocols                                [ NOT FOUND ]
+
+[+] Printers and Spools
+------------------------------------
+  - Checking cups daemon                                      [ NOT FOUND ]
+  - Checking lp daemon                                        [ NOT RUNNING ]
+
+[+] Software: e-mail and messaging
+------------------------------------
+
+[+] Software: firewalls
+------------------------------------
+  - Checking iptables kernel module                           [ FOUND ]
+    - Checking iptables policies of chains                    [ FOUND ]
+      - Chain INPUT (table: filter, target: DROP)             [ DROP ]
+      - Chain INPUT (table: security, target: ACCEPT)         [ ACCEPT ]
+    - Checking for empty ruleset                              [ OK ]
+    - Checking for unused rules                               [ FOUND ]
+  - Checking host based firewall                              [ ACTIVE ]
+
+[+] Software: webserver
+------------------------------------
+  - Checking Apache                                           [ NOT FOUND ]
+  - Checking nginx                                            [ NOT FOUND ]
+
+[+] SSH Support
+------------------------------------
+  - Checking running SSH daemon                               [ FOUND ]
+    - Searching SSH configuration                             [ FOUND ]
+    - OpenSSH option: AllowTcpForwarding                      [ OK ]
+    - OpenSSH option: ClientAliveCountMax                     [ OK ]
+    - OpenSSH option: ClientAliveInterval                     [ OK ]
+    - OpenSSH option: FingerprintHash                         [ OK ]
+    - OpenSSH option: GatewayPorts                            [ OK ]
+    - OpenSSH option: IgnoreRhosts                            [ OK ]
+    - OpenSSH option: LoginGraceTime                          [ OK ]
+    - OpenSSH option: LogLevel                                [ OK ]
+    - OpenSSH option: MaxAuthTries                            [ OK ]
+    - OpenSSH option: MaxSessions                             [ OK ]
+    - OpenSSH option: PermitRootLogin                         [ OK ]
+    - OpenSSH option: PermitUserEnvironment                   [ OK ]
+    - OpenSSH option: PermitTunnel                            [ OK ]
+    - OpenSSH option: Port                                    [ OK ]
+    - OpenSSH option: PrintLastLog                            [ OK ]
+    - OpenSSH option: StrictModes                             [ OK ]
+    - OpenSSH option: TCPKeepAlive                            [ OK ]
+    - OpenSSH option: UseDNS                                  [ OK ]
+    - OpenSSH option: X11Forwarding                           [ OK ]
+    - OpenSSH option: AllowAgentForwarding                    [ OK ]
+    - OpenSSH option: AllowUsers                              [ FOUND ]
+    - OpenSSH option: AllowGroups                             [ NOT FOUND ]
+
+[+] SNMP Support
+------------------------------------
+  - Checking running SNMP daemon                              [ NOT FOUND ]
+
+[+] Databases
+------------------------------------
+    No database engines found
+
+[+] LDAP Services
+------------------------------------
+  - Checking OpenLDAP instance                                [ NOT FOUND ]
+
+[+] PHP
+------------------------------------
+  - Checking PHP                                              [ NOT FOUND ]
+
+[+] Squid Support
+------------------------------------
+  - Checking running Squid daemon                             [ NOT FOUND ]
+
+[+] Logging and files
+------------------------------------
+  - Checking for a running log daemon                         [ OK ]
+    - Checking Syslog-NG status                               [ NOT FOUND ]
+    - Checking systemd journal status                         [ FOUND ]
+    - Checking Metalog status                                 [ NOT FOUND ]
+    - Checking RSyslog status                                 [ FOUND ]
+    - Checking RFC 3195 daemon status                         [ NOT FOUND ]
+    - Checking minilogd instances                             [ NOT FOUND ]
+    - Checking wazuh-agent daemon status                      [ NOT FOUND ]
+  - Checking logrotate presence                               [ OK ]
+  - Checking remote logging                                   [ NOT ENABLED ]
+  - Checking log directories (static list)                    [ DONE ]
+  - Checking open log files                                   [ DONE ]
+  - Checking deleted files in use                             [ DONE ]
+
+[+] Insecure services
+------------------------------------
+  - Installed inetd package                                   [ NOT FOUND ]
+  - Installed xinetd package                                  [ OK ]
+    - xinetd status                                           [ NOT ACTIVE ]
+  - Installed rsh client package                              [ OK ]
+  - Installed rsh server package                              [ OK ]
+  - Installed telnet client package                           [ OK ]
+  - Installed telnet server package                           [ NOT FOUND ]
+  - Checking NIS client installation                          [ OK ]
+  - Checking NIS server installation                          [ OK ]
+  - Checking TFTP client installation                         [ OK ]
+  - Checking TFTP server installation                         [ OK ]
+
+[+] Banners and identification
+------------------------------------
+  - /etc/issue                                                [ FOUND ]
+    - /etc/issue contents                                     [ OK ]
+  - /etc/issue.net                                            [ FOUND ]
+    - /etc/issue.net contents                                 [ OK ]
+
+[+] Scheduled tasks
+------------------------------------
+  - Checking crontab and cronjob files                        [ DONE ]
+
+[+] Accounting
+------------------------------------
+  - Checking accounting information                           [ OK ]
+  - Checking sysstat accounting data                          [ ENABLED ]
+  - Checking auditd                                           [ ENABLED ]
+    - Checking audit rules                                    [ OK ]
+    - Checking audit configuration file                       [ OK ]
+    - Checking auditd log file                                [ FOUND ]
+
+[+] Time and Synchronization
+------------------------------------
+  - NTP daemon found: chronyd                                 [ FOUND ]
+  - Checking for a running NTP daemon or client               [ OK ]
+
+[+] Cryptography
+------------------------------------
+  - Checking for expired SSL certificates [0/139]             [ NONE ]
+
+  [WARNING]: Test CRYP-7902 had a long execution: 20.445007 seconds
+
+  - Found 0 encrypted and 0 unencrypted swap devices in use.  [ OK ]
+  - Kernel entropy is sufficient                              [ YES ]
+  - HW RNG & rngd                                             [ NO ]
+  - SW prng                                                   [ YES ]
+  - MOR variable not found                                    [ WEAK ]
+
+[+] Virtualization
+------------------------------------
+
+[+] Containers
+------------------------------------
+
+[+] Security frameworks
+------------------------------------
+  - Checking presence AppArmor                                [ FOUND ]
+    - Checking AppArmor status                                [ DISABLED ]
+  - Checking presence SELinux                                 [ NOT FOUND ]
+  - Checking presence TOMOYO Linux                            [ NOT FOUND ]
+  - Checking presence grsecurity                              [ NOT FOUND ]
+  - Checking for implemented MAC framework                    [ NONE ]
+
+[+] Software: file integrity
+------------------------------------
+  - Checking file integrity tools
+    - AIDE                                                    [ FOUND ]
+      - AIDE config file                                      [ FOUND ]
+      - AIDE database                                         [ FOUND ]
+  - dm-integrity (status)                                     [ DISABLED ]
+  - dm-verity (status)                                        [ DISABLED ]
+      - AIDE config (Checksum)                                [ OK ]
+  - Checking presence integrity tool                          [ FOUND ]
+
+[+] Software: System tooling
+------------------------------------
+  - Checking automation tooling
+    - Ansible artifact                                        [ FOUND ]
+  - Automation tooling                                        [ FOUND ]
+  - Checking presence of Fail2ban                             [ FOUND ]
+    - Checking Fail2ban jails                                 [ ENABLED ]
+  - Checking for IDS/IPS tooling                              [ FOUND ]
+
+[+] Software: Malware
+------------------------------------
+  - Checking chkrootkit                                       [ FOUND ]
+  - Checking Rootkit Hunter                                   [ FOUND ]
+  - Checking ClamAV scanner                                   [ FOUND ]
+  - Malware software components                               [ FOUND ]
+    - Active agent                                            [ NOT FOUND ]
+    - Rootkit scanner                                         [ FOUND ]
+
+[+] File Permissions
+------------------------------------
+  - Starting file permissions check
+    File: /etc/cron.allow                                     [ OK ]
+    File: /etc/crontab                                        [ OK ]
+    File: /etc/group                                          [ OK ]
+    File: /etc/group-                                         [ OK ]
+    File: /etc/hosts.allow                                    [ OK ]
+    File: /etc/hosts.deny                                     [ OK ]
+    File: /etc/issue                                          [ OK ]
+    File: /etc/issue.net                                      [ OK ]
+    File: /etc/motd                                           [ OK ]
+    File: /etc/passwd                                         [ OK ]
+    File: /etc/passwd-                                        [ OK ]
+    File: /etc/ssh/sshd_config                                [ OK ]
+    Directory: /root/.ssh                                     [ OK ]
+    Directory: /etc/cron.d                                    [ OK ]
+    Directory: /etc/cron.daily                                [ OK ]
+    Directory: /etc/cron.hourly                               [ OK ]
+    Directory: /etc/cron.weekly                               [ OK ]
+    Directory: /etc/cron.monthly                              [ OK ]
+
+[+] Home directories
+------------------------------------
+  - Permissions of home directories                           [ OK ]
+  - Ownership of home directories                             [ OK ]
+  - Checking shell history files                              [ OK ]
+
+[+] Kernel Hardening
+------------------------------------
+  - Comparing sysctl key pairs with scan profile
+    - dev.tty.ldisc_autoload (exp: 0)                         [ OK ]
+    - fs.protected_fifos (exp: 2)                             [ OK ]
+    - fs.protected_hardlinks (exp: 1)                         [ OK ]
+    - fs.protected_regular (exp: 2)                           [ OK ]
+    - fs.protected_symlinks (exp: 1)                          [ OK ]
+    - fs.suid_dumpable (exp: 0)                               [ OK ]
+    - kernel.core_uses_pid (exp: 1)                           [ OK ]
+    - kernel.ctrl-alt-del (exp: 0)                            [ OK ]
+    - kernel.dmesg_restrict (exp: 1)                          [ OK ]
+    - kernel.kptr_restrict (exp: 2)                           [ OK ]
+    - kernel.modules_disabled (exp: 1)                        [ OK ]
+    - kernel.perf_event_paranoid (exp: 2 3 4)                 [ OK ]
+    - kernel.randomize_va_space (exp: 2)                      [ OK ]
+    - kernel.sysrq (exp: 0)                                   [ OK ]
+    - kernel.unprivileged_bpf_disabled (exp: 1)               [ OK ]
+    - kernel.yama.ptrace_scope (exp: 1 2 3)                   [ OK ]
+    - net.core.bpf_jit_harden (exp: 2)                        [ OK ]
+    - net.ipv4.conf.all.accept_redirects (exp: 0)             [ OK ]
+    - net.ipv4.conf.all.accept_source_route (exp: 0)          [ OK ]
+    - net.ipv4.conf.all.bootp_relay (exp: 0)                  [ OK ]
+    - net.ipv4.conf.all.forwarding (exp: 0)                   [ OK ]
+    - net.ipv4.conf.all.log_martians (exp: 1)                 [ OK ]
+    - net.ipv4.conf.all.mc_forwarding (exp: 0)                [ OK ]
+    - net.ipv4.conf.all.proxy_arp (exp: 0)                    [ OK ]
+    - net.ipv4.conf.all.rp_filter (exp: 1)                    [ OK ]
+    - net.ipv4.conf.all.send_redirects (exp: 0)               [ OK ]
+    - net.ipv4.conf.default.accept_redirects (exp: 0)         [ OK ]
+    - net.ipv4.conf.default.accept_source_route (exp: 0)      [ OK ]
+    - net.ipv4.conf.default.log_martians (exp: 1)             [ OK ]
+    - net.ipv4.icmp_echo_ignore_broadcasts (exp: 1)           [ OK ]
+    - net.ipv4.icmp_ignore_bogus_error_responses (exp: 1)     [ OK ]
+    - net.ipv4.tcp_syncookies (exp: 1)                        [ OK ]
+    - net.ipv4.tcp_timestamps (exp: 0 1)                      [ OK ]
+    - net.ipv6.conf.all.accept_redirects (exp: 0)             [ OK ]
+    - net.ipv6.conf.all.accept_source_route (exp: 0)          [ OK ]
+    - net.ipv6.conf.default.accept_redirects (exp: 0)         [ OK ]
+    - net.ipv6.conf.default.accept_source_route (exp: 0)      [ OK ]
+
+[+] Hardening
+------------------------------------
+    - Installed compiler(s)                                   [ FOUND ]
+    - Installed malware scanner                               [ FOUND ]
+    - Non-native binary formats                               [ FOUND ]
+
+[+] Custom tests
+------------------------------------
+  - Running custom tests...                                   [ NONE ]
+
+[+] Plugins (phase 2)
+------------------------------------
+
+================================================================================
+
+  -[ Lynis 3.1.4 Results ]-
+
+  Great, no warnings
+
+  Suggestions (5):
+  ----------------------------
+  * Consider hardening system services [BOOT-5264]
+    - Details  : Run '/usr/bin/systemd-analyze security SERVICE' for each service
+    - Related resources
+      * Article: Systemd features to secure service files: https://linux-audit.com/systemd/systemd-features-to-secure-units-and-services/
+      * Website: https://cisofy.com/lynis/controls/BOOT-5264/
+
+  * To decrease the impact of a full /home file system, place /home on a separate partition [FILE-6310]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/FILE-6310/
+
+  * To decrease the impact of a full /var file system, place /var on a separate partition [FILE-6310]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/FILE-6310/
+
+  * Check iptables rules to see which rules are currently not used [FIRE-4513]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/FIRE-4513/
+
+  * Enable logging to an external logging host for archiving purposes and additional protection [LOGG-2154]
+    - Related resources
+      * Website: https://cisofy.com/lynis/controls/LOGG-2154/
+
+  Follow-up:
+  ----------------------------
+  - Show details of a test (lynis show details TEST-ID)
+  - Check the logfile for all details (less /var/log/lynis.log)
+  - Read security controls texts (https://cisofy.com)
+  - Use --upload to upload data to central system (Lynis Enterprise users)
+
+================================================================================
+
+  Lynis security scan details:
+
+  Hardening index : 92 [##################  ]
+  Tests performed : 261
+  Plugins enabled : 0
+
+  Components:
+  - Firewall               [V]
+  - Malware scanner        [V]
+
+  Scan mode:
+  Normal [V]  Forensics [ ]  Integration [ ]  Pentest [ ]
+
+  Lynis modules:
+  - Compliance status      [?]
+  - Security audit         [V]
+  - Vulnerability scan     [V]
+
+  Files:
+  - Test and debug information      : /var/log/lynis.log
+  - Report data                     : /var/log/lynis-report.dat
+
+================================================================================
+
+  Lynis 3.1.4
+
+  Auditing, system hardening, and compliance for UNIX-based systems
+  (Linux, macOS, BSD, and others)
+
+  2007-2024, CISOfy - https://cisofy.com/lynis/
+  Enterprise support available (compliance, plugins, interface and tools)
+
+================================================================================
+
+  [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/AUDIT_SSH.html b/docs/AUDIT_SSH.html new file mode 100644 index 0000000..295b577 --- /dev/null +++ b/docs/AUDIT_SSH.html @@ -0,0 +1,40 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. SSH Audit by ssh-audit.com

+

CISS.2025.debian.live.builder

+

3. SSH Audit by https://github.com/jtesta/ssh-audit

+
# general
+(gen) banner: SSH-2.0-OpenSSH_9.2p1
+(gen) software: OpenSSH 9.2p1
+(gen) compatibility: OpenSSH 9.9+, Dropbear SSH 2020.79+
+(gen) compression: disabled
+
+# key exchange algorithms
+(kex) sntrup761x25519-sha512@openssh.com  -- [info] available since OpenSSH 8.5
+                                          `- [info] default key exchange from OpenSSH 9.0 to 9.8
+                                          `- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
+(kex) sntrup761x25519-sha512              -- [info] available since OpenSSH 9.9
+                                          `- [info] default key exchange since OpenSSH 9.9
+                                          `- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
+(kex) kex-strict-s-v00@openssh.com        -- [info] pseudo-algorithm that denotes the peer supports a stricter key exchange method as a counter-measure to the Terrapin attack (CVE-2023-48795)
+
+# host-key algorithms
+(key) ssh-ed25519                         -- [info] available since OpenSSH 6.5, Dropbear SSH 2020.79
+(key) rsa-sha2-512                        -- [info] available since OpenSSH 7.2
+(key) rsa-sha2-256                        -- [info] available since OpenSSH 7.2, Dropbear SSH 2020.79
+
+# encryption algorithms (ciphers)
+(enc) aes256-gcm@openssh.com              -- [info] available since OpenSSH 6.2
+(enc) aes256-ctr                          -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
+
+# message authentication code algorithms
+(mac) hmac-sha2-512-etm@openssh.com       -- [info] available since OpenSSH 6.2
+(mac) hmac-sha2-256-etm@openssh.com       -- [info] available since OpenSSH 6.2
+
+# algorithm recommendations (for OpenSSH 9.2)
+(rec) +aes128-ctr                         -- enc algorithm to append
+(rec) +aes128-gcm@openssh.com             -- enc algorithm to append
+(rec) +aes192-ctr                         -- enc algorithm to append
+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/CHANGELOG.html b/docs/CHANGELOG.html new file mode 100644 index 0000000..4651395 --- /dev/null +++ b/docs/CHANGELOG.html @@ -0,0 +1,6 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

TBA

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/CODING_CONVENTION.html b/docs/CODING_CONVENTION.html new file mode 100644 index 0000000..951ae8c --- /dev/null +++ b/docs/CODING_CONVENTION.html @@ -0,0 +1,78 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Coding Style

+

2.1. PR

+

You'd make the life of the maintainers easier if you submit only one patch with one functional change per PR.

+

2.2 Documentation

+

Some people really read that ! New features would need to be documented in the appropriate section in usage() and in ~/docs/DOCUMENTATION.md.

+

2.3. Coding

+

2.3.1. Shell / bash

+

Bash is actually quite powerful—not only with respect to sockets. It's not as mighty as perl or python, but there are a lot of neat features. Here's how you make use of them. Besides those short hints here, there's a wealth of information there.

+ +

2.3.2. Shell specific

+ +

2.3.3. Variables

+ +

3. Misc

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/CONTRIBUTING.html b/docs/CONTRIBUTING.html new file mode 100644 index 0000000..1dd195d --- /dev/null +++ b/docs/CONTRIBUTING.html @@ -0,0 +1,12 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Contributors

+

X

+

I would like to express my sincere gratitude to Mr., Who-wants-to-live-forever, for his gracious support and insightful and profound criticism.

+

Ζ

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/CREDITS.html b/docs/CREDITS.html new file mode 100644 index 0000000..7501115 --- /dev/null +++ b/docs/CREDITS.html @@ -0,0 +1,14 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Credits

+

2.2. Authors

+

2.3. Contributors

+

X

+

I would like to express my sincere gratitude to Mr., Who-wants-to-live-forever, for his gracious support and insightful and profound criticism.

+

Ζ

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/DOCUMENTATION.html b/docs/DOCUMENTATION.html new file mode 100644 index 0000000..3ee9254 --- /dev/null +++ b/docs/DOCUMENTATION.html @@ -0,0 +1,128 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Usage

+
CISS.debian.live.builder
+Master V8.03.127.2025.06.02
+
+(c) Marc S. Weidner, 2018 - 2025
+(p) Centurion Press, 2024 - 2025
+
+https://coresecret.eu/
+
+A lightweight Shell Wrapper for building a hardened Debian Bookworm Live ISO Image.
+
+"./ciss_live_builder.sh <option>", where <option> is one or more of:
+
+  --help, -h
+    What you're looking at.
+
+  --architecture <STRING> one of <amd64 | arm64>
+    A string reflecting the architecture of the Live System.
+    MUST be provided.
+
+  --build-directory </path/to/build_directory>
+    Where the Debian Live Build Image should be generated.
+    MUST be provided.
+
+  --change-splash <STRING> one of <club | hexagon>
+    A string reflecting the GRub Boot Screen Splash you want to use.
+    If omitted defaults to "./.archive/background/club.png".
+
+  --cdi (Experimental Feature)
+    This option generates a boot menu entry to start the forthcoming
+    'CISS.debian.installer', which will be executed after
+    the system has successfully booted up.
+
+  --contact, -c
+    Displays contact information of the author.
+
+  --control <INTEGER>
+    An integer that reflects the version of your Live ISO Image.
+    MUST be provided.
+
+  --debug
+    Enables debug logging for the main program routine. Detailed logging
+    information are written to "/tmp/ciss_live_builder_3764286.log"
+
+  --dhcp-centurion
+    If a DHCP lease is provided, the provider's nameserver will be overridden,
+    and only the hardened, privacy-focused Centurion DNS servers will be used:
+    - https://dns01.eddns.eu/
+    - https://dns02.eddns.de/
+
+  --jump-host <IP | IP | ... >
+    Provide up to 10 IPs for /etc/host.allow whitelisting of SSH access.
+    Could be either IPv4 and / or IPv6 addresses and / or CCDIR notation.
+    If provided, than it MUST be a <SPACE> separated list.
+    IPv6 addresses MUST be encapsulated with [], e.g., [1234::abcd/64].
+
+  --log-statistics-only
+    Provides statistic only after successful building a
+    CISS.debian.live-ISO. While enabling "--log-statistics-only"
+    the argument "--build-directory" MUST be provided while
+    all further options MUST be omitted.
+
+  --provider-netcup-ipv6 
+    Activates IPv6 support for Netcup Root Server. One unique
+    IPv6 address MUST be provided in this case.
+
+  --renice-priority <PRIORITY>
+    Reset the nice priority value of the script and all its children
+    to the desired PRIORITY. MUST be an integer (between "-19" and 19).
+    Negative (higher) values MUST be enclosed in double quotes '"'.
+
+  --reionice-priority <CLASS> <PRIORITY>
+    Reset the ionice priority value of the script and all its children
+    to the desired CLASS. MUST be an integer:
+    1: realtime
+    2: best-effort
+    3: idle
+    defaults to "2".
+    PRIORITY MUST be an integer:
+    between 0 (highest) and 7 (lowest) priority.
+    defaults to "4".
+    A real-time I/O process can significantly slow down other processes
+    or even cause them to starve if it continuously requests I/O.
+
+  --root-password-file </path/to/password.txt>
+    Password file for 'root', if given, MUST be a string of 20 to 64 characters,
+    and MUST NOT contain the special character '"'.
+    If the argument is omitted, no further login authentication is required for
+    the local console. The root password is hashed with an 16 Byte '/dev/random'
+    generated SALT and SHA512 Hashing function and 8,388,608 rounds. Immediately
+    after Hash generation all Variables containing plain password fragments are
+    deleted. Password file SHOULD be 0400 and root:root and is deleted without
+    further prompt after password hash has been successfully generated via:
+    shred -vfzu 5 -f.
+    No tracing of any plain text password fragment in any debug log.
+
+  --ssh-port <INTEGER>
+    The desired Port SSH should listen to.
+    If not provided defaults to Port 22.
+
+  --ssh-pubkey </path/to/.ssh/>
+    Imports the SSH Public Key(s) from the FILE 'authorized_keys' of the
+    specified PATH into the Live ISO. MUST be provided.
+
+  --version, -v
+    Displays version of ./ciss_live_builder.sh.
+
+NOTES:
+  - You MUST be root to run this script.
+
+Contact:
+  - https://coresecret.eu/
+  - security@coresecret.eu
+    - PGP Key 2D98 07F4 1030 1776 597E BDC9 9F54 8853 35A3 C9AD
+      - https://keys.openpgp.org/vks/v1/by-fingerprint/2D9807F410301776597EBDC99F54885335A3C9AD
+

3. Booting

+

3.1. Grub Menu

+

Boot Menu

+

3.2. Integrity checks

+

Integrity Check

+

Integrity Success

+

3.3. Console Login

+

Console Login

+
+

no tracking | no logging | no advertising | no profiling | no bullshit

+ diff --git a/docs/LICENSES/CCLA-1.0.html b/docs/LICENSES/CCLA-1.0.html new file mode 100644 index 0000000..1f31a1f --- /dev/null +++ b/docs/LICENSES/CCLA-1.0.html @@ -0,0 +1,53 @@ +

SPDX-License-Identifier: LicenseRef-CCLA-1.0

+

Centurion Commercial License Agreement 1.0

+

1. General Terms

+

1.1. This Subscription License Agreement ("Agreement") governs the commercial use of the Software ("Software").

+

1.2. Private and open-source usage of the Software remains governed by the EUPL-1.2 license.

+

1.3. By purchasing and using the Software under this Agreement, you ("Licensee") agree to the terms outlined below.

+

1.4. Only the English version of this Agreement shall be legally binding. Translations are provided for convenience only.

+

2. Grant of License

+

2.1. Subject-to-payment of applicable subscription fees, Licensor grants Licensee a

+ +

right to use the Software for commercial purposes.

+

2.2. This license is valid only for the duration of the subscription period and under the scope defined in this Agreement.

+

3. Subscription Fees and Payment

+

3.1. Licensee agrees to pay the subscription fees as specified in the pricing agreement. These fees are non-refundable.

+

3.2. Licensor reserves the right to modify subscription fees upon 30 days' written notice.

+

4. Restrictions

+

4.1. Licensee shall not:

+ +

4.2. The Software may not be used for illegal or unethical purposes.

+

5. Support and Updates

+

5.1. Licensor will provide updates and support for the Software during the subscription period, as detailed in the accompanying support agreement.

+

5.2. Support services may include bug fixes, patches, and minor updates. Major updates may incur additional fees.

+

6. Termination

+

6.1. This Agreement is valid for the subscription term unless terminated earlier:

+ +

6.2. Upon termination, Licensee must cease all uses of the Software and delete all copies.

+

7. Liability and Warranty

+

7.1. The Software is provided "as is" without warranties of any kind, except as required by law.

+

7.2. Licensors' liability is limited to the number of subscription fees paid by Licensee in the preceding 12 months.

+

8. Governing Law

+

8.1. This Agreement shall be governed by the laws of Portugal.

+

8.2. Disputes arising under this Agreement shall be subject to the exclusive jurisdiction of the courts of Portugal.

+

9. Miscellaneous

+

9.1. Any changes to this Agreement must be in writing and signed by both parties.

+

9.2. If any provision of this Agreement is found invalid, the remaining provisions shall remain enforceable.

+

10. Contact Information

+ +
+

This Subscription License Agreement was last updated at 09.05.2025.

+ diff --git a/docs/REFERENCES.html b/docs/REFERENCES.html new file mode 100644 index 0000000..7cc7fd3 --- /dev/null +++ b/docs/REFERENCES.html @@ -0,0 +1,69 @@ +

1. CISS.debian.live.builder

+

Centurion Intelligence Consulting Agency Information Security Standard
Debian Live Build Generator for hardened live environment and CISS Debian Installer
Master Version: 8.02
Build: V8.03.127.2025.06.02

+

2. Resources

+ + + + + + + + + + + + +

2.6.1. Error handling

+ +
+

no tracking | no logging | no advertising | no profiling | no bullshit

+