From 1fee5a6c736987d602585a02042e15a7b3851528 Mon Sep 17 00:00:00 2001 From: ByeonJungHun Date: Wed, 10 Jan 2024 14:41:57 +0900 Subject: [PATCH] =?UTF-8?q?=EA=B2=80=EC=82=AC=20=EA=B2=B0=EA=B3=BC=20?= =?UTF-8?q?=EC=97=85=EB=8D=B0=EC=9D=B4=ED=8A=B8?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ansible/security_check/roles/security_check/files/ubuntu.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ansible/security_check/roles/security_check/files/ubuntu.sh b/ansible/security_check/roles/security_check/files/ubuntu.sh index d826f58..b727be1 100644 --- a/ansible/security_check/roles/security_check/files/ubuntu.sh +++ b/ansible/security_check/roles/security_check/files/ubuntu.sh @@ -143,7 +143,7 @@ U_01() { do sshd_permitrootlogin_no_count=`grep -vE '^#|^\s#' ${sshd_config_file[$i]} | grep -i 'permitrootlogin' | grep -i 'no' | wc -l` if [ $sshd_permitrootlogin_no_count -eq 0 ]; then - echo $sshd_permitrootlogin_no_count >> $resultfile 2>&1 + test = `cat ${sshd_config_file[$i]}` >> $resultfile 2>&1 echo "※ U-01 결과 : 취약(Vulnerable)" >> $resultfile 2>&1 echo " ssh 서비스를 사용하고, sshd_config 파일에서 root 계정의 원격 접속이 허용되어 있습니다.3" >> $resultfile 2>&1 return 0