Skip to content

ssl-baseline skipped all checks #44

@nbublikov

Description

@nbublikov

Describe the bug
ssl-baseline skipped checks, please see attached code

Expected behavior
ssl-baseline start all checks

Example code
`Profile: DevSec SSL/TLS Baseline (ssl-baseline)
Version: 1.6.4
Target: ssh://root@xxxx:22

✔ debugging: Inspec::Version=4.37.20
✔ tcpports=
{:port=>22, :socket=>#<struct port=22, address="0.0.0.0", protocol="tcp", process="sshd", pid=494>}
{:port=>22, :socket=>#<struct port=22, address="::", protocol="tcp6", process="sshd", pid=494>}
{:port=>53, :socket=>#<struct port=53, address="127.0.0.1", protocol="tcp", process="connmand", pid=468>}
{:port=>53, :socket=>#<struct port=53, address="::1", protocol="tcp6", process="connmand", pid=468>}
{:port=>2947, :socket=>#<struct port=2947, address="127.0.0.1", protocol="tcp", process="systemd", pid=1>}
{:port=>2947, :socket=>#<struct port=2947, address="::1", protocol="tcp6", process="systemd", pid=1>}
{:port=>3333, :socket=>#<struct port=3333, address="0.0.0.0", protocol="tcp", process="StateReporterAg", pid=824>}
{:port=>4000, :socket=>#<struct port=4000, address="0.0.0.0", protocol="tcp", process="Monitoring", pid=805>}
{:port=>8080, :socket=>#<struct port=8080, address="0.0.0.0", protocol="tcp", process="python3", pid=1018>}
{:port=>8081, :socket=>#<struct port=8081, address="0.0.0.0", protocol="tcp", process="python3", pid=1219>}
{:port=>8082, :socket=>#<struct port=8082, address="0.0.0.0", protocol="tcp", process="python3", pid=1233>}
{:port=>8090, :socket=>#<struct port=8090, address="0.0.0.0", protocol="tcp", process="iomci_main", pid=629>} is expected not to eq nil
✔ sslports=
is expected not to eq nil
↺ ssl2: Disable SSL 2 from all exposed SSL ports.
↺ Skipped control due to only_if condition.
↺ ssl3: Disable SSL 3 from all exposed SSL ports.
↺ Skipped control due to only_if condition.
↺ tls1.0: Disable TLS 1.0 on exposed ports.
↺ Skipped control due to only_if condition.
↺ tls1.1: Disable TLS 1.1 on exposed ports.
↺ Skipped control due to only_if condition.
↺ tls1.2: Enable TLS 1.2 on exposed ports.
↺ Skipped control due to only_if condition.
↺ kx-ecdh: Enable ECDH as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ kx-rsa: Disable RSA as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ kx-dh: Disable DH as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ kx-krb5: Disable KRB5 as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ kx-psk: Disable PSK as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ kx-gostr: Disable GOSTR as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ kx-srp: Disable SRP as KX from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ au-ecdsa-rsa: Enable ECDSA or RSA as AU from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ au-anon: Disable ANON as AU from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ au-dss: Disable DSS as AU from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ au-psk: Disable PSK as AU from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ au-export: Disable EXPORT as AU from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-aes-gcm-chacha20: Enable AES256 or AES128 or AES256-GCM or AES128-GCM or CHACHA20 as Enc
↺ Skipped control due to only_if condition.
↺ enc-cbc: Disable CBC as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-rc4: Disable RC4 as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-export: Disable EXPORT as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-des: Disable DES, 3DES as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-enull: Disable eNULL as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-camellia: Disable CAMELLIA as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-seed: Disable SEED as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-idea: Disable IDEA as ENC from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ enc-aes-ccm: Disable AES-CCM from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ mac-sha384-sha256-poly1305: Enable SHA384 or SHA256 or POLY1305 as Mac from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ mac-md5: Disable MD5 Mac from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ mac-sha: Disable SHA(1) Mac from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ mac-null: Disable NULL Mac from all exposed SSL/TLS ports and versions.
↺ Skipped control due to only_if condition.
↺ robotattack: Return Of Bleichenbacher's Oracle Threat
↺ Skipped control due to only_if condition.

Profile Summary: 1 successful control, 0 control failures, 32 controls skipped
Test Summary: 2 successful, 0 failures, 32 skipped`

Inspec Version
4.37.20

Baseline Version
https://github.com/dev-sec/ssl-baseline

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions