ssl resource
Use the ssl
Chef InSpec audit resource to test SSL settings for the named port.
Availability
Installation
This resource is distributed along with Chef InSpec itself. You can use it automatically.
Version
This resource first became available in v1.0.0 of InSpec.
Syntax
An ssl
resource block declares an SSL port, and then other properties of the test like cipher and/or protocol:
describe ssl(port: #) do
it { should be_enabled }
end
or:
describe ssl(port: #).filter('value') do
it { should be_enabled }
end
where
ssl(port: #)
is the port number, such asssl(port: 443)
filter
may take any of the following arguments:ciphers
,protocols
, andhandshake
Properties
ciphers
The ciphers
property tests the named cipher:
its('ciphers') { should_not eq '/rc4/i' }
or:
describe ssl(port: 443).ciphers(/rc4/i) do
it { should_not be_enabled }
end
protocols
The protocols
property tests what protocol versions (SSLv3, TLSv1.1, etc) are enabled:
its('protocols') { should eq 'ssl2' }
or:
describe ssl(port: 443).protocols('ssl2') do
it { should_not be_enabled }
end
Examples
The following examples show how to use this Chef InSpec audit resource.
Run the ssl-baseline example profile
The following shows how to use the ssl
Chef InSpec audit resource to find all TCP ports on the system, including IPv4 and IPv6. (This is a partial example based on the ssl_text.rb
file in the ssl-baseline
profile on GitHub.)
...
control 'tls1.2' do
title 'Run TLS 1.2 whenever SSL is active on a port'
impact 0.5
sslports.each do |socket|
proc_desc = "on node == #{command('hostname').stdout.strip} running #{socket.process.inspect} (#{socket.pid})"
describe ssl(port: socket.port).protocols('tls1.2') do
it(proc_desc) { should be_enabled }
it { should be_enabled }
end
end
end
...
control 'rc4' do
title 'Disable RC4 ciphers from all exposed SSL/TLS ports and versions.'
impact 0.5
sslports.each do |socket|
proc_desc = "on node == #{command('hostname').stdout.strip} running #{socket.process.inspect} (#{socket.pid})"
describe ssl(port: socket.port).ciphers(/rc4/i) do
it(proc_desc) { should_not be_enabled }
it { should_not be_enabled }
end
end
end
There are two ways to run the ssl-baseline
example profile to test SSL via the ssl
resource.
Clone the profile:
$ git clone https://github.com/dev-sec/ssl-baseline
and then run:
$ inspec exec ssl-baseline
Or execute the profile directly via URL:
$ inspec exec https://github.com/dev-sec/ssl-baseline
Matchers
For a full list of available matchers, please visit our matchers page.
be_enabled
The be_enabled
matcher tests if SSL is enabled:
it { should be_enabled }
ciphers
The ciphers
matcher tests the named cipher:
its('ciphers') { should_not eq '/rc4/i' }
or:
describe ssl(port: 443).ciphers(/rc4/i) do
it { should_not be_enabled }
end
protocols
The protocols
matcher tests what protocol versions (SSLv3, TLSv1.1, etc) are enabled:
its('protocols') { should eq 'ssl2' }
or:
describe ssl(port: 443).protocols('ssl2') do
it { should_not be_enabled }
end
Supported protocols:
ssl2
ssl3
tls1.0
tls1.1
tls1.2
tls1.3
Was this page helpful?