From Fedora Project Wiki
No edit summary
No edit summary
Line 66: Line 66:
| <references/>
| <references/>
|-
|-
| '''nc (netcat) tests''': listening, connecting, port scanning
| '''nc (netcat)''': try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range.
| {{result|pass|athmane}}
| {{result|pass|athmane}}
| <references/>
| <references/>
Line 74: Line 74:
| <references/>
| <references/>
|-
|-
| '''httping''': httping a web server, both HTTP and HTTPS protocols tested.
| {{result|pass|athmane}}
| <references/>
|-
|-
| '''httping''': httping a web server, HTTP and HTTPS tested.
| '''Rkhunter''': updated database (there was no updates), then searched for rootkits.
| {{result|pass|athmane}}
| {{result|pass|athmane}} <ref>CPU usage <= 20% </ref> <ref>a warning raised about SSH protocol v1  being allowed </ref>
| <references/>
| <references/>
|-
|}
|}

Revision as of 13:31, 27 May 2011

Test Case Security_Lab References
QA:Testcase_Mediakit_ISO_Size
Pass pass athmane
[1]
  1. Used: Fedora-15-i686-Live-Security.iso
QA:Testcase_Mediakit_ISO_Checksums
Pass pass athmane
[1]
  1. Used: Fedora-15-i686-Live-Security.iso
QA:TestCases/Install_Source_Live_Image
Pass pass athmane
[1]
  1. Used: Fedora-15-i686-Live-Security.iso
QA:Testcase_desktop_browser
Pass pass athmane
QA:Testcase_desktop_updates
Pass pass athmane
[1]
  1. tested with YUM, PackageKit test skipped
QA:Testcase_desktop_login
Pass pass athmane
QA:Testcase_desktop_panel_basic
Pass pass athmane
QA:Testcase_desktop_error_checks
Pass pass athmane
[1]
  1. accessibility: lxterminal background is opaque.
QA:Testcase_desktop_menus
Warning warn athmane
[1]
  1. Security Lab Menu: GUI applications are launched from terminal because Exec (in security-*.desktop files) is prefixed with gnome-terminal, eg: Exec=gnome-terminal -e "sh -c 'openvas-client; bash'"
Nmap tests: Port scanning, OS detection, version detection, script scanning, and traceroute
Pass pass athmane
[1]
  1. GUI zenmap not tested.
Wireshark tests
Fail fail athmane [1]
  1. RHBZ #708250
Nikto tests: Web server scan
Pass pass athmane
[1]
  1. HTTPS Scan fail (SSL support not available)
OpenVAS tests: generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html.
Pass pass athmane
[1][2]
  1. As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)
  2. Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87
Ratproxy tests: ran with various options, tested a web application and generated a report with ratproxy-report
Pass pass athmane
Tcpdump: sniff network traffic .
Pass pass athmane
Hping3: basic tests
Pass pass athmane
nc (netcat): try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range.
Pass pass athmane
Medusa: brute-forcing a remote ssh server, with a provided list of accounts and passwords.
Pass pass athmane
httping: httping a web server, both HTTP and HTTPS protocols tested.
Pass pass athmane
Rkhunter: updated database (there was no updates), then searched for rootkits.
Pass pass athmane
[1] [2]
  1. CPU usage <= 20%
  2. a warning raised about SSH protocol v1 being allowed