From Fedora Project Wiki
No edit summary |
No edit summary |
||
(34 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable sortable" border="1" | {| class="wikitable sortable" border="1" | ||
! Test Case !! [[Security_Lab]] !! References | ! Test Case !! [[Security_Lab]] !! References | ||
|- | |||
| [[QA:Testcase_Mediakit_ISO_Size]] | |||
| {{result|pass|athmane}}<ref>Used: Fedora-15-i686-Live-Security.iso</ref> | |||
| <references/> | |||
|- | |||
| [[QA:Testcase_Mediakit_ISO_Checksums]] | |||
| {{result|pass|athmane}}<ref>Used: Fedora-15-i686-Live-Security.iso</ref> | |||
| <references/> | |||
|- | |- | ||
| [[QA:TestCases/Install_Source_Live_Image]] | | [[QA:TestCases/Install_Source_Live_Image]] | ||
| {{result|pass|athmane}}<ref>Used: Fedora-15-i686-Live-Security.iso</ref> | |||
| <references/> | |||
|- | |||
| [[QA:Testcase_desktop_browser]] | |||
| {{result|pass|athmane}} | | {{result|pass|athmane}} | ||
| <references/> | |||
|- | |||
| [[QA:Testcase_desktop_updates]] | |||
| {{result|pass|athmane}} <ref>tested with YUM, PackageKit test skipped</ref> | |||
| <references/> | |||
|- | |||
| [[QA:Testcase_desktop_login]] | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| [[QA:Testcase_desktop_panel_basic]] | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| [[QA:Testcase_desktop_error_checks]] | |||
| {{result|pass|athmane}} <ref>accessibility: lxterminal background is opaque.</ref> | |||
| <references/> | |||
|- | |||
| [[QA:Testcase_desktop_menus]] | |||
| {{result|warn|athmane}} <ref>Security Lab Menu: GUI applications are launched from terminal because Exec (in security-*.desktop files) is prefixed with gnome-terminal, eg: Exec=gnome-terminal -e "sh -c 'openvas-client; bash'"</ref> | |||
| <references/> | |||
|- | |||
| '''Nmap''': testing port scanning, OS detection, version detection, script scanning, and traceroute. ''' UPDATE: [[QA:Testcase_Nmap]]''' | |||
| {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref> | |||
| <references/> | |||
|- | |||
| '''Wireshark''' tests ''' UPDATE: [[QA:Testcase_Wireshark]]''' | |||
| {{result|fail|athmane|708250}} | |||
| <references/> | |||
|- | |||
| '''Nikto''': test a web server scan, '''UPDATE: [[QA:Testcase_Nikto]]''' | |||
| {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref> | |||
| <references/> | |||
|- | |||
| '''OpenVAS ''': generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. '''UPDATE: [[QA:Testcase_OpenVAS]]''' | |||
| {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref> | |||
| <references/> | |||
|- | |||
| '''Ratproxy''': ran with various options, tested a web application and generated a report with ratproxy-report | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''Tcpdump''': sniff network traffic . | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''Hping3''': basic tests | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''nc (netcat)''': try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''Medusa''': brute-forcing a remote ssh server, with a provided list of accounts and passwords. | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''httping''': httping a web server, both HTTP and HTTPS protocols tested. '''UPDATE: [[QA:Testcase_HTTPing]]''' | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''Rkhunter''': updated database (there was no updates), then searched for rootkits. '''UPDATE: [[QA:Testcase_Rkhunter]]''' | |||
| {{result|pass|athmane}} <ref>CPU usage <= 20% </ref> <ref>a warning raised about SSH protocol v1 being allowed </ref> | |||
| <references/> | | <references/> | ||
|- | |- | ||
|} | |} |
Latest revision as of 17:07, 31 May 2011
Test Case | Security_Lab | References |
---|---|---|
QA:Testcase_Mediakit_ISO_Size | [1] |
|
QA:Testcase_Mediakit_ISO_Checksums | [1] |
|
QA:TestCases/Install_Source_Live_Image | [1] |
|
QA:Testcase_desktop_browser | ||
QA:Testcase_desktop_updates | [1] |
|
QA:Testcase_desktop_login | ||
QA:Testcase_desktop_panel_basic | ||
QA:Testcase_desktop_error_checks | [1] |
|
QA:Testcase_desktop_menus | [1] |
|
Nmap: testing port scanning, OS detection, version detection, script scanning, and traceroute. UPDATE: QA:Testcase_Nmap | [1] |
|
Wireshark tests UPDATE: QA:Testcase_Wireshark | ||
Nikto: test a web server scan, UPDATE: QA:Testcase_Nikto | [1] |
|
OpenVAS : generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. UPDATE: QA:Testcase_OpenVAS | [1][2] | |
Ratproxy: ran with various options, tested a web application and generated a report with ratproxy-report | ||
Tcpdump: sniff network traffic . | ||
Hping3: basic tests | ||
nc (netcat): try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | ||
Medusa: brute-forcing a remote ssh server, with a provided list of accounts and passwords. | ||
httping: httping a web server, both HTTP and HTTPS protocols tested. UPDATE: QA:Testcase_HTTPing | ||
Rkhunter: updated database (there was no updates), then searched for rootkits. UPDATE: QA:Testcase_Rkhunter | [1] [2] |