Instant Download Security Automation with Ansible 2 Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis 1st Edition Madhu Akula PDF All Chapters
Instant Download Security Automation with Ansible 2 Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis 1st Edition Madhu Akula PDF All Chapters
com
Red Hat and IT Security: With Red Hat Ansible, Red Hat
OpenShift, and Red Hat Security Auditing 1st Edition
Rithik Chatterjee
https://textbookfull.com/product/red-hat-and-it-security-with-red-hat-
ansible-red-hat-openshift-and-red-hat-security-auditing-1st-edition-
rithik-chatterjee/
textbookfull.com
https://textbookfull.com/product/comptia-security-guide-to-network-
security-fundamentals-mark-ciampa/
textbookfull.com
https://textbookfull.com/product/compressive-sensing-of-earth-
observations-1st-edition-chen-chi-hau/
textbookfull.com
Monstrosity And Philosophy Radical Otherness In Greek And
Latin Culture Filippo Del Lucchese
https://textbookfull.com/product/monstrosity-and-philosophy-radical-
otherness-in-greek-and-latin-culture-filippo-del-lucchese/
textbookfull.com
https://textbookfull.com/product/actin-cytoskeleton-in-cancer-
progression-and-metastasis-part-c-1st-edition-clement-thomas/
textbookfull.com
https://textbookfull.com/product/cognitive-engineering-and-safety-
organization-in-air-traffic-management-1st-edition-tom-kontogiannis/
textbookfull.com
https://textbookfull.com/product/pollution-control-handbook-for-oil-
and-gas-engineering-1st-edition-nicholas-p-cheremisinoff/
textbookfull.com
https://textbookfull.com/product/cwsp-certified-wireless-security-
professional-study-guide-exam-cwsp-205-2nd-edition-david-d-coleman/
textbookfull.com
All in the mix Race class and school choice Bridget Byrne
https://textbookfull.com/product/all-in-the-mix-race-class-and-school-
choice-bridget-byrne/
textbookfull.com
Security Automation with Ansible 2
Madhu Akula
Akash Mahajan
BIRMINGHAM - MUMBAI
Security Automation with Ansible 2
Copyright © 2017 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written permission of the
publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without
warranty, either express or implied. Neither the authors, nor Packt Publishing, and its
dealers and distributors will be held liable for any damages caused or alleged to be caused
directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
www.packtpub.com
Credits
Authors
Copy Editor
Madhu Akula
Safis Editing
Akash Mahajan
Madhu's research papers are frequently selected for major security industry conferences
including DEF CON 24, All Day DevOps (2016, 2017), DevSecCon (London, Singapore,
Boston), DevOpsDays India, c0c0n, Serverless Summit, ToorCon, DefCamp, SkyDogCon,
NolaCon, and null. Madhu was also a keynote speaker for the National Cyber Security
conference at Dayananda Sagar College, Bangalore in February 2016.
When he's not working with Appsecco's clients or speaking at events, Madhu is actively
involved in researching vulnerabilities in open source products/platforms such as
WordPress, ntop, and OpenDocMan. He is also a contributing bug hunter at Code Vigilant
(a project to secure open source software).
Madhu's research has identified many vulnerabilities in over 200 organizations including
the U.S. Department of Homeland Security, Google, Microsoft, Yahoo, Adobe, LinkedIn,
eBay, AT&T, Blackberry, Cisco, and Barracuda. He is also an active member of Bugcrowd,
Hackerone, Synack, and more. Madhu has trained over 5000 people in information security
for companies and organizations including the Indian Navy and the Ministry of e-services
in a leading Gulf state.
I would like to thank my parents, who have always been a great support. Apart from my
parents, I want to thank my colleagues at Appsecco for letting me work on this project
without any stress.
I am grateful for the support given by the folks at Packt, especially Rahul, Nithin, and
Sweeny. All of them worked hard to support and guide us throughout. Last but not least, a
big thank you to my coauthor, Akash Mahajan. He guided me throughout the book and
taught me great things.
Akash Mahajan is an accomplished security professional with over a decade's experience in
providing specialist application and infrastructure consulting services at the highest levels
to companies, governments, and organizations around the world. He has lots of experience
in working with clients to provide innovative security insights that truly reflect the
commercial and operational needs of the organization, from strategic advice to testing and
analysis, to incident response and recovery.
I would like to thank my parents, who have always been a great support. I would like to
thank my wife Lubaina, without her help I wouldn’t have managed to get through all the
writing that I did. Apart from my family, I want to thank my colleagues at Appsecco for
letting me work on this project without any stress.
I am grateful for the support given by the folks at Packt, especially Rahul, Nithin, and
Sweeny. All of them worked hard to support and guide us throughout. Last but not least, a
big thank you to my coauthor Madhu Akula. He basically made the huge task of writing a
book such a breeze.
About the Reviewer
Sam Doran is a senior software engineer at Red Hat, and he is working on Ansible Engine.
Sam served in the U.S. Air Force as an aircraft mechanic and is a proud alumnus of the
Virginia Tech Corps of Cadets. He worked for the US Government as well as for the private
industry in jobs ranging from professional photography and graphic design to site
reliability engineering, network engineering, and information security. He has used Ansible
since 2013 to automate security monitoring infrastructure, cloud provisioning, application
installation, and configuration. He has also helped Fortune 500 companies implement large
scale deployments of Red Hat Ansible Tower. Sam loves automating anything and
everything using Ansible.
www.PacktPub.com
For support files and downloads related to your book, please visit www.PacktPub.com. Did
you know that Packt offers eBook versions of every book published, with PDF and ePub
files available? You can upgrade to the eBook version at www.PacktPub.com and as a print
book customer, you are entitled to a discount on the eBook copy. Get in touch with us at
[email protected] for more details.
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a
range of free newsletters and receive exclusive discounts and offers on Packt books and
eBooks.
https://www.packtpub.com/mapt</a>
Get the most in-demand software skills with Mapt. Mapt gives you full access to all Packt
books and video courses, as well as industry-leading tools to help you plan your personal
development and advance your career.
Why subscribe?
Fully searchable across every book published by Packt
Copy and paste, print, and bookmark content
On demand and accessible via a web browser
Customer Feedback
Thanks for purchasing this Packt book. At Packt, quality is at the heart of our editorial
process. To help us improve, please leave us an honest review on this book's Amazon page
at https://www.amazon.com/dp/1788394518.
If you'd like to join our team of regular reviewers, you can email us at
[email protected]. We award our regular reviewers with free eBooks and
videos in exchange for their valuable feedback. Help us be relentless in improving our
products!
Table of Contents
Preface 1
Chapter 1: Introduction to Ansible Playbooks and Roles 9
Ansible terms to keep in mind 10
Playbooks 10
Ansible modules 11
YAML syntax for writing Ansible playbooks 12
Ansible roles 13
Templates with Jinja2 15
Jinja templating examples 15
Conditional example 15
Loops example 15
LAMP stack playbook example – combining all the concepts 16
Summary 22
Chapter 2: Ansible Tower, Jenkins, and Other Automation Tools 23
Scheduling tools to enable the next abstraction of automation 25
Getting up and running 26
Setting up Ansible Tower 26
Setting up Jenkins 33
Setting up Rundeck 39
Security automation use cases 42
Adding playbooks 42
Ansible Tower configuration 42
Jenkins Ansible integration configuration 45
Rundeck configuration 48
Authentication and data security 50
RBAC for Ansible Tower 51
TLS/SSL for Ansible Tower 52
Encryption and data security for Ansible Tower 52
RBAC for Jenkins 52
TLS/SSL for Jenkins 53
Encryption and data security for Jenkins 53
RBAC for Rundeck 54
HTTP/TLS for Rundeck 55
Encryption and data security for Rundeck 55
Output of the playbooks 55
Report management for Ansible Tower 55
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Table of Contents
[ ii ]
Table of Contents
Beats 89
Why should we use Elastic Stack for security monitoring and alerting? 89
Prerequisites for setting up Elastic Stack 90
Setting up the Elastic Stack 90
Logstash integrations 91
Kibana 91
ElastAlert 91
Installing Elasticsearch 92
Installing Logstash 93
Logstash configuration 94
Installing Kibana 96
Setting up nginx reverse proxy 97
Installing Beats to send logs to Elastic Stack 98
ElastAlert for alerting 99
Configuring the Let's Encrypt service 101
ElastAlert rule configuration 102
Kibana dashboards 103
Automated defense? 105
AWS services used in setup 105
DynamoDB 106
Blacklist lambda function 106
HandleExpiry lambda function 106
Cloudwatch 106
VPC Network ACL 106
Setup 106
Configuration 107
Usage - block an IP address 109
Request 110
Response 110
Automated defense lambda in action 111
Summary 111
Chapter 5: Automating Web Application Security Testing Using
OWASP ZAP 112
Installing OWASP ZAP 114
Installing Docker runtime 114
OWASP ZAP Docker container setup 115
A specialized tool for working with Containers - Ansible Container 117
Configuring ZAP Baseline scan 118
Running a vulnerable application container 118
Running an OWASP ZAP Baseline scan 120
Security testing against web applications and websites 122
[ iii ]
Table of Contents
[ iv ]
Table of Contents
[v]
Table of Contents
[ vi ]
Table of Contents
[ vii ]
Preface
IT is undergoing a massive paradigm shift. From a time where uptime was a measure of IT
success, we are moving to the idea of immutable infrastructure, where, based on the
requirements, we can spin up and trash a server on demand automatically. Ansible is
playing a lead role in this transformation. It has become the tool of choice for companies big
and small for tasks that are meant for one server to entire clusters.
This book is about security automation. We apply our knowledge of Ansible to different
scenarios and workloads that revolve around security, hence the title. When boring and
mundane tasks are automated, people doing those tasks can focus on solving the security
problems they are dealing with. This enables a whole new way to looking at how we learn
about security (trainings), how much we can store, process, and analyze log data (DFIR),
how we can keep applying security updates without any interruptions (security
operations), and more.
In this book, we will share our experience of the types of automation we can enable using
Ansible. You may be familiar with some of these, or they may be entirely new to you.
Regardless, rather than trying to prescribe how Ansible should be used, we hope that you
will read and understand how you can take each of these playbooks/workflows, and make
your security work faster, better, and more reliable, or simply have fun creating complex
infrastructure scenarios for yourself or others.
This book would not have been possible without the excellent documentation provided by
the folks at Red Hat Ansible and countless other blogs and projects already creating secure,
resilient playbooks that we can all learn from and use.
Essential Ansible you should be familiar with, for building useful playbooks
Security automation techniques and approaches
Extending and programming Ansible for even more security
The idea is to get you to quickly refresh your knowledge of Ansible and move on to
becoming productive with it, and toward the end, you'll see how you can do even more by
extending Ansible or creating your own security modules.
Preface
Chapter 2, Ansible Tower, Jenkins, and Other Automation Tools, is all about automation of
automation. We cover the use of scheduling automation tools commonly used with Ansible
such as Ansible Tower, Jenkins, and Rundeck. If you start using these tools the mundane
and boring tasks of remembering when to schedule and execute playbooks and get
notifications about the output can be delegated to the tools rather than in your head. If you
haven't used any tools like these, you should read this chapter.
Chapter 3, Setting up a Hardened WordPress with Encrypted Automated Backups, covers the
exploration of various security automation techniques and approaches. As with any
technique or approach, it is possible that some of what we say doesn't apply for your use
case. However, by taking an opinionated approach, we show you one way of doing this,
which we think works well largely. WordPress is the most popular website creation
software currently. By tackling how to secure it using playbooks (and running in an IT
automation tool), we start talking about an IT/ops requirement of keeping running servers
safe and making sure we can recover from failure. If you are responsible for managing
websites (even if it is just your own), this chapter should be useful. If you don't use
WordPress, there is enough in this chapter to get you to think about how to apply this
chapter to your use case.
Chapter 4, Log Monitoring and Serverless Automated Defense (Elastic Stack in AWS), covers log
monitoring and security automation, which are like peanut butter and jelly. In this chapter,
using Ansible we set up a log monitoring server infrastructure on a server in AWS. Based
on attack notifications, we create a near real-time dynamic firewall service using AWS
services such as AWS Lambda, Dynamo DB, and AWS Cloudwatch.
Chapter 5, Automating Web Application Security Testing Using OWASP ZAP, covers one of
the most common security workflows of testing the security of a website using one of the
most popular open source tools, that is, OWASP ZAP. Once we have figured out the basic
workflow, we supercharge it for continuous scanning of your websites using Ansible and
Jenkins. Read this chapter to see how we can work with Docker containers using Ansible,
while doing continuous security scanning. A sure win-win!
[2]
Preface
Chapter 6, Vulnerability Scanning with Nessus, explains the use of Nessus with Ansible for
vulnerability scanning. This chapter covers the approach of doing basic network scans,
conducting security patch audits, and enumerating vulnerabilities.
Chapter 7, Security Hardening for Applications and Networks, shows that Ansible has enabled
us to assert our security thinking declaratively. By utilizing the idea of what the system
state should be, we can create security hardening playbooks based on standards, such as
CIS and NIST, and guidance provided by the US Department of Defense's STIGs.
Familiarize yourself with approaches to hardening applications and servers using existing
security documentation, but most importantly, in a repeatable self-documenting way,
which is under version control. If you were like us, doing all of this manually for many
years, you will appreciate what a game changer this is for security automation.
Chapter 8, Continuous Security Scanning for Docker Containers, covers how to run security
scanning tools against Docker containers. A lot of modern applications are deployed using
containers, and this chapter will quickly helps you understand whether you have any
vulnerable containers, and as always, coupled with Ansible Tower, how to make this a
continuous process.
Chapter 9, Automating Lab Setups for Forensics Collection, Malware Analysis, is specially for
malware researchers. If you have always wanted to use Cuckoo sandbox and MISP, and
have shied away because of the complicated steps involved in setting these up, this chapter
has got you covered.
Chapter 10, Writing an Ansible Module for Security Testing, covers how we can extend the
functionality offered by Ansible and learn from other projects that are using Ansible to
deliver great software solutions. This chapter and the next, bring us to the third section of
our book.
Sometimes with all the amazing modules that come with Ansible, they are still not enough
for us to do what we want to do. This chapter delves into creating an Ansible module, and
if we may say so ourselves, it doesn't try to be very formal about the approach.
Remembering that what we want to focus on is security automation, we create a module for
running website security scans using a ZAP proxy. With a complete module provided, this
will help you writing and using your modules in no time.
[3]
Preface
Chapter 11, Ansible Security Best Practices, References, and Further reading, covers how to
manage secrets and credentials using Ansible Vault. It will help you in setting up your own
instance of Ansible Galaxy. We also highlight other projects using Ansible playbooks for
security solutions such as DebOps and Algo. We also cover AWX, which is the free and
open source version of Ansible Tower and show you how to set it up and use it. We
conclude with a short discussion on Ansible 2.5, which is expected to be released in the first
or second quarter of 2018.
If you are a system administrator who also takes care of the security of websites, servers,
and networks, this book is for you.
Application developers who would like an easy way to deploy secure servers especially
should look at Chapter 3, Setting up a Hardened WordPress with Encrypted Automated Backups,
to Chapter 7, Security Hardening for Applications and Networks.
[4]
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Preface
You will get the most out of this book if you are one of these:
Conventions
In this book, you will find a number of text styles that distinguish between different kinds
of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions,
pathnames, dummy URLs, user input, and Twitter handles are shown as follows:
"The harden.yml performs hardening of MySQL server configuration" A block of code is
set as follows:
- name: deletes anonymous mysql user
mysql_user:
user: ""
state: absent
login_password: "{{ mysql_root_password }}"
login_user: root
When we wish to draw your attention to a particular part of a code block, the relevant lines
or items are set in bold:
- name: deletes anonymous mysql user
mysql_user:
user: ""
state: absent
login_password: "{{ mysql_root_password }}"
login_user: root
New terms and important words are shown in bold. Words that you see on the screen, for
example, in menus or dialog boxes, appear in the text like this: "Click on Confirm Security
Exception and continue to proceed with the installation steps"
[5]
Preface
Reader feedback
Feedback from our readers is always welcome. Let us know what you think about this
book-what you liked or disliked. Reader feedback is important for us as it helps us develop
titles that you will really get the most out of. To send us general feedback, simply email
[email protected], and mention the book's title in the subject of your message. If
there is a topic that you have expertise in and you are interested in either writing or
contributing to a book, see our author guide at www.packtpub.com/authors.
Customer support
Now that you are the proud owner of a Packt book, we have a number of things to help you
to get the most from your purchase.
1. Log in or register to our website using your email address and password.
2. Hover the mouse pointer on the SUPPORT tab at the top.
3. Click on Code Downloads & Errata.
4. Enter the name of the book in the Search box.
5. Select the book for which you're looking to download the code files.
6. Choose from the drop-down menu where you purchased this book from.
7. Click on Code Download.
[6]
Preface
Once the file is downloaded, please make sure that you unzip or extract the folder using the
latest version of:
The code bundle for the book is also hosted on GitHub at https://github.com/
PacktPublishing/Security-Automation-with-Ansible-2. We also have other code
bundles from our rich catalog of books and videos available at https://github.com/
PacktPublishing/. Check them out!
Errata
Although we have taken every care to ensure the accuracy of our content, mistakes do
happen. If you find a mistake in one of our books-maybe a mistake in the text or the code-
we would be grateful if you could report this to us. By doing so, you can save other readers
from frustration and help us improve subsequent versions of this book. If you find any
errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting
your book, clicking on the Errata Submission Form link, and entering the details of your
errata. Once your errata are verified, your submission will be accepted and the errata will
be uploaded to our website or added to any list of existing errata under the Errata section of
that title. To view the previously submitted errata, go to https://www.packtpub.com/
books/content/support and enter the name of the book in the search field. The required
information will appear under the Errata section.
[7]
Preface
Piracy
Piracy of copyrighted material on the internet is an ongoing problem across all media. At
Packt, we take the protection of our copyright and licenses very seriously. If you come
across any illegal copies of our works in any form on the internet, please provide us with
the location address or website name immediately so that we can pursue a remedy. Please
contact us at [email protected] with a link to the suspected pirated material. We
appreciate your help in protecting our authors and our ability to bring you valuable
content.
Questions
If you have a problem with any aspect of this book, you can contact us at
[email protected], and we will do our best to address the problem.
[8]
Introduction to Ansible
1
Playbooks and Roles
According to Wikipedia, Ansible is an open source automation engine that automates
software provisioning, configuration management, and application deployment. But you
already knew that. This book is about taking the idea of IT automation software and
applying it to the domain of Information Security Automation.
The book will take you through the journey of security automation to show how Ansible is
used in the real world.
If you have been playing around with Ansible, and in this book we assume you have, you
would have definitely come across some of the following terms:
Playbook
Ansible Modules
YAML
Roles
Templates (Jinja2)
Random documents with unrelated
content Scribd suggests to you:
Argentinien. War es also ein Wunder, daß manche Leute, daß
vielleicht die Nahestehenden mit Entsetzen den Gedanken aufgriffen,
der Ausgewanderte könne um das Verschwinden wissen?
Lebenslänglich wäre ein falscher Verdacht haften geblieben, wenn
nicht im Juni nahezu das gesamte Zeug des Verschwundenen aus
den bekannten Hehlerwinkeln zum Kriminalpräsidium gebracht
worden wäre. Die Stutzen, die Sportmütze, die Stahluhr mit den
Hirschgrandeln hatte Grans weiter verkauft, das Oberhemd trug er
bei seiner Verhaftung am Leibe; er trug gleichzeitig am Leibe
Kleidungsstücke von vier Getöteten und handelte mit Kleidern
anderer Getöteter; so daß nur ungeheuerliche Frechheit oder volle
Arglosigkeit bezüglich der Herkunft dieser von Haarmann
empfangenen Sachen solches Zurschautragen von Mordtaten
begreiflich macht. Auch die Bekanntschaft des verschwundenen
jungen Spiecker mit Haarmann konnte bewiesen werden; der Sohn
des Spieckerschen Hauswirts bekannte, daß er und sein
verschwundener Freund den Haarmann im „schwulen Kessel“
kennen gelernt und von ihm Zigaretten erhalten hatten. Haarmann
behauptet (wie in sämtlichen Mordfällen), daß er nach dem Lichtbild
den jungen Spiecker nicht erkennen könne, sich auch an ihn nicht
entsinne (obwohl der Junge ein Glasauge hatte); aber er müsse
wohl annehmen, daß er eines seiner Opfer geworden sei, da ja alle
Sachen bei ihm gefunden wurden. Vielleicht sei es jener schöne
Jüngling gewesen, der, als er um Mitternacht erwacht sei, tot in
seinen Armen gelegen habe. Er sei bei dem Anblick ohnmächtig
geworden oder vor Mattigkeit wieder eingeschlafen. – „Als ich
erwachte frühmorgens, lag der Tote neben mir. Steif und kalt und
blau. Ich habe ihn mit den Händen aus dem Bett gezogen, auf den
Fußboden gelegt und zerstückelt. Ich habe diesen Fall im Gedächtnis
behalten, der Tote lag da so furchtbar krank.“
Der Fall Bock dürfte von allen Fällen der dunkelste sein; wenn
Haarmann wirklich diese Tat beging, so dürfte es wahrscheinlicher
sein, daß hier ein lang geplanter Mord verübt wurde, als nur eine
Tötung im Geschlechtsrausch.
Der „Arbeiter“ Bock aus Ülzen, 22 Jahre alt, war einer von denen,
die sich beschäftigungslos in Hannover umhertrieben, bald auf dem
Bahnhof, bald in der Altstadt. Er war blond, groß, kräftig und kühn.
Haarmann kannte ihn seit 1921 „vom Bahnhof her“. Er machte mit
ihm gelegentlich kleine Schiebergeschäfte oder nutzte ihn als
Kommissionär beim Verkauf von dunkel erworbenen Kleidern. Als
Bock Mitte April verschwand, weinte ihm keiner eine Träne nach. Nur
der Dreher Fritz Kahmann aus der Neuenstraße, mit dem Bock das
Zimmer geteilt hatte (er ist dummlich, ängstlich, dumpf und unsicher
und hat kleine ängstliche Augen) fragte einige Wochen nach dem
Verschwinden des Bock seinen Nachbar Haarmann: „Du, Fritz, wo is
eigentlich Bock geblieben?“ Haarmann antwortete: „Soll ich das
wissen? Wird woll ein Ding gedreht haben, hat vielleicht von
Kollegen eins auf die Platte ’kriegt.“ Darauf der dummliche
Kahmann: „Fritz, du mußt es doch wissen. Er is zuletzt gesehen, wie
er mit einem Koffer nach deiner Wohnung ging.“ Haarmann wurde
nachdenklich. Dann sagte er: „Das is mir doch alles ein Rätsel.
Hermann is ein hübscher Bengel und nich auf ’en Kopf gefallen.“
Kahmann darauf ängstlich: „Ich meine man, wir sollten zur Polizei
gehen und ihn ‚vermißt‘ melden.“ „Dunnerslag,“ erwiderte
Haarmann, „da haste recht, Kahmann. Weißte was? Ich bin doch auf
’er Polizei gut bekannt. Ich besorge die Meldung. Und außerdem: Bei
die Krankenhäuser und im Gerichtsgefängnis muß angeklingelt
werden. Das mach ich alles noch heute.“ Am nächsten Tage trafen
sich die beiden wieder auf der „Insel“. Haarmann begann sofort:
„Alle Mühe ist umsonst. Ich habe überall nachgefragt. Keiner weiß
von Hermann.“ (Später kam heraus, daß Haarmann nirgendwo
wegen des Bock nachgefragt noch telephoniert hatte.) ... Bock hatte
noch mehrere nahe Freunde: Paul Sieger, genannt Alex, roh, blond,
brutal, Franz Kirchhoff, Schlosser, 20 Jahre alt, ein defekter Junge
mit kleinem Kopf, kleinen Augen, kleiner Nase, dicker Unterlippe und
belegter Stimme, sowie endlich Hans Ulawski, ein langer dünner
Kellner im „Simplizissimus“, welchen Haarmann so charakterisiert:
„Das is der größte Gauner vom Bahnhof. Is Zauberkünstler. Zieht
rum auf die Jahrmärkte.“ Alle diese jungen Leute kannten Haarmann
seit vielen Jahren. Sie hielten ihn stets für einen Kriminalbeamten.
(Er hat ihnen oft weiß gemacht: „Ich muß heute zur Konferenz aufs
Präsidium.“) Sie wußten auch, daß Bock mit Haarmann
zusammensteckte. Er aß mit Haarmann in der Wirtschaft bei der
Engel. Er schlief auch oft bei Haarmann. Aber seine Komplizen
bezeugen: „Mit Männern machte er nichts. Er war nur für die
Mädchens. Er war normal.“ In der Tschechoslowakei hatte Ulawski
eine Braut! Zu dieser sind Bock und Ulawski zweimal zusammen
hingefahren. Die Mutter des Bock, 51 Jahre alt, aus Ülzen, simpel,
stumpf, glupschäugig, schwerhörig und kränklich, hat sich gar nicht
um den Verschwundenen bekümmert. „Der Junge kam woll zu
Weihnachten. Als am 8. April Herr Kahmann mich ’ne Karte schrieb,
da dachte ich: Na, hei schall schon wedder komen.“ Höchst
merkwürdig ist es nun, wie die Sachen des Bock bei Haarmann
„festgestellt“ wurden. Als nach Festnahme des Haarmann auch
Ulawski in Haarmanns Gegenwart unter den ausgestellten Sachen
nachsah, fand sich gar nichts. Aber im Fortgehen fällt der Blick des
Ulawski auf das Zeug, das Haarmann selber am Leibe trägt. Er
stutzt, besieht sichs genau und ruft dann bestimmt: „Haarmann
trägt ja Hermanns Anzug auf dem Leibe.“ Haarmann lachte ihn aus
und erklärt: „Die Sache ist viel zu ernst, als daß man mich da herein
bringt.“ Ulawski blieb bei seiner Behauptung, und da er wußte, bei
welchem Schneider sein Freund arbeiten ließ, so geht er zu diesem,
und der Schneider kann denn auch unter Eid bestätigen, nicht nur,
daß er den Anzug, welchen Haarmann trägt, einst für Bock
angefertigt hat, sondern auch, daß Haarmann selber ihn später mit
der Bemerkung, er habe den Anzug für 30 Mark von Bock erworben,
für seine Statur hat umändern lassen. Jetzt erinnert sich denn auch
Haarmann, er habe den Anzug „vielleicht“ von Bock gekauft. Aber
inzwischen fand sich auch die Aktentasche des Bock. Der
eingeschriebene Name: Hermann Bock, Hannover, ist ausgescheuert,
aber noch klar leserlich. Die Tasche wurde von der Kleiderhexe Engel
als Markttasche benutzt. Haarmann hatte sie ihr geschenkt. Alle
anderen Sachen des Bock sind ebenso wie die Leichenteile aus der
Welt verschwunden. Daß Lustmord vorliegt, ist nicht wahrscheinlich;
der Verschwundene war ja langjähriger Bekannter, der oft bei
Haarmann schlief, war nicht homosexuell und nicht mehr in dem
Alter, welches Haarmann bevorzugte. Wurde hier etwa einer
beseitigt, der manches gemerkt hatte und plaudern konnte? Oder
lockten Koffer und Kleider? Oder war ein Zank vorausgegangen?
Oder spielte alles ineinander? Es erfolgte Freisprechung.