import scap-security-guide-0.1.63-1.el8_6
This commit is contained in:
parent
78369b4189
commit
48dd54229e
2
.gitignore
vendored
2
.gitignore
vendored
@ -1,2 +1,2 @@
|
||||
SOURCES/scap-security-guide-0.1.52-2.el7_9-rhel6.tar.bz2
|
||||
SOURCES/scap-security-guide-0.1.60.tar.bz2
|
||||
SOURCES/scap-security-guide-0.1.63.tar.bz2
|
||||
|
@ -1,2 +1,2 @@
|
||||
b22b45d29ad5a97020516230a6ef3140a91d050a SOURCES/scap-security-guide-0.1.52-2.el7_9-rhel6.tar.bz2
|
||||
6768818c9bd6f9f35596f2fe23c50ffe52b974c3 SOURCES/scap-security-guide-0.1.60.tar.bz2
|
||||
b77c67caa4f8818e95fa6a4c74adf3173ed8e3d2 SOURCES/scap-security-guide-0.1.63.tar.bz2
|
||||
|
@ -1,8 +1,24 @@
|
||||
From eaa73e6d6e3de62e9ed895de7b4b1f2f1c1280ca Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Tue, 9 Aug 2022 10:04:01 +0200
|
||||
Subject: [PATCH 1/8] Disable profiles not in a good shape
|
||||
|
||||
Patch-name: disable-not-in-good-shape-profiles.patch
|
||||
Patch-status: |-
|
||||
Disable profiles that are not in good shape for products/rhel8
|
||||
Patch-id: 0
|
||||
---
|
||||
products/rhel8/CMakeLists.txt | 1 -
|
||||
products/rhel8/profiles/cjis.profile | 2 +-
|
||||
products/rhel8/profiles/rht-ccp.profile | 2 +-
|
||||
products/rhel8/profiles/standard.profile | 2 +-
|
||||
4 files changed, 3 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/products/rhel8/CMakeLists.txt b/products/rhel8/CMakeLists.txt
|
||||
index 5258591c7f..cc4b9c5720 100644
|
||||
index 9c044b68ab..8f6ca03de8 100644
|
||||
--- a/products/rhel8/CMakeLists.txt
|
||||
+++ b/products/rhel8/CMakeLists.txt
|
||||
@@ -11,7 +11,6 @@ ssg_build_product(${PRODUCT})
|
||||
@@ -10,7 +10,6 @@ ssg_build_product(${PRODUCT})
|
||||
ssg_build_html_ref_tables("${PRODUCT}" "table-${PRODUCT}-{ref_id}refs" "anssi;cis;cui;nist;pcidss")
|
||||
|
||||
ssg_build_html_profile_table("table-${PRODUCT}-nistrefs-ospp" "${PRODUCT}" "ospp" "nist")
|
||||
@ -10,8 +26,8 @@ index 5258591c7f..cc4b9c5720 100644
|
||||
ssg_build_html_profile_table("table-${PRODUCT}-nistrefs-stig" "${PRODUCT}" "stig" "nist")
|
||||
|
||||
ssg_build_html_profile_table("table-${PRODUCT}-anssirefs-bp28_minimal" "${PRODUCT}" "anssi_bp28_minimal" "anssi")
|
||||
diff --git a/products/rhel8/profiles/cjis.profile b/rhel8/profiles/cjis.profile
|
||||
index 035d2705b..c6475f33e 100644
|
||||
diff --git a/products/rhel8/profiles/cjis.profile b/products/rhel8/profiles/cjis.profile
|
||||
index 30843b692e..18394802b9 100644
|
||||
--- a/products/rhel8/profiles/cjis.profile
|
||||
+++ b/products/rhel8/profiles/cjis.profile
|
||||
@@ -1,4 +1,4 @@
|
||||
@ -20,8 +36,8 @@ index 035d2705b..c6475f33e 100644
|
||||
|
||||
metadata:
|
||||
version: 5.4
|
||||
diff --git a/products/rhel8/profiles/rht-ccp.profile b/rhel8/profiles/rht-ccp.profile
|
||||
index c84579592..164ec98c4 100644
|
||||
diff --git a/products/rhel8/profiles/rht-ccp.profile b/products/rhel8/profiles/rht-ccp.profile
|
||||
index e8e7e3a72f..d293c779bb 100644
|
||||
--- a/products/rhel8/profiles/rht-ccp.profile
|
||||
+++ b/products/rhel8/profiles/rht-ccp.profile
|
||||
@@ -1,4 +1,4 @@
|
||||
@ -30,8 +46,8 @@ index c84579592..164ec98c4 100644
|
||||
|
||||
title: 'Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)'
|
||||
|
||||
diff --git a/products/rhel8/profiles/standard.profile b/rhel8/profiles/standard.profile
|
||||
index a63ae2cf3..da669bb84 100644
|
||||
diff --git a/products/rhel8/profiles/standard.profile b/products/rhel8/profiles/standard.profile
|
||||
index a63ae2cf32..da669bb843 100644
|
||||
--- a/products/rhel8/profiles/standard.profile
|
||||
+++ b/products/rhel8/profiles/standard.profile
|
||||
@@ -1,4 +1,4 @@
|
||||
@ -41,5 +57,5 @@ index a63ae2cf3..da669bb84 100644
|
||||
title: 'Standard System Security Profile for Red Hat Enterprise Linux 8'
|
||||
|
||||
--
|
||||
2.26.2
|
||||
2.37.1
|
||||
|
||||
|
@ -1,24 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
index 9f036f83015..f94ddab2fe1 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
@@ -32,6 +32,7 @@ references:
|
||||
cis@ubuntu2004: 4.1.1.4
|
||||
disa: CCI-001849
|
||||
nist: CM-6(a)
|
||||
+ ospp: FAU_STG.1,FAU_STG.3
|
||||
srg: SRG-OS-000254-GPOS-00095,SRG-OS-000341-GPOS-00132
|
||||
stigid@ol8: OL08-00-030602
|
||||
stigid@rhel8: RHEL-08-030602
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_audit_backlog_limit_argument/rule.yml b/linux_os/guide/system/bootloader-zipl/zipl_audit_backlog_limit_argument/rule.yml
|
||||
index 6d76e896ffc..7396b9167c6 100644
|
||||
--- a/linux_os/guide/system/bootloader-zipl/zipl_audit_backlog_limit_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_audit_backlog_limit_argument/rule.yml
|
||||
@@ -25,6 +25,7 @@ identifiers:
|
||||
|
||||
references:
|
||||
cis@ubuntu2004: 4.1.1.4
|
||||
+ ospp: FAU_STG.1,FAU_STG.3
|
||||
|
||||
ocil_clause: 'audit backlog limit is not configured'
|
||||
|
@ -1,26 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml
|
||||
index 5841f378fe6..f4780b4ae6d 100644
|
||||
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml
|
||||
@@ -22,7 +22,7 @@ identifiers:
|
||||
references:
|
||||
disa: CCI-000366
|
||||
nist: CM-6
|
||||
- ospp: FAU_GEN.1.1.c
|
||||
+ ospp: FAU_GEN.1
|
||||
srg: SRG-OS-000062-GPOS-00031,SRG-OS-000480-GPOS-00227
|
||||
stigid@ol8: OL08-00-030061
|
||||
stigid@rhel8: RHEL-08-030061
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_basic_configuration/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_basic_configuration/rule.yml
|
||||
index ba60b9b2c98..19dc3320e85 100644
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_basic_configuration/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/policy_rules/audit_basic_configuration/rule.yml
|
||||
@@ -47,7 +47,7 @@ identifiers:
|
||||
|
||||
references:
|
||||
nist: AU-2(a)
|
||||
- ospp: FAU_GEN.1.1.c
|
||||
+ ospp: FAU_GEN.1
|
||||
srg: SRG-OS-000365-GPOS-00152,SRG-OS-000475-GPOS-00220
|
||||
|
||||
ocil_clause: 'the file does not exist or the content differs'
|
@ -1,13 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_write_logs/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_write_logs/rule.yml
|
||||
index 6c39a05550c..f169cba9f6b 100644
|
||||
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_write_logs/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_write_logs/rule.yml
|
||||
@@ -21,7 +21,7 @@ identifiers:
|
||||
|
||||
references:
|
||||
nist: CM-6
|
||||
- ospp: FAU_GEN.1.1.c
|
||||
+ ospp: FAU_STG.1
|
||||
srg: SRG-OS-000480-GPOS-00227
|
||||
|
||||
ocil_clause: write_logs isn't set to yes
|
@ -1,26 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml
|
||||
index 48ed2f31795..b536a68cf2a 100644
|
||||
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml
|
||||
@@ -23,7 +23,7 @@ identifiers:
|
||||
references:
|
||||
disa: CCI-000366
|
||||
nist: CM-6,AU-3
|
||||
- ospp: FAU_GEN.1
|
||||
+ ospp: FAU_GEN.1.2
|
||||
srg: SRG-OS-000255-GPOS-00096,SRG-OS-000480-GPOS-00227
|
||||
stigid@ol8: OL08-00-030063
|
||||
stigid@rhel8: RHEL-08-030063
|
||||
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml
|
||||
index a31e975c1c9..8da90cd760f 100644
|
||||
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml
|
||||
@@ -24,7 +24,7 @@ identifiers:
|
||||
references:
|
||||
disa: CCI-001851
|
||||
nist: CM-6,AU-3
|
||||
- ospp: FAU_GEN.1
|
||||
+ ospp: FAU_GEN.1.2
|
||||
srg: SRG-OS-000039-GPOS-00017,SRG-OS-000342-GPOS-00133,SRG-OS-000479-GPOS-00224
|
||||
stigid@ol7: OL07-00-030211
|
||||
stigid@ol8: OL08-00-030062
|
@ -1,13 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml
|
||||
index ac43b654188..70357c153be 100644
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml
|
||||
@@ -37,7 +37,7 @@ identifiers:
|
||||
references:
|
||||
disa: CCI-000162
|
||||
nist: AU-2(a)
|
||||
- ospp: FAU_GEN.1.1.c
|
||||
+ ospp: FAU_GEN.1.2
|
||||
srg: SRG-OS-000462-GPOS-00206,SRG-OS-000475-GPOS-00220,SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029
|
||||
stigid@ol8: OL08-00-030122
|
||||
stigid@rhel8: RHEL-08-030122
|
@ -1,12 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml b/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml
|
||||
index 5af94a56910..7968d90331e 100644
|
||||
--- a/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml
|
||||
+++ b/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml
|
||||
@@ -31,6 +31,7 @@ references:
|
||||
iso27001-2013: A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1
|
||||
nist: CM-6(a)
|
||||
nist-csf: PR.PT-1
|
||||
+ ospp: FTP_ITC_EXT.1.1
|
||||
srg: SRG-OS-000479-GPOS-00224,SRG-OS-000051-GPOS-00024,SRG-OS-000480-GPOS-00227
|
||||
stigid@ol8: OL08-00-030670
|
||||
stigid@rhel8: RHEL-08-030670
|
@ -1,13 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls/rule.yml b/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls/rule.yml
|
||||
index d5d49bf7426..83c6d9339de 100644
|
||||
--- a/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls/rule.yml
|
||||
+++ b/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls/rule.yml
|
||||
@@ -29,7 +29,7 @@ references:
|
||||
anssi: BP28(R43)
|
||||
ism: 0988,1405
|
||||
nist: AU-9(3),CM-6(a)
|
||||
- ospp: FCS_TLSC_EXT.1,FTP_ITC_EXT.1.1
|
||||
+ ospp: FCS_TLSC_EXT.1,FTP_ITC_EXT.1.1,FIA_X509_EXT.1.1,FMT_SMF_EXT.1.1
|
||||
srg: SRG-OS-000480-GPOS-00227,SRG-OS-000120-GPOS-00061
|
||||
|
||||
ocil_clause: 'omfwd is not configured with gtls and AuthMode'
|
@ -1,13 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls_cacert/rule.yml b/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls_cacert/rule.yml
|
||||
index 635207b571f..818f24718a0 100644
|
||||
--- a/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls_cacert/rule.yml
|
||||
+++ b/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_tls_cacert/rule.yml
|
||||
@@ -27,7 +27,7 @@ identifiers:
|
||||
references:
|
||||
anssi: BP28(R43)
|
||||
ism: 0988,1405
|
||||
- ospp: FCS_TLSC_EXT.1,FTP_ITC_EXT.1.1
|
||||
+ ospp: FCS_TLSC_EXT.1
|
||||
srg: SRG-OS-000480-GPOS-00227
|
||||
|
||||
ocil_clause: 'CA certificate for rsyslog remote logging via TLS is not set'
|
@ -1,24 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/package_audit_installed/rule.yml b/linux_os/guide/system/auditing/package_audit_installed/rule.yml
|
||||
index 8b36f0c2fa3..795089c8b83 100644
|
||||
--- a/linux_os/guide/system/auditing/package_audit_installed/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/package_audit_installed/rule.yml
|
||||
@@ -27,6 +27,7 @@ references:
|
||||
nerc-cip: CIP-004-6 R3.3,CIP-007-3 R6.5
|
||||
nist: AC-7(a),AU-7(1),AU-7(2),AU-14,AU-12(2),AU-2(a),CM-6(a)
|
||||
nist@sle12: AU-7(a),AU-7(b),AU-8(b),AU-12.1(iv),AU-12(3),AU-12(c),CM-5(1)
|
||||
+ ospp: FAU_GEN.1
|
||||
srg: SRG-OS-000122-GPOS-00063,SRG-OS-000337-GPOS-00129,SRG-OS-000348-GPOS-00136,SRG-OS-000349-GPOS-00137,SRG-OS-000350-GPOS-00138,SRG-OS-000351-GPOS-00139,SRG-OS-000352-GPOS-00140,SRG-OS-000353-GPOS-00141,SRG-OS-000354-GPOS-00142,SRG-OS-000358-GPOS-00145,SRG-OS-000359-GPOS-00146,SRG-OS-000365-GPOS-00152,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000480-GPOS-00227,SRG-OS-000062-GPOS-00031
|
||||
stigid@ol8: OL08-00-030180
|
||||
stigid@rhel8: RHEL-08-030180
|
||||
diff --git a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
|
||||
index 320b69c3179..99edca3e270 100644
|
||||
--- a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
|
||||
@@ -50,6 +50,7 @@ references:
|
||||
nist: AC-2(g),AU-3,AU-10,AU-2(d),AU-12(c),AU-14(1),AC-6(9),CM-6(a),SI-4(23)
|
||||
nist-csf: DE.AE-3,DE.AE-5,DE.CM-1,DE.CM-3,DE.CM-7,ID.SC-4,PR.AC-3,PR.PT-1,PR.PT-4,RS.AN-1,RS.AN-4
|
||||
nist@sle12: AU-3,AU-3(1),AU-3(1).1(ii),AU-3.1,AU-6(4),AU-6(4).1,AU-7(1),AU-7(1).1,AU-7(a),AU-14(1),AU-14(1).1,CM-6(b),CM-6.1(iv),MA-4(1)(a)
|
||||
+ ospp: FAU_GEN.1
|
||||
pcidss: Req-10.1
|
||||
srg: SRG-OS-000037-GPOS-00015,SRG-OS-000038-GPOS-00016,SRG-OS-000039-GPOS-00017,SRG-OS-000040-GPOS-00018,SRG-OS-000041-GPOS-00019,SRG-OS-000042-GPOS-00021,SRG-OS-000051-GPOS-00024,SRG-OS-000054-GPOS-00025,SRG-OS-000122-GPOS-00063,SRG-OS-000254-GPOS-00095,SRG-OS-000255-GPOS-00096,SRG-OS-000365-GPOS-00152,SRG-OS-000392-GPOS-00172,SRG-OS-000480-GPOS-00227,SRG-OS-000062-GPOS-00031
|
||||
stigid@ol7: OL07-00-030000
|
@ -1,165 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/ansible/shared.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/ansible/shared.yml
|
||||
index 8a28af022a7..02c69bddd27 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/ansible/shared.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/ansible/shared.yml
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_all
|
||||
# reboot = false
|
||||
# strategy = restrict
|
||||
# complexity = high
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml
|
||||
index a7182849548..db89a5e47a1 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml
|
||||
@@ -31,6 +31,8 @@ rationale: |-
|
||||
of initiating changes, including upgrades and modifications.
|
||||
|
||||
identifiers:
|
||||
+ cce@rhel8: CCE-88692-9
|
||||
+ cce@rhel9: CCE-88693-7
|
||||
cce@sle12: CCE-83234-5
|
||||
cce@sle15: CCE-85753-2
|
||||
|
||||
@@ -40,6 +42,8 @@ references:
|
||||
disa: CCI-001499
|
||||
nerc-cip: CIP-003-8 R6
|
||||
nist: CM-5,CM-5(6),CM-5(6).1
|
||||
+ srg: SRG-OS-000259-GPOS-00100
|
||||
+ stigid@rhel8: RHEL-08-010331
|
||||
stigid@sle12: SLES-12-010872
|
||||
stigid@sle15: SLES-15-010352
|
||||
stigid@ubuntu2004: UBTU-20-010427
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
index af078463b05..6e957c302ac 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu,multi_platform_rhel
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
find "$dirPath" -perm /022 -type d -exec chmod go-w '{}' \;
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh
|
||||
index d58616bcafb..55ff9cebd4f 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu,multi_platform_rhel
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
chmod -R 755 "$dirPath"
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh
|
||||
index 98d18cde3ea..c2b5b6bf029 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu,multi_platform_rhel
|
||||
DIRS="/lib /lib64"
|
||||
for dirPath in $DIRS; do
|
||||
mkdir -p "$dirPath/testme" && chmod 777 "$dirPath/testme"
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh
|
||||
index 6df6e2f8f9b..40e6c42c829 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu,multi_platform_rhel
|
||||
DIRS="/usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
mkdir -p "$dirPath/testme" && chmod 777 "$dirPath/testme"
|
||||
diff --git a/products/rhel8/profiles/cjis.profile b/products/rhel8/profiles/cjis.profile
|
||||
index decba0087e8..920a55659fd 100644
|
||||
--- a/products/rhel8/profiles/cjis.profile
|
||||
+++ b/products/rhel8/profiles/cjis.profile
|
||||
@@ -77,6 +77,7 @@ selections:
|
||||
- accounts_password_pam_difok
|
||||
- accounts_max_concurrent_login_sessions
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- file_owner_etc_shadow
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 04f158116ee..5d98b1c894e 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -228,6 +228,9 @@ selections:
|
||||
# RHEL-08-010330
|
||||
- file_permissions_library_dirs
|
||||
|
||||
+ # RHEL-08-010331
|
||||
+ - dir_permissions_library_dirs
|
||||
+
|
||||
# RHEL-08-010340
|
||||
- file_ownership_library_dirs
|
||||
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 8f79b22e3e4..2614504e9cd 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -229,6 +229,9 @@ selections:
|
||||
# RHEL-08-010330
|
||||
- file_permissions_library_dirs
|
||||
|
||||
+ # RHEL-08-010331
|
||||
+ - dir_permissions_library_dirs
|
||||
+
|
||||
# RHEL-08-010340
|
||||
- file_ownership_library_dirs
|
||||
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 3f6ec5e17c4..4a926bce5de 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -2645,8 +2645,6 @@ CCE-88688-7
|
||||
CCE-88689-5
|
||||
CCE-88690-3
|
||||
CCE-88691-1
|
||||
-CCE-88692-9
|
||||
-CCE-88693-7
|
||||
CCE-88694-5
|
||||
CCE-88695-2
|
||||
CCE-88696-0
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index ed739e724f4..4df5c4a2e21 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -25,6 +25,7 @@ extends: null
|
||||
metadata:
|
||||
version: V1R4
|
||||
SMEs:
|
||||
+ - mab879
|
||||
- ggbecker
|
||||
reference: https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems%2Cunix-linux
|
||||
selections:
|
||||
@@ -180,6 +181,7 @@ selections:
|
||||
- dconf_gnome_screensaver_idle_delay
|
||||
- dconf_gnome_screensaver_lock_enabled
|
||||
- dir_group_ownership_library_dirs
|
||||
+- dir_permissions_library_dirs
|
||||
- dir_perms_world_writable_root_owned
|
||||
- dir_perms_world_writable_sticky_bits
|
||||
- directory_group_ownership_var_log_audit
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 56c3fcb9f59..98746158aed 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -36,6 +36,7 @@ extends: null
|
||||
metadata:
|
||||
version: V1R4
|
||||
SMEs:
|
||||
+ - mab879
|
||||
- ggbecker
|
||||
reference: https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems%2Cunix-linux
|
||||
selections:
|
||||
@@ -191,6 +192,7 @@ selections:
|
||||
- dconf_gnome_screensaver_idle_delay
|
||||
- dconf_gnome_screensaver_lock_enabled
|
||||
- dir_group_ownership_library_dirs
|
||||
+- dir_permissions_library_dirs
|
||||
- dir_perms_world_writable_root_owned
|
||||
- dir_perms_world_writable_sticky_bits
|
||||
- directory_group_ownership_var_log_audit
|
@ -1,57 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
|
||||
index 68b353965ec..ff106996f00 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
|
||||
@@ -28,7 +28,7 @@ references:
|
||||
cis@ubuntu2004: 1.4.1
|
||||
cjis: 5.10.1.3
|
||||
cobit5: APO01.06,BAI01.06,BAI02.01,BAI03.05,BAI06.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS01.03,DSS03.05,DSS04.07,DSS05.02,DSS05.03,DSS05.05,DSS05.07,DSS06.02,DSS06.06
|
||||
- disa: CCI-002699,CCI-001744
|
||||
+ disa: CCI-002696,CCI-002699,CCI-001744
|
||||
isa-62443-2009: 4.3.4.3.2,4.3.4.3.3,4.3.4.4.4
|
||||
isa-62443-2013: 'SR 3.1,SR 3.3,SR 3.4,SR 3.8,SR 4.1,SR 6.2,SR 7.6'
|
||||
ism: 1034,1288,1341,1417
|
||||
@@ -36,9 +36,9 @@ references:
|
||||
nist: CM-6(a)
|
||||
nist-csf: DE.CM-1,DE.CM-7,PR.DS-1,PR.DS-6,PR.DS-8,PR.IP-1,PR.IP-3
|
||||
pcidss: Req-11.5
|
||||
- srg: SRG-OS-000363-GPOS-00150
|
||||
+ srg: SRG-OS-000363-GPOS-00150,SRG-OS-000445-GPOS-00199
|
||||
stigid@ol8: OL08-00-010360
|
||||
- stigid@rhel8: RHEL-08-010360
|
||||
+ stigid@rhel8: RHEL-08-010359
|
||||
stigid@sle12: SLES-12-010500
|
||||
stigid@sle15: SLES-15-010420
|
||||
stigid@ubuntu2004: UBTU-20-010450
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index ff23f83cfbf..cb72403e81a 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -239,8 +239,10 @@ selections:
|
||||
- root_permissions_syslibrary_files
|
||||
- dir_group_ownership_library_dirs
|
||||
|
||||
- # RHEL-08-010360
|
||||
+ # RHEL-08-010359
|
||||
- package_aide_installed
|
||||
+
|
||||
+ # RHEL-08-010360
|
||||
- aide_scan_notification
|
||||
|
||||
# RHEL-08-010370
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 31015d4b83c..93ecc404dc2 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -240,8 +240,10 @@ selections:
|
||||
- root_permissions_syslibrary_files
|
||||
- dir_group_ownership_library_dirs
|
||||
|
||||
- # RHEL-08-010360
|
||||
+ # RHEL-08-010359
|
||||
- package_aide_installed
|
||||
+
|
||||
+ # RHEL-08-010360
|
||||
- aide_scan_notification
|
||||
|
||||
# RHEL-08-010370
|
@ -1,596 +0,0 @@
|
||||
From 19bd5adfd804590b15e42cc75287b792706286d5 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Thu, 10 Feb 2022 15:25:06 +0100
|
||||
Subject: [PATCH 1/9] Add rule to check for default sudoers includedir
|
||||
|
||||
This rule supports RHEL-08-010379.
|
||||
---
|
||||
.../ansible/shared.yml | 7 ++++
|
||||
.../sudoers_default_includedir/bash/shared.sh | 11 ++++++
|
||||
.../oval/shared.xml | 23 +++++++++++
|
||||
.../sudo/sudoers_default_includedir/rule.yml | 38 +++++++++++++++++++
|
||||
.../tests/default_includedir.pass.sh | 7 ++++
|
||||
.../tests/duplicate_includedir.fail.sh | 7 ++++
|
||||
.../tests/no_includedir.fail.sh | 4 ++
|
||||
.../tests/two_includedir.fail.sh | 8 ++++
|
||||
shared/references/cce-redhat-avail.txt | 3 --
|
||||
9 files changed, 105 insertions(+), 3 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/default_includedir.pass.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/duplicate_includedir.fail.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/two_includedir.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
new file mode 100644
|
||||
index 00000000000..d9d5933285f
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
@@ -0,0 +1,7 @@
|
||||
+# platform = multi_platform_all
|
||||
+# # reboot = false
|
||||
+# # strategy = configure
|
||||
+# # complexity = low
|
||||
+# # disruption = low
|
||||
+
|
||||
+{{{ ansible_only_lineinfile(msg='Ensure sudo only has the default includedir', line_regex='^#includedir.*$', path='/etc/sudoers', new_line='#includedir /etc/sudoers.d') }}}
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
new file mode 100644
|
||||
index 00000000000..3a9e2da985b
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+sudoers_config_file="/etc/sudoers"
|
||||
+sudoers_includedir_count=$(grep -c "#includedir" "$sudoers_config_file")
|
||||
+if [ "$sudoers_includedir_count" -gt 1 ]; then
|
||||
+ sed -i "/#includedir.*/d" "$sudoers_config_file"
|
||||
+ echo "#includedir /etc/sudoers.d" >> "$sudoers_config_file"
|
||||
+fi
|
||||
+if [ "$sudoers_includedir_count" -eq 0 ]; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> "$sudoers_config_file"
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
new file mode 100644
|
||||
index 00000000000..5618c64291c
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
@@ -0,0 +1,23 @@
|
||||
+<def-group>
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}" version="1">
|
||||
+ {{{ oval_metadata("Check if sudo includes only the default includedir") }}}
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion comment="Check /etc/sudoers for #includedir" test_ref="test_sudoers_default_includedir" />
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists"
|
||||
+ comment="audit augenrules rmmod" id="test_sudoers_default_includedir" version="1">
|
||||
+ <ind:object object_ref="object_sudoers_default_includedir" />
|
||||
+ <ind:state state_ref="state_sudoers_default_includedir" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object id="object_sudoers_default_includedir" version="1">
|
||||
+ <ind:filepath>/etc/sudoers</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^#includedir[\s]+(.*)$</ind:pattern>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+ <ind:textfilecontent54_state id="state_sudoers_default_includedir" version="1">
|
||||
+ <ind:subexpression operation="equals">/etc/sudoers.d</ind:subexpression>
|
||||
+ </ind:textfilecontent54_state>
|
||||
+
|
||||
+</def-group>
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..5c33121f911
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
@@ -0,0 +1,38 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: fedora,rhel7,rhel8,rhel9
|
||||
+
|
||||
+title: 'Ensure sudo only includes the default configuration directory'
|
||||
+
|
||||
+description: |-
|
||||
+ Administrators can configure authorized <tt>sudo</tt> users via drop-in files, and it is possible to include
|
||||
+ other directories and configuration files from the file currently being parsed.
|
||||
+
|
||||
+ Make sure that <tt>/etc/sudoers</tt> only includes drop-in configuration files from <tt>/etc/sudoers.d</tt>.
|
||||
+ The <tt>/etc/sudoers</tt> should contain only one <tt>#includedir</tt> directive pointing to
|
||||
+ <tt>/etc/sudoers.d</tt>
|
||||
+ Note that the '#' character doesn't denote a comment in the configuration file.
|
||||
+
|
||||
+rationale: |-
|
||||
+ Some <tt>sudo</tt> configurtion options allow users to run programs without re-authenticating.
|
||||
+ Use of these configuration options makes it easier for one compromised accound to be used to
|
||||
+ compromise other accounts.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel7: CCE-86277-1
|
||||
+ cce@rhel8: CCE-86377-9
|
||||
+ cce@rhel9: CCE-86477-7
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-000366
|
||||
+ stigid@rhel8: RHEL-08-010379
|
||||
+
|
||||
+ocil_clause: "the /etc/sudoers doesn't include /etc/sudores.d or includes other directories?"
|
||||
+
|
||||
+ocil: |-
|
||||
+ To determine whether <tt>sudo</tt> command includes configuration files from the appropriate directory,
|
||||
+ run the following command:
|
||||
+ <pre>$ sudo grep 'include' /etc/sudoers</pre>
|
||||
+ If only the line <tt>#includedir /etc/sudoers> is returned, then the drop-in file configuration is set correctly.
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/default_includedir.pass.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/default_includedir.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..ac0c808ccd6
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/default_includedir.pass.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+# Ensure default config is there
|
||||
+if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/duplicate_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/duplicate_includedir.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..5bad8225625
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/duplicate_includedir.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+# duplicate default entry
|
||||
+if grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..1e0ab8aea92
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh
|
||||
@@ -0,0 +1,4 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+sed -i "/#includedir.*/d" /etc/sudoers
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/two_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/two_includedir.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..09d14eab630
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/two_includedir.fail.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+# Ensure that there are two different indludedirs
|
||||
+if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
+fi
|
||||
+echo "#includedir /opt/extra_config.d" >> /etc/sudoers
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 41caad9f0d0..f2990adb537 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -340,7 +340,6 @@ CCE-86273-0
|
||||
CCE-86274-8
|
||||
CCE-86275-5
|
||||
CCE-86276-3
|
||||
-CCE-86277-1
|
||||
CCE-86278-9
|
||||
CCE-86279-7
|
||||
CCE-86281-3
|
||||
@@ -428,7 +427,6 @@ CCE-86373-8
|
||||
CCE-86374-6
|
||||
CCE-86375-3
|
||||
CCE-86376-1
|
||||
-CCE-86377-9
|
||||
CCE-86378-7
|
||||
CCE-86379-5
|
||||
CCE-86380-3
|
||||
@@ -524,7 +522,6 @@ CCE-86473-6
|
||||
CCE-86474-4
|
||||
CCE-86475-1
|
||||
CCE-86476-9
|
||||
-CCE-86477-7
|
||||
CCE-86478-5
|
||||
CCE-86479-3
|
||||
CCE-86480-1
|
||||
|
||||
From 99fe46922243e8dff5822e2ed6eb49addd000baa Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Thu, 10 Feb 2022 16:21:46 +0100
|
||||
Subject: [PATCH 2/9] Select rule in RHEL8 STIG
|
||||
|
||||
Select sudoers_default_indludedir aligning to RHEL8 STIG V1R5
|
||||
---
|
||||
products/rhel8/profiles/stig.profile | 3 +++
|
||||
1 file changed, 3 insertions(+)
|
||||
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index d92bc72971c..e13bda7a787 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -271,6 +271,9 @@ selections:
|
||||
# RHEL-08-010376
|
||||
- sysctl_kernel_perf_event_paranoid
|
||||
|
||||
+ # RHEL-08-010379
|
||||
+ - sudoers_default_includedir
|
||||
+
|
||||
# RHEL-08-010380
|
||||
- sudo_remove_nopasswd
|
||||
|
||||
|
||||
From 3686fe72a6e27049f1c46d0a4efa07e1b42b6a20 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Thu, 10 Feb 2022 17:26:59 +0100
|
||||
Subject: [PATCH 3/9] Add test and fix for case when the single includedir is
|
||||
wrong
|
||||
|
||||
---
|
||||
.../sudo/sudoers_default_includedir/bash/shared.sh | 7 +++++--
|
||||
.../tests/wrong_includedir.fail.sh | 5 +++++
|
||||
2 files changed, 10 insertions(+), 2 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/wrong_includedir.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
index 3a9e2da985b..258af02c121 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
@@ -5,7 +5,10 @@ sudoers_includedir_count=$(grep -c "#includedir" "$sudoers_config_file")
|
||||
if [ "$sudoers_includedir_count" -gt 1 ]; then
|
||||
sed -i "/#includedir.*/d" "$sudoers_config_file"
|
||||
echo "#includedir /etc/sudoers.d" >> "$sudoers_config_file"
|
||||
-fi
|
||||
-if [ "$sudoers_includedir_count" -eq 0 ]; then
|
||||
+elif [ "$sudoers_includedir_count" -eq 0 ]; then
|
||||
echo "#includedir /etc/sudoers.d" >> "$sudoers_config_file"
|
||||
+else
|
||||
+ if ! grep -q "^#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ sed -i "s|^#includedir.*|#includedir /etc/sudoers.d|g" /etc/sudoers
|
||||
+ fi
|
||||
fi
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/wrong_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/wrong_includedir.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..55a072adf3c
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/wrong_includedir.fail.sh
|
||||
@@ -0,0 +1,5 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+sed -i "/#includedir.*/d" /etc/sudoers
|
||||
+echo "#includedir /opt/extra_config.d" >> /etc/sudoers
|
||||
|
||||
From 0b20b495ed82cead1a033170b900c13da5260603 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 14:50:11 +0100
|
||||
Subject: [PATCH 4/9] Add tests for sudo file and dir includes in
|
||||
/etc/sudoers.d
|
||||
|
||||
---
|
||||
.../tests/sudoers.d_with_include.fail.sh | 9 +++++++++
|
||||
.../tests/sudoers.d_with_includedir.fail.sh | 9 +++++++++
|
||||
.../tests/sudoers_with_include.fail.sh | 11 +++++++++++
|
||||
3 files changed, 29 insertions(+)
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers_with_include.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..554ef2e060d
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+# Ensure default config is there
|
||||
+if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
+fi
|
||||
+
|
||||
+echo "#include /etc/my-sudoers" > /etc/sudoers.d/my-sudoers
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..516b68b5a3e
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+# Ensure default config is there
|
||||
+if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
+fi
|
||||
+
|
||||
+echo "#includedir /etc/my-sudoers.d" > /etc/sudoers.d/my-sudoers
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers_with_include.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers_with_include.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..ad04880e334
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers_with_include.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_all
|
||||
+
|
||||
+# Ensure default config is there
|
||||
+if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
+ echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
+fi
|
||||
+
|
||||
+if ! grep -q "#include " /etc/sudoers; then
|
||||
+ echo "#include /etc/my-sudoers" >> /etc/sudoers
|
||||
+fi
|
||||
|
||||
From d91e3eefe6c265c27634cb15b0f276a298f81645 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 14:59:18 +0100
|
||||
Subject: [PATCH 5/9] Update rule catch and remove other sudo includes
|
||||
|
||||
Any other #include or #includedir besides:
|
||||
"/etc/sudoers: #includedir /etc/sudoers.d" should be removed.
|
||||
---
|
||||
.../ansible/shared.yml | 14 +++++++++++
|
||||
.../sudoers_default_includedir/bash/shared.sh | 7 ++++--
|
||||
.../oval/shared.xml | 23 +++++++++++++++++++
|
||||
.../sudo/sudoers_default_includedir/rule.yml | 7 +++---
|
||||
4 files changed, 46 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
index d9d5933285f..175a447e0d9 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
@@ -5,3 +5,17 @@
|
||||
# # disruption = low
|
||||
|
||||
{{{ ansible_only_lineinfile(msg='Ensure sudo only has the default includedir', line_regex='^#includedir.*$', path='/etc/sudoers', new_line='#includedir /etc/sudoers.d') }}}
|
||||
+{{{ ansible_lineinfile(msg='Ensure sudoers doesn\'t include other non-default file', regex='^#include[\s]+.*$', path='/etc/sudoers', state='absent') }}}
|
||||
+- name: "Find out if /etc/sudoers.d/* files contain file or directory includes"
|
||||
+ find:
|
||||
+ path: "/etc/sudoers.d"
|
||||
+ patterns: "*"
|
||||
+ contains: '^#include(dir)?\s.*$'
|
||||
+ register: sudoers_d_includes
|
||||
+
|
||||
+- name: "Remove found occurrences of file and directory inclues from /etc/sudoers.d/* files"
|
||||
+ lineinfile:
|
||||
+ path: "{{ item.path }}"
|
||||
+ regexp: '^#include(dir)?\s.*$'
|
||||
+ state: absent
|
||||
+ with_items: "{{ sudoers_d_includes.files }}"
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
index 258af02c121..2d00b471677 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
@@ -1,6 +1,7 @@
|
||||
# platform = multi_platform_all
|
||||
|
||||
sudoers_config_file="/etc/sudoers"
|
||||
+sudoers_config_dir="/etc/sudoers.d"
|
||||
sudoers_includedir_count=$(grep -c "#includedir" "$sudoers_config_file")
|
||||
if [ "$sudoers_includedir_count" -gt 1 ]; then
|
||||
sed -i "/#includedir.*/d" "$sudoers_config_file"
|
||||
@@ -8,7 +9,9 @@ if [ "$sudoers_includedir_count" -gt 1 ]; then
|
||||
elif [ "$sudoers_includedir_count" -eq 0 ]; then
|
||||
echo "#includedir /etc/sudoers.d" >> "$sudoers_config_file"
|
||||
else
|
||||
- if ! grep -q "^#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
- sed -i "s|^#includedir.*|#includedir /etc/sudoers.d|g" /etc/sudoers
|
||||
+ if ! grep -q "^#includedir /etc/sudoers.d" "$sudoers_config_file"; then
|
||||
+ sed -i "s|^#includedir.*|#includedir /etc/sudoers.d|g" "$sudoers_config_file"
|
||||
fi
|
||||
fi
|
||||
+sed -i "/^#include\s\+.*/d" "$sudoers_config_file" "${sudoers_config_dir}"/*
|
||||
+sed -i "/^#includedir\s\+.*/d" "${sudoers_config_dir}"/*
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
index 5618c64291c..59cab0b89de 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
@@ -3,6 +3,8 @@
|
||||
{{{ oval_metadata("Check if sudo includes only the default includedir") }}}
|
||||
<criteria operator="AND">
|
||||
<criterion comment="Check /etc/sudoers for #includedir" test_ref="test_sudoers_default_includedir" />
|
||||
+ <criterion comment="Check /etc/sudoers for #include" test_ref="test_sudoers_without_include" />
|
||||
+ <criterion comment="Check /etc/sudoers.d for includes" test_ref="test_sudoersd_without_includes" />
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
@@ -20,4 +22,25 @@
|
||||
<ind:subexpression operation="equals">/etc/sudoers.d</ind:subexpression>
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="none_exist"
|
||||
+ comment="audit augenrules rmmod" id="test_sudoers_without_include" version="1">
|
||||
+ <ind:object object_ref="object_sudoers_without_include" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object id="object_sudoers_without_include" version="1">
|
||||
+ <ind:filepath>/etc/sudoers</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^#include[\s]+.*$</ind:pattern>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="none_exist"
|
||||
+ comment="audit augenrules rmmod" id="test_sudoersd_without_includes" version="1">
|
||||
+ <ind:object object_ref="object_sudoersd_without_includes" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object id="object_sudoersd_without_includes" version="1">
|
||||
+ <ind:path>/etc/sudoers.d/</ind:path>
|
||||
+ <ind:filename operation="pattern match">.*</ind:filename>
|
||||
+ <ind:pattern operation="pattern match">^#include(dir)?[\s]+.*$</ind:pattern>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
</def-group>
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
index 5c33121f911..3a8c22ac8af 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
@@ -10,7 +10,7 @@ description: |-
|
||||
|
||||
Make sure that <tt>/etc/sudoers</tt> only includes drop-in configuration files from <tt>/etc/sudoers.d</tt>.
|
||||
The <tt>/etc/sudoers</tt> should contain only one <tt>#includedir</tt> directive pointing to
|
||||
- <tt>/etc/sudoers.d</tt>
|
||||
+ <tt>/etc/sudoers.d</tt>, and no file in <tt>/etc/sudoers.d/</tt> should include other files or directories.
|
||||
Note that the '#' character doesn't denote a comment in the configuration file.
|
||||
|
||||
rationale: |-
|
||||
@@ -34,5 +34,6 @@ ocil_clause: "the /etc/sudoers doesn't include /etc/sudores.d or includes other
|
||||
ocil: |-
|
||||
To determine whether <tt>sudo</tt> command includes configuration files from the appropriate directory,
|
||||
run the following command:
|
||||
- <pre>$ sudo grep 'include' /etc/sudoers</pre>
|
||||
- If only the line <tt>#includedir /etc/sudoers> is returned, then the drop-in file configuration is set correctly.
|
||||
+ <pre>$ sudo grep -rP '^#include(dir)?' /etc/sudoers /etc/sudoers.d</pre>
|
||||
+ If only the line <tt>/etc/sudoers:#includedir /etc/sudoers.d</tt> is returned, then the drop-in include configuration is set correctly.
|
||||
+ Any other line returned is a finding.
|
||||
|
||||
From ead72b744f1fc03893184079c079df27780044c2 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 15:00:46 +0100
|
||||
Subject: [PATCH 6/9] Add SRG to sudoers_default_includedir
|
||||
|
||||
---
|
||||
.../system/software/sudo/sudoers_default_includedir/rule.yml | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
index 3a8c22ac8af..a97bd3efb2c 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
@@ -27,6 +27,7 @@ identifiers:
|
||||
|
||||
references:
|
||||
disa: CCI-000366
|
||||
+ srg: SRG-OS-000480-GPOS-00227
|
||||
stigid@rhel8: RHEL-08-010379
|
||||
|
||||
ocil_clause: "the /etc/sudoers doesn't include /etc/sudores.d or includes other directories?"
|
||||
|
||||
From c1a08fe6b8e6388b89b190ca74e57af06e7c999c Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 16:12:32 +0100
|
||||
Subject: [PATCH 7/9] Update RHEL8 STIG profile stability data
|
||||
|
||||
---
|
||||
tests/data/profile_stability/rhel8/stig.profile | 1 +
|
||||
tests/data/profile_stability/rhel8/stig_gui.profile | 1 +
|
||||
2 files changed, 2 insertions(+)
|
||||
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index e4fee44f9f9..974b28757e9 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -365,6 +365,7 @@ selections:
|
||||
- sudo_remove_nopasswd
|
||||
- sudo_require_reauthentication
|
||||
- sudo_restrict_privilege_elevation_to_authorized
|
||||
+- sudoers_default_includedir
|
||||
- sudoers_validate_passwd
|
||||
- sysctl_crypto_fips_enabled
|
||||
- sysctl_fs_protected_hardlinks
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 83d04775e3a..99e0af4f5a6 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -376,6 +376,7 @@ selections:
|
||||
- sudo_remove_nopasswd
|
||||
- sudo_require_reauthentication
|
||||
- sudo_restrict_privilege_elevation_to_authorized
|
||||
+- sudoers_default_includedir
|
||||
- sudoers_validate_passwd
|
||||
- sysctl_crypto_fips_enabled
|
||||
- sysctl_fs_protected_hardlinks
|
||||
|
||||
From adae3ecbda4362e23cd1f30e053db37d6a1d403b Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 16:59:22 +0100
|
||||
Subject: [PATCH 8/9] Fix Ansible remediation metadata
|
||||
|
||||
---
|
||||
.../sudo/sudoers_default_includedir/ansible/shared.yml | 8 ++++----
|
||||
1 file changed, 4 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
index 175a447e0d9..0d8c9e75184 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/ansible/shared.yml
|
||||
@@ -1,8 +1,8 @@
|
||||
# platform = multi_platform_all
|
||||
-# # reboot = false
|
||||
-# # strategy = configure
|
||||
-# # complexity = low
|
||||
-# # disruption = low
|
||||
+# reboot = false
|
||||
+# strategy = configure
|
||||
+# complexity = low
|
||||
+# disruption = low
|
||||
|
||||
{{{ ansible_only_lineinfile(msg='Ensure sudo only has the default includedir', line_regex='^#includedir.*$', path='/etc/sudoers', new_line='#includedir /etc/sudoers.d') }}}
|
||||
{{{ ansible_lineinfile(msg='Ensure sudoers doesn\'t include other non-default file', regex='^#include[\s]+.*$', path='/etc/sudoers', state='absent') }}}
|
||||
|
||||
From d3f048456908b316c0dcc0bff2328cf87fe6e7de Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 17:39:39 +0100
|
||||
Subject: [PATCH 9/9] Handle case when /etc/sudoers.d doesn't exist
|
||||
|
||||
The remediation skips the directory, and the test scenarios create the
|
||||
dir to ensure the test scenario works.
|
||||
---
|
||||
.../sudo/sudoers_default_includedir/bash/shared.sh | 8 ++++++--
|
||||
.../tests/sudoers.d_with_include.fail.sh | 1 +
|
||||
.../tests/sudoers.d_with_includedir.fail.sh | 1 +
|
||||
3 files changed, 8 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
index 2d00b471677..fbff5eb6f30 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/bash/shared.sh
|
||||
@@ -13,5 +13,9 @@ else
|
||||
sed -i "s|^#includedir.*|#includedir /etc/sudoers.d|g" "$sudoers_config_file"
|
||||
fi
|
||||
fi
|
||||
-sed -i "/^#include\s\+.*/d" "$sudoers_config_file" "${sudoers_config_dir}"/*
|
||||
-sed -i "/^#includedir\s\+.*/d" "${sudoers_config_dir}"/*
|
||||
+
|
||||
+sed -i "/^#include\s\+.*/d" "$sudoers_config_file"
|
||||
+
|
||||
+if grep -Pr "^#include(dir)? .*" "$sudoers_config_dir" ; then
|
||||
+ sed -i "/^#include\(dir\)\?\s\+.*/d" "$sudoers_config_dir"/*
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh
|
||||
index 554ef2e060d..3f14ecc1627 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_include.fail.sh
|
||||
@@ -1,6 +1,7 @@
|
||||
#!/bin/bash
|
||||
# platform = multi_platform_all
|
||||
|
||||
+mkdir -p /etc/sudoers.d
|
||||
# Ensure default config is there
|
||||
if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh
|
||||
index 516b68b5a3e..89515076ff1 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/sudoers.d_with_includedir.fail.sh
|
||||
@@ -1,6 +1,7 @@
|
||||
#!/bin/bash
|
||||
# platform = multi_platform_all
|
||||
|
||||
+mkdir -p /etc/sudoers.d
|
||||
# Ensure default config is there
|
||||
if ! grep -q "#includedir /etc/sudoers.d" /etc/sudoers; then
|
||||
echo "#includedir /etc/sudoers.d" >> /etc/sudoers
|
@ -1,13 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_pwhistory_remember_password_auth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_pwhistory_remember_password_auth/rule.yml
|
||||
index 5353f60975c..69a36c4959a 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_pwhistory_remember_password_auth/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_pwhistory_remember_password_auth/rule.yml
|
||||
@@ -43,7 +43,7 @@ references:
|
||||
stigid@ol7: OL07-00-010270
|
||||
stigid@ol8: OL08-00-020220
|
||||
stigid@rhel7: RHEL-07-010270
|
||||
- stigid@rhel8: RHEL-08-020220
|
||||
+ stigid@rhel8: RHEL-08-020221
|
||||
vmmsrg: SRG-OS-000077-VMM-000440
|
||||
|
||||
ocil_clause: |-
|
@ -1,49 +0,0 @@
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_runlevel_target/rule.yml b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_runlevel_target/rule.yml
|
||||
index de0e359a44e..df56a30be80 100644
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_runlevel_target/rule.yml
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_runlevel_target/rule.yml
|
||||
@@ -39,6 +39,7 @@ references:
|
||||
nist: CM-7(a),CM-7(b),CM-6(a)
|
||||
nist-csf: PR.AC-3,PR.PT-4
|
||||
srg: SRG-OS-000480-GPOS-00227
|
||||
+ stigid@rhel8: RHEL-08-040321
|
||||
|
||||
ocil_clause: 'the X windows display server is running and/or has not been disabled'
|
||||
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 09fa85df181..ffca983d0bd 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -1169,6 +1169,9 @@ selections:
|
||||
# RHEL-08-040320
|
||||
- xwindows_remove_packages
|
||||
|
||||
+ # RHEL-08-040321
|
||||
+ - xwindows_runlevel_target
|
||||
+
|
||||
# RHEL-08-040330
|
||||
- network_sniffer_disabled
|
||||
|
||||
diff --git a/products/rhel8/profiles/stig_gui.profile b/products/rhel8/profiles/stig_gui.profile
|
||||
index d1577215b07..d29ceb9c54e 100644
|
||||
--- a/products/rhel8/profiles/stig_gui.profile
|
||||
+++ b/products/rhel8/profiles/stig_gui.profile
|
||||
@@ -35,3 +35,6 @@ extends: stig
|
||||
selections:
|
||||
# RHEL-08-040320
|
||||
- '!xwindows_remove_packages'
|
||||
+
|
||||
+ # RHEL-08-040321
|
||||
+ - '!xwindows_runlevel_target'
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index 9c05c27117c..e4fee44f9f9 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -398,6 +398,7 @@ selections:
|
||||
- usbguard_generate_policy
|
||||
- wireless_disable_interfaces
|
||||
- xwindows_remove_packages
|
||||
+- xwindows_runlevel_target
|
||||
- var_rekey_limit_size=1G
|
||||
- var_rekey_limit_time=1hour
|
||||
- var_accounts_user_umask=077
|
@ -1,38 +0,0 @@
|
||||
From 8605b236665b1022c7379e87d9445c9ca42e78f3 Mon Sep 17 00:00:00 2001
|
||||
From: Gabriel Becker <ggasparb@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 11:41:15 +0100
|
||||
Subject: [PATCH] Add SRG references to STIG rules.
|
||||
|
||||
Rules accounts_password_pam_pwquality_password_auth and accounts_password_pam_pwquality_system_auth
|
||||
were missing SRG required references.
|
||||
---
|
||||
.../accounts_password_pam_pwquality_password_auth/rule.yml | 2 ++
|
||||
.../accounts_password_pam_pwquality_system_auth/rule.yml | 2 ++
|
||||
2 files changed, 4 insertions(+)
|
||||
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml
|
||||
index 6c7bb1ad7a0..34dd6e2fcca 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml
|
||||
@@ -22,6 +22,8 @@ identifiers:
|
||||
cce@rhel9: CCE-85878-7
|
||||
|
||||
references:
|
||||
+ disa: CCI-000366
|
||||
+ srg: SRG-OS-000480-GPOS-00227
|
||||
stigid@rhel8: RHEL-08-020100
|
||||
|
||||
ocil_clause: 'pam_pwquality.so is not enabled in password-auth'
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml
|
||||
index ea42ff9b07a..a5189c61608 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml
|
||||
@@ -22,6 +22,8 @@ identifiers:
|
||||
cce@rhel9: CCE-85873-8
|
||||
|
||||
references:
|
||||
+ disa: CCI-000366
|
||||
+ srg: SRG-OS-000480-GPOS-00227
|
||||
stigid@rhel8: RHEL-08-020101
|
||||
|
||||
ocil_clause: 'pam_pwquality.so is not enabled in system-auth'
|
@ -1,369 +0,0 @@
|
||||
From bbafe0a7b4b9eb50bc622d9f9f3c0074fca932f9 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 9 Feb 2022 16:17:52 +0100
|
||||
Subject: [PATCH 1/2] Pass the rule when no time server nor pool is set
|
||||
|
||||
If no time server or pool is configured, there is no entry to add
|
||||
maxpoll option to, so the rule should evaluate to pass.
|
||||
---
|
||||
.../oval/shared.xml | 50 +++++++++++++++----
|
||||
.../ntp/chronyd_or_ntpd_set_maxpoll/rule.yml | 2 +
|
||||
.../tests/chrony_no_pool_nor_servers.pass.sh | 12 +++++
|
||||
3 files changed, 54 insertions(+), 10 deletions(-)
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/tests/chrony_no_pool_nor_servers.pass.sh
|
||||
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/oval/shared.xml b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/oval/shared.xml
|
||||
index 780c2e2d0ba..76f810123f3 100644
|
||||
--- a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/oval/shared.xml
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/oval/shared.xml
|
||||
@@ -3,17 +3,25 @@
|
||||
{{{ oval_metadata("Configure the maxpoll setting in /etc/ntp.conf or chrony.conf
|
||||
to continuously poll the time source servers.") }}}
|
||||
<criteria operator="OR">
|
||||
- <criteria operator="AND">
|
||||
- <criterion comment="check if maxpoll is set in /etc/ntp.conf"
|
||||
- test_ref="test_ntp_set_maxpoll" />
|
||||
- <criterion comment="check if all server entries have maxpoll set in /etc/ntp.conf"
|
||||
- test_ref="test_ntp_all_server_has_maxpoll"/>
|
||||
+ <criteria operator="OR">
|
||||
+ <criterion comment="check if no server or pool entry is set in /etc/chrony.conf"
|
||||
+ test_ref="test_ntp_no_server"/>
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion comment="check if maxpoll is set in /etc/ntp.conf"
|
||||
+ test_ref="test_ntp_set_maxpoll" />
|
||||
+ <criterion comment="check if all server entries have maxpoll set in /etc/ntp.conf"
|
||||
+ test_ref="test_ntp_all_server_has_maxpoll"/>
|
||||
+ </criteria>
|
||||
</criteria>
|
||||
- <criteria operator="AND">
|
||||
- <criterion comment="check if maxpoll is set in /etc/chrony.conf"
|
||||
- test_ref="test_chrony_set_maxpoll" />
|
||||
- <criterion comment="check if all server entries have maxpoll set in /etc/chrony.conf"
|
||||
- test_ref="test_chrony_all_server_has_maxpoll"/>
|
||||
+ <criteria operator="OR">
|
||||
+ <criterion comment="check if no server or pool entry is set in /etc/chrony.conf"
|
||||
+ test_ref="test_chrony_no_server_nor_pool"/>
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion comment="check if maxpoll is set in /etc/chrony.conf"
|
||||
+ test_ref="test_chrony_set_maxpoll" />
|
||||
+ <criterion comment="check if all server entries have maxpoll set in /etc/chrony.conf"
|
||||
+ test_ref="test_chrony_all_server_has_maxpoll"/>
|
||||
+ </criteria>
|
||||
</criteria>
|
||||
</criteria>
|
||||
</definition>
|
||||
@@ -77,4 +85,26 @@
|
||||
<ind:subexpression operation="pattern match" datatype="string">maxpoll \d+</ind:subexpression>
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="none_exist"
|
||||
+ comment="check if no server entries have server or pool set in /etc/chrony.conf"
|
||||
+ id="test_chrony_no_server_nor_pool" version="1">
|
||||
+ <ind:object object_ref="obj_chrony_no_server_nor_pool" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object id="obj_chrony_no_server_nor_pool" version="1">
|
||||
+ <ind:filepath operation="pattern match">^/etc/chrony\.(conf|d/.+\.conf)$</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^(?:server|pool).*</ind:pattern>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="all_exist"
|
||||
+ comment="check if all server entries have maxpoll set in /etc/ntp.conf"
|
||||
+ id="test_ntp_no_server" version="1">
|
||||
+ <ind:object object_ref="obj_ntp_no_server_nor_pool" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object id="obj_ntp_no_server_nor_pool" version="1">
|
||||
+ <ind:filepath>/etc/ntp.conf</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^server.*</ind:pattern>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
</def-group>
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
|
||||
index 20e7467a7b5..c115ad3c115 100644
|
||||
--- a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
|
||||
@@ -13,6 +13,8 @@ description: |-
|
||||
<pre>maxpoll {{{ xccdf_value("var_time_service_set_maxpoll") }}}</pre>
|
||||
to <pre>server</pre> directives. If using chrony any <pre>pool</pre> directives
|
||||
should be configured too.
|
||||
+ If no <tt>server</tt> or <tt>pool</tt> directives are configured, the rule evaluates
|
||||
+ to pass.
|
||||
{{% if product == "rhcos4" %}}
|
||||
<p>
|
||||
Note that if the remediation shipping with this content is being used, the
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/tests/chrony_no_pool_nor_servers.pass.sh b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/tests/chrony_no_pool_nor_servers.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..bbae20fc696
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/tests/chrony_no_pool_nor_servers.pass.sh
|
||||
@@ -0,0 +1,12 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+#
|
||||
+# profiles = xccdf_org.ssgproject.content_profile_stig
|
||||
+
|
||||
+yum remove -y ntp
|
||||
+
|
||||
+# Remove all pool and server options
|
||||
+sed -i "/^pool.*/d" /etc/chrony.conf
|
||||
+sed -i "/^server.*/d" /etc/chrony.conf
|
||||
+
|
||||
+systemctl enable chronyd.service
|
||||
|
||||
From 60ef6eb2cce9e53ea256738ff2583b332155a318 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Fri, 11 Feb 2022 12:14:30 +0100
|
||||
Subject: [PATCH 2/2] Add rule ensuring Chrony only uses server directive
|
||||
|
||||
This new rule only asserts that Chrony has at least one time source configured,
|
||||
and that it is done with the 'server' directive.
|
||||
No remediation is provided for rule, that is left for other specialized
|
||||
rules.
|
||||
---
|
||||
.../chronyd_server_directive/oval/shared.xml | 33 +++++++++++++++++++
|
||||
.../ntp/chronyd_server_directive/rule.yml | 32 ++++++++++++++++++
|
||||
.../tests/file_empty.fail.sh | 6 ++++
|
||||
.../tests/file_missing.fail.sh | 6 ++++
|
||||
.../tests/line_missing.fail.sh | 7 ++++
|
||||
.../tests/multiple_servers.pass.sh | 8 +++++
|
||||
.../tests/only_pool.fail.sh | 9 +++++
|
||||
.../tests/only_server.pass.sh | 6 ++++
|
||||
products/rhel8/profiles/stig.profile | 1 +
|
||||
products/rhel9/profiles/stig.profile | 1 +
|
||||
shared/references/cce-redhat-avail.txt | 2 --
|
||||
.../data/profile_stability/rhel8/stig.profile | 1 +
|
||||
.../profile_stability/rhel8/stig_gui.profile | 1 +
|
||||
13 files changed, 111 insertions(+), 2 deletions(-)
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/oval/shared.xml
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/rule.yml
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/tests/file_empty.fail.sh
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/tests/file_missing.fail.sh
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/tests/line_missing.fail.sh
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/tests/multiple_servers.pass.sh
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/tests/only_pool.fail.sh
|
||||
create mode 100644 linux_os/guide/services/ntp/chronyd_server_directive/tests/only_server.pass.sh
|
||||
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/oval/shared.xml b/linux_os/guide/services/ntp/chronyd_server_directive/oval/shared.xml
|
||||
new file mode 100644
|
||||
index 00000000000..2244e608047
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/oval/shared.xml
|
||||
@@ -0,0 +1,33 @@
|
||||
+<def-group>
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}" version="1">
|
||||
+ {{{ oval_metadata("Ensure Chrony has time sources configured with server directive") }}}
|
||||
+ <criteria comment="chrony.conf only has server directive">
|
||||
+ <criterion test_ref="test_chronyd_server_directive_with_server" />
|
||||
+ <criterion test_ref="test_chronyd_server_directive_no_pool" />
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists"
|
||||
+ comment="Ensure at least one time source is set with server directive" id="test_chronyd_server_directive_with_server"
|
||||
+ version="1">
|
||||
+ <ind:object object_ref="object_chronyd_server_directive" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object comment="Matches server entries in Chrony conf files"
|
||||
+ id="object_chronyd_server_directive" version="1">
|
||||
+ <ind:filepath operation="pattern match">^/etc/chrony\.(conf|d/.+\.conf)$</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^[\s]*server.*$</ind:pattern>
|
||||
+ <ind:instance datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="none_exist"
|
||||
+ comment="Ensure no time source is set with pool directive" id="test_chronyd_server_directive_no_pool"
|
||||
+ version="1">
|
||||
+ <ind:object object_ref="object_chronyd_no_pool_directive" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object comment="Matches pool entires in Chrony conf files"
|
||||
+ id="object_chronyd_no_pool_directive" version="1">
|
||||
+ <ind:filepath operation="pattern match">^/etc/chrony\.(conf|d/.+\.conf)$</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^[\s]+pool.*$</ind:pattern>
|
||||
+ <ind:instance datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+</def-group>
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/rule.yml b/linux_os/guide/services/ntp/chronyd_server_directive/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..6dc24f1be85
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/rule.yml
|
||||
@@ -0,0 +1,32 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Ensure Chrony is only configured with the server directive'
|
||||
+
|
||||
+description: |-
|
||||
+ Check that Chrony only has time sources configured with the <tt>server</tt> directive.
|
||||
+
|
||||
+rationale: |-
|
||||
+ Depending on the infrastruture being used the <tt>pool</tt> directive may not be supported.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+platform: chrony
|
||||
+
|
||||
+warnings:
|
||||
+ - general: This rule doesn't come with a remediation, the time source needs to be added by the adminstrator.
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel8: CCE-86077-5
|
||||
+ cce@rhel9: CCE-87077-4
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001891
|
||||
+ srg: SRG-OS-000355-GPOS-00143,SRG-OS-000356-GPOS-00144,SRG-OS-000359-GPOS-00146
|
||||
+ stigid@rhel8: RHEL-08-030740
|
||||
+
|
||||
+ocil_clause: 'a remote time server is not configured or configured with pool directive'
|
||||
+
|
||||
+ocil: |-
|
||||
+ Run the following command and verify that time sources are only configure with <tt>server</tt> directive:
|
||||
+ <pre># grep -E "^(server|pool)" /etc/chrony.conf</pre>
|
||||
+ A line with the appropriate server should be returned, any line returned starting with <tt>pool</tt> is a finding.
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/tests/file_empty.fail.sh b/linux_os/guide/services/ntp/chronyd_server_directive/tests/file_empty.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..d1ba0755198
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/tests/file_empty.fail.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+# platform = multi_platform_fedora,multi_platform_rhel
|
||||
+# remediation = none
|
||||
+
|
||||
+echo "" > /etc/chrony.conf
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/tests/file_missing.fail.sh b/linux_os/guide/services/ntp/chronyd_server_directive/tests/file_missing.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..12a50ebc3d2
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/tests/file_missing.fail.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+# platform = multi_platform_fedora,multi_platform_rhel
|
||||
+# remediation = none
|
||||
+
|
||||
+rm -f /etc/chrony.conf
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/tests/line_missing.fail.sh b/linux_os/guide/services/ntp/chronyd_server_directive/tests/line_missing.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..bffa8b62b1b
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/tests/line_missing.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+# platform = multi_platform_fedora,multi_platform_rhel
|
||||
+# remediation = none
|
||||
+
|
||||
+echo "some line" > /etc/chrony.conf
|
||||
+echo "another line" >> /etc/chrony.conf
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/tests/multiple_servers.pass.sh b/linux_os/guide/services/ntp/chronyd_server_directive/tests/multiple_servers.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..5527f389316
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/tests/multiple_servers.pass.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+# platform = multi_platform_fedora,multi_platform_rhel
|
||||
+# remediation = none
|
||||
+
|
||||
+sed -i "^pool.*" /etc/chrony.conf
|
||||
+echo "server 0.pool.ntp.org" > /etc/chrony.conf
|
||||
+echo "server 1.pool.ntp.org" >> /etc/chrony.conf
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/tests/only_pool.fail.sh b/linux_os/guide/services/ntp/chronyd_server_directive/tests/only_pool.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..616fe8844fc
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/tests/only_pool.fail.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+# platform = multi_platform_fedora,multi_platform_rhel
|
||||
+# remediation = none
|
||||
+
|
||||
+sed -i "^server.*" /etc/chrony.conf
|
||||
+if ! grep "^pool.*" /etc/chrony.conf; then
|
||||
+ echo "pool 0.pool.ntp.org" > /etc/chrony.conf
|
||||
+fi
|
||||
diff --git a/linux_os/guide/services/ntp/chronyd_server_directive/tests/only_server.pass.sh b/linux_os/guide/services/ntp/chronyd_server_directive/tests/only_server.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..21a70dc4900
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/ntp/chronyd_server_directive/tests/only_server.pass.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+# packages = chrony
|
||||
+# platform = multi_platform_fedora,multi_platform_rhel
|
||||
+
|
||||
+sed -i "^pool.*" /etc/chrony.conf
|
||||
+echo "server 0.pool.ntp.org" > /etc/chrony.conf
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 36f606ee461..2bd1fb54316 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -909,6 +909,7 @@ selections:
|
||||
# RHEL-08-030740
|
||||
# remediation fails because default configuration file contains pool instead of server keyword
|
||||
- chronyd_or_ntpd_set_maxpoll
|
||||
+ - chronyd_server_directive
|
||||
|
||||
# RHEL-08-030741
|
||||
- chronyd_client_only
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 374932cfd32..0d4d7b0ff97 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -909,6 +909,7 @@ selections:
|
||||
# RHEL-08-030740
|
||||
# remediation fails because default configuration file contains pool instead of server keyword
|
||||
- chronyd_or_ntpd_set_maxpoll
|
||||
+ - chronyd_server_directive
|
||||
|
||||
# RHEL-08-030741
|
||||
- chronyd_client_only
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 8c59c5d3201..0081fe1938f 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -152,7 +152,6 @@ CCE-86073-4
|
||||
CCE-86074-2
|
||||
CCE-86075-9
|
||||
CCE-86076-7
|
||||
-CCE-86077-5
|
||||
CCE-86078-3
|
||||
CCE-86079-1
|
||||
CCE-86080-9
|
||||
@@ -1079,7 +1078,6 @@ CCE-87073-3
|
||||
CCE-87074-1
|
||||
CCE-87075-8
|
||||
CCE-87076-6
|
||||
-CCE-87077-4
|
||||
CCE-87078-2
|
||||
CCE-87079-0
|
||||
CCE-87080-8
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index 5b06103d72e..7d44f8910d1 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -160,6 +160,7 @@ selections:
|
||||
- chronyd_client_only
|
||||
- chronyd_no_chronyc_network
|
||||
- chronyd_or_ntpd_set_maxpoll
|
||||
+- chronyd_server_directive
|
||||
- clean_components_post_updating
|
||||
- configure_bashrc_exec_tmux
|
||||
- configure_bind_crypto_policy
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 11e0ee9515a..91546d1d418 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -171,6 +171,7 @@ selections:
|
||||
- chronyd_client_only
|
||||
- chronyd_no_chronyc_network
|
||||
- chronyd_or_ntpd_set_maxpoll
|
||||
+- chronyd_server_directive
|
||||
- clean_components_post_updating
|
||||
- configure_bashrc_exec_tmux
|
||||
- configure_bind_crypto_policy
|
@ -1,50 +0,0 @@
|
||||
From cd544b1ceec3cfc799faf24fc83e99f950d1c9c9 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Burket <mburket@redhat.com>
|
||||
Date: Wed, 23 Feb 2022 12:21:17 -0600
|
||||
Subject: [PATCH] Ensure that get_implemented_stigs in
|
||||
utils/create_scap_delta_tailoring.py works for all case
|
||||
|
||||
Before this commit using resolved_rules_dir would deselect all rules
|
||||
---
|
||||
utils/create_scap_delta_tailoring.py | 22 ++++++++++------------
|
||||
1 file changed, 10 insertions(+), 12 deletions(-)
|
||||
|
||||
diff --git a/utils/create_scap_delta_tailoring.py b/utils/create_scap_delta_tailoring.py
|
||||
index 90e131cd01a..b1a44858a0f 100755
|
||||
--- a/utils/create_scap_delta_tailoring.py
|
||||
+++ b/utils/create_scap_delta_tailoring.py
|
||||
@@ -103,24 +103,22 @@ def get_implemented_stigs(product, root_path, build_config_yaml_path,
|
||||
build_root):
|
||||
platform_rules = get_platform_rules(product, json_path, resolved_rules_dir, build_root)
|
||||
|
||||
- if resolved_rules_dir:
|
||||
- platform_rules_dict = dict()
|
||||
- for rule in platform_rules:
|
||||
- platform_rules_dict[rule['id']] = rule
|
||||
- return platform_rules_dict
|
||||
product_dir = os.path.join(root_path, "products", product)
|
||||
product_yaml_path = os.path.join(product_dir, "product.yml")
|
||||
env_yaml = ssg.environment.open_environment(build_config_yaml_path, str(product_yaml_path))
|
||||
|
||||
known_rules = dict()
|
||||
for rule in platform_rules:
|
||||
- try:
|
||||
- rule_obj = handle_rule_yaml(product, rule['id'],
|
||||
- rule['dir'], rule['guide'], env_yaml)
|
||||
- except ssg.yaml.DocumentationNotComplete:
|
||||
- sys.stderr.write('Rule %s throw DocumentationNotComplete' % rule['id'])
|
||||
- # Happens on non-debug build when a rule is "documentation-incomplete"
|
||||
- continue
|
||||
+ if resolved_rules_dir:
|
||||
+ rule_obj = rule
|
||||
+ else:
|
||||
+ try:
|
||||
+ rule_obj = handle_rule_yaml(product, rule['id'],
|
||||
+ rule['dir'], rule['guide'], env_yaml)
|
||||
+ except ssg.yaml.DocumentationNotComplete:
|
||||
+ sys.stderr.write('Rule %s throw DocumentationNotComplete' % rule['id'])
|
||||
+ # Happens on non-debug build when a rule is "documentation-incomplete"
|
||||
+ continue
|
||||
|
||||
if reference_str in rule_obj['references'].keys():
|
||||
ref = rule_obj['references'][reference_str]
|
@ -1,26 +0,0 @@
|
||||
From 9c57a8718f82458fe3784263fdb1e51bd08fff83 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 16 Feb 2022 12:46:21 +0100
|
||||
Subject: [PATCH] Do not remove krb5-workstation package on oVirt
|
||||
|
||||
---
|
||||
.../system-tools/package_krb5-workstation_removed/rule.yml | 6 ++++++
|
||||
1 file changed, 6 insertions(+)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml
|
||||
index 4d8951a9148..813474842ec 100644
|
||||
--- a/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml
|
||||
+++ b/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml
|
||||
@@ -27,6 +27,12 @@ references:
|
||||
stigid@ol8: OL08-00-010162
|
||||
stigid@rhel8: RHEL-08-010162
|
||||
|
||||
+platforms:
|
||||
+{{{ rule_notapplicable_when_ovirt_installed() | indent(4)}}}
|
||||
+
|
||||
+warnings:
|
||||
+{{{ ovirt_rule_notapplicable_warning("RHV hosts require ipa-client package, which has dependency on krb5-workstation") | indent(4) }}}
|
||||
+
|
||||
{{{ complete_ocil_entry_package(package="krb5-workstation") }}}
|
||||
|
||||
template:
|
@ -1,536 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..de85c892704
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/rule.yml
|
||||
@@ -0,0 +1,38 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Audit Configuration Files Must Be Owned By Group root'
|
||||
+
|
||||
+description: |-
|
||||
+ All audit configuration files must be owned by group root.
|
||||
+ <pre>chown :root /etc/audit/audit*.{rules,conf} /etc/audit/rules.d/*</pre>
|
||||
+
|
||||
+rationale: |-
|
||||
+ Without the capability to restrict which roles and individuals can
|
||||
+ select which events are audited, unauthorized personnel may be able
|
||||
+ to prevent the auditing of critical events.
|
||||
+ Misconfigured audits may degrade the system's performance by
|
||||
+ overwhelming the audit log. Misconfigured audits may also make it more
|
||||
+ difficult to establish, correlate, and investigate the events relating
|
||||
+ to an incident or identify those responsible for one.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-000171
|
||||
+ srg: SRG-OS-000063-GPOS-00032
|
||||
+ stigid@ubuntu2004: UBTU-20-010135
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ describe_file_group_owner(file="/etc/audit/", group="root") }}}
|
||||
+ {{{ describe_file_group_owner(file="/etc/audit/rules.d/", group="root") }}}
|
||||
+
|
||||
+template:
|
||||
+ name: file_groupowner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /etc/audit/
|
||||
+ - /etc/audit/rules.d/
|
||||
+ file_regex:
|
||||
+ - ^audit(\.rules|d\.conf)$
|
||||
+ - ^.*\.rules$
|
||||
+ filegid: '0'
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/tests/correct_groupowner.pass.sh b/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/tests/correct_groupowner.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..5235e0d05a3
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/tests/correct_groupowner.pass.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+export TESTFILE=/etc/audit/rules.d/test_rule.rules
|
||||
+export AUDITFILE=/etc/audit/auditd.conf
|
||||
+mkdir -p /etc/audit/rules.d/
|
||||
+touch $TESTFILE
|
||||
+touch $AUDITFILE
|
||||
+chgrp root $TESTFILE
|
||||
+chgrp root $AUDITFILE
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/tests/incorrect_groupowner.fail.sh b/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/tests/incorrect_groupowner.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..52378d810a5
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_groupownership_audit_configuration/tests/incorrect_groupowner.fail.sh
|
||||
@@ -0,0 +1,10 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+groupadd group_test
|
||||
+export TESTFILLE=/etc/audit/rules.d/test_rule.rules
|
||||
+export AUDITFILE=/etc/audit/auditd.conf
|
||||
+mkdir -p /etc/audit/rules.d/
|
||||
+touch $TESTFILLE
|
||||
+touch $AUDITFILE
|
||||
+chgrp group_test $TESTFILLE
|
||||
+chgrp group_test $AUDITFILE
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log/rule.yml b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log/rule.yml
|
||||
index 5e2cabafc34..927d08d03d4 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log/rule.yml
|
||||
@@ -1,8 +1,15 @@
|
||||
+{{% if 'ubuntu' in product %}}
|
||||
+{{% set gid = 'syslog' %}}
|
||||
+{{% else %}}
|
||||
+{{% set gid = 'root' %}}
|
||||
+{{% endif %}}
|
||||
+
|
||||
+
|
||||
documentation_complete: true
|
||||
|
||||
title: 'Verify Group Who Owns /var/log Directory'
|
||||
|
||||
-description: '{{{ describe_file_group_owner(file="/var/log", group="root") }}}'
|
||||
+description: '{{{ describe_file_group_owner(file="/var/log", group=gid) }}}'
|
||||
|
||||
rationale: |-
|
||||
The <tt>/var/log</tt> directory contains files with logs of error
|
||||
@@ -22,13 +29,16 @@ references:
|
||||
stigid@rhel8: RHEL-08-010260
|
||||
stigid@ubuntu2004: UBTU-20-010417
|
||||
|
||||
-ocil_clause: '{{{ ocil_clause_file_group_owner(file="/var/log", group="root") }}}'
|
||||
+ocil_clause: '{{{ ocil_clause_file_group_owner(file="/var/log", group=gid) }}}'
|
||||
|
||||
ocil: |-
|
||||
- {{{ ocil_file_group_owner(file="/var/log", group="root") }}}
|
||||
+ {{{ ocil_file_group_owner(file="/var/log", group=gid) }}}
|
||||
|
||||
template:
|
||||
name: file_groupowner
|
||||
vars:
|
||||
filepath: /var/log/
|
||||
filegid: '0'
|
||||
+ filegid@ubuntu1604: '110'
|
||||
+ filegid@ubuntu1804: '110'
|
||||
+ filegid@ubuntu2004: '110'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log_syslog/rule.yml b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log_syslog/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..f654279fe54
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_groupowner_var_log_syslog/rule.yml
|
||||
@@ -0,0 +1,27 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Verify Group Who Owns /var/log/syslog File'
|
||||
+
|
||||
+description: '{{{ describe_file_group_owner(file="/var/log/syslog", group="adm") }}}'
|
||||
+
|
||||
+rationale: |-
|
||||
+ The <tt>/var/log/syslog</tt> file contains logs of error messages in
|
||||
+ the system and should only be accessed by authorized personnel.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001314
|
||||
+ srg: SRG-OS-000206-GPOS-00084
|
||||
+ stigid@ubuntu2004: UBTU-20-010420
|
||||
+
|
||||
+ocil_clause: '{{{ ocil_clause_file_group_owner(file="/var/log/syslog", group="adm") }}}'
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ ocil_file_group_owner(file="/var/log/syslog", group="adm") }}}
|
||||
+
|
||||
+template:
|
||||
+ name: file_groupowner
|
||||
+ vars:
|
||||
+ filepath: /var/log/syslog
|
||||
+ filegid: '4'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_groupownership_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_groupownership_binary_dirs/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..655b2cd1aef
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_groupownership_binary_dirs/rule.yml
|
||||
@@ -0,0 +1,65 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: ubuntu2004
|
||||
+
|
||||
+title: 'Verify that system commands directories are group owned by root'
|
||||
+
|
||||
+description: |-
|
||||
+ System commands files are stored in the following directories by default:
|
||||
+ <pre>/bin
|
||||
+ /sbin
|
||||
+ /usr/bin
|
||||
+ /usr/sbin
|
||||
+ /usr/local/bin
|
||||
+ /usr/local/sbin
|
||||
+ </pre>
|
||||
+ All these directories should be owned by the <tt>root</tt> group.
|
||||
+ If the directory is found to be owned by a group other than root correct
|
||||
+ its ownership with the following command:
|
||||
+ <pre>$ sudo chgrp root <i>DIR</i></pre>
|
||||
+
|
||||
+rationale: |-
|
||||
+ If the operating system allows any user to make changes to software
|
||||
+ libraries, then those changes might be implemented without undergoing the
|
||||
+ appropriate testing and approvals that are part of a robust change management
|
||||
+ process.
|
||||
+ This requirement applies to operating systems with software libraries
|
||||
+ that are accessible and configurable, as in the case of interpreted languages.
|
||||
+ Software libraries also include privileged programs which execute with
|
||||
+ escalated privileges. Only qualified and authorized individuals must be
|
||||
+ allowed to obtain access to information system components for purposes
|
||||
+ of initiating changes, including upgrades and modifications.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001495
|
||||
+ srg: SRG-OS-000258-GPOS-00099
|
||||
+ stigid@ubuntu2004: UBTU-20-010425
|
||||
+
|
||||
+ocil_clause: 'any of these directories are not owned by root group'
|
||||
+
|
||||
+ocil: |-
|
||||
+ System commands are stored in the following directories:
|
||||
+ <pre>/bin
|
||||
+ /sbin
|
||||
+ /usr/bin
|
||||
+ /usr/sbin
|
||||
+ /usr/local/bin
|
||||
+ /usr/local/sbin</pre>
|
||||
+ For each of these directories, run the following command to find files not
|
||||
+ owned by root group:
|
||||
+ <pre>$ sudo find -L <i>$DIR</i> ! -group root -type d \;</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_groupowner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /bin/
|
||||
+ - /sbin/
|
||||
+ - /usr/bin/
|
||||
+ - /usr/sbin/
|
||||
+ - /usr/local/bin/
|
||||
+ - /usr/local/sbin/
|
||||
+ recursive: 'true'
|
||||
+ filegid: '0'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/ansible/shared.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/ansible/shared.yml
|
||||
deleted file mode 100644
|
||||
index 28df7839430..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/ansible/shared.yml
|
||||
+++ /dev/null
|
||||
@@ -1,23 +0,0 @@
|
||||
-# platform = multi_platform_sle
|
||||
-# reboot = false
|
||||
-# strategy = restrict
|
||||
-# complexity = medium
|
||||
-# disruption = medium
|
||||
-- name: "Read list libraries without root ownership"
|
||||
- find:
|
||||
- paths:
|
||||
- - "/usr/lib"
|
||||
- - "/usr/lib64"
|
||||
- - "/lib"
|
||||
- - "/lib64"
|
||||
- file_type: "directory"
|
||||
- register: library_dirs_not_owned_by_root
|
||||
-
|
||||
-- name: "Set ownership of system library dirs to root"
|
||||
- file:
|
||||
- path: "{{ item.path }}"
|
||||
- owner: "root"
|
||||
- state: "directory"
|
||||
- mode: "{{ item.mode }}"
|
||||
- with_items: "{{ library_dirs_not_owned_by_root.files }}"
|
||||
- when: library_dirs_not_owned_by_root.matched > 0
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_audit_binaries/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_audit_binaries/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..f61a5f988dc
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_audit_binaries/rule.yml
|
||||
@@ -0,0 +1,77 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: ubuntu2004
|
||||
+
|
||||
+title: 'Verify that audit tools are owned by group root'
|
||||
+
|
||||
+description: |-
|
||||
+ The {{{ full_name }}} operating system audit tools must have the proper
|
||||
+ ownership configured to protected against unauthorized access.
|
||||
+
|
||||
+ Verify it by running the following command:
|
||||
+ <pre>$ stat -c "%n %G" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules
|
||||
+
|
||||
+ /sbin/auditctl root
|
||||
+ /sbin/aureport root
|
||||
+ /sbin/ausearch root
|
||||
+ /sbin/autrace root
|
||||
+ /sbin/auditd root
|
||||
+ /sbin/audispd root
|
||||
+ /sbin/augenrules root
|
||||
+ </pre>
|
||||
+
|
||||
+ Audit tools needed to successfully view and manipulate audit information
|
||||
+ system activity and records. Audit tools include custom queries and report
|
||||
+ generators
|
||||
+
|
||||
+rationale: |-
|
||||
+ Protecting audit information also includes identifying and protecting the
|
||||
+ tools used to view and manipulate log data. Therefore, protecting audit
|
||||
+ tools is necessary to prevent unauthorized operation on audit information.
|
||||
+
|
||||
+ Operating systems providing tools to interface with audit information
|
||||
+ will leverage user permissions and roles identifying the user accessing the
|
||||
+ tools and the corresponding rights the user enjoys to make access decisions
|
||||
+ regarding the access to audit tools.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001493,CCI-001494
|
||||
+ srg: SRG-OS-000256-GPiOS-00097,SRG-OS-000257-GPOS-00098
|
||||
+ stigid@ubuntu2004: UBTU-20-010201
|
||||
+
|
||||
+ocil: |-
|
||||
+ Verify it by running the following command:
|
||||
+ <pre>$ stat -c "%n %G" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules
|
||||
+
|
||||
+ /sbin/auditctl root
|
||||
+ /sbin/aureport root
|
||||
+ /sbin/ausearch root
|
||||
+ /sbin/autrace root
|
||||
+ /sbin/auditd root
|
||||
+ /sbin/audispd root
|
||||
+ /sbin/augenrules root
|
||||
+ </pre>
|
||||
+
|
||||
+ If the command does not return all the above lines, the missing ones
|
||||
+ need to be added.
|
||||
+
|
||||
+ Run the following command to correct the permissions of the missing
|
||||
+ entries:
|
||||
+ <pre>$ sudo chown :root [audit_tool] </pre>
|
||||
+
|
||||
+ Replace "[audit_tool]" with each audit tool not group-owned by root.
|
||||
+
|
||||
+template:
|
||||
+ name: file_groupowner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /sbin/auditctl
|
||||
+ - /sbin/aureport
|
||||
+ - /sbin/ausearch
|
||||
+ - /sbin/autrace
|
||||
+ - /sbin/auditd
|
||||
+ - /sbin/audispd
|
||||
+ - /sbin/augenrules
|
||||
+ filegid: '0'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh
|
||||
index bb7c72550e9..a9e8c7d8e25 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Oracle Linux 8,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
+# platform = multi_platform_sle,Oracle Linux 8,Red Hat Enterprise Linux 8,multi_platform_fedora,multi_platform_ubuntu
|
||||
|
||||
for SYSCMDFILES in /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin
|
||||
do
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/tests/incorrect_groupownership.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/tests/incorrect_groupownership.fail.sh
|
||||
index 7cf507ca5f4..33a0c85d35b 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/tests/incorrect_groupownership.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/tests/incorrect_groupownership.fail.sh
|
||||
@@ -1,10 +1,12 @@
|
||||
#!/bin/bash
|
||||
|
||||
+groupadd group_test
|
||||
+
|
||||
for TESTFILE in /bin/test_me /sbin/test_me /usr/bin/test_me /usr/sbin/test_me /usr/local/bin/test_me /usr/local/sbin/test_me
|
||||
do
|
||||
if [[ ! -f $TESTFILE ]]
|
||||
then
|
||||
touch $TESTFILE
|
||||
fi
|
||||
- chown nobody.nobody $TESTFILE
|
||||
+ chgrp group_test $TESTFILE
|
||||
done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/ansible/shared.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/ansible/shared.yml
|
||||
deleted file mode 100644
|
||||
index 08019fd48bb..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/ansible/shared.yml
|
||||
+++ /dev/null
|
||||
@@ -1,26 +0,0 @@
|
||||
-# platform = multi_platform_sle,Oracle Linux 8,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
-# reboot = false
|
||||
-# strategy = restrict
|
||||
-# complexity = high
|
||||
-# disruption = medium
|
||||
-
|
||||
-- name: "Read list libraries without root ownership"
|
||||
- find:
|
||||
- paths:
|
||||
- - "/usr/lib"
|
||||
- - "/usr/lib64"
|
||||
- - "/lib"
|
||||
- - "/lib64"
|
||||
- file_type: "file"
|
||||
- register: library_files_not_group_owned_by_root
|
||||
-
|
||||
-- name: "Set group ownership of system library files to root"
|
||||
- file:
|
||||
- path: "{{ item.path }}"
|
||||
- group: "root"
|
||||
- state: "file"
|
||||
- mode: "{{ item.mode }}"
|
||||
- with_items: "{{ library_files_not_group_owned_by_root.files }}"
|
||||
- when:
|
||||
- - library_files_not_group_owned_by_root.matched > 0
|
||||
- - item.gid != 0
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/bash/shared.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/bash/shared.sh
|
||||
deleted file mode 100644
|
||||
index 3a42beafb8a..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/bash/shared.sh
|
||||
+++ /dev/null
|
||||
@@ -1,7 +0,0 @@
|
||||
-# platform = multi_platform_sle,Oracle Linux 8,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
-
|
||||
-find /lib \
|
||||
-/lib64 \
|
||||
-/usr/lib \
|
||||
-/usr/lib64 \
|
||||
-\! -group root -type f -exec chgrp root '{}' \;
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/oval/shared.xml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/oval/shared.xml
|
||||
deleted file mode 100644
|
||||
index f5ca9380b55..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/oval/shared.xml
|
||||
+++ /dev/null
|
||||
@@ -1,27 +0,0 @@
|
||||
-<def-group>
|
||||
- <definition class="compliance" id="root_permissions_syslibrary_files" version="2">
|
||||
- {{{ oval_metadata("
|
||||
- Checks that system-wide library files in /lib, /lib64, /usr/lib, /usr/lib64
|
||||
- are owned by root.
|
||||
- ") }}}
|
||||
- <criteria >
|
||||
- <criterion test_ref="test_root_permissions_for_syslibrary_files" />
|
||||
- </criteria>
|
||||
- </definition>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="test if system-wide files have root permissions" id="test_root_permissions_for_syslibrary_files" version="1">
|
||||
- <unix:object object_ref="root_permissions_for_system_wide_library_files" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
- <unix:file_object comment="system-wide directories" id="root_permissions_for_system_wide_library_files" version="1">
|
||||
- <!-- Checks that system-wide library files in /lib, /lib64, /usr/lib, /usr/lib64
|
||||
- are owned by root. -->
|
||||
- <unix:path operation="pattern match">^\/lib(|64)?$|^\/usr\/lib(|64)?$</unix:path>
|
||||
- <unix:filename operation="pattern match">^.*$</unix:filename>
|
||||
- <filter action="include">group_permissions_for_system_wide_files_are_not_root</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_state id="group_permissions_for_system_wide_files_are_not_root" version="1" >
|
||||
- <unix:group_id datatype="int" operation="not equal">0</unix:group_id>
|
||||
- </unix:file_state>
|
||||
-</def-group>
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml
|
||||
index 17923f52ea6..eaf04c8d36c 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml
|
||||
@@ -1,6 +1,6 @@
|
||||
documentation_complete: true
|
||||
|
||||
-prodtype: fedora,ol8,rhel8,rhel9,sle12,sle15
|
||||
+prodtype: fedora,ol8,rhel8,rhel9,sle12,sle15,ubuntu2004
|
||||
|
||||
title: |-
|
||||
Verify the system-wide library files in directories
|
||||
@@ -46,6 +46,7 @@ references:
|
||||
stigid@rhel8: RHEL-08-010350
|
||||
stigid@sle12: SLES-12-010875
|
||||
stigid@sle15: SLES-15-010355
|
||||
+ stigid@ubuntu2004: UBTU-20-01430
|
||||
|
||||
ocil_clause: 'system wide library files are not group owned by root'
|
||||
|
||||
@@ -59,3 +60,14 @@ ocil: |-
|
||||
To find if system-wide library files stored in these directories are not group-owned by
|
||||
root run the following command for each directory <i>DIR</i>:
|
||||
<pre>$ sudo find -L <i>DIR</i> ! -group root -type f </pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_groupowner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /lib/
|
||||
+ - /lib64/
|
||||
+ - /usr/lib/
|
||||
+ - /usr/lib64/
|
||||
+ file_regex: ^.*$
|
||||
+ filegid: '0'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_group.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh
|
||||
similarity index 86%
|
||||
rename from linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_group.pass.sh
|
||||
rename to linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh
|
||||
index a4ae2854db1..0e982c3b8ca 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_group.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
+# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora,multi_platform_ubuntu
|
||||
|
||||
for SYSLIBDIRS in /lib /lib64 /usr/lib /usr/lib64
|
||||
do
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_group.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh
|
||||
similarity index 70%
|
||||
rename from linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_group.fail.sh
|
||||
rename to linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh
|
||||
index c96f65b989c..23a7703f57d 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_group.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh
|
||||
@@ -1,10 +1,11 @@
|
||||
-# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
+# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora,multi_platform_ubuntu
|
||||
|
||||
+groupadd group_test
|
||||
for TESTFILE in /lib/test_me /lib64/test_me /usr/lib/test_me /usr/lib64/test_me
|
||||
do
|
||||
if [[ ! -f $TESTFILE ]]
|
||||
then
|
||||
touch $TESTFILE
|
||||
fi
|
||||
- chown nobody.nobody $TESTFILE
|
||||
+ chgrp group_test $TESTFILE
|
||||
done
|
||||
diff --git a/shared/templates/file_groupowner/tests/missing_file_test.pass.sh b/shared/templates/file_groupowner/tests/missing_file_test.pass.sh
|
||||
index 938e6b30819..015ff98c99d 100644
|
||||
--- a/shared/templates/file_groupowner/tests/missing_file_test.pass.sh
|
||||
+++ b/shared/templates/file_groupowner/tests/missing_file_test.pass.sh
|
||||
@@ -1,8 +1,20 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
|
||||
-{{% if MISSING_FILE_PASS %}}
|
||||
- rm -f {{{ FILEPATH }}}
|
||||
-{{% else %}}
|
||||
- true
|
||||
-{{% endif %}}
|
||||
+{{% for path in FILEPATH %}}
|
||||
+ {{% if MISSING_FILE_PASS %}}
|
||||
+ rm -f {{{ path }}}
|
||||
+ {{% else %}}
|
||||
+ {{% if IS_DIRECTORY and FILE_REGEX %}}
|
||||
+ echo "Create specific tests for this rule because of regex"
|
||||
+ {{% elif IS_DIRECTORY and RECURSIVE %}}
|
||||
+ find -L {{{ path }}} -type d -exec chgrp {{{ FILEGID }}} {} \;
|
||||
+ {{% else %}}
|
||||
+ if [ ! -f {{{ path }}} ]; then
|
||||
+ mkdir -p "$(dirname '{{{ path }}}')"
|
||||
+ touch {{{ path }}}
|
||||
+ fi
|
||||
+ chgrp {{{ FILEGID }}} {{{ path }}}
|
||||
+ {{% endif %}}
|
||||
+ {{% endif %}}
|
||||
+{{% endfor %}}
|
@ -1,288 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..968ef336148
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/rule.yml
|
||||
@@ -0,0 +1,39 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Audit Configuration Files Must Be Owned By Root'
|
||||
+
|
||||
+description: |-
|
||||
+ All audit configuration files must be owned by root user.
|
||||
+ {{{ describe_file_owner(file="/etc/audit/", owner="root") }}}
|
||||
+ {{{ describe_file_owner(file="/etc/audit/rules.d/", owner="root") }}}
|
||||
+
|
||||
+rationale: |-
|
||||
+ Without the capability to restrict which roles and individuals can
|
||||
+ select which events are audited, unauthorized personnel may be able
|
||||
+ to prevent the auditing of critical events.
|
||||
+ Misconfigured audits may degrade the system's performance by
|
||||
+ overwhelming the audit log. Misconfigured audits may also make it more
|
||||
+ difficult to establish, correlate, and investigate the events relating
|
||||
+ to an incident or identify those responsible for one.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-000171
|
||||
+ srg: SRG-OS-000063-GPOS-00032
|
||||
+ stigid@ubuntu2004: UBTU-20-010134
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ describe_file_owner(file="/etc/audit/", owner="root") }}}
|
||||
+ {{{ describe_file_owner(file="/etc/audit/rules.d/", owner="root") }}}
|
||||
+
|
||||
+template:
|
||||
+ name: file_owner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /etc/audit/
|
||||
+ - /etc/audit/rules.d/
|
||||
+ file_regex:
|
||||
+ - ^audit(\.rules|d\.conf)$
|
||||
+ - ^.*\.rules$
|
||||
+ fileuid: '0'
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/tests/correct_owner.pass.sh b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/tests/correct_owner.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..4d67307a1ef
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/tests/correct_owner.pass.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+# packages = audit
|
||||
+
|
||||
+chown 0 /etc/audit/audit.rules
|
||||
+chown 0 /etc/audit/auditd.conf
|
||||
+chown 0 -R /etc/audit/rules.d/
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/tests/incorrect_owner.fail.sh b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/tests/incorrect_owner.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..337074fab92
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_audit_configuration/tests/incorrect_owner.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+# packages = audit
|
||||
+
|
||||
+useradd testuser_123
|
||||
+chown testuser_123 /etc/audit/audit.rules
|
||||
+chown testuser_123 /etc/audit/auditd.conf
|
||||
+chown testuser_123 -R /etc/audit/rules.d/
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_owner_var_log_syslog/rule.yml b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_owner_var_log_syslog/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..f1bf515455d
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_owner_var_log_syslog/rule.yml
|
||||
@@ -0,0 +1,27 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Verify User Who Owns /var/log/syslog File'
|
||||
+
|
||||
+description: '{{{ describe_file_owner(file="/var/log/syslog", owner="syslog") }}}'
|
||||
+
|
||||
+rationale: |-
|
||||
+ The <tt>/var/log/syslog</tt> file contains logs of error messages in
|
||||
+ the system and should only be accessed by authorized personnel.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001314
|
||||
+ srg: SRG-OS-000206-GPOS-00084
|
||||
+ stigid@ubuntu2004: UBTU-20-010421
|
||||
+
|
||||
+ocil_clause: '{{{ ocil_clause_file_owner(file="/var/log/syslog", owner="syslog") }}}'
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ ocil_file_owner(file="/var/log/syslog", owner="syslog") }}}
|
||||
+
|
||||
+template:
|
||||
+ name: file_owner
|
||||
+ vars:
|
||||
+ filepath: /var/log/syslog
|
||||
+ fileuid: '104'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..e2362388678
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml
|
||||
@@ -0,0 +1,55 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Verify that System Executable Have Root Ownership'
|
||||
+
|
||||
+description: |-
|
||||
+ <pre>/bin
|
||||
+ /sbin
|
||||
+ /usr/bin
|
||||
+ /usr/sbin
|
||||
+ /usr/local/bin
|
||||
+ /usr/local/sbin</pre>
|
||||
+ All these directories should be owned by the <tt>root</tt> user.
|
||||
+ If any directory <i>DIR</i> in these directories is found
|
||||
+ to be owned by a user other than root, correct its ownership with the
|
||||
+ following command:
|
||||
+ <pre>$ sudo chown root <i>DIR</i></pre>
|
||||
+
|
||||
+rationale: |-
|
||||
+ System binaries are executed by privileged users as well as system services,
|
||||
+ and restrictive permissions are necessary to ensure that their
|
||||
+ execution of these programs cannot be co-opted.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001495
|
||||
+ srg: SRG-OS-000258-GPOS-00099
|
||||
+ stigid@ubuntu2004: UBTU-20-010424
|
||||
+
|
||||
+ocil_clause: 'any system exectables directories are found to not be owned by root'
|
||||
+
|
||||
+ocil: |-
|
||||
+ System executables are stored in the following directories by default:
|
||||
+ <pre>/bin
|
||||
+ /sbin
|
||||
+ /usr/bin
|
||||
+ /usr/local/bin
|
||||
+ /usr/local/sbin
|
||||
+ /usr/sbin</pre>
|
||||
+ For each of these directories, run the following command to find files
|
||||
+ not owned by root:
|
||||
+ <pre>$ sudo find -L <i>DIR/</i> ! -user root -type d -exec chown root {} \;</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_owner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /bin/
|
||||
+ - /sbin/
|
||||
+ - /usr/bin/
|
||||
+ - /usr/sbin/
|
||||
+ - /usr/local/bin/
|
||||
+ - /usr/local/sbin/
|
||||
+ recursive: 'true'
|
||||
+ fileuid: '0'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_audit_binaries/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_audit_binaries/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..0c7d9b313d5
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_audit_binaries/rule.yml
|
||||
@@ -0,0 +1,77 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: ubuntu2004
|
||||
+
|
||||
+title: 'Verify that audit tools are owned by root'
|
||||
+
|
||||
+description: |-
|
||||
+ The {{{ full_name }}} operating system audit tools must have the proper
|
||||
+ ownership configured to protected against unauthorized access.
|
||||
+
|
||||
+ Verify it by running the following command:
|
||||
+ <pre>$ stat -c "%n %U" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules
|
||||
+
|
||||
+ /sbin/auditctl root
|
||||
+ /sbin/aureport root
|
||||
+ /sbin/ausearch root
|
||||
+ /sbin/autrace root
|
||||
+ /sbin/auditd root
|
||||
+ /sbin/audispd root
|
||||
+ /sbin/augenrules root
|
||||
+ </pre>
|
||||
+
|
||||
+ Audit tools needed to successfully view and manipulate audit information
|
||||
+ system activity and records. Audit tools include custom queries and report
|
||||
+ generators
|
||||
+
|
||||
+rationale: |-
|
||||
+ Protecting audit information also includes identifying and protecting the
|
||||
+ tools used to view and manipulate log data. Therefore, protecting audit
|
||||
+ tools is necessary to prevent unauthorized operation on audit information.
|
||||
+
|
||||
+ Operating systems providing tools to interface with audit information
|
||||
+ will leverage user permissions and roles identifying the user accessing the
|
||||
+ tools and the corresponding rights the user enjoys to make access decisions
|
||||
+ regarding the access to audit tools.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001493,CCI-001494
|
||||
+ srg: SRG-OS-000256-GPiOS-00097,SRG-OS-000257-GPOS-00098
|
||||
+ stigid@ubuntu2004: UBTU-20-010200
|
||||
+
|
||||
+ocil: |-
|
||||
+ Verify it by running the following command:
|
||||
+ <pre>$ stat -c "%n %U" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules
|
||||
+
|
||||
+ /sbin/auditctl root
|
||||
+ /sbin/aureport root
|
||||
+ /sbin/ausearch root
|
||||
+ /sbin/autrace root
|
||||
+ /sbin/auditd root
|
||||
+ /sbin/audispd root
|
||||
+ /sbin/augenrules root
|
||||
+ </pre>
|
||||
+
|
||||
+ If the command does not return all the above lines, the missing ones
|
||||
+ need to be added.
|
||||
+
|
||||
+ Run the following command to correct the permissions of the missing
|
||||
+ entries:
|
||||
+ <pre>$ sudo chown root [audit_tool] </pre>
|
||||
+
|
||||
+ Replace "[audit_tool]" with each audit tool not owned by root.
|
||||
+
|
||||
+template:
|
||||
+ name: file_owner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /sbin/auditctl
|
||||
+ - /sbin/aureport
|
||||
+ - /sbin/ausearch
|
||||
+ - /sbin/autrace
|
||||
+ - /sbin/auditd
|
||||
+ - /sbin/audispd
|
||||
+ - /sbin/augenrules
|
||||
+ fileuid: '0'
|
||||
diff --git a/shared/templates/file_owner/ansible.template b/shared/templates/file_owner/ansible.template
|
||||
index 80eaae8d50b..590c9fc6055 100644
|
||||
--- a/shared/templates/file_owner/ansible.template
|
||||
+++ b/shared/templates/file_owner/ansible.template
|
||||
@@ -25,7 +25,7 @@
|
||||
|
||||
- name: Ensure owner on {{{ path }}} recursively
|
||||
file:
|
||||
- paths "{{{ path }}}"
|
||||
+ path: "{{{ path }}}"
|
||||
state: directory
|
||||
recurse: yes
|
||||
owner: "{{{ FILEUID }}}"
|
||||
diff --git a/shared/templates/file_owner/tests/missing_file_test.pass.sh b/shared/templates/file_owner/tests/missing_file_test.pass.sh
|
||||
index 938e6b30819..4e3683f9dcf 100644
|
||||
--- a/shared/templates/file_owner/tests/missing_file_test.pass.sh
|
||||
+++ b/shared/templates/file_owner/tests/missing_file_test.pass.sh
|
||||
@@ -1,8 +1,18 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
|
||||
-{{% if MISSING_FILE_PASS %}}
|
||||
- rm -f {{{ FILEPATH }}}
|
||||
-{{% else %}}
|
||||
- true
|
||||
-{{% endif %}}
|
||||
+{{% for path in FILEPATH %}}
|
||||
+ {{% if MISSING_FILE_PASS %}}
|
||||
+ rm -f {{{ path }}}
|
||||
+ {{% else %}}
|
||||
+ {{% if IS_DIRECTORY and RECURSIVE %}}
|
||||
+ find -L {{{ path }}} -type d -exec chown {{{ FILEUID }}} {} \;
|
||||
+ {{% else %}}
|
||||
+ if [ ! -f {{{ path }}} ]; then
|
||||
+ mkdir -p "$(dirname '{{{ path }}}')"
|
||||
+ touch {{{ path }}}
|
||||
+ fi
|
||||
+ chown {{{ FILEUID }}} {{{ path }}}
|
||||
+ {{% endif %}}
|
||||
+ {{% endif %}}
|
||||
+{{% endfor %}}
|
@ -1,409 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_local_var_log/bash/ubuntu.sh b/linux_os/guide/system/permissions/files/permissions_local_var_log/bash/ubuntu.sh
|
||||
new file mode 100644
|
||||
index 00000000000..93fd73e6ece
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_local_var_log/bash/ubuntu.sh
|
||||
@@ -0,0 +1,14 @@
|
||||
+# platform = multi_platform_ubuntu
|
||||
+
|
||||
+readarray -t files < <(find /var/log/)
|
||||
+for file in "${files[@]}"; do
|
||||
+ if basename $file | grep -qE '^.*$'; then
|
||||
+ chmod 0640 $file
|
||||
+ fi
|
||||
+done
|
||||
+
|
||||
+if grep -qE "^f \/var\/log\/(btmp|wtmp|lastlog)? " /usr/lib/tmpfiles.d/var.conf; then
|
||||
+ sed -i --follow-symlinks "s/\(^f[[:space:]]\+\/var\/log\/btmp[[:space:]]\+\)\(\([[:digit:]]\+\)[^ $]*\)/\10640/" /usr/lib/tmpfiles.d/var.conf
|
||||
+ sed -i --follow-symlinks "s/\(^f[[:space:]]\+\/var\/log\/wtmp[[:space:]]\+\)\(\([[:digit:]]\+\)[^ $]*\)/\10640/" /usr/lib/tmpfiles.d/var.conf
|
||||
+ sed -i --follow-symlinks "s/\(^f[[:space:]]\+\/var\/log\/lastlog[[:space:]]\+\)\(\([[:digit:]]\+\)[^ $]*\)/\10640/" /usr/lib/tmpfiles.d/var.conf
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_local_var_log/oval/shared.xml b/linux_os/guide/system/permissions/files/permissions_local_var_log/oval/shared.xml
|
||||
deleted file mode 100644
|
||||
index dd95ce05936..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_local_var_log/oval/shared.xml
|
||||
+++ /dev/null
|
||||
@@ -1,36 +0,0 @@
|
||||
-<def-group>
|
||||
- <definition class="compliance" id="permissions_local_var_log" version="1">
|
||||
- {{{ oval_metadata("
|
||||
- Checks that files in /var/log have permission at least 0640
|
||||
- ") }}}
|
||||
- <criteria operator="AND">
|
||||
- <criterion test_ref="test_mode_log_files" />
|
||||
- </criteria>
|
||||
- </definition>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="log file with less restrictive permission than 0640" id="test_mode_log_files" version="1">
|
||||
- <unix:object object_ref="object_file_mode_log_files" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
- <unix:file_object comment="log files" id="object_file_mode_log_files" version="1">
|
||||
- <unix:path operation="pattern match">^\/var\/log\/</unix:path>
|
||||
- <unix:filename operation="pattern match">^.*$</unix:filename>
|
||||
- <filter action="include">log_files_permission_more_0640</filter>
|
||||
- <filter action="exclude">var_log_symlinks</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_state id="log_files_permission_more_0640" version="1" operator="OR">
|
||||
- <!-- if any one of these is true then mode is NOT 0640 (hence the OR operator) -->
|
||||
- <unix:uexec datatype="boolean">true</unix:uexec>
|
||||
- <unix:gwrite datatype="boolean">true</unix:gwrite>
|
||||
- <unix:gexec datatype="boolean">true</unix:gexec>
|
||||
- <unix:oread datatype="boolean">true</unix:oread>
|
||||
- <unix:owrite datatype="boolean">true</unix:owrite>
|
||||
- <unix:oexec datatype="boolean">true</unix:oexec>
|
||||
- </unix:file_state>
|
||||
-
|
||||
- <unix:file_state id="var_log_symlinks" version="1">
|
||||
- <unix:type operation="equals">symbolic link</unix:type>
|
||||
- </unix:file_state>
|
||||
-
|
||||
-</def-group>
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_local_var_log/rule.yml b/linux_os/guide/system/permissions/files/permissions_local_var_log/rule.yml
|
||||
index 2b0431b7763..9ce79cfde4e 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_local_var_log/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_local_var_log/rule.yml
|
||||
@@ -47,3 +47,10 @@ ocil: |-
|
||||
<pre>
|
||||
sudo find /var/log -perm /137 -type f -exec stat -c "%n %a" {} \;
|
||||
</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_permissions
|
||||
+ vars:
|
||||
+ filepath: /var/log/
|
||||
+ file_regex: '.*'
|
||||
+ filemode: '0640'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/var_logfile_correct_mode.pass.sh b/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/var_logfile_correct_mode.pass.sh
|
||||
index 5317ef272b8..1793259cff5 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/var_logfile_correct_mode.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/var_logfile_correct_mode.pass.sh
|
||||
@@ -1,5 +1,6 @@
|
||||
#!/bin/bash
|
||||
|
||||
+chmod -R 640 /var/log
|
||||
mkdir -p /var/log/testme
|
||||
touch /var/log/testme/test.log
|
||||
chmod 640 /var/log/testme/test.log
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/world_writable_dir.pass.sh b/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/world_writable_dir.pass.sh
|
||||
index 83db1acf8d3..69b081473a5 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/world_writable_dir.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_local_var_log/tests/world_writable_dir.pass.sh
|
||||
@@ -1,4 +1,5 @@
|
||||
#!/bin/bash
|
||||
|
||||
+chmod -R 640 /var/log/
|
||||
mkdir -p /var/log/testme
|
||||
chmod 777 /var/log/testme
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_permissions_var_log/bash/ubuntu.sh b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_permissions_var_log/bash/ubuntu.sh
|
||||
new file mode 100644
|
||||
index 00000000000..93962ea66a7
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_permissions_var_log/bash/ubuntu.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+# platform = multi_platform_ubuntu
|
||||
+
|
||||
+chmod 0755 /var/log/
|
||||
+
|
||||
+if grep -q "^z \/var\/log " /usr/lib/tmpfiles.d/00rsyslog.conf; then
|
||||
+ sed -i --follow-symlinks "s/\(^z[[:space:]]\+\/var\/log[[:space:]]\+\)\(\([[:digit:]]\+\)[^ $]*\)/\10755/" /usr/lib/tmpfiles.d/00rsyslog.conf
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_permissions_var_log_syslog/rule.yml b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_permissions_var_log_syslog/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..73258d40fdc
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_var_log_dir/file_permissions_var_log_syslog/rule.yml
|
||||
@@ -0,0 +1,28 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Verify Permissions on /var/log/syslog File'
|
||||
+
|
||||
+description: |-
|
||||
+ {{{ describe_file_permissions(file="/var/log/syslog", perms="0640") }}}
|
||||
+
|
||||
+rationale: |-
|
||||
+ The <tt>/var/log/syslog</tt> file contains logs of error messages in
|
||||
+ the system and should only be accessed by authorized personnel.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001314
|
||||
+ srg: SRG-OS-000206-GPOS-00084
|
||||
+ stigid@ubuntu2004: UBTU-20-010422
|
||||
+
|
||||
+ocil_clause: '{{{ ocil_clause_file_permissions(file="/var/log/syslog", perms="-rw-r-----") }}}'
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ ocil_file_permissions(file="/var/log/syslog", perms="-rw-r-----") }}}
|
||||
+
|
||||
+template:
|
||||
+ name: file_permissions
|
||||
+ vars:
|
||||
+ filepath: /var/log/syslog
|
||||
+ filemode: '0640'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_binary_dirs/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..a666c768870
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_binary_dirs/rule.yml
|
||||
@@ -0,0 +1,57 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: 'Verify that System Executable Directories Have Restrictive Permissions'
|
||||
+
|
||||
+description: |-
|
||||
+ System executables are stored in the following directories by default:
|
||||
+ <pre>/bin
|
||||
+ /sbin
|
||||
+ /usr/bin
|
||||
+ /usr/sbin
|
||||
+ /usr/local/bin
|
||||
+ /usr/local/sbin</pre>
|
||||
+ These directories should not be group-writable or world-writable.
|
||||
+ If any directory <i>DIR</i> in these directories is found to be
|
||||
+ group-writable or world-writable, correct its permission with the
|
||||
+ following command:
|
||||
+ <pre>$ sudo chmod go-w <i>DIR</i></pre>
|
||||
+
|
||||
+rationale: |-
|
||||
+ System binaries are executed by privileged users, as well as system services,
|
||||
+ and restrictive permissions are necessary to ensure execution of these programs
|
||||
+ cannot be co-opted.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001495
|
||||
+ srg: SRG-OS-000258-GPOS-00099
|
||||
+ stigid@ubuntu2004: UBTU-20-010423
|
||||
+
|
||||
+ocil_clause: 'any of these files are group-writable or world-writable'
|
||||
+
|
||||
+ocil: |-
|
||||
+ System executables are stored in the following directories by default:
|
||||
+ <pre>/bin
|
||||
+ /sbin
|
||||
+ /usr/bin
|
||||
+ /usr/sbin
|
||||
+ /usr/local/bin
|
||||
+ /usr/local/sbin</pre>
|
||||
+ To find system executables directories that are group-writable or
|
||||
+ world-writable, run the following command for each directory <i>DIR</i>
|
||||
+ which contains system executables:
|
||||
+ <pre>$ sudo find -L <i>DIR</i> -perm /022 -type d</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_permissions
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /bin/
|
||||
+ - /sbin/
|
||||
+ - /usr/bin/
|
||||
+ - /usr/sbin/
|
||||
+ - /usr/local/bin/
|
||||
+ - /usr/local/sbin/
|
||||
+ recursive: 'true'
|
||||
+ filemode: '0755'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
index 3f7239deef9..af078463b05 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
find "$dirPath" -perm /022 -type d -exec chmod go-w '{}' \;
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh
|
||||
index 1f68586853d..d58616bcafb 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/owner_only_writable_dir.pass.sh
|
||||
@@ -1,5 +1,6 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
+ chmod -R 755 "$dirPath"
|
||||
mkdir -p "$dirPath/testme" && chmod 700 "$dirPath/testme"
|
||||
done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh
|
||||
index b60a7269568..98d18cde3ea 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_lib.fail.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
DIRS="/lib /lib64"
|
||||
for dirPath in $DIRS; do
|
||||
mkdir -p "$dirPath/testme" && chmod 777 "$dirPath/testme"
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh
|
||||
index 5438b51bb6a..6df6e2f8f9b 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/tests/world_writable_dir_on_usr_lib.fail.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_sle,multi_platform_ubuntu
|
||||
DIRS="/usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
mkdir -p "$dirPath/testme" && chmod 777 "$dirPath/testme"
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_audit_binaries/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_audit_binaries/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..da42e997478
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_audit_binaries/rule.yml
|
||||
@@ -0,0 +1,78 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: ubuntu2004
|
||||
+
|
||||
+title: 'Verify that audit tools Have Mode 0755 or less'
|
||||
+
|
||||
+description: |-
|
||||
+ The {{{ full_name }}} operating system audit tools must have the proper
|
||||
+ permissions configured to protected against unauthorized access.
|
||||
+
|
||||
+ Verify it by running the following command:
|
||||
+ <pre>$ stat -c "%n %a" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules
|
||||
+
|
||||
+ /sbin/auditctl 755
|
||||
+ /sbin/aureport 755
|
||||
+ /sbin/ausearch 755
|
||||
+ /sbin/autrace 755
|
||||
+ /sbin/auditd 755
|
||||
+ /sbin/audispd 755
|
||||
+ /sbin/augenrules 755
|
||||
+ </pre>
|
||||
+
|
||||
+ Audit tools needed to successfully view and manipulate audit information
|
||||
+ system activity and records. Audit tools include custom queries and report
|
||||
+ generators
|
||||
+
|
||||
+rationale: |-
|
||||
+ Protecting audit information also includes identifying and protecting the
|
||||
+ tools used to view and manipulate log data. Therefore, protecting audit
|
||||
+ tools is necessary to prevent unauthorized operation on audit information.
|
||||
+
|
||||
+ Operating systems providing tools to interface with audit information
|
||||
+ will leverage user permissions and roles identifying the user accessing the
|
||||
+ tools and the corresponding rights the user enjoys to make access decisions
|
||||
+ regarding the access to audit tools.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-001493,CCI-001494
|
||||
+ srg: SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098
|
||||
+ stigid@ubuntu2004: UBTU-20-010199
|
||||
+
|
||||
+ocil: |-
|
||||
+ Verify it by running the following command:
|
||||
+ <pre>$ stat -c "%n %a" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules
|
||||
+
|
||||
+ /sbin/auditctl 755
|
||||
+ /sbin/aureport 755
|
||||
+ /sbin/ausearch 755
|
||||
+ /sbin/autrace 755
|
||||
+ /sbin/auditd 755
|
||||
+ /sbin/audispd 755
|
||||
+ /sbin/augenrules 755
|
||||
+ </pre>
|
||||
+
|
||||
+ If the command does not return all the above lines, the missing ones
|
||||
+ need to be added.
|
||||
+
|
||||
+ Run the following command to correct the permissions of the missing
|
||||
+ entries:
|
||||
+ <pre>$ sudo chmod 0755 [audit_tool] </pre>
|
||||
+
|
||||
+ Replace "[audit_tool]" with the audit tool that does not have the
|
||||
+ correct permissions.
|
||||
+
|
||||
+template:
|
||||
+ name: file_permissions
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /sbin/auditctl
|
||||
+ - /sbin/aureport
|
||||
+ - /sbin/ausearch
|
||||
+ - /sbin/autrace
|
||||
+ - /sbin/auditd
|
||||
+ - /sbin/audispd
|
||||
+ - /sbin/augenrules
|
||||
+ filemode: '0755'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/bash/shared.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/bash/shared.sh
|
||||
index de2e1e98dfa..ab89b277a52 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/bash/shared.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = Red Hat Virtualization 4,multi_platform_rhel,multi_platform_ol,multi_platform_sle
|
||||
+# platform = Red Hat Virtualization 4,multi_platform_rhel,multi_platform_ol,multi_platform_sle,multi_platform_ubuntu
|
||||
DIRS="/bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin /usr/libexec"
|
||||
for dirPath in $DIRS; do
|
||||
find "$dirPath" -perm /022 -exec chmod go-w '{}' \;
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/tests/correct_permissions.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/tests/correct_permissions.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..59b8838581c
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/tests/correct_permissions.pass.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+DIRS="/bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin /usr/libexec"
|
||||
+for dirPath in $DIRS; do
|
||||
+ find "$dirPath" -perm /022 -type f -exec chmod 0755 '{}' \;
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/tests/incorrect_permissions.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/tests/incorrect_permissions.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..9d9ce30064b
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/tests/incorrect_permissions.fail.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+DIRS="/bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin /usr/libexec"
|
||||
+for dirPath in $DIRS; do
|
||||
+ find "$dirPath" -type f -exec chmod 0777 '{}' \;
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/correct_permissions.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/correct_permissions.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..de388e63325
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/correct_permissions.pass.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
+for dirPath in $DIRS; do
|
||||
+ chmod -R 755 "$dirPath"
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/incorrect_permissions.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/incorrect_permissions.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..913e75e7b17
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/incorrect_permissions.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
+for dirPath in $DIRS; do
|
||||
+ find "$dirPath" -type d -exec chmod go-w '{}' \;
|
||||
+ find "$dirPath" -type f -exec chmod go+w '{}' \;
|
||||
+done
|
||||
diff --git a/shared/templates/file_permissions/oval.template b/shared/templates/file_permissions/oval.template
|
||||
index 89083e812c1..6b3616a7f42 100644
|
||||
--- a/shared/templates/file_permissions/oval.template
|
||||
+++ b/shared/templates/file_permissions/oval.template
|
||||
@@ -67,6 +67,11 @@
|
||||
#}}
|
||||
<filter action="include">state_file_permissions{{{ FILEID }}}_{{{ loop.index0 }}}_mode_not_{{{ FILEMODE }}}</filter>
|
||||
{{%- endif %}}
|
||||
+ <filter action="exclude">exclude_symlinks_{{{ FILEID }}}</filter>
|
||||
</unix:file_object>
|
||||
{{% endfor %}}
|
||||
+
|
||||
+ <unix:file_state id="exclude_symlinks_{{{ FILEID }}}" version="1">
|
||||
+ <unix:type operation="equals">symbolic link</unix:type>
|
||||
+ </unix:file_state>
|
||||
</def-group>
|
@ -1,44 +0,0 @@
|
||||
From 1c054ed40a4dbc2a48ffe7720d018c317cad8105 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Tue, 15 Feb 2022 14:12:55 +0100
|
||||
Subject: [PATCH] Simply mask services that should be disabled
|
||||
|
||||
At some point Ansible started to return much more services in
|
||||
ansible_facts.services, including services that are not installed.
|
||||
This caused the task to think that the service exists, attempt to stop
|
||||
and mask the service.
|
||||
But systemd module fatal errors on non existing services, although the
|
||||
module ends up masking the service in question.
|
||||
|
||||
The bash remediations simply mask the service, even if it is not
|
||||
installed.
|
||||
Let's do the same with Ansible, mask the service and ignore errors.
|
||||
|
||||
One down side is that every non-existing service is reported as an
|
||||
error, which is ignored. But still a fatal error.
|
||||
---
|
||||
shared/templates/service_disabled/ansible.template | 5 +----
|
||||
1 file changed, 1 insertion(+), 4 deletions(-)
|
||||
|
||||
diff --git a/shared/templates/service_disabled/ansible.template b/shared/templates/service_disabled/ansible.template
|
||||
index 550ed563056..254f41ac7fd 100644
|
||||
--- a/shared/templates/service_disabled/ansible.template
|
||||
+++ b/shared/templates/service_disabled/ansible.template
|
||||
@@ -6,16 +6,13 @@
|
||||
{{%- if init_system == "systemd" %}}
|
||||
- name: Disable service {{{ SERVICENAME }}}
|
||||
block:
|
||||
- - name: Gather the service facts
|
||||
- service_facts:
|
||||
-
|
||||
- name: Disable service {{{ SERVICENAME }}}
|
||||
systemd:
|
||||
name: "{{{ DAEMONNAME }}}.service"
|
||||
enabled: "no"
|
||||
state: "stopped"
|
||||
masked: "yes"
|
||||
- when: '"{{{ DAEMONNAME }}}.service" in ansible_facts.services'
|
||||
+ ignore_errors: 'yes'
|
||||
|
||||
- name: "Unit Socket Exists - {{{ DAEMONNAME }}}.socket"
|
||||
command: systemctl list-unit-files {{{ DAEMONNAME }}}.socket
|
@ -1,22 +0,0 @@
|
||||
From 50eb163d9e9751c2e8cf8129523a8cf7e07a5930 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Burket <mburket@redhat.com>
|
||||
Date: Thu, 17 Feb 2022 12:49:32 -0600
|
||||
Subject: [PATCH] get_implemented_stigs in utils/create_scap_delta_tailoring.py
|
||||
should return the implemented stig items
|
||||
|
||||
---
|
||||
utils/create_scap_delta_tailoring.py | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/utils/create_scap_delta_tailoring.py b/utils/create_scap_delta_tailoring.py
|
||||
index 2c3c5d0df32..25ad1aef66e 100755
|
||||
--- a/utils/create_scap_delta_tailoring.py
|
||||
+++ b/utils/create_scap_delta_tailoring.py
|
||||
@@ -127,6 +127,7 @@ def get_implemented_stigs(product, root_path, build_config_yaml_path,
|
||||
known_rules[ref].append(rule['id'])
|
||||
else:
|
||||
known_rules[ref] = [rule['id']]
|
||||
+ return known_rules
|
||||
|
||||
|
||||
get_implemented_stigs.__annotations__ = {'product': str, 'root_path': str,
|
@ -1,116 +0,0 @@
|
||||
From bc2f72ff8a23b508cef88a363e75e73474625775 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Tue, 22 Feb 2022 17:15:43 +0100
|
||||
Subject: [PATCH 1/3] remove extend definition from ovals
|
||||
|
||||
---
|
||||
.../software/integrity/fips/enable_fips_mode/oval/rhcos4.xml | 1 -
|
||||
.../software/integrity/fips/enable_fips_mode/oval/shared.xml | 1 -
|
||||
2 files changed, 2 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/rhcos4.xml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/rhcos4.xml
|
||||
index c5ae0550e6b..52d86fd4478 100644
|
||||
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/rhcos4.xml
|
||||
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/rhcos4.xml
|
||||
@@ -5,7 +5,6 @@
|
||||
<extend_definition comment="check /etc/system-fips exists" definition_ref="etc_system_fips_exists" />
|
||||
<extend_definition comment="check sysctl crypto.fips_enabled = 1" definition_ref="proc_sys_crypto_fips_enabled" />
|
||||
<extend_definition comment="system cryptography policy is configured" definition_ref="configure_crypto_policy" />
|
||||
- <extend_definition comment="Installed OS is FIPS certified" definition_ref="installed_OS_is_FIPS_certified" />
|
||||
<criterion comment="check if system crypto policy selection in var_system_crypto_policy in the profile is set to FIPS" test_ref="test_system_crypto_policy_value" />
|
||||
</criteria>
|
||||
</definition>
|
||||
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
|
||||
index 699dca06dd1..6c3f57e143f 100644
|
||||
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
|
||||
@@ -6,7 +6,6 @@
|
||||
<extend_definition comment="check sysctl crypto.fips_enabled = 1" definition_ref="sysctl_crypto_fips_enabled" />
|
||||
<extend_definition comment="Dracut FIPS module is enabled" definition_ref="enable_dracut_fips_module" />
|
||||
<extend_definition comment="system cryptography policy is configured" definition_ref="configure_crypto_policy" />
|
||||
- <extend_definition comment="Installed OS is FIPS certified" definition_ref="installed_OS_is_FIPS_certified" />
|
||||
<criterion comment="check if system crypto policy selection in var_system_crypto_policy in the profile is set to FIPS" test_ref="test_system_crypto_policy_value" />
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
From dbbea1998e189c4a27edc700478f55e2dfda56f8 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Tue, 22 Feb 2022 17:17:28 +0100
|
||||
Subject: [PATCH 2/3] chang warning and description
|
||||
|
||||
---
|
||||
.../integrity/fips/enable_fips_mode/rule.yml | 25 ++++---------------
|
||||
1 file changed, 5 insertions(+), 20 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
index 9d89114b07f..6b055eac8ff 100644
|
||||
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
@@ -13,11 +13,9 @@ description: |-
|
||||
<ul>
|
||||
<li>Setting the kernel FIPS mode flag (<tt>/proc/sys/crypto/fips_enabled</tt>) to <tt>1</tt></li>
|
||||
<li>Creating <tt>/etc/system-fips</tt></li>
|
||||
- <li>Setting the system crypto policy in <tt>/etc/crypto-policies/config</tt> to <tt>FIPS</tt></li>
|
||||
+ <li>Setting the system crypto policy in <tt>/etc/crypto-policies/config</tt> to <tt>{{{ xccdf_value("var_system_crypto_policy") }}}</tt></li>
|
||||
<li>Loading the Dracut <tt>fips</tt> module</li>
|
||||
</ul>
|
||||
- This rule also ensures that the system policy is set to <tt>{{{ xccdf_value("var_system_crypto_policy") }}}</tt>.
|
||||
- Furthermore, the system running in FIPS mode should be FIPS certified by NIST.
|
||||
|
||||
rationale: |-
|
||||
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
|
||||
@@ -48,7 +46,7 @@ references:
|
||||
ocil_clause: 'FIPS mode is not enabled'
|
||||
|
||||
ocil: |-
|
||||
- To verify that FIPS is enabled properly, run the following command:
|
||||
+ To verify that FIPS mode is enabled properly, run the following command:
|
||||
<pre>fips-mode-setup --check</pre>
|
||||
The output should contain the following:
|
||||
<pre>FIPS mode is enabled.</pre>
|
||||
@@ -61,19 +59,6 @@ warnings:
|
||||
- general: |-
|
||||
The system needs to be rebooted for these changes to take effect.
|
||||
- regulatory: |-
|
||||
- System Crypto Modules must be provided by a vendor that undergoes
|
||||
- FIPS-140 certifications.
|
||||
- FIPS-140 is applicable to all Federal agencies that use
|
||||
- cryptographic-based security systems to protect sensitive information
|
||||
- in computer and telecommunication systems (including voice systems) as
|
||||
- defined in Section 5131 of the Information Technology Management Reform
|
||||
- Act of 1996, Public Law 104-106. This standard shall be used in
|
||||
- designing and implementing cryptographic modules that Federal
|
||||
- departments and agencies operate or are operated for them under
|
||||
- contract. See <b>{{{ weblink(link="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf") }}}</b>
|
||||
- To meet this, the system has to have cryptographic software provided by
|
||||
- a vendor that has undergone this certification. This means providing
|
||||
- documentation, test results, design information, and independent third
|
||||
- party review by an accredited lab. While open source software is
|
||||
- capable of meeting this, it does not meet FIPS-140 unless the vendor
|
||||
- submits to this process.
|
||||
+ This rule DOES NOT CHECK if the components of the operating system are FIPS certified.
|
||||
+ You can find the list of FIPS certified modules at {{{ weblink(link="https://csrc.nist.rip/groups/STM/cmvp/documents/140-1/1401vend.htm") }}}.
|
||||
+ This rule checks if the system is running in FIPS mode. See the rule description for more information about what it means.
|
||||
|
||||
From 3c72eec95c617ee295099522d2817c6d217a7e63 Mon Sep 17 00:00:00 2001
|
||||
From: vojtapolasek <krecoun@gmail.com>
|
||||
Date: Wed, 23 Feb 2022 09:16:09 +0100
|
||||
Subject: [PATCH 3/3] Update
|
||||
linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
|
||||
Co-authored-by: Gabriel Becker <ggasparb@redhat.com>
|
||||
---
|
||||
.../system/software/integrity/fips/enable_fips_mode/rule.yml | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
index 6b055eac8ff..30cbc939bed 100644
|
||||
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
@@ -60,5 +60,5 @@ warnings:
|
||||
The system needs to be rebooted for these changes to take effect.
|
||||
- regulatory: |-
|
||||
This rule DOES NOT CHECK if the components of the operating system are FIPS certified.
|
||||
- You can find the list of FIPS certified modules at {{{ weblink(link="https://csrc.nist.rip/groups/STM/cmvp/documents/140-1/1401vend.htm") }}}.
|
||||
+ You can find the list of FIPS certified modules at {{{ weblink(link="https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search") }}}.
|
||||
This rule checks if the system is running in FIPS mode. See the rule description for more information about what it means.
|
@ -1,854 +0,0 @@
|
||||
From 51a826878ade2ebb564405991937ba0e2b2b7717 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Wed, 2 Feb 2022 14:25:30 +0100
|
||||
Subject: [PATCH 1/8] create two macros
|
||||
|
||||
one provides description for grub2_argument templated rules
|
||||
the second provides ocil for those cases
|
||||
---
|
||||
shared/macros.jinja | 56 +++++++++++++++++++++++++++++++++++++++++++++
|
||||
1 file changed, 56 insertions(+)
|
||||
|
||||
diff --git a/shared/macros.jinja b/shared/macros.jinja
|
||||
index 00358e2f67c..3d41c998b0c 100644
|
||||
--- a/shared/macros.jinja
|
||||
+++ b/shared/macros.jinja
|
||||
@@ -1620,3 +1620,59 @@ The audit daemon must be restarted for the changes to take effect.
|
||||
- no_ovirt
|
||||
{{%- endif %}}
|
||||
{{% endmacro %}}
|
||||
+
|
||||
+{{#
|
||||
+ Describe how to configure Grub2 to add an argument to the default kernel command line.
|
||||
+ The parameter should be in form `parameter=value`.
|
||||
+#}}
|
||||
+{{%- macro describe_grub2_argument(arg_name_value) -%}}
|
||||
+{{%- if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product -%}}
|
||||
+To ensure that <tt>{{{ arg_name_value }}}</tt> is added as a kernel command line
|
||||
+argument to newly installed kernels, ad <tt>{{{ arg_name_value }}}</tt> to the
|
||||
+default Grub2 command line for Linux operating systems. Modify the line within
|
||||
+<tt>/etc/default/grub</tt> as shown below:
|
||||
+<pre>GRUB_CMDLINE_LINUX="... {{{ arg_name_value }}} ..."</pre>
|
||||
+Run the following command to update command line for already installed kernels:
|
||||
+{{%- if 'ubuntu' in product -%}}
|
||||
+<pre># update-grub</pre>
|
||||
+{{%- else -%}}
|
||||
+<pre># grubby --update-kernel=ALL --args="{{{ arg_name_value }}}"</pre>
|
||||
+{{%- endif -%}}
|
||||
+{{%- else -%}}
|
||||
+Configure the default Grub2 kernel command line to contain {{{ arg_name_value }}} as follows:
|
||||
+<pre># grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) {{{ arg_name_value }}}"</pre>
|
||||
+{{%- endif -%}}
|
||||
+{{%- endmacro -%}}
|
||||
+
|
||||
+{{#
|
||||
+ Provide OCIL for checking if an argument for kernel command line is configured with Grub2.
|
||||
+ The parameter should have form `parameter=value`.
|
||||
+#}}
|
||||
+{{%- macro ocil_grub2_argument(arg_name_value) -%}}
|
||||
+{{%- if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product -%}}
|
||||
+Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
+in <tt>/etc/default/grub</tt>. If it includes <tt>{{{ arg_name_value }}}</tt>,
|
||||
+then auditinng will be enabled for newly installed kernels.
|
||||
+First check if the GRUB recovery is enabled:
|
||||
+<pre>$ grep 'GRUB_DISABLE_RECOVERY' /etc/default/grub</pre>
|
||||
+If this option is set to true, then check that a line is output by the following command:
|
||||
+<pre>$ grep 'GRUB_CMDLINE_LINUX_DEFAULT.*{{{ arg_name_value }}}.*' /etc/default/grub</pre>
|
||||
+If the recovery is disabled, check the line with
|
||||
+<pre>$ grep 'GRUB_CMDLINE_LINUX.*{{{ arg_name_value }}}.*' /etc/default/grub</pre>.
|
||||
+{{%- if 'ubuntu' in product -%}}
|
||||
+Moreover, current Grub2 config file in <tt>/etc/grub2/grub.cfg</tt> must be checked.
|
||||
+<pre># grep vmlinuz {{{ grub2_boot_path }}}/grub.cfg | grep -v '{{{ arg_name_value }}}'</pre>
|
||||
+This command should not return any output.
|
||||
+{{%- else -%}}
|
||||
+Moreover, command line parameters for currently installed kernels should be checked as well.
|
||||
+Run the following command:
|
||||
+<pre># grubby --info=ALL | grep args | grep -v '{{{ arg_name_value }}}'</pre>
|
||||
+The command should not return any output.
|
||||
+{{%- endif -%}}
|
||||
+{{%- else -%}}
|
||||
+Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
+in <tt>{{{ grub2_boot_path }}}/grubenv</tt>. If they include <tt>{{{ arg_name_value }}}</tt>, then auditing
|
||||
+is enabled at boot time.
|
||||
+<pre># grep 'kernelopts.*{{{ arg_name_value }}}.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
+{{%- endif -%}}
|
||||
+{{%- endmacro -%}}
|
||||
|
||||
From c8cb579db19bd55eebcb0bdc4b1432368a5c1b77 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Wed, 2 Feb 2022 14:26:26 +0100
|
||||
Subject: [PATCH 2/8] use new macros in grub2_audit_argument
|
||||
|
||||
---
|
||||
.../auditing/grub2_audit_argument/rule.yml | 45 ++-----------------
|
||||
1 file changed, 3 insertions(+), 42 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
|
||||
index 96dbe67699e..aff0521ee73 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
|
||||
@@ -7,15 +7,8 @@ title: 'Enable Auditing for Processes Which Start Prior to the Audit Daemon'
|
||||
description: |-
|
||||
To ensure all processes can be audited, even those which start
|
||||
prior to the audit daemon, add the argument <tt>audit=1</tt> to the default
|
||||
- GRUB 2 command line for the Linux operating system in
|
||||
-{{% if product in ["rhel7", "ol7"] %}}
|
||||
- <tt>/etc/default/grub</tt>, so that the line looks similar to
|
||||
- <pre>GRUB_CMDLINE_LINUX="... audit=1 ..."</pre>
|
||||
- In case the <tt>GRUB_DISABLE_RECOVERY</tt> is set to true, then the parameter should be added to the <tt>GRUB_CMDLINE_LINUX_DEFAULT</tt> instead.
|
||||
-{{% else %}}
|
||||
- <tt>{{{ grub2_boot_path }}}/grubenv</tt>, in the manner below:
|
||||
- <pre># grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) audit=1"</pre>
|
||||
-{{% endif %}}
|
||||
+ GRUB 2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("audit=1") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
Each process on the system carries an "auditable" flag which indicates whether
|
||||
@@ -59,39 +52,7 @@ references:
|
||||
ocil_clause: 'auditing is not enabled at boot time'
|
||||
|
||||
ocil: |-
|
||||
-{{% if product in ["rhel7", "ol7", "sle12","sle15"] %}}
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. If it includes <tt>audit=1</tt>, then auditing
|
||||
- is enabled at boot time.
|
||||
- First check if the GRUB recovery is enabled:
|
||||
- <pre>$ grep 'GRUB_DISABLE_RECOVERY' /etc/default/grub</pre>
|
||||
- If this option is set to true, then check that a line is output by the following command:
|
||||
- <pre>$ grep 'GRUB_CMDLINE_LINUX_DEFAULT.*audit=1.*' /etc/default/grub</pre>
|
||||
- If the recovery is disabled, check the line with
|
||||
- <pre>$ grep 'GRUB_CMDLINE_LINUX.*audit=1.*' /etc/default/grub</pre>.
|
||||
- Moreover, current Grub2 config file in <tt>/etc/grub2/grub.cfg</tt> must be checked.
|
||||
- <pre># grep vmlinuz {{{ grub2_boot_path }}}/grub.cfg | grep -v 'audit=1'</pre>
|
||||
- This command should not return any output. If it does, update the configuration with
|
||||
- <pre># grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre>
|
||||
- <br /><br />
|
||||
- Alternatively, to ensure <tt>audit=1</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>$ sudo /sbin/grubby --update-kernel=ALL --args="audit=1"</pre>
|
||||
- <br />
|
||||
-{{% else %}}
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>{{{ grub2_boot_path }}}/grubenv</tt>. If they include <tt>audit=1</tt>, then auditing
|
||||
- is enabled at boot time.
|
||||
- <pre># grep 'kernelopts.*audit=1.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
- <br /><br />
|
||||
- To ensure <tt>audit=1</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre># grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) audit=1"</pre>
|
||||
- <br />
|
||||
-{{% endif %}}
|
||||
-
|
||||
+ {{{ ocil_grub2_argument("audit=1") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
|
||||
From 3ff2c245408d3fe892222eee8171e2f84868f705 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Thu, 3 Feb 2022 14:25:34 +0100
|
||||
Subject: [PATCH 3/8] fix omission in ocil jinja macro
|
||||
|
||||
---
|
||||
shared/macros.jinja | 6 +++---
|
||||
1 file changed, 3 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/shared/macros.jinja b/shared/macros.jinja
|
||||
index 3d41c998b0c..16a0404b668 100644
|
||||
--- a/shared/macros.jinja
|
||||
+++ b/shared/macros.jinja
|
||||
@@ -1652,7 +1652,7 @@ Configure the default Grub2 kernel command line to contain {{{ arg_name_value }}
|
||||
{{%- if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product -%}}
|
||||
Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
in <tt>/etc/default/grub</tt>. If it includes <tt>{{{ arg_name_value }}}</tt>,
|
||||
-then auditinng will be enabled for newly installed kernels.
|
||||
+then the parameter will be configured for newly installed kernels.
|
||||
First check if the GRUB recovery is enabled:
|
||||
<pre>$ grep 'GRUB_DISABLE_RECOVERY' /etc/default/grub</pre>
|
||||
If this option is set to true, then check that a line is output by the following command:
|
||||
@@ -1671,8 +1671,8 @@ The command should not return any output.
|
||||
{{%- endif -%}}
|
||||
{{%- else -%}}
|
||||
Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
-in <tt>{{{ grub2_boot_path }}}/grubenv</tt>. If they include <tt>{{{ arg_name_value }}}</tt>, then auditing
|
||||
-is enabled at boot time.
|
||||
+in <tt>{{{ grub2_boot_path }}}/grubenv</tt>. If they include <tt>{{{ arg_name_value }}}</tt>, then the parameter
|
||||
+is configured at boot time.
|
||||
<pre># grep 'kernelopts.*{{{ arg_name_value }}}.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
{{%- endif -%}}
|
||||
{{%- endmacro -%}}
|
||||
|
||||
From 976da69681d03d9b9380fc57216c30c7b4891f50 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Thu, 3 Feb 2022 14:26:33 +0100
|
||||
Subject: [PATCH 4/8] use new jinja macros in all grub2 related rules
|
||||
|
||||
---
|
||||
.../rule.yml | 15 ++-----
|
||||
.../grub2_enable_iommu_force/rule.yml | 9 +++-
|
||||
.../grub2_init_on_alloc_argument/rule.yml | 18 ++------
|
||||
.../grub2_kernel_trust_cpu_rng/rule.yml | 11 ++---
|
||||
.../grub2_pti_argument/rule.yml | 15 ++-----
|
||||
.../grub2_vsyscall_argument/rule.yml | 15 ++-----
|
||||
.../grub2_ipv6_disable_argument/rule.yml | 45 ++-----------------
|
||||
.../grub2_page_poison_argument/rule.yml | 15 ++-----
|
||||
.../grub2_slub_debug_argument/rule.yml | 15 ++-----
|
||||
9 files changed, 33 insertions(+), 125 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
index f94ddab2fe1..868d525014f 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
@@ -7,9 +7,8 @@ title: 'Extend Audit Backlog Limit for the Audit Daemon'
|
||||
description: |-
|
||||
To improve the kernel capacity to queue all log events, even those which occurred
|
||||
prior to the audit daemon, add the argument <tt>audit_backlog_limit=8192</tt> to the default
|
||||
- GRUB 2 command line for the Linux operating system in
|
||||
- <tt>/etc/default/grub</tt>, in the manner below:
|
||||
- <pre>GRUB_CMDLINE_LINUX="crashkernel=auto rd.lvm.lv=VolGroup/LogVol06 rd.lvm.lv=VolGroup/lv_swap rhgb quiet rd.shell=0 audit=1 audit_backlog_limit=8192"</pre>
|
||||
+ GRUB 2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("audit_backlog_limit=8192") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
audit_backlog_limit sets the queue length for audit events awaiting transfer
|
||||
@@ -40,15 +39,7 @@ references:
|
||||
ocil_clause: 'audit backlog limit is not configured'
|
||||
|
||||
ocil: |-
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. If they include <tt>audit=1</tt>, then auditing
|
||||
- is enabled at boot time.
|
||||
- <br /><br />
|
||||
- To ensure <tt>audit_backlog_limit=8192</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>$ sudo /sbin/grubby --update-kernel=ALL --args="audit_backlog_limit=8192"</pre>
|
||||
- <br />
|
||||
+ {{{ ocil_grub2_argument("audit_backlog_limit=8192") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_enable_iommu_force/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_enable_iommu_force/rule.yml
|
||||
index 0a0d76aeb23..1ff5a4d5f26 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_enable_iommu_force/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_enable_iommu_force/rule.yml
|
||||
@@ -5,9 +5,10 @@ title: 'IOMMU configuration directive'
|
||||
description: |-
|
||||
On x86 architecture supporting VT-d, the IOMMU manages the access control policy between the hardware devices and some
|
||||
of the system critical units such as the memory.
|
||||
+ {{{ describe_grub2_argument("iommu=force") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
- On x86 architectures, activating the I/OMMU prevents the system from arbritrary accesses potentially made by
|
||||
+ On x86 architectures, activating the I/OMMU prevents the system from arbitrary accesses potentially made by
|
||||
hardware devices.
|
||||
|
||||
severity: unknown
|
||||
@@ -22,6 +23,12 @@ references:
|
||||
|
||||
platform: machine
|
||||
|
||||
+ocil_clause: 'I/OMMU is not activated'
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ ocil_grub2_argument("iommu=force") | indent(4) }}}
|
||||
+
|
||||
+
|
||||
warnings:
|
||||
- functionality:
|
||||
Depending on the hardware, devices and operating system used, enabling IOMMU can cause hardware instabilities.
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
index a9253c74cc6..3bb645dadb7 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
@@ -6,12 +6,8 @@ title: 'Configure kernel to zero out memory before allocation'
|
||||
|
||||
description: |-
|
||||
To configure the kernel to zero out memory before allocating it, add the
|
||||
- <tt>init_on_alloc=1</tt> argument to the default GRUB 2 command line for
|
||||
- the Linux operating system in <tt>/etc/default/grub</tt>, in the manner
|
||||
- below:
|
||||
- <pre>GRUB_CMDLINE_LINUX="crashkernel=auto quiet rd.shell=0 audit=1 audit_backlog_limit=8192 init_on_alloc=1"</pre>
|
||||
- Update the boot parameter for existing kernels by running the following command:
|
||||
- <pre># grubby --update-kernel=ALL --args="init_on_alloc=1"</pre>
|
||||
+ <tt>init_on_alloc=1</tt> argument to the default GRUB 2 command line.
|
||||
+ {{{ describe_grub2_argument("init_on_alloc=1") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
When the kernel configuration option <tt>init_on_alloc</tt> is enabled,
|
||||
@@ -27,15 +23,7 @@ identifiers:
|
||||
ocil_clause: 'the kernel is not configured to zero out memory before allocation'
|
||||
|
||||
ocil: |-
|
||||
- Make sure that the kernel is configured to zero out memory before
|
||||
- allocation. Ensure that the parameter is configured in
|
||||
- <tt>/etc/default/grub</tt>:
|
||||
- <pre>grep GRUB_CMDLINE_LINUX /etc/default/grub</pre>
|
||||
- The output should contain <tt>init_on_alloc=1</tt>.
|
||||
- Run the following command to display command line parameters of all
|
||||
- installed kernels:
|
||||
- <pre># grubby --info=ALL | grep args</pre>
|
||||
- Ensure that each line contains the <tt>init_on_alloc=1</tt> parameter.
|
||||
+ {{{ ocil_grub2_argument("init_on_alloc=1") | indent(4) }}}
|
||||
|
||||
platform: machine
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_kernel_trust_cpu_rng/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_kernel_trust_cpu_rng/rule.yml
|
||||
index 308ae9cb735..d6bfc02f345 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_kernel_trust_cpu_rng/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_kernel_trust_cpu_rng/rule.yml
|
||||
@@ -11,8 +11,8 @@ description: |-
|
||||
<tt>Y</tt>, make sure that it is not overridden with the boot parameter.
|
||||
There must not exist the boot parameter <tt>random.trust_cpu=off</tt>. If
|
||||
the option is not compiled in, make sure that <tt>random.trust_cpu=on</tt>
|
||||
- is configured as a boot parameter by running the following command:
|
||||
- <pre>sudo grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) random.trust_cpu=on"</pre>
|
||||
+ is configured as a boot parameter.
|
||||
+ {{{ describe_grub2_argument("random.trust_cpu=on") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
The Linux kernel offers an option which signifies if the kernel should trust
|
||||
@@ -44,11 +44,8 @@ ocil: |-
|
||||
option is not overridden through a boot parameter:
|
||||
<pre>sudo grep 'kernelopts.*random\.trust_cpu=off.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
The command should not return any output. If the option is not compiled into
|
||||
- the kernel, check that the option is configured through boot parameter with
|
||||
- the following command:
|
||||
- <pre>sudo grep 'kernelopts.*random\.trust_cpu=on.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
- If the command does not return any output, then the boot parameter is
|
||||
- missing.
|
||||
+ the kernel, check that the option is configured through boot parameter.
|
||||
+ {{{ ocil_grub2_argument("random.trust_cpu=on") | indent(4) }}}
|
||||
|
||||
platform: machine
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
|
||||
index f4f3fa39510..51b0a284746 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
|
||||
@@ -7,9 +7,8 @@ title: 'Enable Kernel Page-Table Isolation (KPTI)'
|
||||
description: |-
|
||||
To enable Kernel page-table isolation,
|
||||
add the argument <tt>pti=on</tt> to the default
|
||||
- GRUB 2 command line for the Linux operating system in
|
||||
- <tt>/etc/default/grub</tt>, in the manner below:
|
||||
- <pre>GRUB_CMDLINE_LINUX="pti=on"</pre>
|
||||
+ GRUB 2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("pti=on") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
Kernel page-table isolation is a kernel feature that mitigates
|
||||
@@ -33,15 +32,7 @@ references:
|
||||
ocil_clause: 'Kernel page-table isolation is not enabled'
|
||||
|
||||
ocil: |-
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. If they include <tt>pti=on</tt>,
|
||||
- then Kernel page-table isolation is enabled at boot time.
|
||||
- <br /><br />
|
||||
- To ensure <tt>pti=on</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>$ sudo /sbin/grubby --update-kernel=ALL --args="pti=on</pre>
|
||||
- <br />
|
||||
+ {{{ ocil_grub2_argument("pti=on") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
index 9f38a1c13b9..1b88d13bd3c 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
@@ -7,9 +7,8 @@ title: 'Disable vsyscalls'
|
||||
description: |-
|
||||
To disable use of virtual syscalls,
|
||||
add the argument <tt>vsyscall=none</tt> to the default
|
||||
- GRUB 2 command line for the Linux operating system in
|
||||
- <tt>/etc/default/grub</tt>, in the manner below:
|
||||
- <pre>GRUB_CMDLINE_LINUX="vsyscall=none"</pre>
|
||||
+ GRUB 2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("vsyscall=none") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
Virtual Syscalls provide an opportunity of attack for a user who has control
|
||||
@@ -33,15 +32,7 @@ references:
|
||||
ocil_clause: 'vsyscalls are enabled'
|
||||
|
||||
ocil: |-
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. If they include <tt>vsyscall=none</tt>,
|
||||
- then virtyal syscalls are not enabled at boot time.
|
||||
- <br /><br />
|
||||
- To ensure <tt>vsyscall=none</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>$ sudo /sbin/grubby --update-kernel=ALL --args="vsyscall=none</pre>
|
||||
- <br />
|
||||
+ {{{ ocil_grub2_argument("vsyscall=none") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
diff --git a/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml b/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml
|
||||
index b8ff66c7d6e..c0fda343a1a 100644
|
||||
--- a/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml
|
||||
@@ -7,20 +7,8 @@ title: 'Ensure IPv6 is disabled through kernel boot parameter'
|
||||
description: |-
|
||||
To disable IPv6 protocol support in the Linux kernel,
|
||||
add the argument <tt>ipv6.disable=1</tt> to the default
|
||||
- GRUB2 command line for the Linux operating system in
|
||||
-{{% if product in ["rhel7", "ol7"] %}}
|
||||
- <tt>/etc/default/grub</tt>, so that the line looks similar to
|
||||
- <pre>GRUB_CMDLINE_LINUX="... ipv6.disable=1 ..."</pre>
|
||||
- In case the <tt>GRUB_DISABLE_RECOVERY</tt> is set to true, then the parameter should be added to the <tt>GRUB_CMDLINE_LINUX_DEFAULT</tt> instead.
|
||||
- Run one of following command to ensure that the configuration is applied when booting currently installed kernels:
|
||||
- <pre>sudo grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre>
|
||||
- or
|
||||
- <pre>sudo /sbin/grubby --update-kernel=ALL --args="ipv6.disable=1"</pre>
|
||||
-{{% else %}}
|
||||
- <tt>{{{ grub2_boot_path }}}/grubenv</tt>, in the manner below:
|
||||
- <pre>sudo grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) ipv6.disable=1"</pre>
|
||||
-{{% endif %}}
|
||||
-
|
||||
+ GRUB2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("ipv6.disable=1") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
Any unnecessary network stacks, including IPv6, should be disabled to reduce
|
||||
@@ -40,34 +28,7 @@ references:
|
||||
ocil_clause: 'IPv6 is not disabled'
|
||||
|
||||
ocil: |-
|
||||
- {{% if product in ["rhel7", "ol7"] %}}
|
||||
- Inspect the form of default GRUB2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. Check if it includes <tt>ipv6.disable=1</tt>.
|
||||
- First check if the GRUB recovery is enabled:
|
||||
- <pre>grep 'GRUB_DISABLE_RECOVERY' /etc/default/grub</pre>
|
||||
- If this option is set to true, then check that the following line is output by the following command:
|
||||
- <pre>grep 'GRUB_CMDLINE_LINUX_DEFAULT.*ipv6.disable=1.*' /etc/default/grub</pre>
|
||||
- If the recovery is disabled, check the line with
|
||||
- <pre>grep 'GRUB_CMDLINE_LINUX.*ipv6.disable=1.*' /etc/default/grub</pre>.
|
||||
- Moreover, current GRUB2 config file in <tt>/etc/grub2/grub.cfg</tt> must be checked.
|
||||
- <pre>sudo grep vmlinuz {{{ grub2_boot_path }}}/grub.cfg | grep -v 'ipv6.disable=1'</pre>
|
||||
- This command should not return any output. If it does, update the configuration with one of following commands:
|
||||
- <pre>sudo grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre>
|
||||
- or
|
||||
- <pre>sudo /sbin/grubby --update-kernel=ALL --args="ipv6.disable=1"</pre>
|
||||
- <br />
|
||||
-{{% else %}}
|
||||
- Inspect the form of default GRUB2 command line for the Linux operating system
|
||||
- in <tt>{{{ grub2_boot_path }}}/grubenv</tt>. Check if it includes <tt>ipv6.disable=1</tt>.
|
||||
- <pre>sudo grep 'kernelopts.*ipv6.disable=1.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
- <br /><br />
|
||||
- To ensure <tt>ipv6.disable=1</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>sudo grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) ipv6.disable=1"</pre>
|
||||
- <br />
|
||||
-{{% endif %}}
|
||||
-
|
||||
+ {{{ ocil_grub2_argument("ipv6.disable=1") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
|
||||
index 3bf592fb4d8..1f4e183d9e7 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
|
||||
@@ -7,9 +7,8 @@ title: 'Enable page allocator poisoning'
|
||||
description: |-
|
||||
To enable poisoning of free pages,
|
||||
add the argument <tt>page_poison=1</tt> to the default
|
||||
- GRUB 2 command line for the Linux operating system in
|
||||
- <tt>/etc/default/grub</tt>, in the manner below:
|
||||
- <pre>GRUB_CMDLINE_LINUX="page_poison=1"</pre>
|
||||
+ GRUB 2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("page_poison=1") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
Poisoning writes an arbitrary value to freed pages, so any modification or
|
||||
@@ -35,15 +34,7 @@ references:
|
||||
ocil_clause: 'page allocator poisoning is not enabled'
|
||||
|
||||
ocil: |-
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. If they include <tt>page_poison=1</tt>,
|
||||
- then page poisoning is enabled at boot time.
|
||||
- <br /><br />
|
||||
- To ensure <tt>page_poison=1</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>$ sudo /sbin/grubby --update-kernel=ALL --args="page_poison=1</pre>
|
||||
- <br />
|
||||
+ {{{ ocil_grub2_argument("page_poison=1") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
|
||||
index 9964399650a..bb5dbc6c125 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
|
||||
@@ -7,9 +7,8 @@ title: 'Enable SLUB/SLAB allocator poisoning'
|
||||
description: |-
|
||||
To enable poisoning of SLUB/SLAB objects,
|
||||
add the argument <tt>slub_debug=P</tt> to the default
|
||||
- GRUB 2 command line for the Linux operating system in
|
||||
- <tt>/etc/default/grub</tt>, in the manner below:
|
||||
- <pre>GRUB_CMDLINE_LINUX="slub_debug=P"</pre>
|
||||
+ GRUB 2 command line for the Linux operating system.
|
||||
+ {{{ describe_grub2_argument("slub_debug=P") | indent(4) }}}
|
||||
|
||||
rationale: |-
|
||||
Poisoning writes an arbitrary value to freed objects, so any modification or
|
||||
@@ -35,15 +34,7 @@ references:
|
||||
ocil_clause: 'SLUB/SLAB poisoning is not enabled'
|
||||
|
||||
ocil: |-
|
||||
- Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
- in <tt>/etc/default/grub</tt>. If they include <tt>slub_debug=P</tt>,
|
||||
- then SLUB/SLAB poisoning is enabled at boot time.
|
||||
- <br /><br />
|
||||
- To ensure <tt>slub_debug=P</tt> is configured on all installed kernels, the
|
||||
- following command may be used:
|
||||
- <br />
|
||||
- <pre>$ sudo /sbin/grubby --update-kernel=ALL --args="slub_debug=P</pre>
|
||||
- <br />
|
||||
+ {{{ ocil_grub2_argument("slub_debug=P") | indent(4) }}}
|
||||
|
||||
warnings:
|
||||
- management: |-
|
||||
|
||||
From 5c39cf81d49f0eb5bb73337057fb95356784e5c6 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Wed, 9 Feb 2022 16:05:59 +0100
|
||||
Subject: [PATCH 5/8] fix an error in ubuntu version of macro
|
||||
|
||||
---
|
||||
shared/macros.jinja | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/macros.jinja b/shared/macros.jinja
|
||||
index 16a0404b668..54d2b299a47 100644
|
||||
--- a/shared/macros.jinja
|
||||
+++ b/shared/macros.jinja
|
||||
@@ -1660,7 +1660,7 @@ If this option is set to true, then check that a line is output by the following
|
||||
If the recovery is disabled, check the line with
|
||||
<pre>$ grep 'GRUB_CMDLINE_LINUX.*{{{ arg_name_value }}}.*' /etc/default/grub</pre>.
|
||||
{{%- if 'ubuntu' in product -%}}
|
||||
-Moreover, current Grub2 config file in <tt>/etc/grub2/grub.cfg</tt> must be checked.
|
||||
+Moreover, current Grub2 config file in <tt>{{{ grub2_boot_path }}}/grub.cfg</tt> must be checked.
|
||||
<pre># grep vmlinuz {{{ grub2_boot_path }}}/grub.cfg | grep -v '{{{ arg_name_value }}}'</pre>
|
||||
This command should not return any output.
|
||||
{{%- else -%}}
|
||||
|
||||
From f100d190833d168127715215e788347f806736f3 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Wed, 9 Feb 2022 16:16:21 +0100
|
||||
Subject: [PATCH 6/8] remove warnings from rules
|
||||
|
||||
they are no longer relevant, we do not use grub2-mkconfig anymore
|
||||
---
|
||||
.../auditing/grub2_audit_argument/rule.yml | 18 ------------------
|
||||
.../rule.yml | 18 ------------------
|
||||
.../grub2_pti_argument/rule.yml | 18 ------------------
|
||||
.../grub2_vsyscall_argument/rule.yml | 18 ------------------
|
||||
.../grub2_ipv6_disable_argument/rule.yml | 18 ------------------
|
||||
.../grub2_page_poison_argument/rule.yml | 18 ------------------
|
||||
.../grub2_slub_debug_argument/rule.yml | 18 ------------------
|
||||
7 files changed, 126 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
|
||||
index aff0521ee73..00a4ded2738 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
|
||||
@@ -54,24 +54,6 @@ ocil_clause: 'auditing is not enabled at boot time'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("audit=1") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command as <tt>root</tt>:
|
||||
- <pre>~]# grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command as <tt>root</tt>:
|
||||
-{{% if product in ["rhel7", "ol7", "rhel8", "ol8"] %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: grub2
|
||||
|
||||
template:
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
index 868d525014f..efbc3dae1c1 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
|
||||
@@ -41,24 +41,6 @@ ocil_clause: 'audit backlog limit is not configured'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("audit_backlog_limit=8192") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command as <tt>root</tt>:
|
||||
- <pre>~]# grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command as <tt>root</tt>:
|
||||
-{{% if product in ["rhel7", "rhel8", "ol7", "ol8"] %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: grub2
|
||||
|
||||
template:
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
|
||||
index 51b0a284746..52a308e3247 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
|
||||
@@ -34,24 +34,6 @@ ocil_clause: 'Kernel page-table isolation is not enabled'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("pti=on") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command as <tt>root</tt>:
|
||||
- <pre>~]# grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command as <tt>root</tt>:
|
||||
-{{% if product in ["rhel8", "ol8"] %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: machine
|
||||
|
||||
template:
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
index 1b88d13bd3c..93eb31dad7b 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
@@ -34,24 +34,6 @@ ocil_clause: 'vsyscalls are enabled'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("vsyscall=none") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command as <tt>root</tt>:
|
||||
- <pre>~]# grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command as <tt>root</tt>:
|
||||
-{{% if product in ["rhel7", "rhel8", "ol7", "ol8"] %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: machine
|
||||
|
||||
template:
|
||||
diff --git a/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml b/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml
|
||||
index c0fda343a1a..9e1ca48efe0 100644
|
||||
--- a/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/network/network-ipv6/disabling_ipv6/grub2_ipv6_disable_argument/rule.yml
|
||||
@@ -30,24 +30,6 @@ ocil_clause: 'IPv6 is not disabled'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("ipv6.disable=1") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command:
|
||||
- <pre>sudo grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command:
|
||||
-{{% if product in ["rhel7", "ol7", "rhel8", "ol8"] %}}
|
||||
- <pre>sudo grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>sudo grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: grub2
|
||||
|
||||
template:
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
|
||||
index 1f4e183d9e7..1ad6c6b3c44 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
|
||||
@@ -36,24 +36,6 @@ ocil_clause: 'page allocator poisoning is not enabled'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("page_poison=1") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command as <tt>root</tt>:
|
||||
- <pre>~]# grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command as <tt>root</tt>:
|
||||
-{{% if product in ["rhel7", "rhel8", "ol7", "ol8"] %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: grub2
|
||||
|
||||
template:
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
|
||||
index bb5dbc6c125..e40f5377c61 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
|
||||
@@ -36,24 +36,6 @@ ocil_clause: 'SLUB/SLAB poisoning is not enabled'
|
||||
ocil: |-
|
||||
{{{ ocil_grub2_argument("slub_debug=P") | indent(4) }}}
|
||||
|
||||
-warnings:
|
||||
- - management: |-
|
||||
- The GRUB 2 configuration file, <tt>grub.cfg</tt>,
|
||||
- is automatically updated each time a new kernel is installed. Note that any
|
||||
- changes to <tt>/etc/default/grub</tt> require rebuilding the <tt>grub.cfg</tt>
|
||||
- file. To update the GRUB 2 configuration file manually, use the
|
||||
- <pre>grub2-mkconfig -o</pre> command as follows:
|
||||
- <ul>
|
||||
- <li>On BIOS-based machines, issue the following command as <tt>root</tt>:
|
||||
- <pre>~]# grub2-mkconfig -o {{{ grub2_boot_path }}}/grub.cfg</pre></li>
|
||||
- <li>On UEFI-based machines, issue the following command as <tt>root</tt>:
|
||||
-{{% if product in ["rhel7", "rhel8", "ol7", "ol8"] %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg</pre></li>
|
||||
-{{% else %}}
|
||||
- <pre>~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg</pre></li>
|
||||
-{{% endif %}}
|
||||
- </ul>
|
||||
-
|
||||
platform: grub2
|
||||
|
||||
template:
|
||||
|
||||
From bbc3cc093004efd0457ccb33722a4fb14b0b2fb8 Mon Sep 17 00:00:00 2001
|
||||
From: vojtapolasek <krecoun@gmail.com>
|
||||
Date: Mon, 14 Feb 2022 14:29:15 +0100
|
||||
Subject: [PATCH 7/8] Update shared/macros.jinja
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
Co-authored-by: Matěj Týč <matej.tyc@gmail.com>
|
||||
---
|
||||
shared/macros.jinja | 7 ++++++-
|
||||
1 file changed, 6 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/macros.jinja b/shared/macros.jinja
|
||||
index 54d2b299a47..392181e2b24 100644
|
||||
--- a/shared/macros.jinja
|
||||
+++ b/shared/macros.jinja
|
||||
@@ -1671,7 +1671,12 @@ The command should not return any output.
|
||||
{{%- endif -%}}
|
||||
{{%- else -%}}
|
||||
Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
-in <tt>{{{ grub2_boot_path }}}/grubenv</tt>. If they include <tt>{{{ arg_name_value }}}</tt>, then the parameter
|
||||
+{{% if grub2_boot_path == grub2_uefi_boot_path or not grub2_uefi_boot_path -%}}
|
||||
+in <tt>{{{ grub2_boot_path }}}/grubenv</tt>.
|
||||
+{{%- else -%}}
|
||||
+in <tt>grubenv</tt> that can be found either in <tt>{{{ grub2_boot_path }}}</tt> in case of legacy BIOS systems, or in <tt>{{{ grub2_uefi_boot_path }}}</tt> in case of UEFI systems.
|
||||
+{{%- endif %}}
|
||||
+If they include <tt>{{{ arg_name_value }}}</tt>, then the parameter
|
||||
is configured at boot time.
|
||||
<pre># grep 'kernelopts.*{{{ arg_name_value }}}.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
{{%- endif -%}}
|
||||
|
||||
From 8121376668b43d21cf0f9700994bc011c3e313d7 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 15:17:33 +0100
|
||||
Subject: [PATCH 8/8] more modifications to description and ocil
|
||||
|
||||
final touches
|
||||
---
|
||||
shared/macros.jinja | 15 ++++++++++-----
|
||||
1 file changed, 10 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/shared/macros.jinja b/shared/macros.jinja
|
||||
index 392181e2b24..a89bac12f53 100644
|
||||
--- a/shared/macros.jinja
|
||||
+++ b/shared/macros.jinja
|
||||
@@ -1626,7 +1626,7 @@ The audit daemon must be restarted for the changes to take effect.
|
||||
The parameter should be in form `parameter=value`.
|
||||
#}}
|
||||
{{%- macro describe_grub2_argument(arg_name_value) -%}}
|
||||
-{{%- if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product -%}}
|
||||
+{{%- if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product -%}}
|
||||
To ensure that <tt>{{{ arg_name_value }}}</tt> is added as a kernel command line
|
||||
argument to newly installed kernels, ad <tt>{{{ arg_name_value }}}</tt> to the
|
||||
default Grub2 command line for Linux operating systems. Modify the line within
|
||||
@@ -1649,7 +1649,7 @@ Configure the default Grub2 kernel command line to contain {{{ arg_name_value }}
|
||||
The parameter should have form `parameter=value`.
|
||||
#}}
|
||||
{{%- macro ocil_grub2_argument(arg_name_value) -%}}
|
||||
-{{%- if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product -%}}
|
||||
+{{%- if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product -%}}
|
||||
Inspect the form of default GRUB 2 command line for the Linux operating system
|
||||
in <tt>/etc/default/grub</tt>. If it includes <tt>{{{ arg_name_value }}}</tt>,
|
||||
then the parameter will be configured for newly installed kernels.
|
||||
@@ -1660,8 +1660,12 @@ If this option is set to true, then check that a line is output by the following
|
||||
If the recovery is disabled, check the line with
|
||||
<pre>$ grep 'GRUB_CMDLINE_LINUX.*{{{ arg_name_value }}}.*' /etc/default/grub</pre>.
|
||||
{{%- if 'ubuntu' in product -%}}
|
||||
-Moreover, current Grub2 config file in <tt>{{{ grub2_boot_path }}}/grub.cfg</tt> must be checked.
|
||||
-<pre># grep vmlinuz {{{ grub2_boot_path }}}/grub.cfg | grep -v '{{{ arg_name_value }}}'</pre>
|
||||
+Moreover, current Grub config file <tt>grub.cfg</tt> must be checked. The file can be found
|
||||
+either in <tt>{{{ grub2_boot_path }}}</tt> in case of legacy BIOS systems, or in <tt>{{{ grub2_uefi_boot_path }}}</tt> in case of UEFI systems.
|
||||
+If they include <tt>{{{ arg_name_value }}}</tt>, then the parameter
|
||||
+is configured at boot time.
|
||||
+<pre># grep vmlinuz GRUB_CFG_FILE_PATH | grep -v '{{{ arg_name_value }}}'</pre>
|
||||
+Fill in <tt>GRUB_CFG_FILE_PATH</tt> based on information above.
|
||||
This command should not return any output.
|
||||
{{%- else -%}}
|
||||
Moreover, command line parameters for currently installed kernels should be checked as well.
|
||||
@@ -1678,6 +1682,7 @@ in <tt>grubenv</tt> that can be found either in <tt>{{{ grub2_boot_path }}}</tt>
|
||||
{{%- endif %}}
|
||||
If they include <tt>{{{ arg_name_value }}}</tt>, then the parameter
|
||||
is configured at boot time.
|
||||
-<pre># grep 'kernelopts.*{{{ arg_name_value }}}.*' {{{ grub2_boot_path }}}/grubenv</pre>
|
||||
+<pre># grep 'kernelopts.*{{{ arg_name_value }}}.*' GRUBENV_FILE_LOCATION</pre>
|
||||
+Fill in <tt>GRUBENV_FILE_LOCATION</tt> based on information above.
|
||||
{{%- endif -%}}
|
||||
{{%- endmacro -%}}
|
@ -1,842 +0,0 @@
|
||||
From 1bd88bbdc7ce8b6e2265f323cd3a777ef2240e6b Mon Sep 17 00:00:00 2001
|
||||
From: Matej Tyc <matyc@redhat.com>
|
||||
Date: Fri, 28 Jan 2022 17:11:56 +0100
|
||||
Subject: [PATCH 1/5] Change the grub2 bootloader argument template
|
||||
|
||||
- Introduce the concept of product-specific bootloader config
|
||||
properties that determine the check/remediation form.
|
||||
- Expand the RHEL8 remediation with a check for update of
|
||||
/etc/default/grub contents.
|
||||
- Add a RHEL8 check that looks for kernelopts references in loader entries.
|
||||
- Update tests.
|
||||
---
|
||||
.../grub2_entries_reference_kernelopts.xml | 25 +++++
|
||||
.../ansible.template | 35 ++++++-
|
||||
.../grub2_bootloader_argument/bash.template | 48 +++++++--
|
||||
.../grub2_bootloader_argument/oval.template | 97 +++++++++++++------
|
||||
.../arg_not_there_etcdefaultgrub.fail.sh | 2 +-
|
||||
....fail.sh => arg_not_there_grubenv.fail.sh} | 0
|
||||
6 files changed, 164 insertions(+), 43 deletions(-)
|
||||
create mode 100644 shared/checks/oval/grub2_entries_reference_kernelopts.xml
|
||||
rename shared/templates/grub2_bootloader_argument/tests/{arg_not_there.fail.sh => arg_not_there_grubenv.fail.sh} (100%)
|
||||
|
||||
diff --git a/shared/checks/oval/grub2_entries_reference_kernelopts.xml b/shared/checks/oval/grub2_entries_reference_kernelopts.xml
|
||||
new file mode 100644
|
||||
index 00000000000..1aec9fe64d2
|
||||
--- /dev/null
|
||||
+++ b/shared/checks/oval/grub2_entries_reference_kernelopts.xml
|
||||
@@ -0,0 +1,25 @@
|
||||
+<def-group>
|
||||
+ <definition class="compliance" id="grub2_entries_reference_kernelopts" version="2">
|
||||
+ {{{ oval_metadata(
|
||||
+ "Ensure that grubenv-defined kernel options are referenced in individual boot loader entries",
|
||||
+ title="Use $kernelopts in /boot/loader/entries/*.conf",
|
||||
+ affected_platforms=["multi_platform_all"]) }}}
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion test_ref="test_grub2_entries_reference_kernelopts"
|
||||
+ comment="check kernel command line parameters for referenced boot entries reference the $kernelopts variable." />
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ <ind:textfilecontent54_test id="test_grub2_entries_reference_kernelopts"
|
||||
+ comment="check kernel command line parameters for referenced boot entries reference the $kernelopts variable."
|
||||
+ check="all" check_existence="all_exist" version="1">
|
||||
+ <ind:object object_ref="object_grub2_entries_reference_kernelopts" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+
|
||||
+ <ind:textfilecontent54_object id="object_grub2_entries_reference_kernelopts" version="1">
|
||||
+ <ind:path>/boot/loader/entries/</ind:path>
|
||||
+ <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
+ <ind:pattern operation="pattern match">^options .*\b\$kernelopts\b.*$</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+</def-group>
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/ansible.template b/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
index 58d4fab69fa..de970879c8f 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
@@ -4,7 +4,34 @@
|
||||
# complexity = medium
|
||||
# disruption = low
|
||||
|
||||
-{{% if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product %}}
|
||||
+{{#
|
||||
+ See the OVAL template for more comments.
|
||||
+ Product-specific categorization should be synced across all template content types
|
||||
+-#}}
|
||||
+{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
+{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
+{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = false -%}}
|
||||
+{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
+
|
||||
+{{% if product in ["rhel9"] %}}
|
||||
+{{% set system_with_expanded_kernel_options_in_loader_entries = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel8"] %}}
|
||||
+{{% set system_with_referenced_kernel_options_in_loader_entries = true %}}
|
||||
+{{% set system_with_kernel_options_in_grubenv = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel7", "ol7"] or 'ubuntu' in product %}}
|
||||
+{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product %}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if system_with_kernel_options_in_etc_default_grub -%}}
|
||||
- name: Check {{{ ARG_NAME }}} argument exists
|
||||
command: grep 'GRUB_CMDLINE_LINUX.*{{{ ARG_NAME }}}=' /etc/default/grub
|
||||
failed_when: False
|
||||
@@ -27,7 +54,9 @@
|
||||
- name: Update bootloader menu
|
||||
command: /sbin/grubby --update-kernel=ALL --args="{{{ ARG_NAME_VALUE }}}"
|
||||
|
||||
-{{% else %}}
|
||||
+{{%- endif %}}
|
||||
+
|
||||
+{{% if system_with_kernel_options_in_grubenv -%}}
|
||||
|
||||
- name: Get current kernel parameters
|
||||
ansible.builtin.shell:
|
||||
@@ -50,4 +79,4 @@
|
||||
when:
|
||||
- kernelopts.rc != 0
|
||||
|
||||
-{{% endif %}}
|
||||
+{{%- endif %}}
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/bash.template b/shared/templates/grub2_bootloader_argument/bash.template
|
||||
index 631e686897e..817fd1fde23 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/bash.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/bash.template
|
||||
@@ -1,6 +1,41 @@
|
||||
# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv,multi_platform_ubuntu,multi_platform_sle
|
||||
+{{#
|
||||
+ See the OVAL template for more comments.
|
||||
+ Product-specific categorization should be synced across all template content types
|
||||
+-#}}
|
||||
|
||||
-{{% if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product %}}
|
||||
+{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
+{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
+{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = false -%}}
|
||||
+{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
+
|
||||
+{{% if product in ["rhel9"] %}}
|
||||
+{{% set system_with_expanded_kernel_options_in_loader_entries = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel8"] %}}
|
||||
+{{% set system_with_referenced_kernel_options_in_loader_entries = true %}}
|
||||
+{{% set system_with_kernel_options_in_grubenv = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel7", "ol7"] or 'ubuntu' in product %}}
|
||||
+{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product %}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = true %}}
|
||||
+{{% endif -%}}
|
||||
+
|
||||
+{{% macro update_etc_default_grub(arg_name_value) %}}
|
||||
+{{% if 'ubuntu' in product %}}
|
||||
+update-grub
|
||||
+{{% else %}}
|
||||
+grubby --update-kernel=ALL --args="{{{ arg_name_value }}}"
|
||||
+{{% endif %}}
|
||||
+{{% endmacro -%}}
|
||||
+
|
||||
+{{% if system_with_kernel_options_in_etc_default_grub %}}
|
||||
{{% if '/' in ARG_NAME %}}
|
||||
{{{ raise("ARG_NAME (" + ARG_NAME + ") uses sed path separator (/) in " + rule_id) }}}
|
||||
{{% elif '/' in ARG_NAME_VALUE %}}
|
||||
@@ -14,14 +49,11 @@ else
|
||||
# no {{{ ARG_NAME }}}=arg is present, append it
|
||||
sed -i 's/\(^GRUB_CMDLINE_LINUX=".*\)"/\1 {{{ ARG_NAME_VALUE }}}"/' '/etc/default/grub'
|
||||
fi
|
||||
-
|
||||
-{{% if 'ubuntu' in product %}}
|
||||
-update-grub
|
||||
-{{% else %}}
|
||||
-# Correct the form of kernel command line for each installed kernel in the bootloader
|
||||
-grubby --update-kernel=ALL --args="{{{ ARG_NAME_VALUE }}}"
|
||||
{{% endif %}}
|
||||
-{{% else %}}
|
||||
+
|
||||
+{{{ update_etc_default_grub(ARG_NAME_VALUE) }}}
|
||||
+
|
||||
+{{% if system_with_kernel_options_in_grubenv -%}}
|
||||
# Correct grub2 kernelopts value using grub2-editenv
|
||||
existing_kernelopts="$(grub2-editenv - list | grep kernelopts)"
|
||||
if ! printf '%s' "$existing_kernelopts" | grep -qE '^kernelopts=(.*\s)?{{{ ARG_NAME_VALUE }}}(\s.*)?$'; then
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/oval.template b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
index 3ea8acb2910..24258a3bcbd 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/oval.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
@@ -1,15 +1,53 @@
|
||||
+{{#-
|
||||
+ We set defaults to "off", and products should enable relevant ones depending on how the product configures grub.
|
||||
+ - /boot/loader/entries/* may not exist don't exist
|
||||
+ - If they exist, they can reference variables defined in grubenv, or they can contain literal args
|
||||
+ - The grub cfg may either use those loader entries, or it can contain literal values as well
|
||||
+ - Kernel opts can be stored in /etc/default/grub so they are persistent between kernel upgrades
|
||||
+-#}}
|
||||
+{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
+{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
+{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = false -%}}
|
||||
+{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
+
|
||||
+{{% if product in ["rhel9"] -%}}
|
||||
+{{% set system_with_expanded_kernel_options_in_loader_entries = true %}}
|
||||
+{{%- endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel8"] -%}}
|
||||
+{{% set system_with_referenced_kernel_options_in_loader_entries = true %}}
|
||||
+{{% set system_with_kernel_options_in_grubenv = true %}}
|
||||
+{{%- endif -%}}
|
||||
+
|
||||
+{{% if product in ["rhel7", "ol7"] or 'ubuntu' in product -%}}
|
||||
+{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
+{{%- endif -%}}
|
||||
+
|
||||
+{{%- if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product %}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = true %}}
|
||||
+{{%- endif -%}}
|
||||
+
|
||||
<def-group>
|
||||
<definition class="compliance" id="{{{ _RULE_ID }}}" version="2">
|
||||
{{{ oval_metadata("Ensure " + ARG_NAME_VALUE + " is configured in the kernel line in /etc/default/grub.") }}}
|
||||
<criteria operator="AND">
|
||||
- {{% if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product %}}
|
||||
- {{% if product in ['rhel9'] %}}
|
||||
+ {{% if system_with_kernel_options_in_grubenv -%}}
|
||||
+ <criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
+ comment="Check if {{{ ARG_NAME_VALUE }}} is present in the GRUB2 environment variable block in {{{ grub2_boot_path }}}/grubenv" />
|
||||
+ {{%- endif %}}
|
||||
+ {{% if system_with_referenced_kernel_options_in_loader_entries -%}}
|
||||
+ <extend_definition comment="check kernel command line parameters for referenced boot entries reference the $kernelopts variable" definition_ref="grub2_entries_reference_kernelopts" />
|
||||
+ {{%- endif %}}
|
||||
+ {{% if system_with_expanded_kernel_options_in_loader_entries -%}}
|
||||
<criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_entries"
|
||||
comment="Check if {{{ ARG_NAME_VALUE }}} is present in the boot parameters in the /boot/loader/entries/*.conf" />
|
||||
- {{% else %}}
|
||||
+ {{%- endif %}}
|
||||
+ {{% if system_with_expanded_kernel_options_in_grub_cfg -%}}
|
||||
<criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg"
|
||||
comment="Check if {{{ ARG_NAME_VALUE }}} is present in the boot parameters in the {{{ grub2_boot_path }}}/grub.cfg for all kernels" />
|
||||
- {{% endif %}}
|
||||
+ {{%- endif %}}
|
||||
+ {{% if system_with_kernel_options_in_etc_default_grub -%}}
|
||||
<criteria operator="OR">
|
||||
<criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument"
|
||||
comment="check for {{{ ARG_NAME_VALUE }}} in /etc/default/grub via GRUB_CMDLINE_LINUX" />
|
||||
@@ -20,14 +58,11 @@
|
||||
comment="Check GRUB_DISABLE_RECOVERY=true in /etc/default/grub" />
|
||||
</criteria>
|
||||
</criteria>
|
||||
- {{% else %}}
|
||||
- <criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
- comment="Check if {{{ ARG_NAME_VALUE }}} is present in the GRUB2 environment variable block in {{{ grub2_boot_path }}}/grubenv" />
|
||||
- {{% endif %}}
|
||||
+ {{%- endif %}}
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
-{{% if product in ["rhel7", "ol7", "rhel9"] or 'ubuntu' in product %}}
|
||||
+{{%- if system_with_kernel_options_in_etc_default_grub %}}
|
||||
<ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument"
|
||||
comment="check for {{{ ARG_NAME_VALUE }}} in /etc/default/grub via GRUB_CMDLINE_LINUX"
|
||||
check="all" check_existence="all_exist" version="1">
|
||||
@@ -54,8 +89,25 @@
|
||||
<ind:pattern operation="pattern match">^\s*GRUB_CMDLINE_LINUX_DEFAULT="(.*)"$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
+{{%- endif %}}
|
||||
+
|
||||
+{{%- if system_with_kernel_options_in_grubenv %}}
|
||||
+ <ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
+ comment="check for kernel command line parameters {{{ ARG_NAME_VALUE }}} in {{{ grub2_boot_path }}}/grubenv for all kernels"
|
||||
+ check="all" check_existence="all_exist" version="1">
|
||||
+ <ind:object object_ref="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env" />
|
||||
+ <ind:state state_ref="state_grub2_{{{ SANITIZED_ARG_NAME }}}_argument" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
|
||||
- {{% if product in ["rhel9"] %}}
|
||||
+ <ind:textfilecontent54_object id="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
+ version="1">
|
||||
+ <ind:filepath>{{{ grub2_boot_path }}}/grubenv</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^kernelopts=(.*)$</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+{{%- endif %}}
|
||||
+
|
||||
+{{%- if system_with_expanded_kernel_options_in_loader_entries %}}
|
||||
<ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_entries"
|
||||
comment="check kernel command line parameters for {{{ ARG_NAME_VALUE }}} for all boot entries."
|
||||
check="all" check_existence="all_exist" version="1">
|
||||
@@ -69,7 +121,9 @@
|
||||
<ind:pattern operation="pattern match">^options (.*)$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
- {{% else %}}
|
||||
+{{%- endif %}}
|
||||
+
|
||||
+{{%- if system_with_expanded_kernel_options_in_grub_cfg %}}
|
||||
<ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg"
|
||||
comment="check kernel command line parameters for {{{ ARG_NAME_VALUE }}} in {{{ grub2_boot_path }}}/grub.cfg for all kernels"
|
||||
check="all" check_existence="all_exist" version="1">
|
||||
@@ -87,26 +141,7 @@
|
||||
{{% endif %}}
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
-
|
||||
- {{% endif %}}
|
||||
-
|
||||
-{{% else %}}
|
||||
-
|
||||
- <ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
- comment="check forkernel command line parameters {{{ ARG_NAME_VALUE }}} in {{{ grub2_boot_path }}}/grubenv for all kernels"
|
||||
- check="all" check_existence="all_exist" version="1">
|
||||
- <ind:object object_ref="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env" />
|
||||
- <ind:state state_ref="state_grub2_{{{ SANITIZED_ARG_NAME }}}_argument" />
|
||||
- </ind:textfilecontent54_test>
|
||||
-
|
||||
- <ind:textfilecontent54_object id="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
- version="1">
|
||||
- <ind:filepath>{{{ grub2_boot_path }}}/grubenv</ind:filepath>
|
||||
- <ind:pattern operation="pattern match">^kernelopts=(.*)$</ind:pattern>
|
||||
- <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
- </ind:textfilecontent54_object>
|
||||
-
|
||||
-{{% endif %}}
|
||||
+{{%- endif %}}
|
||||
|
||||
<ind:textfilecontent54_state id="state_grub2_{{{ SANITIZED_ARG_NAME }}}_argument"
|
||||
version="1">
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/tests/arg_not_there_etcdefaultgrub.fail.sh b/shared/templates/grub2_bootloader_argument/tests/arg_not_there_etcdefaultgrub.fail.sh
|
||||
index a56e6d09235..a270be45952 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/tests/arg_not_there_etcdefaultgrub.fail.sh
|
||||
+++ b/shared/templates/grub2_bootloader_argument/tests/arg_not_there_etcdefaultgrub.fail.sh
|
||||
@@ -1,6 +1,6 @@
|
||||
#!/bin/bash
|
||||
|
||||
-# platform = Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9
|
||||
+# platform = Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9
|
||||
|
||||
# Removes argument from kernel command line in /etc/default/grub
|
||||
if grep -q '^GRUB_CMDLINE_LINUX=.*{{{ARG_NAME}}}=.*"' '/etc/default/grub' ; then
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/tests/arg_not_there.fail.sh b/shared/templates/grub2_bootloader_argument/tests/arg_not_there_grubenv.fail.sh
|
||||
similarity index 100%
|
||||
rename from shared/templates/grub2_bootloader_argument/tests/arg_not_there.fail.sh
|
||||
rename to shared/templates/grub2_bootloader_argument/tests/arg_not_there_grubenv.fail.sh
|
||||
|
||||
From 0d10bf751d5e1d7f024cd7301f8b02b38c0e3b9c Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Mat=C4=9Bj=20T=C3=BD=C4=8D?= <matyc@redhat.com>
|
||||
Date: Wed, 9 Feb 2022 11:19:06 +0100
|
||||
Subject: [PATCH 2/5] Change the default product setting
|
||||
|
||||
Assume that every product stores kernel opts in the /etc/default/grub
|
||||
---
|
||||
shared/templates/grub2_bootloader_argument/ansible.template | 6 +-----
|
||||
shared/templates/grub2_bootloader_argument/bash.template | 6 +-----
|
||||
shared/templates/grub2_bootloader_argument/oval.template | 6 +-----
|
||||
3 files changed, 3 insertions(+), 15 deletions(-)
|
||||
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/ansible.template b/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
index de970879c8f..46de9b465c2 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
@@ -11,7 +11,7 @@
|
||||
{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = false -%}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = true -%}}
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
|
||||
{{% if product in ["rhel9"] %}}
|
||||
@@ -27,10 +27,6 @@
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
{{% endif -%}}
|
||||
|
||||
-{{% if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product %}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
{{% if system_with_kernel_options_in_etc_default_grub -%}}
|
||||
- name: Check {{{ ARG_NAME }}} argument exists
|
||||
command: grep 'GRUB_CMDLINE_LINUX.*{{{ ARG_NAME }}}=' /etc/default/grub
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/bash.template b/shared/templates/grub2_bootloader_argument/bash.template
|
||||
index 817fd1fde23..b188d1e3689 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/bash.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/bash.template
|
||||
@@ -7,7 +7,7 @@
|
||||
{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = false -%}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = true -%}}
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
|
||||
{{% if product in ["rhel9"] %}}
|
||||
@@ -23,10 +23,6 @@
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
{{% endif -%}}
|
||||
|
||||
-{{% if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product %}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
{{% macro update_etc_default_grub(arg_name_value) %}}
|
||||
{{% if 'ubuntu' in product %}}
|
||||
update-grub
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/oval.template b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
index 24258a3bcbd..88fa7b7a3ee 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/oval.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
@@ -8,7 +8,7 @@
|
||||
{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = false -%}}
|
||||
+{{% set system_with_kernel_options_in_etc_default_grub = true -%}}
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
|
||||
{{% if product in ["rhel9"] -%}}
|
||||
@@ -24,10 +24,6 @@
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
{{%- endif -%}}
|
||||
|
||||
-{{%- if product in ["rhel7", "ol7", "rhel8", "ol8", "rhel9"] or 'ubuntu' in product %}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = true %}}
|
||||
-{{%- endif -%}}
|
||||
-
|
||||
<def-group>
|
||||
<definition class="compliance" id="{{{ _RULE_ID }}}" version="2">
|
||||
{{{ oval_metadata("Ensure " + ARG_NAME_VALUE + " is configured in the kernel line in /etc/default/grub.") }}}
|
||||
|
||||
From fac0aeb351d7acab1112482d11a0be73df662496 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Mat=C4=9Bj=20T=C3=BD=C4=8D?= <matyc@redhat.com>
|
||||
Date: Fri, 11 Feb 2022 14:55:53 +0100
|
||||
Subject: [PATCH 3/5] Improve the template further
|
||||
|
||||
- Fix the $kernelopts regex - $ is not a word char.
|
||||
- Use grubby exclusively on RHEL systems and structure remediations differently than OVAL checks
|
||||
- Exclude the rescue.conf loader entry from checks, as it is not a boot entry for general use.
|
||||
---
|
||||
.../grub2_entries_reference_kernelopts.xml | 2 +-
|
||||
.../ansible.template | 72 +------------------
|
||||
.../grub2_bootloader_argument/bash.template | 67 +++++------------
|
||||
.../grub2_bootloader_argument/oval.template | 7 +-
|
||||
.../tests/invalid_rescue.pass.sh | 6 ++
|
||||
tests/test_rule_in_container.sh | 2 +-
|
||||
6 files changed, 33 insertions(+), 123 deletions(-)
|
||||
create mode 100644 shared/templates/grub2_bootloader_argument/tests/invalid_rescue.pass.sh
|
||||
|
||||
diff --git a/shared/checks/oval/grub2_entries_reference_kernelopts.xml b/shared/checks/oval/grub2_entries_reference_kernelopts.xml
|
||||
index 1aec9fe64d2..30f3965a037 100644
|
||||
--- a/shared/checks/oval/grub2_entries_reference_kernelopts.xml
|
||||
+++ b/shared/checks/oval/grub2_entries_reference_kernelopts.xml
|
||||
@@ -19,7 +19,7 @@
|
||||
<ind:textfilecontent54_object id="object_grub2_entries_reference_kernelopts" version="1">
|
||||
<ind:path>/boot/loader/entries/</ind:path>
|
||||
<ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
- <ind:pattern operation="pattern match">^options .*\b\$kernelopts\b.*$</ind:pattern>
|
||||
+ <ind:pattern operation="pattern match">^options(?:\s+.*)?\s+\$kernelopts\b.*$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
</def-group>
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/ansible.template b/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
index 46de9b465c2..db3b4430d4b 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/ansible.template
|
||||
@@ -4,75 +4,5 @@
|
||||
# complexity = medium
|
||||
# disruption = low
|
||||
|
||||
-{{#
|
||||
- See the OVAL template for more comments.
|
||||
- Product-specific categorization should be synced across all template content types
|
||||
--#}}
|
||||
-{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
-{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
-{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = true -%}}
|
||||
-{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
-
|
||||
-{{% if product in ["rhel9"] %}}
|
||||
-{{% set system_with_expanded_kernel_options_in_loader_entries = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
-{{% if product in ["rhel8"] %}}
|
||||
-{{% set system_with_referenced_kernel_options_in_loader_entries = true %}}
|
||||
-{{% set system_with_kernel_options_in_grubenv = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
-{{% if product in ["rhel7", "ol7"] or 'ubuntu' in product %}}
|
||||
-{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
-{{% if system_with_kernel_options_in_etc_default_grub -%}}
|
||||
-- name: Check {{{ ARG_NAME }}} argument exists
|
||||
- command: grep 'GRUB_CMDLINE_LINUX.*{{{ ARG_NAME }}}=' /etc/default/grub
|
||||
- failed_when: False
|
||||
- register: argcheck
|
||||
-
|
||||
-- name: Replace existing {{{ ARG_NAME }}} argument
|
||||
- replace:
|
||||
- path: /etc/default/grub
|
||||
- regexp: '{{{ ARG_NAME }}}=\w+'
|
||||
- replace: '{{{ ARG_NAME_VALUE }}}'
|
||||
- when: argcheck.rc == 0
|
||||
-
|
||||
-- name: Add {{{ ARG_NAME }}} argument
|
||||
- replace:
|
||||
- path: /etc/default/grub
|
||||
- regexp: '(GRUB_CMDLINE_LINUX=.*)"'
|
||||
- replace: '\1 {{{ ARG_NAME_VALUE }}}"'
|
||||
- when: argcheck.rc != 0
|
||||
-
|
||||
-- name: Update bootloader menu
|
||||
+- name: Update grub defaults and the bootloader menu
|
||||
command: /sbin/grubby --update-kernel=ALL --args="{{{ ARG_NAME_VALUE }}}"
|
||||
-
|
||||
-{{%- endif %}}
|
||||
-
|
||||
-{{% if system_with_kernel_options_in_grubenv -%}}
|
||||
-
|
||||
-- name: Get current kernel parameters
|
||||
- ansible.builtin.shell:
|
||||
- cmd: '/usr/bin/grub2-editenv - list | grep "kernelopts="'
|
||||
- register: kernelopts
|
||||
- ignore_errors: yes
|
||||
- changed_when: False
|
||||
-
|
||||
-- name: Update the bootloader menu
|
||||
- command: /usr/bin/grub2-editenv - set "{{ item }} {{{ ARG_NAME_VALUE }}}"
|
||||
- with_items: "{{ kernelopts.stdout_lines | select('match', '^kernelopts.*') | list }}"
|
||||
- when:
|
||||
- - kernelopts.rc == 0
|
||||
- - kernelopts.stdout_lines is defined
|
||||
- - kernelopts.stdout_lines | length > 0
|
||||
- - kernelopts.stdout | regex_search('^kernelopts=(?:.*\s)?{{{ ARG_NAME_VALUE }}}(?:\s.*)?$', multiline=True) is none
|
||||
-
|
||||
-- name: Update the bootloader menu when there are no entries previously set
|
||||
- command: /usr/bin/grub2-editenv - set "kernelopts={{{ ARG_NAME_VALUE }}}"
|
||||
- when:
|
||||
- - kernelopts.rc != 0
|
||||
-
|
||||
-{{%- endif %}}
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/bash.template b/shared/templates/grub2_bootloader_argument/bash.template
|
||||
index b188d1e3689..5f97efd498f 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/bash.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/bash.template
|
||||
@@ -4,59 +4,28 @@
|
||||
Product-specific categorization should be synced across all template content types
|
||||
-#}}
|
||||
|
||||
-{{% set system_with_expanded_kernel_options_in_loader_entries = false -%}}
|
||||
-{{% set system_with_referenced_kernel_options_in_loader_entries = false -%}}
|
||||
-{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
-{{% set system_with_kernel_options_in_etc_default_grub = true -%}}
|
||||
-{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
+{{% set grub_helper_executable = "grubby" -%}}
|
||||
+{{% set grub_helper_args = ["--update-kernel=ALL", "--args=" ~ ARG_NAME_VALUE] -%}}
|
||||
|
||||
-{{% if product in ["rhel9"] %}}
|
||||
-{{% set system_with_expanded_kernel_options_in_loader_entries = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
-{{% if product in ["rhel8"] %}}
|
||||
-{{% set system_with_referenced_kernel_options_in_loader_entries = true %}}
|
||||
-{{% set system_with_kernel_options_in_grubenv = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
-{{% if product in ["rhel7", "ol7"] or 'ubuntu' in product %}}
|
||||
-{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
-{{% endif -%}}
|
||||
-
|
||||
-{{% macro update_etc_default_grub(arg_name_value) %}}
|
||||
-{{% if 'ubuntu' in product %}}
|
||||
-update-grub
|
||||
-{{% else %}}
|
||||
-grubby --update-kernel=ALL --args="{{{ arg_name_value }}}"
|
||||
-{{% endif %}}
|
||||
-{{% endmacro -%}}
|
||||
-
|
||||
-{{% if system_with_kernel_options_in_etc_default_grub %}}
|
||||
-{{% if '/' in ARG_NAME %}}
|
||||
-{{{ raise("ARG_NAME (" + ARG_NAME + ") uses sed path separator (/) in " + rule_id) }}}
|
||||
-{{% elif '/' in ARG_NAME_VALUE %}}
|
||||
-{{{ raise("ARG_NAME_VALUE (" + ARG_NAME_VALUE + ") uses sed path separator (/) in " + rule_id) }}}
|
||||
-{{% endif %}}
|
||||
+{{%- macro update_etc_default_grub_manually() -%}}
|
||||
# Correct the form of default kernel command line in GRUB
|
||||
if grep -q '^GRUB_CMDLINE_LINUX=.*{{{ ARG_NAME }}}=.*"' '/etc/default/grub' ; then
|
||||
- # modify the GRUB command-line if an {{{ ARG_NAME }}}= arg already exists
|
||||
- sed -i 's/\(^GRUB_CMDLINE_LINUX=".*\){{{ ARG_NAME }}}=[^[:space:]]*\(.*"\)/\1 {{{ ARG_NAME_VALUE }}} \2/' '/etc/default/grub'
|
||||
+ # modify the GRUB command-line if an {{{ ARG_NAME }}}= arg already exists
|
||||
+ sed -i 's/\(^GRUB_CMDLINE_LINUX=".*\){{{ ARG_NAME }}}=[^[:space:]]*\(.*"\)/\1 {{{ ARG_NAME_VALUE }}} \2/' '/etc/default/grub'
|
||||
else
|
||||
- # no {{{ ARG_NAME }}}=arg is present, append it
|
||||
- sed -i 's/\(^GRUB_CMDLINE_LINUX=".*\)"/\1 {{{ ARG_NAME_VALUE }}}"/' '/etc/default/grub'
|
||||
+ # no {{{ ARG_NAME }}}=arg is present, append it
|
||||
+ sed -i 's/\(^GRUB_CMDLINE_LINUX=".*\)"/\1 {{{ ARG_NAME_VALUE }}}"/' '/etc/default/grub'
|
||||
fi
|
||||
-{{% endif %}}
|
||||
+{{%- endmacro %}}
|
||||
+
|
||||
+{{% if 'ubuntu' in product %}}
|
||||
+{{{ update_etc_default_grub_manually() }}}
|
||||
+{{% set grub_helper_executable = "update-grub" -%}}
|
||||
+{{% endif -%}}
|
||||
|
||||
-{{{ update_etc_default_grub(ARG_NAME_VALUE) }}}
|
||||
+{{% if product in ["rhel8", "ol8"] %}}
|
||||
+{{# Suppress the None output of append -#}}
|
||||
+{{{ grub_helper_args.append("--env=/boot/grub2/grubenv") or "" -}}}
|
||||
+{{% endif -%}}
|
||||
|
||||
-{{% if system_with_kernel_options_in_grubenv -%}}
|
||||
-# Correct grub2 kernelopts value using grub2-editenv
|
||||
-existing_kernelopts="$(grub2-editenv - list | grep kernelopts)"
|
||||
-if ! printf '%s' "$existing_kernelopts" | grep -qE '^kernelopts=(.*\s)?{{{ ARG_NAME_VALUE }}}(\s.*)?$'; then
|
||||
- if test -n "$existing_kernelopts"; then
|
||||
- grub2-editenv - set "$existing_kernelopts {{{ ARG_NAME_VALUE }}}"
|
||||
- else
|
||||
- grub2-editenv - set "kernelopts={{{ ARG_NAME_VALUE }}}"
|
||||
- fi
|
||||
-fi
|
||||
-{{% endif %}}
|
||||
+{{{ grub_helper_executable }}} {{{ " ".join(grub_helper_args) }}}
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/oval.template b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
index 88fa7b7a3ee..6981cc14045 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/oval.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
@@ -1,6 +1,6 @@
|
||||
{{#-
|
||||
We set defaults to "off", and products should enable relevant ones depending on how the product configures grub.
|
||||
- - /boot/loader/entries/* may not exist don't exist
|
||||
+ - /boot/loader/entries/* may not exist.
|
||||
- If they exist, they can reference variables defined in grubenv, or they can contain literal args
|
||||
- The grub cfg may either use those loader entries, or it can contain literal values as well
|
||||
- Kernel opts can be stored in /etc/default/grub so they are persistent between kernel upgrades
|
||||
@@ -116,7 +116,12 @@
|
||||
<ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
<ind:pattern operation="pattern match">^options (.*)$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
+ <filter action="exclude">state_grub2_rescue_entry_for_{{{ _RULE_ID }}}</filter>
|
||||
</ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_state id="state_grub2_rescue_entry_for_{{{ _RULE_ID }}}" version="1">
|
||||
+ <ind:filename>rescue.conf</ind:filename>
|
||||
+ </ind:textfilecontent54_state>
|
||||
{{%- endif %}}
|
||||
|
||||
{{%- if system_with_expanded_kernel_options_in_grub_cfg %}}
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/tests/invalid_rescue.pass.sh b/shared/templates/grub2_bootloader_argument/tests/invalid_rescue.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..ee6e2c67f34
|
||||
--- /dev/null
|
||||
+++ b/shared/templates/grub2_bootloader_argument/tests/invalid_rescue.pass.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+# platform = Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9
|
||||
+# packages = grub2,grubby
|
||||
+
|
||||
+{{{ grub2_bootloader_argument_remediation(ARG_NAME, ARG_NAME_VALUE) }}}
|
||||
+
|
||||
+echo "I am an invalid boot entry, but nobody should care, because I am rescue" > /boot/loader/entries/trololol-rescue.conf
|
||||
diff --git a/tests/test_rule_in_container.sh b/tests/test_rule_in_container.sh
|
||||
index 395fc4e856c..a8691ca7463 100755
|
||||
--- a/tests/test_rule_in_container.sh
|
||||
+++ b/tests/test_rule_in_container.sh
|
||||
@@ -221,7 +221,7 @@ additional_args=()
|
||||
test "$_arg_dontclean" = on && additional_args+=(--dontclean)
|
||||
|
||||
# Don't act on the default value.
|
||||
-test -n "$_arg_scenarios" && additional_args+=(--scenario "'$_arg_scenarios'")
|
||||
+test -n "$_arg_scenarios" && additional_args+=(--scenario "$_arg_scenarios")
|
||||
|
||||
test -n "$_arg_datastream" && additional_args+=(--datastream "$_arg_datastream")
|
||||
|
||||
|
||||
From 8dda6030dea885c7c7e7e8f1024f5f2edf5bc36c Mon Sep 17 00:00:00 2001
|
||||
From: Matej Tyc <matyc@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 13:45:09 +0100
|
||||
Subject: [PATCH 4/5] Add support for checks of both BIOS/UEFI systems
|
||||
|
||||
---
|
||||
.../grub2_bootloader_argument/oval.template | 57 +++++++++++++++----
|
||||
1 file changed, 46 insertions(+), 11 deletions(-)
|
||||
|
||||
diff --git a/shared/templates/grub2_bootloader_argument/oval.template b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
index 6981cc14045..71367465663 100644
|
||||
--- a/shared/templates/grub2_bootloader_argument/oval.template
|
||||
+++ b/shared/templates/grub2_bootloader_argument/oval.template
|
||||
@@ -10,6 +10,7 @@
|
||||
{{% set system_with_kernel_options_in_grubenv = false -%}}
|
||||
{{% set system_with_kernel_options_in_etc_default_grub = true -%}}
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = false -%}}
|
||||
+{{% set system_with_bios_and_uefi_support = false -%}}
|
||||
|
||||
{{% if product in ["rhel9"] -%}}
|
||||
{{% set system_with_expanded_kernel_options_in_loader_entries = true %}}
|
||||
@@ -24,13 +25,25 @@
|
||||
{{% set system_with_expanded_kernel_options_in_grub_cfg = true %}}
|
||||
{{%- endif -%}}
|
||||
|
||||
+{{% if grub2_uefi_boot_path and grub2_uefi_boot_path != grub2_boot_path -%}}
|
||||
+{{% set system_with_bios_and_uefi_support = true %}}
|
||||
+{{%- endif -%}}
|
||||
+
|
||||
<def-group>
|
||||
<definition class="compliance" id="{{{ _RULE_ID }}}" version="2">
|
||||
{{{ oval_metadata("Ensure " + ARG_NAME_VALUE + " is configured in the kernel line in /etc/default/grub.") }}}
|
||||
<criteria operator="AND">
|
||||
{{% if system_with_kernel_options_in_grubenv -%}}
|
||||
+ {{% if system_with_bios_and_uefi_support -%}}
|
||||
+ <criteria operator="OR">
|
||||
+ {{%- endif %}}
|
||||
<criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
comment="Check if {{{ ARG_NAME_VALUE }}} is present in the GRUB2 environment variable block in {{{ grub2_boot_path }}}/grubenv" />
|
||||
+ {{% if system_with_bios_and_uefi_support -%}}
|
||||
+ <criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env_uefi"
|
||||
+ comment="Check if {{{ ARG_NAME_VALUE }}} is present in the GRUB2 environment variable block in {{{ grub2_uefi_boot_path }}}/grubenv" />
|
||||
+ </criteria>
|
||||
+ {{%- endif %}}
|
||||
{{%- endif %}}
|
||||
{{% if system_with_referenced_kernel_options_in_loader_entries -%}}
|
||||
<extend_definition comment="check kernel command line parameters for referenced boot entries reference the $kernelopts variable" definition_ref="grub2_entries_reference_kernelopts" />
|
||||
@@ -40,8 +53,16 @@
|
||||
comment="Check if {{{ ARG_NAME_VALUE }}} is present in the boot parameters in the /boot/loader/entries/*.conf" />
|
||||
{{%- endif %}}
|
||||
{{% if system_with_expanded_kernel_options_in_grub_cfg -%}}
|
||||
+ {{% if system_with_bios_and_uefi_support -%}}
|
||||
+ <criteria operator="OR">
|
||||
+ {{%- endif %}}
|
||||
<criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg"
|
||||
comment="Check if {{{ ARG_NAME_VALUE }}} is present in the boot parameters in the {{{ grub2_boot_path }}}/grub.cfg for all kernels" />
|
||||
+ {{% if system_with_bios_and_uefi_support -%}}
|
||||
+ <criterion test_ref="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg_uefi"
|
||||
+ comment="Check if {{{ ARG_NAME_VALUE }}} is present in the boot parameters in the {{{ grub2_uefi_boot_path }}}/grub.cfg for all kernels" />
|
||||
+ </criteria>
|
||||
+ {{%- endif %}}
|
||||
{{%- endif %}}
|
||||
{{% if system_with_kernel_options_in_etc_default_grub -%}}
|
||||
<criteria operator="OR">
|
||||
@@ -88,19 +109,26 @@
|
||||
{{%- endif %}}
|
||||
|
||||
{{%- if system_with_kernel_options_in_grubenv %}}
|
||||
- <ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
- comment="check for kernel command line parameters {{{ ARG_NAME_VALUE }}} in {{{ grub2_boot_path }}}/grubenv for all kernels"
|
||||
+{{%- macro test_and_object_for_kernel_options_grub_env(base_name, path) %}}
|
||||
+ <ind:textfilecontent54_test id="test_{{{ base_name }}}"
|
||||
+ comment="check for kernel command line parameters {{{ ARG_NAME_VALUE }}} in {{{ path }}} for all kernels"
|
||||
check="all" check_existence="all_exist" version="1">
|
||||
- <ind:object object_ref="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env" />
|
||||
+ <ind:object object_ref="object_{{{ base_name }}}" />
|
||||
<ind:state state_ref="state_grub2_{{{ SANITIZED_ARG_NAME }}}_argument" />
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_env"
|
||||
+ <ind:textfilecontent54_object id="object_{{{ base_name }}}"
|
||||
version="1">
|
||||
- <ind:filepath>{{{ grub2_boot_path }}}/grubenv</ind:filepath>
|
||||
+ <ind:filepath>{{{ path }}}</ind:filepath>
|
||||
<ind:pattern operation="pattern match">^kernelopts=(.*)$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
+{{%- endmacro %}}
|
||||
+
|
||||
+{{{ test_and_object_for_kernel_options_grub_env("grub2_" ~ SANITIZED_ARG_NAME ~ "_argument_grub_env", grub2_boot_path ~ "/grubenv") }}}
|
||||
+{{% if system_with_bios_and_uefi_support -%}}
|
||||
+{{{ test_and_object_for_kernel_options_grub_env("grub2_" ~ SANITIZED_ARG_NAME ~ "_argument_grub_env_uefi", grub2_uefi_boot_path ~ "/grubenv") }}}
|
||||
+{{%- endif %}}
|
||||
{{%- endif %}}
|
||||
|
||||
{{%- if system_with_expanded_kernel_options_in_loader_entries %}}
|
||||
@@ -120,21 +148,22 @@
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
<ind:textfilecontent54_state id="state_grub2_rescue_entry_for_{{{ _RULE_ID }}}" version="1">
|
||||
- <ind:filename>rescue.conf</ind:filename>
|
||||
+ <ind:filename operation="pattern match">.*rescue.conf$</ind:filename>
|
||||
</ind:textfilecontent54_state>
|
||||
{{%- endif %}}
|
||||
|
||||
{{%- if system_with_expanded_kernel_options_in_grub_cfg %}}
|
||||
- <ind:textfilecontent54_test id="test_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg"
|
||||
- comment="check kernel command line parameters for {{{ ARG_NAME_VALUE }}} in {{{ grub2_boot_path }}}/grub.cfg for all kernels"
|
||||
+{{%- macro test_and_object_for_kernel_options_grub_cfg(base_name, path) %}}
|
||||
+ <ind:textfilecontent54_test id="test_{{{ base_name }}}"
|
||||
+ comment="check kernel command line parameters for {{{ ARG_NAME_VALUE }}} in {{{ path }}} for all kernels"
|
||||
check="all" check_existence="all_exist" version="1">
|
||||
- <ind:object object_ref="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg" />
|
||||
+ <ind:object object_ref="object_{{{ base_name }}}" />
|
||||
<ind:state state_ref="state_grub2_{{{ SANITIZED_ARG_NAME }}}_argument" />
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_grub2_{{{ SANITIZED_ARG_NAME }}}_argument_grub_cfg"
|
||||
+ <ind:textfilecontent54_object id="object_{{{ base_name }}}"
|
||||
version="1">
|
||||
- <ind:filepath>{{{ grub2_boot_path }}}/grub.cfg</ind:filepath>
|
||||
+ <ind:filepath>{{{ path }}}</ind:filepath>
|
||||
{{% if product in ["rhel7"] or 'ubuntu' in product %}}
|
||||
<ind:pattern operation="pattern match">^.*/vmlinuz.*(root=.*)$</ind:pattern>
|
||||
{{% else %}}
|
||||
@@ -142,6 +171,12 @@
|
||||
{{% endif %}}
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
+{{%- endmacro %}}
|
||||
+
|
||||
+{{{ test_and_object_for_kernel_options_grub_cfg("grub2_" + SANITIZED_ARG_NAME + "_argument_grub_cfg", grub2_boot_path ~ "/grub.cfg") }}}
|
||||
+{{% if system_with_bios_and_uefi_support -%}}
|
||||
+{{{ test_and_object_for_kernel_options_grub_cfg("grub2_" + SANITIZED_ARG_NAME + "_argument_grub_cfg_uefi", grub2_uefi_boot_path ~ "/grub.cfg") }}}
|
||||
+{{%- endif %}}
|
||||
{{%- endif %}}
|
||||
|
||||
<ind:textfilecontent54_state id="state_grub2_{{{ SANITIZED_ARG_NAME }}}_argument"
|
||||
|
||||
From df44b5d7017328d05c0671397edcfed019a2a448 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Mat=C4=9Bj=20T=C3=BD=C4=8D?= <matyc@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 14:49:34 +0100
|
||||
Subject: [PATCH 5/5] Correct test scenario metadata
|
||||
|
||||
- Grubenv doesn't relate to anything else than RHEL8
|
||||
- The grubby remediation has different behavior in corner-cases
|
||||
that are technically unsupported, so the corresponding test scenario has been dropped.
|
||||
---
|
||||
.../grub2_audit_argument/tests/blank_grubenv_rhel8.fail.sh | 1 +
|
||||
.../auditing/grub2_audit_argument/tests/correct_grubenv.pass.sh | 2 +-
|
||||
2 files changed, 2 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_argument/tests/blank_grubenv_rhel8.fail.sh b/linux_os/guide/system/auditing/grub2_audit_argument/tests/blank_grubenv_rhel8.fail.sh
|
||||
index 5af2acc317e..956c8ac79fd 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_argument/tests/blank_grubenv_rhel8.fail.sh
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_argument/tests/blank_grubenv_rhel8.fail.sh
|
||||
@@ -1,6 +1,7 @@
|
||||
#!/bin/bash
|
||||
|
||||
# platform = Red Hat Enterprise Linux 8
|
||||
+# remediation = none
|
||||
|
||||
# Removes audit argument from kernel command line in /boot/grub2/grubenv
|
||||
file="/boot/grub2/grubenv"
|
||||
diff --git a/linux_os/guide/system/auditing/grub2_audit_argument/tests/correct_grubenv.pass.sh b/linux_os/guide/system/auditing/grub2_audit_argument/tests/correct_grubenv.pass.sh
|
||||
index 0ec9a1d6e38..9823b08dff9 100644
|
||||
--- a/linux_os/guide/system/auditing/grub2_audit_argument/tests/correct_grubenv.pass.sh
|
||||
+++ b/linux_os/guide/system/auditing/grub2_audit_argument/tests/correct_grubenv.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
#!/bin/bash
|
||||
-# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9
|
||||
+# platform = Red Hat Enterprise Linux 8
|
||||
|
||||
grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) audit=1"
|
@ -1,855 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/ansible/shared.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/ansible/shared.yml
|
||||
new file mode 100644
|
||||
index 00000000000..b44c91cbf4a
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/ansible/shared.yml
|
||||
@@ -0,0 +1,150 @@
|
||||
+# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel
|
||||
+# reboot = false
|
||||
+# strategy = configure
|
||||
+# complexity = low
|
||||
+# disruption = medium
|
||||
+
|
||||
+- name: Check for existing pam_pwquality.so entry
|
||||
+ ansible.builtin.lineinfile:
|
||||
+ path: "/etc/pam.d/password-auth"
|
||||
+ create: no
|
||||
+ regexp: '^password.*pam_pwquality.so.*'
|
||||
+ state: absent
|
||||
+ check_mode: true
|
||||
+ changed_when: false
|
||||
+ register: result_pam_pwquality_present
|
||||
+
|
||||
+- name: Check if system relies on authselect
|
||||
+ ansible.builtin.stat:
|
||||
+ path: /usr/bin/authselect
|
||||
+ register: result_authselect_present
|
||||
+
|
||||
+- name: "Remediation where authselect tool is present"
|
||||
+ block:
|
||||
+ - name: Check the integrity of the current authselect profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect check
|
||||
+ register: result_authselect_check_cmd
|
||||
+ changed_when: false
|
||||
+ ignore_errors: true
|
||||
+
|
||||
+ - name: Informative message based on the authselect integrity check result
|
||||
+ ansible.builtin.assert:
|
||||
+ that:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ fail_msg:
|
||||
+ - authselect integrity check failed. Remediation aborted!
|
||||
+ - This remediation could not be applied because the authselect profile is not intact.
|
||||
+ - It is not recommended to manually edit the PAM files when authselect is available.
|
||||
+ - In cases where the default authselect profile does not cover a specific demand, a custom authselect profile is recommended.
|
||||
+ success_msg:
|
||||
+ - authselect integrity check passed
|
||||
+
|
||||
+ - name: Get authselect current profile
|
||||
+ ansible.builtin.shell:
|
||||
+ cmd: authselect current -r | awk '{ print $1 }'
|
||||
+ register: result_authselect_profile
|
||||
+ changed_when: false
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+
|
||||
+ - name: Define the current authselect profile as a local fact
|
||||
+ ansible.builtin.set_fact:
|
||||
+ authselect_current_profile: "{{ result_authselect_profile.stdout }}"
|
||||
+ authselect_custom_profile: "{{ result_authselect_profile.stdout }}"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_authselect_profile.stdout is match("custom/")
|
||||
+
|
||||
+ - name: Define the new authselect custom profile as a local fact
|
||||
+ ansible.builtin.set_fact:
|
||||
+ authselect_current_profile: "{{ result_authselect_profile.stdout }}"
|
||||
+ authselect_custom_profile: "custom/hardening"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_authselect_profile.stdout is not match("custom/")
|
||||
+
|
||||
+ - name: Get authselect current features to also enable them in the custom profile
|
||||
+ ansible.builtin.shell:
|
||||
+ cmd: authselect current | tail -n+3 | awk '{ print $2 }'
|
||||
+ register: result_authselect_features
|
||||
+ changed_when: false
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+
|
||||
+ - name: Check if any custom profile with the same name was already created in the past
|
||||
+ ansible.builtin.stat:
|
||||
+ path: /etc/authselect/{{ authselect_custom_profile }}
|
||||
+ register: result_authselect_custom_profile_present
|
||||
+ changed_when: false
|
||||
+ when:
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+
|
||||
+ - name: Create a custom profile based on the current profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect create-profile hardening -b sssd
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+ - not result_authselect_custom_profile_present.stat.exists
|
||||
+
|
||||
+ - name: Ensure the desired configuration is present in the custom profile
|
||||
+ ansible.builtin.lineinfile:
|
||||
+ dest: "/etc/authselect/{{ authselect_custom_profile }}/password-auth"
|
||||
+ insertbefore: ^password.*sufficient.*pam_unix.so.*
|
||||
+ line: "password requisite pam_pwquality.so"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_pam_pwquality_present.found == 0
|
||||
+
|
||||
+ - name: Ensure a backup of current authselect profile before selecting the custom profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect apply-changes -b --backup=before-pwquality-hardening.backup
|
||||
+ register: result_authselect_backup
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+ - authselect_custom_profile is not match(authselect_current_profile)
|
||||
+
|
||||
+ - name: Ensure the custom profile is selected
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect select {{ authselect_custom_profile }} --force
|
||||
+ register: result_pam_authselect_select_profile
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+ - authselect_custom_profile is not match(authselect_current_profile)
|
||||
+
|
||||
+ - name: Restore the authselect features in the custom profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect enable-feature {{ item }}
|
||||
+ loop: "{{ result_authselect_features.stdout_lines }}"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_authselect_features is not skipped
|
||||
+ - result_pam_authselect_select_profile is not skipped
|
||||
+
|
||||
+ - name: Ensure the custom profile changes are applied
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect apply-changes -b --backup=after-pwquality-hardening.backup
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ when:
|
||||
+ - result_authselect_present.stat.exists
|
||||
+
|
||||
+# For systems without authselect
|
||||
+- name: "Remediation where authselect tool is not present and PAM files are directly edited"
|
||||
+ block:
|
||||
+ - name: Ensure the desired configuration is present in the custom profile
|
||||
+ ansible.builtin.lineinfile:
|
||||
+ dest: "/etc/pam.d/password-auth"
|
||||
+ insertbefore: ^password.*sufficient.*pam_unix.so.*
|
||||
+ line: "password requisite pam_pwquality.so"
|
||||
+ when:
|
||||
+ - result_pam_pwquality_present.found == 0
|
||||
+ when:
|
||||
+ - not result_authselect_present.stat.exists
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/bash/shared.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/bash/shared.sh
|
||||
new file mode 100644
|
||||
index 00000000000..d2fca2a79ca
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/bash/shared.sh
|
||||
@@ -0,0 +1,41 @@
|
||||
+# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel
|
||||
+
|
||||
+PAM_FILE="password-auth"
|
||||
+
|
||||
+if [ -f /usr/bin/authselect ]; then
|
||||
+ if authselect check; then
|
||||
+ CURRENT_PROFILE=$(authselect current -r | awk '{ print $1 }')
|
||||
+ # Standard profiles delivered with authselect should not be modified.
|
||||
+ # If not already in use, a custom profile is created preserving the enabled features.
|
||||
+ if [[ ! $CURRENT_PROFILE == custom/* ]]; then
|
||||
+ ENABLED_FEATURES=$(authselect current | tail -n+3 | awk '{ print $2 }')
|
||||
+ authselect create-profile hardening -b $CURRENT_PROFILE
|
||||
+ CURRENT_PROFILE="custom/hardening"
|
||||
+ # Ensure a backup before changing the profile
|
||||
+ authselect apply-changes -b --backup=before-pwquality-hardening.backup
|
||||
+ authselect select $CURRENT_PROFILE
|
||||
+ for feature in $ENABLED_FEATURES; do
|
||||
+ authselect enable-feature $feature;
|
||||
+ done
|
||||
+ fi
|
||||
+ # Include the desired configuration in the custom profile
|
||||
+ CUSTOM_FILE="/etc/authselect/$CURRENT_PROFILE/$PAM_FILE"
|
||||
+ # The line should be included on the top password section
|
||||
+ if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $CUSTOM_FILE) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $CUSTOM_FILE
|
||||
+ fi
|
||||
+ authselect apply-changes -b --backup=after-pwquality-hardening.backup
|
||||
+ else
|
||||
+ echo "
|
||||
+authselect integrity check failed. Remediation aborted!
|
||||
+This remediation could not be applied because the authselect profile is not intact.
|
||||
+It is not recommended to manually edit the PAM files when authselect is available.
|
||||
+In cases where the default authselect profile does not cover a specific demand, a custom authselect profile is recommended."
|
||||
+ false
|
||||
+ fi
|
||||
+else
|
||||
+ FILE_PATH="/etc/pam.d/$PAM_FILE"
|
||||
+ if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $FILE_PATH) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $FILE_PATH
|
||||
+ fi
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/oval/shared.xml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/oval/shared.xml
|
||||
new file mode 100644
|
||||
index 00000000000..84f32456beb
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/oval/shared.xml
|
||||
@@ -0,0 +1,21 @@
|
||||
+<def-group>
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}" version="1">
|
||||
+ {{{ oval_metadata("The PAM module pam_pwquality is used in password-auth") }}}
|
||||
+ <criteria comment="Condition for pam_pwquality in password-auth is satisfied">
|
||||
+ <criterion comment="pam_pwquality password-auth"
|
||||
+ test_ref="test_accounts_password_pam_pwquality_password_auth"/>
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ <ind:textfilecontent54_object id="object_accounts_password_pam_pwquality_password_auth" version="1">
|
||||
+ <ind:filepath>/etc/pam.d/password-auth</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^password[\s]*requisite[\s]*pam_pwquality\.so</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="equals">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists" version="1"
|
||||
+ id="test_accounts_password_pam_pwquality_password_auth"
|
||||
+ comment="check the configuration of /etc/pam.d/password-auth">
|
||||
+ <ind:object object_ref="object_accounts_password_pam_pwquality_password_auth"/>
|
||||
+ </ind:textfilecontent54_test>
|
||||
+</def-group>
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..6c7bb1ad7a0
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/rule.yml
|
||||
@@ -0,0 +1,35 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: fedora,rhel7,rhel8,rhel9,rhv4
|
||||
+
|
||||
+title: 'Ensure PAM password complexity module is enabled in password-auth'
|
||||
+
|
||||
+description: |-
|
||||
+ To enable PAM password complexity in password-auth file:
|
||||
+ Edit the <tt>password</tt> section in
|
||||
+ <tt>/etc/pam.d/password-auth</tt> to show
|
||||
+ <tt>password requisite pam_pwquality.so</tt>.
|
||||
+
|
||||
+rationale: |-
|
||||
+ Enabling PAM password complexity permits to enforce strong passwords and consequently
|
||||
+ makes the system less prone to dictionary attacks.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel7: CCE-85876-1
|
||||
+ cce@rhel8: CCE-85877-9
|
||||
+ cce@rhel9: CCE-85878-7
|
||||
+
|
||||
+references:
|
||||
+ stigid@rhel8: RHEL-08-020100
|
||||
+
|
||||
+ocil_clause: 'pam_pwquality.so is not enabled in password-auth'
|
||||
+
|
||||
+ocil: |-
|
||||
+ To check if pam_pwhistory.so is enabled in password-auth, run the following command:
|
||||
+ <pre>$ grep pam_pwquality /etc/pam.d/password-auth</pre></pre>
|
||||
+ The output should be similar to the following:
|
||||
+ <pre>password requisite pam_pwquality.so</pre>
|
||||
+
|
||||
+platform: pam
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_commented_entry.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_commented_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..3d696c36b76
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_commented_entry.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+
|
||||
+authselect create-profile hardening -b sssd
|
||||
+CUSTOM_PROFILE="custom/hardening"
|
||||
+authselect select $CUSTOM_PROFILE --force
|
||||
+
|
||||
+CUSTOM_SYSTEM_AUTH="/etc/authselect/$CUSTOM_PROFILE/password-auth"
|
||||
+sed -i --follow-symlinks -e '/^password\s*requisite\s*pam_pwquality\.so/ s/^#*/#/g' $CUSTOM_SYSTEM_AUTH
|
||||
+authselect apply-changes -b
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_correct_entry.pass.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_correct_entry.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..0435899262b
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_correct_entry.pass.sh
|
||||
@@ -0,0 +1,13 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+
|
||||
+authselect create-profile hardening -b sssd
|
||||
+CUSTOM_PROFILE="custom/hardening"
|
||||
+authselect select $CUSTOM_PROFILE --force
|
||||
+
|
||||
+CUSTOM_SYSTEM_AUTH="/etc/authselect/$CUSTOM_PROFILE/password-auth"
|
||||
+if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $CUSTOM_SYSTEM_AUTH) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $CUSTOM_SYSTEM_AUTH
|
||||
+fi
|
||||
+authselect apply-changes -b
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_missing_entry.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_missing_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..472616a51f6
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_missing_entry.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+
|
||||
+authselect create-profile hardening -b sssd
|
||||
+CUSTOM_PROFILE="custom/hardening"
|
||||
+authselect select $CUSTOM_PROFILE --force
|
||||
+
|
||||
+CUSTOM_SYSTEM_AUTH="/etc/authselect/$CUSTOM_PROFILE/password-auth"
|
||||
+sed -i --follow-symlinks '/^password\s*requisite\s*pam_pwquality\.so/d' $CUSTOM_SYSTEM_AUTH
|
||||
+authselect apply-changes -b
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_modified_pam.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_modified_pam.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..59f9d6f77c4
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/authselect_modified_pam.fail.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+# remediation = none
|
||||
+
|
||||
+SYSTEM_AUTH_FILE="/etc/pam.d/password-auth"
|
||||
+
|
||||
+# This modification will break the integrity checks done by authselect.
|
||||
+sed -i --follow-symlinks -e '/^password\s*requisite\s*pam_pwquality\.so/ s/^#*/#/g' $SYSTEM_AUTH_FILE
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/correct_entry.pass.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/correct_entry.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..71f87b19045
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/correct_entry.pass.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+# packages = pam
|
||||
+# platform = Red Hat Enterprise Linux 7,Red Hat Virtualization 4,multi_platform_fedora
|
||||
+
|
||||
+config_file=/etc/pam.d/password-auth
|
||||
+if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $config_file) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $config_file
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/missing_entry.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/missing_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..95b73b24d26
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_password_auth/tests/missing_entry.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+# platform = Red Hat Enterprise Linux 7,Red Hat Virtualization 4,multi_platform_fedora
|
||||
+# packages = pam
|
||||
+
|
||||
+config_file=/etc/pam.d/password-auth
|
||||
+
|
||||
+sed -i --follow-symlinks '/^password\s*requisite\s*pam_pwquality\.so/d' $config_file
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/ansible/shared.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/ansible/shared.yml
|
||||
new file mode 100644
|
||||
index 00000000000..13cd20458ed
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/ansible/shared.yml
|
||||
@@ -0,0 +1,150 @@
|
||||
+# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel
|
||||
+# reboot = false
|
||||
+# strategy = configure
|
||||
+# complexity = low
|
||||
+# disruption = medium
|
||||
+
|
||||
+- name: Check for existing pam_pwquality.so entry
|
||||
+ ansible.builtin.lineinfile:
|
||||
+ path: "/etc/pam.d/system-auth"
|
||||
+ create: no
|
||||
+ regexp: '^password.*pam_pwquality.so.*'
|
||||
+ state: absent
|
||||
+ check_mode: true
|
||||
+ changed_when: false
|
||||
+ register: result_pam_pwquality_present
|
||||
+
|
||||
+- name: Check if system relies on authselect
|
||||
+ ansible.builtin.stat:
|
||||
+ path: /usr/bin/authselect
|
||||
+ register: result_authselect_present
|
||||
+
|
||||
+- name: "Remediation where authselect tool is present"
|
||||
+ block:
|
||||
+ - name: Check the integrity of the current authselect profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect check
|
||||
+ register: result_authselect_check_cmd
|
||||
+ changed_when: false
|
||||
+ ignore_errors: true
|
||||
+
|
||||
+ - name: Informative message based on the authselect integrity check result
|
||||
+ ansible.builtin.assert:
|
||||
+ that:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ fail_msg:
|
||||
+ - authselect integrity check failed. Remediation aborted!
|
||||
+ - This remediation could not be applied because the authselect profile is not intact.
|
||||
+ - It is not recommended to manually edit the PAM files when authselect is available.
|
||||
+ - In cases where the default authselect profile does not cover a specific demand, a custom authselect profile is recommended.
|
||||
+ success_msg:
|
||||
+ - authselect integrity check passed
|
||||
+
|
||||
+ - name: Get authselect current profile
|
||||
+ ansible.builtin.shell:
|
||||
+ cmd: authselect current -r | awk '{ print $1 }'
|
||||
+ register: result_authselect_profile
|
||||
+ changed_when: false
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+
|
||||
+ - name: Define the current authselect profile as a local fact
|
||||
+ ansible.builtin.set_fact:
|
||||
+ authselect_current_profile: "{{ result_authselect_profile.stdout }}"
|
||||
+ authselect_custom_profile: "{{ result_authselect_profile.stdout }}"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_authselect_profile.stdout is match("custom/")
|
||||
+
|
||||
+ - name: Define the new authselect custom profile as a local fact
|
||||
+ ansible.builtin.set_fact:
|
||||
+ authselect_current_profile: "{{ result_authselect_profile.stdout }}"
|
||||
+ authselect_custom_profile: "custom/hardening"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_authselect_profile.stdout is not match("custom/")
|
||||
+
|
||||
+ - name: Get authselect current features to also enable them in the custom profile
|
||||
+ ansible.builtin.shell:
|
||||
+ cmd: authselect current | tail -n+3 | awk '{ print $2 }'
|
||||
+ register: result_authselect_features
|
||||
+ changed_when: false
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+
|
||||
+ - name: Check if any custom profile with the same name was already created in the past
|
||||
+ ansible.builtin.stat:
|
||||
+ path: /etc/authselect/{{ authselect_custom_profile }}
|
||||
+ register: result_authselect_custom_profile_present
|
||||
+ changed_when: false
|
||||
+ when:
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+
|
||||
+ - name: Create a custom profile based on the current profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect create-profile hardening -b sssd
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+ - not result_authselect_custom_profile_present.stat.exists
|
||||
+
|
||||
+ - name: Ensure the desired configuration is present in the custom profile
|
||||
+ ansible.builtin.lineinfile:
|
||||
+ dest: "/etc/authselect/{{ authselect_custom_profile }}/system-auth"
|
||||
+ insertbefore: ^password.*sufficient.*pam_unix.so.*
|
||||
+ line: "password requisite pam_pwquality.so"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_pam_pwquality_present.found == 0
|
||||
+
|
||||
+ - name: Ensure a backup of current authselect profile before selecting the custom profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect apply-changes -b --backup=before-pwquality-hardening.backup
|
||||
+ register: result_authselect_backup
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+ - authselect_custom_profile is not match(authselect_current_profile)
|
||||
+
|
||||
+ - name: Ensure the custom profile is selected
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect select {{ authselect_custom_profile }} --force
|
||||
+ register: result_pam_authselect_select_profile
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - authselect_current_profile is not match("custom/")
|
||||
+ - authselect_custom_profile is not match(authselect_current_profile)
|
||||
+
|
||||
+ - name: Restore the authselect features in the custom profile
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect enable-feature {{ item }}
|
||||
+ loop: "{{ result_authselect_features.stdout_lines }}"
|
||||
+ when:
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ - result_authselect_features is not skipped
|
||||
+ - result_pam_authselect_select_profile is not skipped
|
||||
+
|
||||
+ - name: Ensure the custom profile changes are applied
|
||||
+ ansible.builtin.command:
|
||||
+ cmd: authselect apply-changes -b --backup=after-pwquality-hardening.backup
|
||||
+ when:
|
||||
+ - result_authselect_check_cmd is success
|
||||
+ - result_authselect_profile is not skipped
|
||||
+ when:
|
||||
+ - result_authselect_present.stat.exists
|
||||
+
|
||||
+# For systems without authselect
|
||||
+- name: "Remediation where authselect tool is not present and PAM files are directly edited"
|
||||
+ block:
|
||||
+ - name: Ensure the desired configuration is present in the custom profile
|
||||
+ ansible.builtin.lineinfile:
|
||||
+ dest: "/etc/pam.d/system-auth"
|
||||
+ insertbefore: ^password.*sufficient.*pam_unix.so.*
|
||||
+ line: "password requisite pam_pwquality.so"
|
||||
+ when:
|
||||
+ - result_pam_pwquality_present.found == 0
|
||||
+ when:
|
||||
+ - not result_authselect_present.stat.exists
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/bash/shared.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/bash/shared.sh
|
||||
new file mode 100644
|
||||
index 00000000000..9a7972a3f93
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/bash/shared.sh
|
||||
@@ -0,0 +1,41 @@
|
||||
+# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel
|
||||
+
|
||||
+PAM_FILE="system-auth"
|
||||
+
|
||||
+if [ -f /usr/bin/authselect ]; then
|
||||
+ if authselect check; then
|
||||
+ CURRENT_PROFILE=$(authselect current -r | awk '{ print $1 }')
|
||||
+ # Standard profiles delivered with authselect should not be modified.
|
||||
+ # If not already in use, a custom profile is created preserving the enabled features.
|
||||
+ if [[ ! $CURRENT_PROFILE == custom/* ]]; then
|
||||
+ ENABLED_FEATURES=$(authselect current | tail -n+3 | awk '{ print $2 }')
|
||||
+ authselect create-profile hardening -b $CURRENT_PROFILE
|
||||
+ CURRENT_PROFILE="custom/hardening"
|
||||
+ # Ensure a backup before changing the profile
|
||||
+ authselect apply-changes -b --backup=before-pwquality-hardening.backup
|
||||
+ authselect select $CURRENT_PROFILE
|
||||
+ for feature in $ENABLED_FEATURES; do
|
||||
+ authselect enable-feature $feature;
|
||||
+ done
|
||||
+ fi
|
||||
+ # Include the desired configuration in the custom profile
|
||||
+ CUSTOM_FILE="/etc/authselect/$CURRENT_PROFILE/$PAM_FILE"
|
||||
+ # The line should be included on the top password section
|
||||
+ if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $CUSTOM_FILE) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $CUSTOM_FILE
|
||||
+ fi
|
||||
+ authselect apply-changes -b --backup=after-pwquality-hardening.backup
|
||||
+ else
|
||||
+ echo "
|
||||
+authselect integrity check failed. Remediation aborted!
|
||||
+This remediation could not be applied because the authselect profile is not intact.
|
||||
+It is not recommended to manually edit the PAM files when authselect is available.
|
||||
+In cases where the default authselect profile does not cover a specific demand, a custom authselect profile is recommended."
|
||||
+ false
|
||||
+ fi
|
||||
+else
|
||||
+ FILE_PATH="/etc/pam.d/$PAM_FILE"
|
||||
+ if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $FILE_PATH) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $FILE_PATH
|
||||
+ fi
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/oval/shared.xml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/oval/shared.xml
|
||||
new file mode 100644
|
||||
index 00000000000..f8d241f1ff2
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/oval/shared.xml
|
||||
@@ -0,0 +1,21 @@
|
||||
+<def-group>
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}" version="1">
|
||||
+ {{{ oval_metadata("The PAM module pam_pwquality is used in system-auth") }}}
|
||||
+ <criteria comment="Condition for pam_pwquality in system-auth is satisfied">
|
||||
+ <criterion comment="pam_pwquality system-auth"
|
||||
+ test_ref="test_accounts_password_pam_pwquality_system_auth"/>
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ <ind:textfilecontent54_object id="object_accounts_password_pam_pwquality_system_auth" version="1">
|
||||
+ <ind:filepath>/etc/pam.d/system-auth</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^password[\s]*requisite[\s]*pam_pwquality\.so</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="equals">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists" version="1"
|
||||
+ id="test_accounts_password_pam_pwquality_system_auth"
|
||||
+ comment="check the configuration of /etc/pam.d/system-auth">
|
||||
+ <ind:object object_ref="object_accounts_password_pam_pwquality_system_auth"/>
|
||||
+ </ind:textfilecontent54_test>
|
||||
+</def-group>
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..ea42ff9b07a
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/rule.yml
|
||||
@@ -0,0 +1,35 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: fedora,rhel7,rhel8,rhel9,rhv4
|
||||
+
|
||||
+title: 'Ensure PAM password complexity module is enabled in system-auth'
|
||||
+
|
||||
+description: |-
|
||||
+ To enable PAM password complexity in system-auth file:
|
||||
+ Edit the <tt>password</tt> section in
|
||||
+ <tt>/etc/pam.d/system-auth</tt> to show
|
||||
+ <tt>password requisite pam_pwquality.so</tt>.
|
||||
+
|
||||
+rationale: |-
|
||||
+ Enabling PAM password complexity permits to enforce strong passwords and consequently
|
||||
+ makes the system less prone to dictionary attacks.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel7: CCE-85874-6
|
||||
+ cce@rhel8: CCE-85872-0
|
||||
+ cce@rhel9: CCE-85873-8
|
||||
+
|
||||
+references:
|
||||
+ stigid@rhel8: RHEL-08-020101
|
||||
+
|
||||
+ocil_clause: 'pam_pwquality.so is not enabled in system-auth'
|
||||
+
|
||||
+ocil: |-
|
||||
+ To check if pam_pwhistory.so is enabled in system-auth, run the following command:
|
||||
+ <pre>$ grep pam_pwquality /etc/pam.d/system-auth</pre></pre>
|
||||
+ The output should be similar to the following:
|
||||
+ <pre>password requisite pam_pwquality.so</pre>
|
||||
+
|
||||
+platform: pam
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_commented_entry.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_commented_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..849f16d0f93
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_commented_entry.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+
|
||||
+authselect create-profile hardening -b sssd
|
||||
+CUSTOM_PROFILE="custom/hardening"
|
||||
+authselect select $CUSTOM_PROFILE --force
|
||||
+
|
||||
+CUSTOM_SYSTEM_AUTH="/etc/authselect/$CUSTOM_PROFILE/system-auth"
|
||||
+sed -i --follow-symlinks -e '/^password\s*requisite\s*pam_pwquality\.so/ s/^#*/#/g' $CUSTOM_SYSTEM_AUTH
|
||||
+authselect apply-changes -b
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_correct_entry.pass.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_correct_entry.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..6a98c244980
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_correct_entry.pass.sh
|
||||
@@ -0,0 +1,13 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+
|
||||
+authselect create-profile hardening -b sssd
|
||||
+CUSTOM_PROFILE="custom/hardening"
|
||||
+authselect select $CUSTOM_PROFILE --force
|
||||
+
|
||||
+CUSTOM_SYSTEM_AUTH="/etc/authselect/$CUSTOM_PROFILE/system-auth"
|
||||
+if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $CUSTOM_SYSTEM_AUTH) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $CUSTOM_SYSTEM_AUTH
|
||||
+fi
|
||||
+authselect apply-changes -b
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_missing_entry.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_missing_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..6786f6c13d7
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_missing_entry.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+
|
||||
+authselect create-profile hardening -b sssd
|
||||
+CUSTOM_PROFILE="custom/hardening"
|
||||
+authselect select $CUSTOM_PROFILE --force
|
||||
+
|
||||
+CUSTOM_SYSTEM_AUTH="/etc/authselect/$CUSTOM_PROFILE/system-auth"
|
||||
+sed -i --follow-symlinks '/^password\s*requisite\s*pam_pwquality\.so/d' $CUSTOM_SYSTEM_AUTH
|
||||
+authselect apply-changes -b
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_modified_pam.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_modified_pam.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..b3d9e5884f5
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/authselect_modified_pam.fail.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+#!/bin/bash
|
||||
+# packages = authselect
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
|
||||
+# remediation = none
|
||||
+
|
||||
+SYSTEM_AUTH_FILE="/etc/pam.d/system-auth"
|
||||
+
|
||||
+# This modification will break the integrity checks done by authselect.
|
||||
+sed -i --follow-symlinks -e '/^password\s*requisite\s*pam_pwquality\.so/ s/^#*/#/g' $SYSTEM_AUTH_FILE
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/correct_entry.pass.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/correct_entry.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..71f87b19045
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/correct_entry.pass.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+# packages = pam
|
||||
+# platform = Red Hat Enterprise Linux 7,Red Hat Virtualization 4,multi_platform_fedora
|
||||
+
|
||||
+config_file=/etc/pam.d/password-auth
|
||||
+if [ $(grep -c "^\s*password.*requisite.*pam_pwquality.so" $config_file) -eq 0 ]; then
|
||||
+ sed -i --follow-symlinks '0,/^password.*/s/^password.*/password requisite pam_pwquality.so\n&/' $config_file
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/missing_entry.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/missing_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..3c8f6f79fe9
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_pwquality_system_auth/tests/missing_entry.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+# platform = Red Hat Enterprise Linux 7,Red Hat Virtualization 4,multi_platform_fedora
|
||||
+# packages = pam
|
||||
+
|
||||
+config_file=/etc/pam.d/system-auth
|
||||
+
|
||||
+sed -i --follow-symlinks '/^password\s*requisite\s*pam_pwquality\.so/d' $config_file
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml
|
||||
index eeb55a6ff5c..6b2219a3eab 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml
|
||||
@@ -6,13 +6,16 @@ title: 'Ensure PAM Enforces Password Requirements - Authentication Retry Prompts
|
||||
|
||||
description: |-
|
||||
To configure the number of retry prompts that are permitted per-session:
|
||||
+ {{% if product in ['rhel8', 'rhel9'] %}}
|
||||
+ Edit the <tt>/etc/security/pwquality.conf</tt> to include
|
||||
+ {{% else %}}
|
||||
Edit the <tt>pam_pwquality.so</tt> statement in
|
||||
{{% if 'ubuntu' not in product %}}
|
||||
- <tt>/etc/pam.d/system-auth</tt> {{% if product in ['rhel8', 'rhel9'] %}} and
|
||||
- <tt>/etc/pam.d/password-auth</tt> {{% endif %}} to show
|
||||
+ <tt>/etc/pam.d/system-auth</tt> to show
|
||||
{{% else %}}
|
||||
<tt>/etc/pam.d/common-password</tt> to show
|
||||
{{% endif %}}
|
||||
+ {{% endif %}}
|
||||
<tt>retry={{{xccdf_value("var_password_pam_retry") }}}</tt>, or a lower value if site
|
||||
policy is more restrictive. The DoD requirement is a maximum of 3 prompts
|
||||
per session.
|
||||
@@ -48,17 +51,21 @@ references:
|
||||
stigid@ol7: OL07-00-010119
|
||||
stigid@ol8: OL08-00-020100
|
||||
stigid@rhel7: RHEL-07-010119
|
||||
- stigid@rhel8: RHEL-08-020100
|
||||
+ stigid@rhel8: RHEL-08-020104
|
||||
stigid@ubuntu2004: UBTU-20-010057
|
||||
|
||||
ocil_clause: 'it is not the required value'
|
||||
|
||||
ocil: |-
|
||||
To check how many retry attempts are permitted on a per-session basis, run the following command:
|
||||
+ {{% if product in ['rhel8', 'rhel9'] %}}
|
||||
+ <pre>$ grep retry /etc/security/pwquality.conf</pre>
|
||||
+ {{% else %}}
|
||||
{{% if 'ubuntu' in product %}}
|
||||
<pre>$ grep pam_pwquality /etc/pam.d/common-password</pre>
|
||||
{{% else %}}
|
||||
- <pre>$ grep pam_pwquality /etc/pam.d/system-auth {{% if product in ['rhel8', 'rhel9'] %}}/etc/pam.d/password-auth{{% endif %}}</pre>
|
||||
+ <pre>$ grep pam_pwquality /etc/pam.d/system-auth</pre>
|
||||
+ {{% endif %}}
|
||||
{{% endif %}}
|
||||
The <tt>retry</tt> parameter will indicate how many attempts are permitted.
|
||||
The DoD required value is less than or equal to 3.
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index d92bc72971c..62fc512f05e 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -523,6 +523,20 @@ selections:
|
||||
- sssd_enable_certmap
|
||||
|
||||
# RHEL-08-020100
|
||||
+ - accounts_password_pam_pwquality_password_auth
|
||||
+
|
||||
+ # RHEL-08-020101
|
||||
+ - accounts_password_pam_pwquality_system_auth
|
||||
+
|
||||
+ # RHEL-08-020102
|
||||
+ # This is only required for RHEL8 systems below version 8.4 where the
|
||||
+ # retry parameter was not yet available on /etc/security/pwquality.conf.
|
||||
+
|
||||
+ # RHEL-08-020103
|
||||
+ # This is only required for RHEL8 systems below version 8.4 where the
|
||||
+ # retry parameter was not yet available on /etc/security/pwquality.conf.
|
||||
+
|
||||
+ # RHEL-08-020104
|
||||
- accounts_password_pam_retry
|
||||
|
||||
# RHEL-08-020110
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 42c6d0e9aca..ad08a6d3410 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -524,6 +524,20 @@ selections:
|
||||
- sssd_enable_certmap
|
||||
|
||||
# RHEL-08-020100
|
||||
+ - accounts_password_pam_pwquality_password_auth
|
||||
+
|
||||
+ # RHEL-08-020101
|
||||
+ - accounts_password_pam_pwquality_system_auth
|
||||
+
|
||||
+ # RHEL-08-020102
|
||||
+ # This is only required for RHEL8 systems below version 8.4 where the
|
||||
+ # retry parameter was not yet available on /etc/security/pwquality.conf.
|
||||
+
|
||||
+ # RHEL-08-020103
|
||||
+ # This is only required for RHEL8 systems below version 8.4 where the
|
||||
+ # retry parameter was not yet available on /etc/security/pwquality.conf.
|
||||
+
|
||||
+ # RHEL-08-020104
|
||||
- accounts_password_pam_retry
|
||||
|
||||
# RHEL-08-020110
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index e4fee44f9f9..33e82401c3d 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -53,6 +53,8 @@ selections:
|
||||
- accounts_password_pam_ocredit
|
||||
- accounts_password_pam_pwhistory_remember_password_auth
|
||||
- accounts_password_pam_pwhistory_remember_system_auth
|
||||
+- accounts_password_pam_pwquality_password_auth
|
||||
+- accounts_password_pam_pwquality_system_auth
|
||||
- accounts_password_pam_retry
|
||||
- accounts_password_pam_ucredit
|
||||
- accounts_password_pam_unix_rounds_password_auth
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 83d04775e3a..5beeb4f28af 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -64,6 +64,8 @@ selections:
|
||||
- accounts_password_pam_ocredit
|
||||
- accounts_password_pam_pwhistory_remember_password_auth
|
||||
- accounts_password_pam_pwhistory_remember_system_auth
|
||||
+- accounts_password_pam_pwquality_password_auth
|
||||
+- accounts_password_pam_pwquality_system_auth
|
||||
- accounts_password_pam_retry
|
||||
- accounts_password_pam_ucredit
|
||||
- accounts_password_pam_unix_rounds_password_auth
|
@ -1,126 +0,0 @@
|
||||
From 622558873703704bd97fde1874a9a782d4cb8b0e Mon Sep 17 00:00:00 2001
|
||||
From: Gabriel Becker <ggasparb@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 17:51:50 +0100
|
||||
Subject: [PATCH] Introduce CPE for aarch64 and make package_rear_installed n/a
|
||||
aarch64.
|
||||
|
||||
This rule is not applicable for RHEL9 only.
|
||||
---
|
||||
.../package_rear_installed/rule.yml | 4 +++
|
||||
shared/applicability/arch.yml | 12 +++++++
|
||||
...proc_sys_kernel_osrelease_arch_aarch64.xml | 33 +++++++++++++++++++
|
||||
..._sys_kernel_osrelease_arch_not_aarch64.xml | 16 +++++++++
|
||||
ssg/constants.py | 2 ++
|
||||
5 files changed, 67 insertions(+)
|
||||
create mode 100644 shared/checks/oval/proc_sys_kernel_osrelease_arch_aarch64.xml
|
||||
create mode 100644 shared/checks/oval/proc_sys_kernel_osrelease_arch_not_aarch64.xml
|
||||
|
||||
diff --git a/linux_os/guide/system/software/system-tools/package_rear_installed/rule.yml b/linux_os/guide/system/software/system-tools/package_rear_installed/rule.yml
|
||||
index 6e3c11e5749..efb591654a9 100644
|
||||
--- a/linux_os/guide/system/software/system-tools/package_rear_installed/rule.yml
|
||||
+++ b/linux_os/guide/system/software/system-tools/package_rear_installed/rule.yml
|
||||
@@ -25,6 +25,10 @@ ocil: '{{{ ocil_package(package="rear") }}}'
|
||||
# The package is not available for s309x on RHEL<8.5
|
||||
# platform: not_s390x_arch
|
||||
|
||||
+{{%- if product == "rhel9" %}}
|
||||
+platform: not_aarch64_arch
|
||||
+{{%- endif %}}
|
||||
+
|
||||
template:
|
||||
name: package_installed
|
||||
vars:
|
||||
diff --git a/shared/applicability/arch.yml b/shared/applicability/arch.yml
|
||||
index d2cbd102310..9ac05317a95 100644
|
||||
--- a/shared/applicability/arch.yml
|
||||
+++ b/shared/applicability/arch.yml
|
||||
@@ -12,3 +12,15 @@ cpes:
|
||||
check_id: proc_sys_kernel_osrelease_arch_s390x
|
||||
bash_conditional: 'grep -q s390x /proc/sys/kernel/osrelease'
|
||||
|
||||
+ - not_aarch64_arch:
|
||||
+ name: "cpe:/a:not_aarch64_arch"
|
||||
+ title: "System architecture is not AARCH64"
|
||||
+ check_id: proc_sys_kernel_osrelease_arch_not_aarch64
|
||||
+ bash_conditional: "! grep -q aarch64 /proc/sys/kernel/osrelease"
|
||||
+
|
||||
+ - aarch64_arch:
|
||||
+ name: "cpe:/a:aarch64_arch"
|
||||
+ title: "System architecture is AARCH64"
|
||||
+ check_id: proc_sys_kernel_osrelease_arch_aarch64
|
||||
+ bash_conditional: 'grep -q aarch64 /proc/sys/kernel/osrelease'
|
||||
+
|
||||
diff --git a/shared/checks/oval/proc_sys_kernel_osrelease_arch_aarch64.xml b/shared/checks/oval/proc_sys_kernel_osrelease_arch_aarch64.xml
|
||||
new file mode 100644
|
||||
index 00000000000..3d54f81e6d4
|
||||
--- /dev/null
|
||||
+++ b/shared/checks/oval/proc_sys_kernel_osrelease_arch_aarch64.xml
|
||||
@@ -0,0 +1,33 @@
|
||||
+<def-group>
|
||||
+ <definition class="inventory" id="proc_sys_kernel_osrelease_arch_aarch64"
|
||||
+ version="1">
|
||||
+ <metadata>
|
||||
+ <title>Test that the architecture is aarch64</title>
|
||||
+ <affected family="unix">
|
||||
+ <platform>multi_platform_all</platform>
|
||||
+ </affected>
|
||||
+ <description>Check that architecture of kernel in /proc/sys/kernel/osrelease is aarch64</description>
|
||||
+ </metadata>
|
||||
+ <criteria>
|
||||
+ <criterion comment="Architecture is aarch64"
|
||||
+ test_ref="test_proc_sys_kernel_osrelease_arch_aarch64" />
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="all_exist"
|
||||
+ comment="proc_sys_kernel is for aarch64 architecture"
|
||||
+ id="test_proc_sys_kernel_osrelease_arch_aarch64"
|
||||
+ version="1">
|
||||
+ <ind:object object_ref="object_proc_sys_kernel_osrelease_arch_aarch64" />
|
||||
+ <ind:state state_ref="state_proc_sys_kernel_osrelease_arch_aarch64" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+
|
||||
+ <ind:textfilecontent54_object id="object_proc_sys_kernel_osrelease_arch_aarch64" version="1">
|
||||
+ <ind:filepath>/proc/sys/kernel/osrelease</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^.*\.(.*)$</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_state id="state_proc_sys_kernel_osrelease_arch_aarch64" version="1">
|
||||
+ <ind:subexpression datatype="string" operation="pattern match">^aarch64$</ind:subexpression>
|
||||
+ </ind:textfilecontent54_state>
|
||||
+</def-group>
|
||||
diff --git a/shared/checks/oval/proc_sys_kernel_osrelease_arch_not_aarch64.xml b/shared/checks/oval/proc_sys_kernel_osrelease_arch_not_aarch64.xml
|
||||
new file mode 100644
|
||||
index 00000000000..3fce66ee00a
|
||||
--- /dev/null
|
||||
+++ b/shared/checks/oval/proc_sys_kernel_osrelease_arch_not_aarch64.xml
|
||||
@@ -0,0 +1,16 @@
|
||||
+<def-group>
|
||||
+ <definition class="inventory" id="proc_sys_kernel_osrelease_arch_not_aarch64"
|
||||
+ version="1">
|
||||
+ <metadata>
|
||||
+ <title>Test for different architecture than aarch64</title>
|
||||
+ <affected family="unix">
|
||||
+ <platform>multi_platform_all</platform>
|
||||
+ </affected>
|
||||
+ <description>Check that architecture of kernel in /proc/sys/kernel/osrelease is not aarch64</description>
|
||||
+ </metadata>
|
||||
+ <criteria>
|
||||
+ <extend_definition comment="Architecture is not aarch64"
|
||||
+ definition_ref="proc_sys_kernel_osrelease_arch_aarch64" negate="true"/>
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+</def-group>
|
||||
diff --git a/ssg/constants.py b/ssg/constants.py
|
||||
index 64d7d36c989..92cc2f8de34 100644
|
||||
--- a/ssg/constants.py
|
||||
+++ b/ssg/constants.py
|
||||
@@ -424,6 +424,8 @@
|
||||
"non-uefi": None,
|
||||
"not_s390x_arch": None,
|
||||
"s390x_arch": None,
|
||||
+ "not_aarch64_arch": None,
|
||||
+ "aarch64_arch": None,
|
||||
"ovirt": None,
|
||||
"no_ovirt": None,
|
||||
}
|
@ -1,44 +0,0 @@
|
||||
diff --git a/controls/stig_rhel8.yml b/controls/stig_rhel8.yml
|
||||
index d7821c2e3b8..fe6b0f01186 100644
|
||||
--- a/controls/stig_rhel8.yml
|
||||
+++ b/controls/stig_rhel8.yml
|
||||
@@ -584,11 +584,6 @@ controls:
|
||||
rules:
|
||||
- sshd_disable_root_login
|
||||
status: automated
|
||||
- - id: RHEL-08-010560
|
||||
- levels:
|
||||
- - medium
|
||||
- title: The auditd service must be running in RHEL 8.
|
||||
- status: pending
|
||||
- id: RHEL-08-010561
|
||||
levels:
|
||||
- medium
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 7c89bcbf659..09fa85df181 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -368,9 +368,6 @@ selections:
|
||||
# RHEL-08-010550
|
||||
- sshd_disable_root_login
|
||||
|
||||
- # RHEL-08-010560
|
||||
- - service_auditd_enabled
|
||||
-
|
||||
# RHEL-08-010561
|
||||
- service_rsyslog_enabled
|
||||
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 690991f697b..eb2cac913bd 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -369,9 +369,6 @@ selections:
|
||||
# RHEL-08-010550
|
||||
- sshd_disable_root_login
|
||||
|
||||
- # RHEL-08-010560
|
||||
- - service_auditd_enabled
|
||||
-
|
||||
# RHEL-08-010561
|
||||
- service_rsyslog_enabled
|
||||
|
@ -1,106 +0,0 @@
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index d92bc72971c..98cabee38dd 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -51,7 +51,7 @@ selections:
|
||||
- var_password_pam_lcredit=1
|
||||
- var_password_pam_retry=3
|
||||
- var_password_pam_minlen=15
|
||||
- - var_sshd_set_keepalive=0
|
||||
+ # - var_sshd_set_keepalive=0
|
||||
- sshd_approved_macs=stig
|
||||
- sshd_approved_ciphers=stig
|
||||
- sshd_idle_timeout_value=10_minutes
|
||||
@@ -170,11 +170,13 @@ selections:
|
||||
# RHEL-08-010190
|
||||
- dir_perms_world_writable_sticky_bits
|
||||
|
||||
- # RHEL-08-010200
|
||||
- - sshd_set_keepalive_0
|
||||
-
|
||||
- # RHEL-08-010201
|
||||
- - sshd_set_idle_timeout
|
||||
+ # These two items don't behave as they used to in RHEL8.6 and RHEL9
|
||||
+ # anymore. They will be disabled for now until an alternative
|
||||
+ # solution is found.
|
||||
+ # # RHEL-08-010200
|
||||
+ # - sshd_set_keepalive_0
|
||||
+ # # RHEL-08-010201
|
||||
+ # - sshd_set_idle_timeout
|
||||
|
||||
# RHEL-08-010210
|
||||
- file_permissions_var_log_messages
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 42c6d0e9aca..842f17c7021 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -52,7 +52,7 @@ selections:
|
||||
- var_password_pam_lcredit=1
|
||||
- var_password_pam_retry=3
|
||||
- var_password_pam_minlen=15
|
||||
- - var_sshd_set_keepalive=0
|
||||
+ # - var_sshd_set_keepalive=0
|
||||
- sshd_approved_macs=stig
|
||||
- sshd_approved_ciphers=stig
|
||||
- sshd_idle_timeout_value=10_minutes
|
||||
@@ -171,11 +171,13 @@ selections:
|
||||
# RHEL-08-010190
|
||||
- dir_perms_world_writable_sticky_bits
|
||||
|
||||
- # RHEL-08-010200
|
||||
- - sshd_set_keepalive_0
|
||||
-
|
||||
- # RHEL-08-010201
|
||||
- - sshd_set_idle_timeout
|
||||
+ # These two items don't behave as they used to in RHEL8.6 and RHEL9
|
||||
+ # anymore. They will be disabled for now until an alternative
|
||||
+ # solution is found.
|
||||
+ # # RHEL-08-010200
|
||||
+ # - sshd_set_keepalive_0
|
||||
+ # # RHEL-08-010201
|
||||
+ # - sshd_set_idle_timeout
|
||||
|
||||
# RHEL-08-010210
|
||||
- file_permissions_var_log_messages
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index e4fee44f9f9..e3c8ebfc9a5 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -353,8 +353,6 @@ selections:
|
||||
- sshd_enable_warning_banner
|
||||
- sshd_print_last_log
|
||||
- sshd_rekey_limit
|
||||
-- sshd_set_idle_timeout
|
||||
-- sshd_set_keepalive_0
|
||||
- sshd_use_strong_rng
|
||||
- sshd_x11_use_localhost
|
||||
- sssd_certificate_verification
|
||||
@@ -423,7 +421,6 @@ selections:
|
||||
- var_password_pam_ucredit=1
|
||||
- var_password_pam_lcredit=1
|
||||
- var_password_pam_retry=3
|
||||
-- var_sshd_set_keepalive=0
|
||||
- sshd_approved_macs=stig
|
||||
- sshd_approved_ciphers=stig
|
||||
- sshd_idle_timeout_value=10_minutes
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 83d04775e3a..8ef48e0654b 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -364,8 +364,6 @@ selections:
|
||||
- sshd_enable_warning_banner
|
||||
- sshd_print_last_log
|
||||
- sshd_rekey_limit
|
||||
-- sshd_set_idle_timeout
|
||||
-- sshd_set_keepalive_0
|
||||
- sshd_use_strong_rng
|
||||
- sshd_x11_use_localhost
|
||||
- sssd_certificate_verification
|
||||
@@ -432,7 +430,6 @@ selections:
|
||||
- var_password_pam_ucredit=1
|
||||
- var_password_pam_lcredit=1
|
||||
- var_password_pam_retry=3
|
||||
-- var_sshd_set_keepalive=0
|
||||
- sshd_approved_macs=stig
|
||||
- sshd_approved_ciphers=stig
|
||||
- sshd_idle_timeout_value=10_minutes
|
@ -1,146 +0,0 @@
|
||||
From 0ffb73fe67cb5773037f62895e6fdc93195f7c38 Mon Sep 17 00:00:00 2001
|
||||
From: Gabriel Becker <ggasparb@redhat.com>
|
||||
Date: Mon, 21 Feb 2022 12:55:10 +0100
|
||||
Subject: [PATCH] Remove tmux process runinng check from
|
||||
configure_bashrc_exec_tmux.
|
||||
|
||||
This check can cause troubles since the user must be logged to show up
|
||||
as tmux running. For example, an evaluation happening through a cron job
|
||||
wouldn't be able to make this rule work, since no terminal is being
|
||||
used.
|
||||
---
|
||||
.../configure_bashrc_exec_tmux/oval/shared.xml | 10 ----------
|
||||
.../configure_bashrc_exec_tmux/rule.yml | 14 +-------------
|
||||
.../tests/correct_value.pass.sh | 1 -
|
||||
.../tests/correct_value_d_directory.pass.sh | 1 -
|
||||
.../tests/duplicate_value_multiple_files.pass.sh | 1 -
|
||||
.../tests/tmux_not_running.fail.sh | 13 -------------
|
||||
.../tests/wrong_value.fail.sh | 2 --
|
||||
7 files changed, 1 insertion(+), 41 deletions(-)
|
||||
delete mode 100644 linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml
|
||||
index 4cb2f9e0e04..58f91eadf66 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml
|
||||
@@ -4,7 +4,6 @@
|
||||
<criteria comment="Check exec tmux configured at the end of bashrc" operator="AND">
|
||||
<criterion comment="check tmux is configured to exec on the last line of /etc/bashrc"
|
||||
test_ref="test_configure_bashrc_exec_tmux" />
|
||||
- <criterion comment="check tmux is running" test_ref="test_tmux_running"/>
|
||||
</criteria>
|
||||
</definition>
|
||||
<ind:textfilecontent54_test check="all" check_existence="all_exist"
|
||||
@@ -18,13 +17,4 @@
|
||||
<ind:pattern operation="pattern match">if \[ "\$PS1" \]; then\n\s+parent=\$\(ps -o ppid= -p \$\$\)\n\s+name=\$\(ps -o comm= -p \$parent\)\n\s+case "\$name" in sshd\|login\) exec tmux ;; esac\nfi</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
-
|
||||
- <unix:process58_test check="all" id="test_tmux_running" comment="is tmux running" version="1">
|
||||
- <unix:object object_ref="obj_tmux_running"/>
|
||||
- </unix:process58_test>
|
||||
-
|
||||
- <unix:process58_object id="obj_tmux_running" version="1">
|
||||
- <unix:command_line operation="pattern match">^tmux(?:|[\s]+.*)$</unix:command_line>
|
||||
- <unix:pid datatype="int" operation="greater than">0</unix:pid>
|
||||
- </unix:process58_object>
|
||||
</def-group>
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
|
||||
index 7afc5fc5e6b..9f224748894 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
|
||||
@@ -8,19 +8,11 @@ description: |-
|
||||
The <tt>tmux</tt> terminal multiplexer is used to implement
|
||||
automatic session locking. It should be started from
|
||||
<tt>/etc/bashrc</tt> or drop-in files within <tt>/etc/profile.d/</tt>.
|
||||
- Additionally it must be ensured that the <tt>tmux</tt> process is running
|
||||
- and it can be verified with the following command:
|
||||
- <pre>ps all | grep tmux | grep -v grep</pre>
|
||||
|
||||
rationale: |-
|
||||
Unlike <tt>bash</tt> itself, the <tt>tmux</tt> terminal multiplexer
|
||||
provides a mechanism to lock sessions after period of inactivity.
|
||||
|
||||
-warnings:
|
||||
- - general: |-
|
||||
- The remediation does not start the tmux process, so it must be
|
||||
- manually started or have the system rebooted after applying the fix.
|
||||
-
|
||||
severity: medium
|
||||
|
||||
identifiers:
|
||||
@@ -34,7 +26,7 @@ references:
|
||||
stigid@ol8: OL08-00-020041
|
||||
stigid@rhel8: RHEL-08-020041
|
||||
|
||||
-ocil_clause: 'exec tmux is not present at the end of bashrc or tmux process is not running'
|
||||
+ocil_clause: 'exec tmux is not present at the end of bashrc'
|
||||
|
||||
ocil: |-
|
||||
To verify that tmux is configured to execute,
|
||||
@@ -46,9 +38,5 @@ ocil: |-
|
||||
name=$(ps -o comm= -p $parent)
|
||||
case "$name" in sshd|login) exec tmux ;; esac
|
||||
fi</pre>
|
||||
- To verify that the tmux process is running,
|
||||
- run the following command:
|
||||
- <pre>ps all | grep tmux | grep -v grep</pre>
|
||||
- If the command does not produce output, this is a finding.
|
||||
|
||||
platform: machine
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh
|
||||
index 221c18665ef..fbc7590f27d 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh
|
||||
@@ -9,4 +9,3 @@ if [ "$PS1" ]; then
|
||||
fi
|
||||
EOF
|
||||
|
||||
-tmux new-session -s root -d
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh
|
||||
index 1702bb17e79..6107f86f248 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh
|
||||
@@ -10,4 +10,3 @@ if [ "$PS1" ]; then
|
||||
fi
|
||||
EOF
|
||||
|
||||
-tmux new-session -s root -d
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh
|
||||
index 16d4acfcb5a..c662221eca1 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh
|
||||
@@ -17,4 +17,3 @@ if [ "$PS1" ]; then
|
||||
fi
|
||||
EOF
|
||||
|
||||
-tmux new-session -s root -d
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh
|
||||
deleted file mode 100644
|
||||
index 6cb9d83efc5..00000000000
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,13 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-# packages = tmux
|
||||
-# remediation = none
|
||||
-
|
||||
-cat >> /etc/bashrc <<'EOF'
|
||||
-if [ "$PS1" ]; then
|
||||
- parent=$(ps -o ppid= -p $$)
|
||||
- name=$(ps -o comm= -p $parent)
|
||||
- case "$name" in sshd|login) exec tmux ;; esac
|
||||
-fi
|
||||
-EOF
|
||||
-
|
||||
-killall tmux || true
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh
|
||||
index f13a8b038e4..9b461654572 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh
|
||||
@@ -101,5 +101,3 @@ if [ -z "$BASHRCSOURCED" ]; then
|
||||
fi
|
||||
# vim:ts=4:sw=4
|
||||
EOF
|
||||
-
|
||||
-tmux new-session -s root -d
|
@ -1,79 +0,0 @@
|
||||
From ea49c71011c1815b2889c5a004c79c99faff4a1c Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 23 Feb 2022 18:23:22 +0100
|
||||
Subject: [PATCH] Adjsut partitions sizes to acomodate a GUI install
|
||||
|
||||
The GUI requires more room in the /usr partition.
|
||||
Let's reduce /otp, /srv and /home, which should not have any data.
|
||||
---
|
||||
.../rhel8/kickstart/ssg-rhel8-anssi_bp28_enhanced-ks.cfg | 8 ++++----
|
||||
products/rhel8/kickstart/ssg-rhel8-anssi_bp28_high-ks.cfg | 8 ++++----
|
||||
.../kickstart/ssg-rhel8-anssi_bp28_intermediary-ks.cfg | 8 ++++----
|
||||
3 files changed, 12 insertions(+), 12 deletions(-)
|
||||
|
||||
diff --git a/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_enhanced-ks.cfg b/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_enhanced-ks.cfg
|
||||
index 9c02e5c2ac1..cc18e8cd16f 100644
|
||||
--- a/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_enhanced-ks.cfg
|
||||
+++ b/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_enhanced-ks.cfg
|
||||
@@ -100,13 +100,13 @@ volgroup VolGroup --pesize=4096 pv.01
|
||||
# Create particular logical volumes (optional)
|
||||
logvol / --fstype=xfs --name=LogVol06 --vgname=VolGroup --size=3192 --grow
|
||||
# Ensure /usr Located On Separate Partition
|
||||
-logvol /usr --fstype=xfs --name=LogVol08 --vgname=VolGroup --size=5000 --fsoptions="nodev"
|
||||
+logvol /usr --fstype=xfs --name=LogVol08 --vgname=VolGroup --size=6536 --fsoptions="nodev"
|
||||
# Ensure /opt Located On Separate Partition
|
||||
-logvol /opt --fstype=xfs --name=LogVol09 --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid"
|
||||
+logvol /opt --fstype=xfs --name=LogVol09 --vgname=VolGroup --size=512 --fsoptions="nodev,nosuid"
|
||||
# Ensure /srv Located On Separate Partition
|
||||
-logvol /srv --fstype=xfs --name=LogVol10 --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid"
|
||||
+logvol /srv --fstype=xfs --name=LogVol10 --vgname=VolGroup --size=512 --fsoptions="nodev,nosuid"
|
||||
# Ensure /home Located On Separate Partition
|
||||
-logvol /home --fstype=xfs --name=home --vgname=VolGroup --size=1024 --fsoptions="nodev"
|
||||
+logvol /home --fstype=xfs --name=home --vgname=VolGroup --size=512 --fsoptions="nodev"
|
||||
# Ensure /tmp Located On Separate Partition
|
||||
logvol /tmp --fstype=xfs --name=tmp --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid,noexec"
|
||||
# Ensure /var/tmp Located On Separate Partition
|
||||
diff --git a/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_high-ks.cfg b/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_high-ks.cfg
|
||||
index 68729408698..3e99b4d0f99 100644
|
||||
--- a/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_high-ks.cfg
|
||||
+++ b/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_high-ks.cfg
|
||||
@@ -104,13 +104,13 @@ volgroup VolGroup --pesize=4096 pv.01
|
||||
# Create particular logical volumes (optional)
|
||||
logvol / --fstype=xfs --name=LogVol06 --vgname=VolGroup --size=3192 --grow
|
||||
# Ensure /usr Located On Separate Partition
|
||||
-logvol /usr --fstype=xfs --name=LogVol08 --vgname=VolGroup --size=5000 --fsoptions="nodev"
|
||||
+logvol /usr --fstype=xfs --name=LogVol08 --vgname=VolGroup --size=6536 --fsoptions="nodev"
|
||||
# Ensure /opt Located On Separate Partition
|
||||
-logvol /opt --fstype=xfs --name=LogVol09 --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid"
|
||||
+logvol /opt --fstype=xfs --name=LogVol09 --vgname=VolGroup --size=512 --fsoptions="nodev,nosuid"
|
||||
# Ensure /srv Located On Separate Partition
|
||||
-logvol /srv --fstype=xfs --name=LogVol10 --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid"
|
||||
+logvol /srv --fstype=xfs --name=LogVol10 --vgname=VolGroup --size=512 --fsoptions="nodev,nosuid"
|
||||
# Ensure /home Located On Separate Partition
|
||||
-logvol /home --fstype=xfs --name=home --vgname=VolGroup --size=1024 --fsoptions="nodev"
|
||||
+logvol /home --fstype=xfs --name=home --vgname=VolGroup --size=512 --fsoptions="nodev"
|
||||
# Ensure /tmp Located On Separate Partition
|
||||
logvol /tmp --fstype=xfs --name=tmp --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid,noexec"
|
||||
# Ensure /var/tmp Located On Separate Partition
|
||||
diff --git a/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_intermediary-ks.cfg b/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_intermediary-ks.cfg
|
||||
index 1f703d127e5..31d10a7e97e 100644
|
||||
--- a/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_intermediary-ks.cfg
|
||||
+++ b/products/rhel8/kickstart/ssg-rhel8-anssi_bp28_intermediary-ks.cfg
|
||||
@@ -100,13 +100,13 @@ volgroup VolGroup --pesize=4096 pv.01
|
||||
# Create particular logical volumes (optional)
|
||||
logvol / --fstype=xfs --name=LogVol06 --vgname=VolGroup --size=3192 --grow
|
||||
# Ensure /usr Located On Separate Partition
|
||||
-logvol /usr --fstype=xfs --name=LogVol08 --vgname=VolGroup --size=5000 --fsoptions="nodev"
|
||||
+logvol /usr --fstype=xfs --name=LogVol08 --vgname=VolGroup --size=6536 --fsoptions="nodev"
|
||||
# Ensure /opt Located On Separate Partition
|
||||
-logvol /opt --fstype=xfs --name=LogVol09 --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid"
|
||||
+logvol /opt --fstype=xfs --name=LogVol09 --vgname=VolGroup --size=512 --fsoptions="nodev,nosuid"
|
||||
# Ensure /srv Located On Separate Partition
|
||||
-logvol /srv --fstype=xfs --name=LogVol10 --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid"
|
||||
+logvol /srv --fstype=xfs --name=LogVol10 --vgname=VolGroup --size=512 --fsoptions="nodev,nosuid"
|
||||
# Ensure /home Located On Separate Partition
|
||||
-logvol /home --fstype=xfs --name=home --vgname=VolGroup --size=1024 --fsoptions="nodev"
|
||||
+logvol /home --fstype=xfs --name=home --vgname=VolGroup --size=512 --fsoptions="nodev"
|
||||
# Ensure /tmp Located On Separate Partition
|
||||
logvol /tmp --fstype=xfs --name=tmp --vgname=VolGroup --size=1024 --fsoptions="nodev,nosuid,noexec"
|
||||
# Ensure /var/tmp Located On Separate Partition
|
@ -1,285 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml
|
||||
index 09dc1566bbf..26c7eea79d1 100644
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml
|
||||
@@ -6,10 +6,10 @@ title: 'Configure auditing of unsuccessful file accesses'
|
||||
|
||||
{{% set file_contents_audit_access_failed =
|
||||
"## Unsuccessful file access (any other opens) This has to go last.
|
||||
--a always,exit -F arch=b32 -S open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
--a always,exit -F arch=b64 -S open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
--a always,exit -F arch=b32 -S open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
--a always,exit -F arch=b64 -S open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access" %}}
|
||||
+-a always,exit -F arch=b32 -S open,openat,openat2,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b32 -S open,openat,openat2,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access" %}}
|
||||
|
||||
description: |-
|
||||
Ensure that unsuccessful attempts to access a file are audited.
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml
|
||||
index 5ce9fe6799c..262cf290ec0 100644
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml
|
||||
@@ -7,8 +7,8 @@ title: 'Configure auditing of successful file accesses'
|
||||
{{% set file_contents_audit_access_success =
|
||||
"## Successful file access (any other opens) This has to go last.
|
||||
## These next two are likely to result in a whole lot of events
|
||||
--a always,exit -F arch=b32 -S open,openat,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access
|
||||
--a always,exit -F arch=b64 -S open,openat,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access" %}}
|
||||
+-a always,exit -F arch=b32 -S open,openat,openat2,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access
|
||||
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access" %}}
|
||||
|
||||
description: |-
|
||||
Ensure that successful attempts to access a file are audited.
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml
|
||||
index e37291c68a1..bdc59faa5f7 100644
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml
|
||||
@@ -4,7 +4,7 @@ prodtype: ol8,rhcos4,rhel8,rhel9
|
||||
|
||||
title: 'Perform general configuration of Audit for OSPP'
|
||||
|
||||
-{{% if product == "rhel9" %}}
|
||||
+
|
||||
{{% set file_contents_audit_ospp_general =
|
||||
"## The purpose of these rules is to meet the requirements for Operating
|
||||
## System Protection Profile (OSPP)v4.2. These rules depends on having
|
||||
@@ -90,89 +90,7 @@ title: 'Perform general configuration of Audit for OSPP'
|
||||
## state results from that policy. This would be handled entirely by
|
||||
## that daemon.
|
||||
" %}}
|
||||
-{{% else %}}
|
||||
-{{% set file_contents_audit_ospp_general =
|
||||
-"## The purpose of these rules is to meet the requirements for Operating
|
||||
-## System Protection Profile (OSPP)v4.2. These rules depends on having
|
||||
-## the following rule files copied to /etc/audit/rules.d:
|
||||
-##
|
||||
-## 10-base-config.rules, 11-loginuid.rules,
|
||||
-## 30-ospp-v42-1-create-failed.rules, 30-ospp-v42-1-create-success.rules,
|
||||
-## 30-ospp-v42-2-modify-failed.rules, 30-ospp-v42-2-modify-success.rules,
|
||||
-## 30-ospp-v42-3-access-failed.rules, 30-ospp-v42-3-access-success.rules,
|
||||
-## 30-ospp-v42-4-delete-failed.rules, 30-ospp-v42-4-delete-success.rules,
|
||||
-## 30-ospp-v42-5-perm-change-failed.rules,
|
||||
-## 30-ospp-v42-5-perm-change-success.rules,
|
||||
-## 30-ospp-v42-6-owner-change-failed.rules,
|
||||
-## 30-ospp-v42-6-owner-change-success.rules
|
||||
-##
|
||||
-## original copies may be found in /usr/share/audit/sample-rules/
|
||||
-
|
||||
-
|
||||
-## User add delete modify. This is covered by pam. However, someone could
|
||||
-## open a file and directly create or modify a user, so we'll watch passwd and
|
||||
-## shadow for writes
|
||||
--a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
-
|
||||
-## User enable and disable. This is entirely handled by pam.
|
||||
-
|
||||
-## Group add delete modify. This is covered by pam. However, someone could
|
||||
-## open a file and directly create or modify a user, so we'll watch group and
|
||||
-## gshadow for writes
|
||||
--a always,exit -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F key=group-modify
|
||||
--a always,exit -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F key=group-modify
|
||||
-
|
||||
|
||||
-## Use of special rights for config changes. This would be use of setuid
|
||||
-## programs that relate to user accts. This is not all setuid apps because
|
||||
-## requirements are only for ones that affect system configuration.
|
||||
--a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/sbin/usernetctl -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/sbin/seunshare -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/newuidmap -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/newgidmap -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/at -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
-
|
||||
-## Privilege escalation via su or sudo. This is entirely handled by pam.
|
||||
-
|
||||
-## Audit log access
|
||||
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
|
||||
-## Attempts to Alter Process and Session Initiation Information
|
||||
--a always,exit -F path=/var/run/utmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
|
||||
--a always,exit -F path=/var/log/btmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
|
||||
--a always,exit -F path=/var/log/wtmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
|
||||
-
|
||||
-## Attempts to modify MAC controls
|
||||
--a always,exit -F dir=/etc/selinux/ -F perm=wa -F auid>=1000 -F auid!=unset -F key=MAC-policy
|
||||
-
|
||||
-## Software updates. This is entirely handled by rpm.
|
||||
-
|
||||
-## System start and shutdown. This is entirely handled by systemd
|
||||
-
|
||||
-## Kernel Module loading. This is handled in 43-module-load.rules
|
||||
-
|
||||
-## Application invocation. The requirements list an optional requirement
|
||||
-## FPT_SRP_EXT.1 Software Restriction Policies. This event is intended to
|
||||
-## state results from that policy. This would be handled entirely by
|
||||
-## that daemon.
|
||||
-" %}}
|
||||
-{{% endif %}}
|
||||
|
||||
description: |-
|
||||
Configure some basic <tt>Audit</tt> parameters specific for OSPP profile.
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules.pass.sh b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules.pass.sh
|
||||
index ffe2344db56..c59e7e5e1f2 100644
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules.pass.sh
|
||||
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules.pass.sh
|
||||
@@ -1,3 +1,3 @@
|
||||
-# platform = Red Hat Enterprise Linux 8
|
||||
+# platform = Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9
|
||||
|
||||
cp $SHARED/audit/30-ospp-v42.rules /etc/audit/rules.d/
|
||||
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules_rhel9.pass.sh b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules_rhel9.pass.sh
|
||||
deleted file mode 100644
|
||||
index 96ef5ae0a23..00000000000
|
||||
--- a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/tests/correct_rules_rhel9.pass.sh
|
||||
+++ /dev/null
|
||||
@@ -1,3 +0,0 @@
|
||||
-# platform = Red Hat Enterprise Linux 9
|
||||
-
|
||||
-cp $SHARED/audit/30-ospp-v42_rhel9.rules /etc/audit/rules.d/30-ospp-v42.rules
|
||||
diff --git a/tests/shared/audit/30-ospp-v42-3-access-failed.rules b/tests/shared/audit/30-ospp-v42-3-access-failed.rules
|
||||
index a5aad3a95ce..39ac7a883ca 100644
|
||||
--- a/tests/shared/audit/30-ospp-v42-3-access-failed.rules
|
||||
+++ b/tests/shared/audit/30-ospp-v42-3-access-failed.rules
|
||||
@@ -1,5 +1,5 @@
|
||||
## Unsuccessful file access (any other opens) This has to go last.
|
||||
--a always,exit -F arch=b32 -S open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
--a always,exit -F arch=b64 -S open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
--a always,exit -F arch=b32 -S open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
--a always,exit -F arch=b64 -S open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b32 -S open,openat,openat2,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b32 -S open,openat,openat2,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
|
||||
diff --git a/tests/shared/audit/30-ospp-v42-3-access-success.rules b/tests/shared/audit/30-ospp-v42-3-access-success.rules
|
||||
index 0c8a6b65760..79004ce0c21 100644
|
||||
--- a/tests/shared/audit/30-ospp-v42-3-access-success.rules
|
||||
+++ b/tests/shared/audit/30-ospp-v42-3-access-success.rules
|
||||
@@ -1,4 +1,4 @@
|
||||
## Successful file access (any other opens) This has to go last.
|
||||
## These next two are likely to result in a whole lot of events
|
||||
--a always,exit -F arch=b32 -S open,openat,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access
|
||||
--a always,exit -F arch=b64 -S open,openat,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access
|
||||
+-a always,exit -F arch=b32 -S open,openat,openat2,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access
|
||||
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access
|
||||
diff --git a/tests/shared/audit/30-ospp-v42.rules b/tests/shared/audit/30-ospp-v42.rules
|
||||
index 3dced17255c..2d3c48265b6 100644
|
||||
--- a/tests/shared/audit/30-ospp-v42.rules
|
||||
+++ b/tests/shared/audit/30-ospp-v42.rules
|
||||
@@ -57,6 +57,10 @@
|
||||
|
||||
## Privilege escalation via su or sudo. This is entirely handled by pam.
|
||||
|
||||
+## Watch for configuration changes to privilege escalation.
|
||||
+-a always,exit -F path=/etc/sudoers -F perm=wa -F key=special-config-changes
|
||||
+-a always,exit -F dir=/etc/sudoers.d/ -F perm=wa -F key=special-config-changes
|
||||
+
|
||||
## Audit log access
|
||||
-a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
|
||||
## Attempts to Alter Process and Session Initiation Information
|
||||
diff --git a/tests/shared/audit/30-ospp-v42_rhel9.rules b/tests/shared/audit/30-ospp-v42_rhel9.rules
|
||||
deleted file mode 100644
|
||||
index 2d3c48265b6..00000000000
|
||||
--- a/tests/shared/audit/30-ospp-v42_rhel9.rules
|
||||
+++ /dev/null
|
||||
@@ -1,84 +0,0 @@
|
||||
-## The purpose of these rules is to meet the requirements for Operating
|
||||
-## System Protection Profile (OSPP)v4.2. These rules depends on having
|
||||
-## the following rule files copied to /etc/audit/rules.d:
|
||||
-##
|
||||
-## 10-base-config.rules, 11-loginuid.rules,
|
||||
-## 30-ospp-v42-1-create-failed.rules, 30-ospp-v42-1-create-success.rules,
|
||||
-## 30-ospp-v42-2-modify-failed.rules, 30-ospp-v42-2-modify-success.rules,
|
||||
-## 30-ospp-v42-3-access-failed.rules, 30-ospp-v42-3-access-success.rules,
|
||||
-## 30-ospp-v42-4-delete-failed.rules, 30-ospp-v42-4-delete-success.rules,
|
||||
-## 30-ospp-v42-5-perm-change-failed.rules,
|
||||
-## 30-ospp-v42-5-perm-change-success.rules,
|
||||
-## 30-ospp-v42-6-owner-change-failed.rules,
|
||||
-## 30-ospp-v42-6-owner-change-success.rules
|
||||
-##
|
||||
-## original copies may be found in /usr/share/audit/sample-rules/
|
||||
-
|
||||
-
|
||||
-## User add delete modify. This is covered by pam. However, someone could
|
||||
-## open a file and directly create or modify a user, so we'll watch passwd and
|
||||
-## shadow for writes
|
||||
--a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
-
|
||||
-## User enable and disable. This is entirely handled by pam.
|
||||
-
|
||||
-## Group add delete modify. This is covered by pam. However, someone could
|
||||
-## open a file and directly create or modify a user, so we'll watch group and
|
||||
-## gshadow for writes
|
||||
--a always,exit -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F key=user-modify
|
||||
--a always,exit -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F key=group-modify
|
||||
--a always,exit -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F key=group-modify
|
||||
-
|
||||
-
|
||||
-## Use of special rights for config changes. This would be use of setuid
|
||||
-## programs that relate to user accts. This is not all setuid apps because
|
||||
-## requirements are only for ones that affect system configuration.
|
||||
--a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/sbin/usernetctl -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/sbin/seunshare -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/newuidmap -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/newgidmap -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
--a always,exit -F path=/usr/bin/at -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
|
||||
-
|
||||
-## Privilege escalation via su or sudo. This is entirely handled by pam.
|
||||
-
|
||||
-## Watch for configuration changes to privilege escalation.
|
||||
--a always,exit -F path=/etc/sudoers -F perm=wa -F key=special-config-changes
|
||||
--a always,exit -F dir=/etc/sudoers.d/ -F perm=wa -F key=special-config-changes
|
||||
-
|
||||
-## Audit log access
|
||||
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
|
||||
-## Attempts to Alter Process and Session Initiation Information
|
||||
--a always,exit -F path=/var/run/utmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
|
||||
--a always,exit -F path=/var/log/btmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
|
||||
--a always,exit -F path=/var/log/wtmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
|
||||
-
|
||||
-## Attempts to modify MAC controls
|
||||
--a always,exit -F dir=/etc/selinux/ -F perm=wa -F auid>=1000 -F auid!=unset -F key=MAC-policy
|
||||
-
|
||||
-## Software updates. This is entirely handled by rpm.
|
||||
-
|
||||
-## System start and shutdown. This is entirely handled by systemd
|
||||
-
|
||||
-## Kernel Module loading. This is handled in 43-module-load.rules
|
||||
-
|
||||
-## Application invocation. The requirements list an optional requirement
|
||||
-## FPT_SRP_EXT.1 Software Restriction Policies. This event is intended to
|
||||
-## state results from that policy. This would be handled entirely by
|
||||
-## that daemon.
|
||||
-
|
@ -1,493 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod/rule.yml
|
||||
index a0b3efcbf79..1bc7afbb224 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod/rule.yml
|
||||
@@ -58,7 +58,7 @@ references:
|
||||
stigid@ol7: OL07-00-030410
|
||||
stigid@ol8: OL08-00-030540
|
||||
stigid@rhel7: RHEL-07-030420
|
||||
- stigid@rhel8: RHEL-08-030540
|
||||
+ stigid@rhel8: RHEL-08-030490
|
||||
stigid@sle12: SLES-12-020470
|
||||
stigid@sle15: SLES-15-030300
|
||||
stigid@ubuntu2004: UBTU-20-010153
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat/rule.yml
|
||||
index 83dd57f2b6d..dc8211684f2 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat/rule.yml
|
||||
@@ -58,7 +58,7 @@ references:
|
||||
stigid@ol7: OL07-00-030410
|
||||
stigid@ol8: OL08-00-030530
|
||||
stigid@rhel7: RHEL-07-030430
|
||||
- stigid@rhel8: RHEL-08-030530
|
||||
+ stigid@rhel8: RHEL-08-030490
|
||||
stigid@sle12: SLES-12-020480
|
||||
stigid@sle15: SLES-15-030310
|
||||
stigid@ubuntu2004: UBTU-20-010154
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown/rule.yml
|
||||
index 1b78aab4a1a..07592bb2fd9 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown/rule.yml
|
||||
@@ -61,7 +61,7 @@ references:
|
||||
stigid@ol7: OL07-00-030370
|
||||
stigid@ol8: OL08-00-030520
|
||||
stigid@rhel7: RHEL-07-030380
|
||||
- stigid@rhel8: RHEL-08-030520
|
||||
+ stigid@rhel8: RHEL-08-030480
|
||||
stigid@sle12: SLES-12-020430
|
||||
stigid@sle15: SLES-15-030260
|
||||
stigid@ubuntu2004: UBTU-20-010149
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat/rule.yml
|
||||
index 360c60de06d..084970765b2 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat/rule.yml
|
||||
@@ -58,7 +58,7 @@ references:
|
||||
stigid@ol7: OL07-00-030370
|
||||
stigid@ol8: OL08-00-030510
|
||||
stigid@rhel7: RHEL-07-030400
|
||||
- stigid@rhel8: RHEL-08-030510
|
||||
+ stigid@rhel8: RHEL-08-030480
|
||||
stigid@sle12: SLES-12-020450
|
||||
stigid@sle15: SLES-15-030280
|
||||
stigid@ubuntu2004: UBTU-20-010150
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr/rule.yml
|
||||
index 19bf8a5b981..5695440ad7d 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr/rule.yml
|
||||
@@ -75,7 +75,7 @@ references:
|
||||
stigid@ol7: OL07-00-030440
|
||||
stigid@ol8: OL08-00-030240
|
||||
stigid@rhel7: RHEL-07-030480
|
||||
- stigid@rhel8: RHEL-08-030240
|
||||
+ stigid@rhel8: RHEL-08-030200
|
||||
stigid@sle12: SLES-12-020410
|
||||
stigid@sle15: SLES-15-030210
|
||||
stigid@ubuntu2004: UBTU-20-010147
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr/rule.yml
|
||||
index 40cd114042e..ab536a8ae0a 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr/rule.yml
|
||||
@@ -70,7 +70,7 @@ references:
|
||||
stigid@ol7: OL07-00-030440
|
||||
stigid@ol8: OL08-00-030230
|
||||
stigid@rhel7: RHEL-07-030450
|
||||
- stigid@rhel8: RHEL-08-030230
|
||||
+ stigid@rhel8: RHEL-08-030200
|
||||
stigid@sle12: SLES-12-020380
|
||||
stigid@sle15: SLES-15-030230
|
||||
stigid@ubuntu2004: UBTU-20-010144
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown/rule.yml
|
||||
index 81dddd9fb71..d1f4ee35ccb 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown/rule.yml
|
||||
@@ -58,7 +58,7 @@ references:
|
||||
stigid@ol7: OL07-00-030370
|
||||
stigid@ol8: OL08-00-030500
|
||||
stigid@rhel7: RHEL-07-030390
|
||||
- stigid@rhel8: RHEL-08-030500
|
||||
+ stigid@rhel8: RHEL-08-030480
|
||||
stigid@sle12: SLES-12-020440
|
||||
stigid@sle15: SLES-15-030270
|
||||
stigid@ubuntu2004: UBTU-20-010151
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr/rule.yml
|
||||
index fa15012b05f..a2425e373bc 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr/rule.yml
|
||||
@@ -69,7 +69,7 @@ references:
|
||||
stigid@ol7: OL07-00-030440
|
||||
stigid@ol8: OL08-00-030220
|
||||
stigid@rhel7: RHEL-07-030460
|
||||
- stigid@rhel8: RHEL-08-030220
|
||||
+ stigid@rhel8: RHEL-08-030200
|
||||
stigid@sle15: SLES-15-030240
|
||||
stigid@ubuntu2004: UBTU-20-010143
|
||||
vmmsrg: SRG-OS-000458-VMM-001810,SRG-OS-000474-VMM-001940
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr/rule.yml
|
||||
index 6d15eecee2c..0be27fbe860 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr/rule.yml
|
||||
@@ -74,7 +74,7 @@ references:
|
||||
stigid@ol7: OL07-00-030440
|
||||
stigid@ol8: OL08-00-030210
|
||||
stigid@rhel7: RHEL-07-030470
|
||||
- stigid@rhel8: RHEL-08-030210
|
||||
+ stigid@rhel8: RHEL-08-030200
|
||||
stigid@sle12: SLES-12-020390
|
||||
stigid@sle15: SLES-15-030190
|
||||
stigid@ubuntu2004: UBTU-20-010145
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr/rule.yml
|
||||
index 6f7cea26e16..5dc13a0a43a 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr/rule.yml
|
||||
@@ -70,7 +70,7 @@ references:
|
||||
stigid@ol7: OL07-00-030440
|
||||
stigid@ol8: OL08-00-030270
|
||||
stigid@rhel7: RHEL-07-030440
|
||||
- stigid@rhel8: RHEL-08-030270
|
||||
+ stigid@rhel8: RHEL-08-030200
|
||||
stigid@sle12: SLES-12-020370
|
||||
stigid@sle15: SLES-15-030220
|
||||
stigid@ubuntu2004: UBTU-20-010142
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat/rule.yml
|
||||
index 718dcb8a9d9..120d6fa84d3 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat/rule.yml
|
||||
@@ -52,7 +52,7 @@ references:
|
||||
stigid@ol7: OL07-00-030910
|
||||
stigid@ol8: OL08-00-030362
|
||||
stigid@rhel7: RHEL-07-030890
|
||||
- stigid@rhel8: RHEL-08-030362
|
||||
+ stigid@rhel8: RHEL-08-030361
|
||||
stigid@ubuntu2004: UBTU-20-010270
|
||||
vmmsrg: SRG-OS-000466-VMM-001870,SRG-OS-000468-VMM-001890
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir/rule.yml
|
||||
index 643f075f46a..4caa7c66986 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir/rule.yml
|
||||
@@ -49,7 +49,7 @@ references:
|
||||
stigid@ol7: OL07-00-030910
|
||||
stigid@ol8: OL08-00-030363
|
||||
stigid@rhel7: RHEL-07-030900
|
||||
- stigid@rhel8: RHEL-08-030363
|
||||
+ stigid@rhel8: RHEL-08-030361
|
||||
vmmsrg: SRG-OS-000466-VMM-001870,SRG-OS-000468-VMM-001890
|
||||
|
||||
{{{ complete_ocil_entry_audit_syscall(syscall="rmdir") }}}
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink/rule.yml
|
||||
index 9cf3c4668bc..8fea9dc4582 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink/rule.yml
|
||||
@@ -52,7 +52,7 @@ references:
|
||||
stigid@ol7: OL07-00-030910
|
||||
stigid@ol8: OL08-00-030364
|
||||
stigid@rhel7: RHEL-07-030910
|
||||
- stigid@rhel8: RHEL-08-030364
|
||||
+ stigid@rhel8: RHEL-08-030361
|
||||
stigid@ubuntu2004: UBTU-20-010267
|
||||
vmmsrg: SRG-OS-000466-VMM-001870,SRG-OS-000468-VMM-001890
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat/rule.yml
|
||||
index d0ebbdbd723..bee18e99b52 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat/rule.yml
|
||||
@@ -52,7 +52,7 @@ references:
|
||||
stigid@ol7: OL07-00-030910
|
||||
stigid@ol8: OL08-00-030365
|
||||
stigid@rhel7: RHEL-07-030920
|
||||
- stigid@rhel8: RHEL-08-030365
|
||||
+ stigid@rhel8: RHEL-08-030361
|
||||
stigid@ubuntu2004: UBTU-20-010268
|
||||
vmmsrg: SRG-OS-000466-VMM-001870,SRG-OS-000468-VMM-001890
|
||||
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_creat/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_creat/rule.yml
|
||||
index 373b12525e1..736c6643b57 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_creat/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_creat/rule.yml
|
||||
@@ -63,7 +63,7 @@ references:
|
||||
stigid@ol7: OL07-00-030510
|
||||
stigid@ol8: OL08-00-030470
|
||||
stigid@rhel7: RHEL-07-030500
|
||||
- stigid@rhel8: RHEL-08-030470
|
||||
+ stigid@rhel8: RHEL-08-030420
|
||||
stigid@sle12: SLES-12-020520
|
||||
stigid@sle15: SLES-15-030160
|
||||
stigid@ubuntu2004: UBTU-20-010158
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_ftruncate/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_ftruncate/rule.yml
|
||||
index 2b2d82a736b..6b4176d53e3 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_ftruncate/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_ftruncate/rule.yml
|
||||
@@ -66,7 +66,7 @@ references:
|
||||
stigid@ol7: OL07-00-030510
|
||||
stigid@ol8: OL08-00-030460
|
||||
stigid@rhel7: RHEL-07-030550
|
||||
- stigid@rhel8: RHEL-08-030460
|
||||
+ stigid@rhel8: RHEL-08-030420
|
||||
stigid@sle12: SLES-12-020510
|
||||
stigid@sle15: SLES-15-030320
|
||||
stigid@ubuntu2004: UBTU-20-010157
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open/rule.yml
|
||||
index dcb3d0f0525..90d45b6787e 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open/rule.yml
|
||||
@@ -66,7 +66,7 @@ references:
|
||||
stigid@ol7: OL07-00-030510
|
||||
stigid@ol8: OL08-00-030440
|
||||
stigid@rhel7: RHEL-07-030510
|
||||
- stigid@rhel8: RHEL-08-030440
|
||||
+ stigid@rhel8: RHEL-08-030420
|
||||
stigid@sle12: SLES-12-020490
|
||||
stigid@sle15: SLES-15-030150
|
||||
stigid@ubuntu2004: UBTU-20-010155
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at/rule.yml
|
||||
index e68d892bb90..6df936e489c 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at/rule.yml
|
||||
@@ -60,7 +60,7 @@ references:
|
||||
stigid@ol7: OL07-00-030510
|
||||
stigid@ol8: OL08-00-030450
|
||||
stigid@rhel7: RHEL-07-030530
|
||||
- stigid@rhel8: RHEL-08-030450
|
||||
+ stigid@rhel8: RHEL-08-030420
|
||||
stigid@sle12: SLES-12-020540
|
||||
stigid@sle15: SLES-15-030180
|
||||
stigid@ubuntu2004: UBTU-20-010160
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_openat/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_openat/rule.yml
|
||||
index cd6bd545e71..1b6ae818e48 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_openat/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_openat/rule.yml
|
||||
@@ -66,7 +66,7 @@ references:
|
||||
stigid@ol7: OL07-00-030510
|
||||
stigid@ol8: OL08-00-030430
|
||||
stigid@rhel7: RHEL-07-030520
|
||||
- stigid@rhel8: RHEL-08-030430
|
||||
+ stigid@rhel8: RHEL-08-030420
|
||||
stigid@sle12: SLES-12-020530
|
||||
stigid@sle15: SLES-15-030170
|
||||
stigid@ubuntu2004: UBTU-20-010159
|
||||
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit/rule.yml
|
||||
index 50e5b4e4f02..2f1c6d0bf22 100644
|
||||
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit/rule.yml
|
||||
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit/rule.yml
|
||||
@@ -51,7 +51,7 @@ references:
|
||||
stigid@ol7: OL07-00-030820
|
||||
stigid@ol8: OL08-00-030380
|
||||
stigid@rhel7: RHEL-07-030821
|
||||
- stigid@rhel8: RHEL-08-030380
|
||||
+ stigid@rhel8: RHEL-08-030360
|
||||
stigid@sle12: SLES-12-020740
|
||||
stigid@sle15: SLES-15-030530
|
||||
stigid@ubuntu2004: UBTU-20-010180
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index ffca983d0bd..d92bc72971c 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -560,6 +560,8 @@ selections:
|
||||
|
||||
# RHEL-08-020220
|
||||
- accounts_password_pam_pwhistory_remember_system_auth
|
||||
+
|
||||
+ # RHEL-08-020221
|
||||
- accounts_password_pam_pwhistory_remember_password_auth
|
||||
|
||||
# RHEL-08-020230
|
||||
@@ -712,18 +714,11 @@ selections:
|
||||
|
||||
# RHEL-08-030200
|
||||
- audit_rules_dac_modification_lremovexattr
|
||||
-
|
||||
- # RHEL-08-030210
|
||||
- audit_rules_dac_modification_removexattr
|
||||
-
|
||||
- # RHEL-08-030220
|
||||
- audit_rules_dac_modification_lsetxattr
|
||||
-
|
||||
- # RHEL-08-030230
|
||||
- audit_rules_dac_modification_fsetxattr
|
||||
-
|
||||
- # RHEL-08-030240
|
||||
- audit_rules_dac_modification_fremovexattr
|
||||
+ - audit_rules_dac_modification_setxattr
|
||||
|
||||
# RHEL-08-030250
|
||||
- audit_rules_privileged_commands_chage
|
||||
@@ -731,8 +726,6 @@ selections:
|
||||
# RHEL-08-030260
|
||||
- audit_rules_execution_chcon
|
||||
|
||||
- # RHEL-08-030270
|
||||
- - audit_rules_dac_modification_setxattr
|
||||
|
||||
# RHEL-08-030280
|
||||
- audit_rules_privileged_commands_ssh_agent
|
||||
@@ -787,28 +780,18 @@ selections:
|
||||
|
||||
# RHEL-08-030360
|
||||
- audit_rules_kernel_module_loading_init
|
||||
+ - audit_rules_kernel_module_loading_finit
|
||||
|
||||
# RHEL-08-030361
|
||||
- audit_rules_file_deletion_events_rename
|
||||
-
|
||||
- # RHEL-08-030362
|
||||
- audit_rules_file_deletion_events_renameat
|
||||
-
|
||||
- # RHEL-08-030363
|
||||
- audit_rules_file_deletion_events_rmdir
|
||||
-
|
||||
- # RHEL-08-030364
|
||||
- audit_rules_file_deletion_events_unlink
|
||||
-
|
||||
- # RHEL-08-030365
|
||||
- audit_rules_file_deletion_events_unlinkat
|
||||
|
||||
# RHEL-08-030370
|
||||
- audit_rules_privileged_commands_gpasswd
|
||||
|
||||
- # RHEL-08-030380
|
||||
- - audit_rules_kernel_module_loading_finit
|
||||
-
|
||||
# RHEL-08-030390
|
||||
- audit_rules_kernel_module_loading_delete
|
||||
|
||||
@@ -820,41 +803,21 @@ selections:
|
||||
|
||||
# RHEL-08-030420
|
||||
- audit_rules_unsuccessful_file_modification_truncate
|
||||
-
|
||||
- # RHEL-08-030430
|
||||
- audit_rules_unsuccessful_file_modification_openat
|
||||
-
|
||||
- # RHEL-08-030440
|
||||
- audit_rules_unsuccessful_file_modification_open
|
||||
-
|
||||
- # RHEL-08-030450
|
||||
- audit_rules_unsuccessful_file_modification_open_by_handle_at
|
||||
-
|
||||
- # RHEL-08-030460
|
||||
- audit_rules_unsuccessful_file_modification_ftruncate
|
||||
-
|
||||
- # RHEL-08-030470
|
||||
- audit_rules_unsuccessful_file_modification_creat
|
||||
|
||||
# RHEL-08-030480
|
||||
- audit_rules_dac_modification_chown
|
||||
-
|
||||
- # RHEL-08-030490
|
||||
- - audit_rules_dac_modification_chmod
|
||||
-
|
||||
- # RHEL-08-030500
|
||||
- audit_rules_dac_modification_lchown
|
||||
-
|
||||
- # RHEL-08-030510
|
||||
- audit_rules_dac_modification_fchownat
|
||||
-
|
||||
- # RHEL-08-030520
|
||||
- audit_rules_dac_modification_fchown
|
||||
|
||||
- # RHEL-08-030530
|
||||
+ # RHEL-08-030490
|
||||
+ - audit_rules_dac_modification_chmod
|
||||
- audit_rules_dac_modification_fchmodat
|
||||
-
|
||||
- # RHEL-08-030540
|
||||
- audit_rules_dac_modification_fchmod
|
||||
|
||||
# RHEL-08-030550
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index eb2cac913bd..42c6d0e9aca 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -561,6 +561,8 @@ selections:
|
||||
|
||||
# RHEL-08-020220
|
||||
- accounts_password_pam_pwhistory_remember_system_auth
|
||||
+
|
||||
+ # RHEL-08-020221
|
||||
- accounts_password_pam_pwhistory_remember_password_auth
|
||||
|
||||
# RHEL-08-020230
|
||||
@@ -713,18 +715,11 @@ selections:
|
||||
|
||||
# RHEL-08-030200
|
||||
- audit_rules_dac_modification_lremovexattr
|
||||
-
|
||||
- # RHEL-08-030210
|
||||
- audit_rules_dac_modification_removexattr
|
||||
-
|
||||
- # RHEL-08-030220
|
||||
- audit_rules_dac_modification_lsetxattr
|
||||
-
|
||||
- # RHEL-08-030230
|
||||
- audit_rules_dac_modification_fsetxattr
|
||||
-
|
||||
- # RHEL-08-030240
|
||||
- audit_rules_dac_modification_fremovexattr
|
||||
+ - audit_rules_dac_modification_setxattr
|
||||
|
||||
# RHEL-08-030250
|
||||
- audit_rules_privileged_commands_chage
|
||||
@@ -732,9 +727,6 @@ selections:
|
||||
# RHEL-08-030260
|
||||
- audit_rules_execution_chcon
|
||||
|
||||
- # RHEL-08-030270
|
||||
- - audit_rules_dac_modification_setxattr
|
||||
-
|
||||
# RHEL-08-030280
|
||||
- audit_rules_privileged_commands_ssh_agent
|
||||
|
||||
@@ -788,28 +780,18 @@ selections:
|
||||
|
||||
# RHEL-08-030360
|
||||
- audit_rules_kernel_module_loading_init
|
||||
+ - audit_rules_kernel_module_loading_finit
|
||||
|
||||
# RHEL-08-030361
|
||||
- audit_rules_file_deletion_events_rename
|
||||
-
|
||||
- # RHEL-08-030362
|
||||
- audit_rules_file_deletion_events_renameat
|
||||
-
|
||||
- # RHEL-08-030363
|
||||
- audit_rules_file_deletion_events_rmdir
|
||||
-
|
||||
- # RHEL-08-030364
|
||||
- audit_rules_file_deletion_events_unlink
|
||||
-
|
||||
- # RHEL-08-030365
|
||||
- audit_rules_file_deletion_events_unlinkat
|
||||
|
||||
# RHEL-08-030370
|
||||
- audit_rules_privileged_commands_gpasswd
|
||||
|
||||
- # RHEL-08-030380
|
||||
- - audit_rules_kernel_module_loading_finit
|
||||
-
|
||||
# RHEL-08-030390
|
||||
- audit_rules_kernel_module_loading_delete
|
||||
|
||||
@@ -821,41 +803,21 @@ selections:
|
||||
|
||||
# RHEL-08-030420
|
||||
- audit_rules_unsuccessful_file_modification_truncate
|
||||
-
|
||||
- # RHEL-08-030430
|
||||
- audit_rules_unsuccessful_file_modification_openat
|
||||
-
|
||||
- # RHEL-08-030440
|
||||
- audit_rules_unsuccessful_file_modification_open
|
||||
-
|
||||
- # RHEL-08-030450
|
||||
- audit_rules_unsuccessful_file_modification_open_by_handle_at
|
||||
-
|
||||
- # RHEL-08-030460
|
||||
- audit_rules_unsuccessful_file_modification_ftruncate
|
||||
-
|
||||
- # RHEL-08-030470
|
||||
- audit_rules_unsuccessful_file_modification_creat
|
||||
|
||||
# RHEL-08-030480
|
||||
- audit_rules_dac_modification_chown
|
||||
-
|
||||
- # RHEL-08-030490
|
||||
- - audit_rules_dac_modification_chmod
|
||||
-
|
||||
- # RHEL-08-030500
|
||||
- audit_rules_dac_modification_lchown
|
||||
-
|
||||
- # RHEL-08-030510
|
||||
- audit_rules_dac_modification_fchownat
|
||||
-
|
||||
- # RHEL-08-030520
|
||||
- audit_rules_dac_modification_fchown
|
||||
|
||||
- # RHEL-08-030530
|
||||
+ # RHEL-08-030490
|
||||
+ - audit_rules_dac_modification_chmod
|
||||
- audit_rules_dac_modification_fchmodat
|
||||
-
|
||||
- # RHEL-08-030540
|
||||
- audit_rules_dac_modification_fchmod
|
||||
|
||||
# RHEL-08-030550
|
@ -1,375 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/bash/shared.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/bash/shared.sh
|
||||
new file mode 100644
|
||||
index 00000000000..1c151a1ec1a
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/bash/shared.sh
|
||||
@@ -0,0 +1,5 @@
|
||||
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhv
|
||||
+
|
||||
+if ! grep -q "^password.*sufficient.*pam_unix.so.*sha512" "/etc/pam.d/password-auth"; then
|
||||
+ sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/$/ sha512/" "/etc/pam.d/password-auth"
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/oval/shared.xml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/oval/shared.xml
|
||||
new file mode 100644
|
||||
index 00000000000..24fdbe4c1d4
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/oval/shared.xml
|
||||
@@ -0,0 +1,19 @@
|
||||
+<def-group>
|
||||
+ <definition class="compliance" id="set_password_hashing_algorithm_passwordauth" version="1">
|
||||
+ {{{ oval_metadata("The password hashing algorithm should be set correctly in /etc/pam.d/password-auth.") }}}
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion test_ref="test_pam_unix_passwordauth_sha512" />
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/password-auth for correct settings" id="test_pam_unix_passwordauth_sha512" version="1">
|
||||
+ <ind:object object_ref="object_pam_unix_passwordauth_sha512" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+
|
||||
+ <ind:textfilecontent54_object comment="check /etc/pam.d/password-auth for correct settings" id="object_pam_unix_passwordauth_sha512" version="1">
|
||||
+ <ind:filepath>/etc/pam.d/password-auth</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:sufficient))[\s]+pam_unix\.so[\s]+.*sha512.*$</ind:pattern>
|
||||
+ <ind:instance datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+</def-group>
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..9375269161d
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/rule.yml
|
||||
@@ -0,0 +1,72 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: fedora,rhel7,rhel8,rhel9,rhv4
|
||||
+
|
||||
+title: "Set PAM's Password Hashing Algorithm - password-auth"
|
||||
+
|
||||
+description: |-
|
||||
+ The PAM system service can be configured to only store encrypted
|
||||
+ representations of passwords. In
|
||||
+ <tt>/etc/pam.d/password-auth</tt>,
|
||||
+ the
|
||||
+ <tt>password</tt> section of the file controls which PAM modules execute
|
||||
+ during a password change. Set the <tt>pam_unix.so</tt> module in the
|
||||
+ <tt>password</tt> section to include the argument <tt>sha512</tt>, as shown
|
||||
+ below:
|
||||
+ <br />
|
||||
+ <pre>password sufficient pam_unix.so sha512 <i>other arguments...</i></pre>
|
||||
+ <br />
|
||||
+ This will help ensure when local users change their passwords, hashes for
|
||||
+ the new passwords will be generated using the SHA-512 algorithm. This is
|
||||
+ the default.
|
||||
+
|
||||
+rationale: |-
|
||||
+ Passwords need to be protected at all times, and encryption is the standard
|
||||
+ method for protecting passwords. If passwords are not encrypted, they can
|
||||
+ be plainly read (i.e., clear text) and easily compromised. Passwords that
|
||||
+ are encrypted with a weak algorithm are no more protected than if they are
|
||||
+ kepy in plain text.
|
||||
+ <br /><br />
|
||||
+ This setting ensures user and group account administration utilities are
|
||||
+ configured to store only encrypted representations of passwords.
|
||||
+ Additionally, the <tt>crypt_style</tt> configuration option ensures the use
|
||||
+ of a strong hashing algorithm that makes password cracking attacks more
|
||||
+ difficult.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel7: CCE-85943-9
|
||||
+ cce@rhel8: CCE-85945-4
|
||||
+ cce@rhel9: CCE-85946-2
|
||||
+
|
||||
+references:
|
||||
+ anssi: BP28(R32)
|
||||
+ cis-csc: 1,12,15,16,5
|
||||
+ cis@rhel7: 5.4.3
|
||||
+ cis@rhel8: 5.4.4
|
||||
+ cjis: 5.6.2.2
|
||||
+ cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
|
||||
+ cui: 3.13.11
|
||||
+ disa: CCI-000196
|
||||
+ isa-62443-2009: 4.3.3.2.2,4.3.3.5.1,4.3.3.5.2,4.3.3.6.1,4.3.3.6.2,4.3.3.6.3,4.3.3.6.4,4.3.3.6.5,4.3.3.6.6,4.3.3.6.7,4.3.3.6.8,4.3.3.6.9,4.3.3.7.2,4.3.3.7.4
|
||||
+ isa-62443-2013: 'SR 1.1,SR 1.10,SR 1.2,SR 1.3,SR 1.4,SR 1.5,SR 1.7,SR 1.8,SR 1.9,SR 2.1'
|
||||
+ ism: 0418,1055,1402
|
||||
+ iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
|
||||
+ nist: IA-5(c),IA-5(1)(c),CM-6(a)
|
||||
+ nist-csf: PR.AC-1,PR.AC-6,PR.AC-7
|
||||
+ pcidss: Req-8.2.1
|
||||
+ srg: SRG-OS-000073-GPOS-00041
|
||||
+ stigid@rhel7: RHEL-07-010200
|
||||
+ stigid@rhel8: RHEL-08-010160
|
||||
+ vmmsrg: SRG-OS-000480-VMM-002000
|
||||
+
|
||||
+ocil_clause: 'it does not'
|
||||
+
|
||||
+ocil: |-
|
||||
+ Inspect the <tt>password</tt> section of <tt>/etc/pam.d/password-auth</tt>
|
||||
+ and ensure that the <tt>pam_unix.so</tt> module includes the argument
|
||||
+ <tt>sha512</tt>:
|
||||
+ <pre>$ grep sha512 /etc/pam.d/password-auth</pre>
|
||||
+
|
||||
+platform: pam
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/correct.pass.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/correct.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..a924fe5bd97
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/correct.pass.sh
|
||||
@@ -0,0 +1,5 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+if ! grep -q "^password.*sufficient.*pam_unix.so.*sha512" "/etc/pam.d/password-auth"; then
|
||||
+ sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/$/ sha512/" "/etc/pam.d/password-auth"
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/missing.fail.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/missing.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..68e925a645f
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/missing.fail.sh
|
||||
@@ -0,0 +1,3 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/sha512//g" "/etc/pam.d/password-auth"
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh
|
||||
index 542ea521a6c..e7503feeecb 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh
|
||||
@@ -1,7 +1,9 @@
|
||||
-# platform = multi_platform_wrlinux,multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv,multi_platform_sle
|
||||
+# platform = multi_platform_wrlinux,multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv
|
||||
|
||||
AUTH_FILES[0]="/etc/pam.d/system-auth"
|
||||
+{{%- if product == "rhel7" %}}
|
||||
AUTH_FILES[1]="/etc/pam.d/password-auth"
|
||||
+{{%- endif %}}
|
||||
|
||||
for pamFile in "${AUTH_FILES[@]}"
|
||||
do
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml
|
||||
index d76b6f80c0c..a754a84df6c 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml
|
||||
@@ -3,6 +3,9 @@
|
||||
{{{ oval_metadata("The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.") }}}
|
||||
<criteria operator="AND">
|
||||
<criterion test_ref="test_pam_unix_sha512" />
|
||||
+ {{%- if product == "rhel7" %}}
|
||||
+ <extend_definition comment="check /etc/pam.d/password-auth for correct settings" definition_ref="set_password_hashing_algorithm_passwordauth" />
|
||||
+ {{%- endif %}}
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml
|
||||
index 13da9dd4086..59fb48e93b5 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml
|
||||
@@ -70,7 +70,7 @@ references:
|
||||
stigid@ol7: OL07-00-010200
|
||||
stigid@ol8: OL08-00-010160
|
||||
stigid@rhel7: RHEL-07-010200
|
||||
- stigid@rhel8: RHEL-08-010160
|
||||
+ stigid@rhel8: RHEL-08-010159
|
||||
stigid@sle12: SLES-12-010230
|
||||
stigid@sle15: SLES-15-020170
|
||||
vmmsrg: SRG-OS-000480-VMM-002000
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh
|
||||
index 7e481760670..fb9feec4d27 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh
|
||||
@@ -1,7 +1,9 @@
|
||||
#!/bin/bash
|
||||
|
||||
AUTH_FILES[0]="/etc/pam.d/system-auth"
|
||||
+{{%- if product == "rhel7" %}}
|
||||
AUTH_FILES[1]="/etc/pam.d/password-auth"
|
||||
+{{%- endif %}}
|
||||
|
||||
for pamFile in "${AUTH_FILES[@]}"
|
||||
do
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh
|
||||
index 09bb82dd1d7..2f35381d475 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh
|
||||
@@ -1,7 +1,9 @@
|
||||
#!/bin/bash
|
||||
|
||||
AUTH_FILES[0]="/etc/pam.d/system-auth"
|
||||
+{{%- if product == "rhel7" %}}
|
||||
AUTH_FILES[1]="/etc/pam.d/password-auth"
|
||||
+{{%- endif %}}
|
||||
|
||||
for pamFile in "${AUTH_FILES[@]}"
|
||||
do
|
||||
diff --git a/products/rhel8/profiles/pci-dss.profile b/products/rhel8/profiles/pci-dss.profile
|
||||
index 3ada8e6fe49..4df21f4ae6e 100644
|
||||
--- a/products/rhel8/profiles/pci-dss.profile
|
||||
+++ b/products/rhel8/profiles/pci-dss.profile
|
||||
@@ -126,6 +126,7 @@ selections:
|
||||
- service_pcscd_enabled
|
||||
- sssd_enable_smartcards
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- file_owner_etc_shadow
|
||||
diff --git a/products/rhel8/profiles/rht-ccp.profile b/products/rhel8/profiles/rht-ccp.profile
|
||||
index 15abd98a6a5..7188062df72 100644
|
||||
--- a/products/rhel8/profiles/rht-ccp.profile
|
||||
+++ b/products/rhel8/profiles/rht-ccp.profile
|
||||
@@ -54,6 +54,7 @@ selections:
|
||||
- accounts_password_pam_difok
|
||||
- accounts_passwords_pam_faillock_deny
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- require_singleuser_auth
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 04f158116ee..8d69bb48d38 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -149,6 +149,9 @@ selections:
|
||||
# RHEL-08-010152
|
||||
- require_emergency_target_auth
|
||||
|
||||
+ # RHEL-08-010159
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
+
|
||||
# RHEL-08-010160
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
|
||||
diff --git a/products/rhel9/profiles/pci-dss.profile b/products/rhel9/profiles/pci-dss.profile
|
||||
index beb1acda31d..1e4044f4e7e 100644
|
||||
--- a/products/rhel9/profiles/pci-dss.profile
|
||||
+++ b/products/rhel9/profiles/pci-dss.profile
|
||||
@@ -123,6 +123,7 @@ selections:
|
||||
- service_pcscd_enabled
|
||||
- sssd_enable_smartcards
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- file_owner_etc_shadow
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 8f79b22e3e4..b9f557de030 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -150,6 +150,9 @@ selections:
|
||||
# RHEL-08-010152
|
||||
- require_emergency_target_auth
|
||||
|
||||
+ # RHEL-08-010159
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
+
|
||||
# RHEL-08-010160
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
|
||||
diff --git a/products/rhv4/profiles/pci-dss.profile b/products/rhv4/profiles/pci-dss.profile
|
||||
index c4ed0ec2d48..d00f44996d8 100644
|
||||
--- a/products/rhv4/profiles/pci-dss.profile
|
||||
+++ b/products/rhv4/profiles/pci-dss.profile
|
||||
@@ -121,6 +121,7 @@ selections:
|
||||
- service_pcscd_enabled
|
||||
- sssd_enable_smartcards
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- file_owner_etc_shadow
|
||||
diff --git a/products/rhv4/profiles/rhvh-stig.profile b/products/rhv4/profiles/rhvh-stig.profile
|
||||
index 01c2fd8cc2d..9cf416665ab 100644
|
||||
--- a/products/rhv4/profiles/rhvh-stig.profile
|
||||
+++ b/products/rhv4/profiles/rhvh-stig.profile
|
||||
@@ -356,6 +356,7 @@ selections:
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- package_opensc_installed
|
||||
- var_smartcard_drivers=cac
|
||||
- configure_opensc_card_drivers
|
||||
diff --git a/products/rhv4/profiles/rhvh-vpp.profile b/products/rhv4/profiles/rhvh-vpp.profile
|
||||
index c2b6c106937..e66fe435508 100644
|
||||
--- a/products/rhv4/profiles/rhvh-vpp.profile
|
||||
+++ b/products/rhv4/profiles/rhvh-vpp.profile
|
||||
@@ -201,6 +201,7 @@ selections:
|
||||
- accounts_password_pam_unix_remember
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
+ - set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- no_empty_passwords
|
||||
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 3f6ec5e17c4..4aa925037b1 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -53,9 +53,6 @@ CCE-85939-7
|
||||
CCE-85940-5
|
||||
CCE-85941-3
|
||||
CCE-85942-1
|
||||
-CCE-85943-9
|
||||
-CCE-85945-4
|
||||
-CCE-85946-2
|
||||
CCE-85947-0
|
||||
CCE-85948-8
|
||||
CCE-85949-6
|
||||
diff --git a/tests/data/profile_stability/rhel8/pci-dss.profile b/tests/data/profile_stability/rhel8/pci-dss.profile
|
||||
index f58bcf91cf2..e235d492438 100644
|
||||
--- a/tests/data/profile_stability/rhel8/pci-dss.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/pci-dss.profile
|
||||
@@ -1,5 +1,9 @@
|
||||
+title: PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
|
||||
description: Ensures PCI-DSS v3.2.1 security configuration settings are applied.
|
||||
-documentation_complete: true
|
||||
+extends: null
|
||||
+metadata:
|
||||
+ SMEs:
|
||||
+ - yuumasato
|
||||
reference: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
|
||||
selections:
|
||||
- account_disable_post_pw_expiration
|
||||
@@ -120,6 +124,7 @@ selections:
|
||||
- service_pcscd_enabled
|
||||
- set_password_hashing_algorithm_libuserconf
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
+- set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
- sshd_set_idle_timeout
|
||||
- sshd_set_keepalive_0
|
||||
@@ -136,4 +141,8 @@ selections:
|
||||
- var_multiple_time_servers=rhel
|
||||
- var_sshd_set_keepalive=0
|
||||
- var_smartcard_drivers=cac
|
||||
-title: PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
|
||||
+platforms: !!set {}
|
||||
+cpe_names: !!set {}
|
||||
+platform: null
|
||||
+filter_rules: ''
|
||||
+documentation_complete: true
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index ed739e724f4..c5fcbf47de2 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -336,6 +337,7 @@ selections:
|
||||
- service_systemd-coredump_disabled
|
||||
- service_usbguard_enabled
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
+- set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
- sshd_disable_compression
|
||||
- sshd_disable_empty_passwords
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 56c3fcb9f59..49ec4ae41ac 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -347,6 +348,7 @@ selections:
|
||||
- service_systemd-coredump_disabled
|
||||
- service_usbguard_enabled
|
||||
- set_password_hashing_algorithm_logindefs
|
||||
+- set_password_hashing_algorithm_passwordauth
|
||||
- set_password_hashing_algorithm_systemauth
|
||||
- sshd_disable_compression
|
||||
- sshd_disable_empty_passwords
|
@ -1,397 +0,0 @@
|
||||
From 742e103392746dac771663247d169cfe498ee658 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Fri, 21 Jan 2022 14:02:16 +0100
|
||||
Subject: [PATCH 1/7] modify vsyscall rules according to rhel9 ospp
|
||||
|
||||
add references
|
||||
make rules scored in th e profile
|
||||
---
|
||||
.../system/bootloader-grub2/grub2_vsyscall_argument/rule.yml | 1 +
|
||||
.../system/bootloader-zipl/zipl_vsyscall_argument/rule.yml | 3 +++
|
||||
products/rhel9/profiles/ospp.profile | 4 ----
|
||||
3 files changed, 4 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
index 1dd26fea9b6..9f38a1c13b9 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
|
||||
@@ -25,6 +25,7 @@ identifiers:
|
||||
references:
|
||||
disa: CCI-001084
|
||||
nist: CM-7(a)
|
||||
+ ospp: FPT_ASLR_EXT.1
|
||||
srg: SRG-OS-000480-GPOS-00227,SRG-OS-000134-GPOS-00068
|
||||
stigid@ol8: OL08-00-010422
|
||||
stigid@rhel8: RHEL-08-010422
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_vsyscall_argument/rule.yml b/linux_os/guide/system/bootloader-zipl/zipl_vsyscall_argument/rule.yml
|
||||
index 52b192ffc52..9d645c8876e 100644
|
||||
--- a/linux_os/guide/system/bootloader-zipl/zipl_vsyscall_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_vsyscall_argument/rule.yml
|
||||
@@ -21,6 +21,9 @@ identifiers:
|
||||
cce@rhel8: CCE-83381-4
|
||||
cce@rhel9: CCE-84100-7
|
||||
|
||||
+references:
|
||||
+ ospp: FPT_ASLR_EXT.1
|
||||
+
|
||||
ocil_clause: 'vsyscalls are enabled'
|
||||
|
||||
ocil: |-
|
||||
diff --git a/products/rhel9/profiles/ospp.profile b/products/rhel9/profiles/ospp.profile
|
||||
index 287a28c43c5..f0b850a4ced 100644
|
||||
--- a/products/rhel9/profiles/ospp.profile
|
||||
+++ b/products/rhel9/profiles/ospp.profile
|
||||
@@ -128,8 +128,6 @@ selections:
|
||||
- grub2_slub_debug_argument
|
||||
- grub2_page_poison_argument
|
||||
- grub2_vsyscall_argument
|
||||
- - grub2_vsyscall_argument.role=unscored
|
||||
- - grub2_vsyscall_argument.severity=info
|
||||
- grub2_pti_argument
|
||||
- grub2_kernel_trust_cpu_rng
|
||||
|
||||
@@ -421,5 +419,3 @@ selections:
|
||||
- zipl_slub_debug_argument
|
||||
- zipl_page_poison_argument
|
||||
- zipl_vsyscall_argument
|
||||
- - zipl_vsyscall_argument.role=unscored
|
||||
- - zipl_vsyscall_argument.severity=info
|
||||
|
||||
From d167658d46accbc75200a5d145a746322f1c2d4a Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Fri, 21 Jan 2022 14:05:24 +0100
|
||||
Subject: [PATCH 2/7] add ospp references to fips rules
|
||||
|
||||
---
|
||||
.../software/integrity/fips/enable_dracut_fips_module/rule.yml | 1 +
|
||||
.../system/software/integrity/fips/enable_fips_mode/rule.yml | 2 +-
|
||||
2 files changed, 2 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/integrity/fips/enable_dracut_fips_module/rule.yml b/linux_os/guide/system/software/integrity/fips/enable_dracut_fips_module/rule.yml
|
||||
index f342b9b8d95..3b7c3229b6f 100644
|
||||
--- a/linux_os/guide/system/software/integrity/fips/enable_dracut_fips_module/rule.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/fips/enable_dracut_fips_module/rule.yml
|
||||
@@ -29,6 +29,7 @@ references:
|
||||
ism: "1446"
|
||||
nerc-cip: CIP-003-8 R4.2,CIP-007-3 R5.1
|
||||
nist: SC-12(2),SC-12(3),IA-7,SC-13,CM-6(a),SC-12
|
||||
+ ospp: FCS_RBG_EXT.1
|
||||
srg: SRG-OS-000478-GPOS-00223
|
||||
stigid@ol8: OL08-00-010020
|
||||
stigid@rhel8: RHEL-08-010020
|
||||
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
index 7559e61600d..9d89114b07f 100644
|
||||
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
|
||||
@@ -39,7 +39,7 @@ references:
|
||||
ism: "1446"
|
||||
nerc-cip: CIP-003-8 R4.2,CIP-007-3 R5.1
|
||||
nist: SC-12(2),SC-12(3),IA-7,SC-13,CM-6(a),SC-12
|
||||
- ospp: FCS_COP.1(1),FCS_COP.1(2),FCS_COP.1(3),FCS_COP.1(4),FCS_CKM.1,FCS_CKM.2,FCS_TLSC_EXT.1
|
||||
+ ospp: FCS_COP.1(1),FCS_COP.1(2),FCS_COP.1(3),FCS_COP.1(4),FCS_CKM.1,FCS_CKM.2,FCS_TLSC_EXT.1,FCS_RBG_EXT.1
|
||||
srg: SRG-OS-000478-GPOS-00223,SRG-OS-000396-GPOS-00176
|
||||
stigid@ol8: OL08-00-010020
|
||||
stigid@rhel8: RHEL-08-010020
|
||||
|
||||
From f05e895bb96b64a5142e62e3dd0f7208633d5c23 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Fri, 21 Jan 2022 14:08:36 +0100
|
||||
Subject: [PATCH 3/7] drop no longer needed rules from ospp rhel9 profile
|
||||
|
||||
---
|
||||
products/rhel9/profiles/ospp.profile | 6 ------
|
||||
1 file changed, 6 deletions(-)
|
||||
|
||||
diff --git a/products/rhel9/profiles/ospp.profile b/products/rhel9/profiles/ospp.profile
|
||||
index f0b850a4ced..7e30054bc98 100644
|
||||
--- a/products/rhel9/profiles/ospp.profile
|
||||
+++ b/products/rhel9/profiles/ospp.profile
|
||||
@@ -125,11 +125,7 @@ selections:
|
||||
## Boot prompt
|
||||
- grub2_audit_argument
|
||||
- grub2_audit_backlog_limit_argument
|
||||
- - grub2_slub_debug_argument
|
||||
- - grub2_page_poison_argument
|
||||
- grub2_vsyscall_argument
|
||||
- - grub2_pti_argument
|
||||
- - grub2_kernel_trust_cpu_rng
|
||||
|
||||
## Security Settings
|
||||
- sysctl_kernel_kptr_restrict
|
||||
@@ -416,6 +412,4 @@ selections:
|
||||
- zipl_bootmap_is_up_to_date
|
||||
- zipl_audit_argument
|
||||
- zipl_audit_backlog_limit_argument
|
||||
- - zipl_slub_debug_argument
|
||||
- - zipl_page_poison_argument
|
||||
- zipl_vsyscall_argument
|
||||
|
||||
From 972ae269eff95de8a6914056d38e58b7aeafb8c3 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Fri, 21 Jan 2022 15:12:46 +0100
|
||||
Subject: [PATCH 4/7] add grub2_init_on_alloc rule
|
||||
|
||||
---
|
||||
.../grub2_init_on_alloc_argument/rule.yml | 46 +++++++++++++++++++
|
||||
shared/references/cce-redhat-avail.txt | 1 -
|
||||
2 files changed, 46 insertions(+), 1 deletion(-)
|
||||
create mode 100644 linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..592e2fb117d
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
@@ -0,0 +1,46 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: rhel9
|
||||
+
|
||||
+title: 'Configure kernel to zero out memory before allocation (through Grub2)'
|
||||
+
|
||||
+description: |-
|
||||
+ To configure the kernel to zero out memory before allocating it, add the
|
||||
+ <tt>init_on_alloc=1</tt> argument to the default GRUB 2 command line for
|
||||
+ the Linux operating system in <tt>/etc/default/grub</tt>, in the manner
|
||||
+ below:
|
||||
+ <pre>GRUB_CMDLINE_LINUX="crashkernel=auto quiet rd.shell=0 audit=1 audit_backlog_limit=8192 init_on_alloc=1"</pre>
|
||||
+ Update the boot parameter for existing kernels by running the following command:
|
||||
+ <pre># grubby --update-kernel=ALL --args="init_on_alloc=1"</pre>
|
||||
+
|
||||
+rationale: |-
|
||||
+ When the kernel configuration option <tt>init_on_alloc</tt> is enabled,
|
||||
+ all page allocator and slab allocator memory will be zeroed when allocated,
|
||||
+ eliminating many kinds of "uninitialized heap memory" flaws, effectively
|
||||
+ preventing data leaks.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel9: CCE-85867-0
|
||||
+
|
||||
+ocil_clause: 'the kernel is not configured to zero out memory before allocation'
|
||||
+
|
||||
+ocil: |-
|
||||
+ Make sure that the kernel is configured to zero out memory before
|
||||
+ allocation. Ensure that the parameter is configured in
|
||||
+ <tt>/etc/default/grub</tt>:
|
||||
+ <pre>grep GRUB_CMDLINE_LINUX /etc/default/grub</pre>
|
||||
+ The output should contain <tt>init_on_alloc=1</tt>.
|
||||
+ Run the following command to display command line parameters of all
|
||||
+ installed kernels:
|
||||
+ <pre># grubby --info=ALL | grep args</pre>
|
||||
+ Ensure that each line contains the <tt>init_on_alloc=1</tt> parameter.
|
||||
+
|
||||
+platform: machine
|
||||
+
|
||||
+template:
|
||||
+ name: grub2_bootloader_argument
|
||||
+ vars:
|
||||
+ arg_name: init_on_alloc
|
||||
+ arg_value: '1'
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 8aad24b20f7..6835189cd99 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -1,4 +1,3 @@
|
||||
-CCE-85867-0
|
||||
CCE-85868-8
|
||||
CCE-85872-0
|
||||
CCE-85873-8
|
||||
|
||||
From a865514257c85d79aaf7e4286d8723aa1ad8de03 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Mon, 24 Jan 2022 10:01:23 +0100
|
||||
Subject: [PATCH 5/7] add zipl_init_on_alloc_argument rule
|
||||
|
||||
---
|
||||
.../zipl_init_on_alloc_argument/rule.yml | 41 +++++++++++++++++++
|
||||
.../tests/correct_option.pass.sh | 15 +++++++
|
||||
.../tests/missing_in_cmdline.fail.sh | 13 ++++++
|
||||
.../tests/missing_in_entry.fail.sh | 13 ++++++
|
||||
shared/references/cce-redhat-avail.txt | 1 -
|
||||
5 files changed, 82 insertions(+), 1 deletion(-)
|
||||
create mode 100644 linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml
|
||||
create mode 100644 linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/correct_option.pass.sh
|
||||
create mode 100644 linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_cmdline.fail.sh
|
||||
create mode 100644 linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_entry.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml
|
||||
new file mode 100644
|
||||
index 00000000000..b47a7757327
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml
|
||||
@@ -0,0 +1,41 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: rhel9
|
||||
+
|
||||
+title: 'Configure kernel to zero out memory before allocation (through zIPl)'
|
||||
+
|
||||
+description: |-
|
||||
+ To ensure that the kernel is configured to zero out memory before
|
||||
+ allocation, check that all boot entries in
|
||||
+ <tt>/boot/loader/entries/*.conf</tt> have <tt>init_on_alloc=1</tt>
|
||||
+ included in its options.<br />
|
||||
+
|
||||
+ To ensure that new kernels and boot entries continue to zero out memory
|
||||
+ before allocation, add <tt>init_on_alloc=1</tt> to <tt>/etc/kernel/cmdline</tt>.
|
||||
+
|
||||
+rationale: |-
|
||||
+ When the kernel configuration option <tt>init_on_alloc</tt> is enabled,
|
||||
+ all page allocator and slab allocator memory will be zeroed when allocated,
|
||||
+ eliminating many kinds of "uninitialized heap memory" flaws, effectively
|
||||
+ preventing data leaks.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel9: CCE-85868-8
|
||||
+
|
||||
+ocil_clause: 'the kernel is not configured to zero out memory before allocation'
|
||||
+
|
||||
+ocil: |-
|
||||
+ To check that the kernel is configured to zero out memory before allocation
|
||||
+ time, check all boot entries with following command:
|
||||
+ <pre>sudo grep -L"^options\s+.*\binit_on_alloc=1\b" /boot/loader/entries/*.conf</pre>
|
||||
+ No line should be returned, each line returned is a boot entry that doesn't enable audit.
|
||||
+
|
||||
+platform: machine
|
||||
+
|
||||
+template:
|
||||
+ name: zipl_bls_entries_option
|
||||
+ vars:
|
||||
+ arg_name: init_on_alloc
|
||||
+ arg_value: '1'
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/correct_option.pass.sh b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/correct_option.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..50cf1b78f70
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/correct_option.pass.sh
|
||||
@@ -0,0 +1,15 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_fedora,Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Make sure boot loader entries contain init_on_alloc=1
|
||||
+for file in /boot/loader/entries/*.conf
|
||||
+do
|
||||
+ if ! grep -q '^options.*init_on_alloc=1.*$' "$file" ; then
|
||||
+ sed -i '/^options / s/$/ init_on_alloc=1/' "$file"
|
||||
+ fi
|
||||
+done
|
||||
+
|
||||
+# Make sure /etc/kernel/cmdline contains init_on_alloc=1
|
||||
+if ! grep -qs '^(.*\s)?init_on_alloc=1(\s.*)?$' /etc/kernel/cmdline ; then
|
||||
+ echo "init_on_alloc=1" >> /etc/kernel/cmdline
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_cmdline.fail.sh b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_cmdline.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..7c0d9154776
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_cmdline.fail.sh
|
||||
@@ -0,0 +1,13 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_fedora,Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Make sure boot loader entries contain init_on_alloc=1
|
||||
+for file in /boot/loader/entries/*.conf
|
||||
+do
|
||||
+ if ! grep -q '^options.*init_on_alloc=1.*$' "$file" ; then
|
||||
+ sed -i '/^options / s/$/ init_on_alloc=1/' "$file"
|
||||
+ fi
|
||||
+done
|
||||
+
|
||||
+# Make sure /etc/kernel/cmdline doesn't contain init_on_alloc=1
|
||||
+sed -Ei 's/(^.*)init_on_alloc=1(.*?)$/\1\2/' /etc/kernel/cmdline || true
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_entry.fail.sh b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_entry.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..9d330c9192d
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/tests/missing_in_entry.fail.sh
|
||||
@@ -0,0 +1,13 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_fedora,Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Remove init_on_alloc=1 from all boot entries
|
||||
+sed -Ei 's/(^options.*\s)init_on_alloc=1(.*?)$/\1\2/' /boot/loader/entries/*
|
||||
+# But make sure one boot loader entry contains init_on_alloc=1
|
||||
+sed -i '/^options / s/$/ init_on_alloc=1/' /boot/loader/entries/*rescue.conf
|
||||
+sed -Ei 's/(^options.*\s)\$kernelopts(.*?)$/\1\2/' /boot/loader/entries/*rescue.conf
|
||||
+
|
||||
+# Make sure /etc/kernel/cmdline contains init_on_alloc=1
|
||||
+if ! grep -qs '^(.*\s)?init_on_alloc=1(\s.*)?$' /etc/kernel/cmdline ; then
|
||||
+ echo "init_on_alloc=1" >> /etc/kernel/cmdline
|
||||
+fi
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 6835189cd99..05a641aeaf0 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -1,4 +1,3 @@
|
||||
-CCE-85868-8
|
||||
CCE-85872-0
|
||||
CCE-85873-8
|
||||
CCE-85874-6
|
||||
|
||||
From 9ca5ec04e734941b1c401369b6da6672b42824b1 Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Mon, 24 Jan 2022 10:07:24 +0100
|
||||
Subject: [PATCH 6/7] add new rules to rhel9 ospp
|
||||
|
||||
---
|
||||
products/rhel9/profiles/ospp.profile | 2 ++
|
||||
1 file changed, 2 insertions(+)
|
||||
|
||||
diff --git a/products/rhel9/profiles/ospp.profile b/products/rhel9/profiles/ospp.profile
|
||||
index 7e30054bc98..28c7e92d298 100644
|
||||
--- a/products/rhel9/profiles/ospp.profile
|
||||
+++ b/products/rhel9/profiles/ospp.profile
|
||||
@@ -126,6 +126,7 @@ selections:
|
||||
- grub2_audit_argument
|
||||
- grub2_audit_backlog_limit_argument
|
||||
- grub2_vsyscall_argument
|
||||
+ - grub2_init_on_alloc_argument
|
||||
|
||||
## Security Settings
|
||||
- sysctl_kernel_kptr_restrict
|
||||
@@ -413,3 +414,4 @@ selections:
|
||||
- zipl_audit_argument
|
||||
- zipl_audit_backlog_limit_argument
|
||||
- zipl_vsyscall_argument
|
||||
+ - zipl_init_on_alloc_argument
|
||||
|
||||
From 42a118bcc615051ae4cd268a5fc758aa5d75108d Mon Sep 17 00:00:00 2001
|
||||
From: Vojtech Polasek <vpolasek@redhat.com>
|
||||
Date: Thu, 27 Jan 2022 14:08:20 +0100
|
||||
Subject: [PATCH 7/7] make rule names consistent
|
||||
|
||||
---
|
||||
.../bootloader-grub2/grub2_init_on_alloc_argument/rule.yml | 2 +-
|
||||
.../system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml | 2 +-
|
||||
2 files changed, 2 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
index 592e2fb117d..a9253c74cc6 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_init_on_alloc_argument/rule.yml
|
||||
@@ -2,7 +2,7 @@ documentation_complete: true
|
||||
|
||||
prodtype: rhel9
|
||||
|
||||
-title: 'Configure kernel to zero out memory before allocation (through Grub2)'
|
||||
+title: 'Configure kernel to zero out memory before allocation'
|
||||
|
||||
description: |-
|
||||
To configure the kernel to zero out memory before allocating it, add the
|
||||
diff --git a/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml
|
||||
index b47a7757327..fa272250a28 100644
|
||||
--- a/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-zipl/zipl_init_on_alloc_argument/rule.yml
|
||||
@@ -2,7 +2,7 @@ documentation_complete: true
|
||||
|
||||
prodtype: rhel9
|
||||
|
||||
-title: 'Configure kernel to zero out memory before allocation (through zIPl)'
|
||||
+title: 'Configure kernel to zero out memory before allocation in zIPL'
|
||||
|
||||
description: |-
|
||||
To ensure that the kernel is configured to zero out memory before
|
@ -1,155 +0,0 @@
|
||||
diff --git a/controls/anssi.yml b/controls/anssi.yml
|
||||
index ff3736711dd..5c3d5f34ea8 100644
|
||||
--- a/controls/anssi.yml
|
||||
+++ b/controls/anssi.yml
|
||||
@@ -72,6 +72,7 @@ controls:
|
||||
SELinux policies limit the privileges of services and daemons to only what they require.
|
||||
rules:
|
||||
- selinux_state
|
||||
+ - var_selinux_state=enforcing
|
||||
|
||||
- id: R4
|
||||
levels:
|
||||
diff --git a/products/rhel8/profiles/anssi_bp28_enhanced.profile b/products/rhel8/profiles/anssi_bp28_enhanced.profile
|
||||
index 2a49527c10a..8f2ee31493b 100644
|
||||
--- a/products/rhel8/profiles/anssi_bp28_enhanced.profile
|
||||
+++ b/products/rhel8/profiles/anssi_bp28_enhanced.profile
|
||||
@@ -17,4 +17,3 @@ description: |-
|
||||
|
||||
selections:
|
||||
- anssi:all:enhanced
|
||||
- - '!selinux_state'
|
||||
diff --git a/products/rhel9/profiles/anssi_bp28_enhanced.profile b/products/rhel9/profiles/anssi_bp28_enhanced.profile
|
||||
index 89e0d260390..da048c9b556 100644
|
||||
--- a/products/rhel9/profiles/anssi_bp28_enhanced.profile
|
||||
+++ b/products/rhel9/profiles/anssi_bp28_enhanced.profile
|
||||
@@ -17,4 +17,3 @@ description: |-
|
||||
|
||||
selections:
|
||||
- anssi:all:enhanced
|
||||
- - '!selinux_state'
|
||||
diff --git a/tests/unit/ssg-module/data/controls_dir/abcd-levels.yml b/tests/unit/ssg-module/data/controls_dir/abcd-levels.yml
|
||||
index 2e60ec43532..b201c495b8d 100644
|
||||
--- a/tests/unit/ssg-module/data/controls_dir/abcd-levels.yml
|
||||
+++ b/tests/unit/ssg-module/data/controls_dir/abcd-levels.yml
|
||||
@@ -42,3 +42,29 @@ controls:
|
||||
rules:
|
||||
- var_password_pam_minlen=2
|
||||
- var_some_variable=3
|
||||
+
|
||||
+ # S5, S6 and S7 are used to test if level inheritance is working corectly
|
||||
+ # when multiple levels select the same rule
|
||||
+ - id: S5
|
||||
+ title: Default Crypto Policy
|
||||
+ levels:
|
||||
+ - low
|
||||
+ rules:
|
||||
+ - configure_crypto_policy
|
||||
+ - var_system_crypto_policy=default_policy
|
||||
+
|
||||
+ - id: S6
|
||||
+ title: FIPS Crypto Policy
|
||||
+ levels:
|
||||
+ - medium
|
||||
+ rules:
|
||||
+ - configure_crypto_policy
|
||||
+ - var_system_crypto_policy=fips
|
||||
+
|
||||
+ - id: S7
|
||||
+ title: Future Crypto Policy
|
||||
+ levels:
|
||||
+ - high
|
||||
+ rules:
|
||||
+ - configure_crypto_policy
|
||||
+ - var_system_crypto_policy=future
|
||||
diff --git a/tests/unit/ssg-module/test_controls.py b/tests/unit/ssg-module/test_controls.py
|
||||
index d3d6280042a..fb569280736 100644
|
||||
--- a/tests/unit/ssg-module/test_controls.py
|
||||
+++ b/tests/unit/ssg-module/test_controls.py
|
||||
@@ -92,6 +92,20 @@ def test_controls_levels():
|
||||
c_4b = controls_manager.get_control("abcd-levels", "S4.b")
|
||||
assert c_4b.levels == ["high"]
|
||||
|
||||
+ c_5 = controls_manager.get_control("abcd-levels", "S5")
|
||||
+ assert c_5.levels == ["low"]
|
||||
+
|
||||
+ c_6 = controls_manager.get_control("abcd-levels", "S6")
|
||||
+ assert c_6.levels == ["medium"]
|
||||
+
|
||||
+ c_7 = controls_manager.get_control("abcd-levels", "S7")
|
||||
+ assert c_7.levels == ["high"]
|
||||
+
|
||||
+ # test if all crypto-policy controls have the rule selected
|
||||
+ assert "configure_crypto_policy" in c_5.selections
|
||||
+ assert "configure_crypto_policy" in c_6.selections
|
||||
+ assert "configure_crypto_policy" in c_7.selections
|
||||
+
|
||||
# just the essential controls
|
||||
low_controls = controls_manager.get_all_controls_of_level(
|
||||
"abcd-levels", "low")
|
||||
@@ -104,25 +118,34 @@ def test_controls_levels():
|
||||
|
||||
assert len(high_controls) == len(all_controls)
|
||||
assert len(low_controls) <= len(high_controls)
|
||||
- assert len(low_controls) == 4
|
||||
- assert len(medium_controls) == 5
|
||||
+ assert len(low_controls) == 5
|
||||
+ assert len(medium_controls) == 7
|
||||
|
||||
# test overriding of variables in levels
|
||||
assert c_2.variables["var_password_pam_minlen"] == "1"
|
||||
assert "var_password_pam_minlen" not in c_3.variables.keys()
|
||||
assert c_4b.variables["var_password_pam_minlen"] == "2"
|
||||
|
||||
+ variable_found = False
|
||||
for c in low_controls:
|
||||
if "var_password_pam_minlen" in c.variables.keys():
|
||||
+ variable_found = True
|
||||
assert c.variables["var_password_pam_minlen"] == "1"
|
||||
+ assert variable_found
|
||||
|
||||
+ variable_found = False
|
||||
for c in medium_controls:
|
||||
if "var_password_pam_minlen" in c.variables.keys():
|
||||
+ variable_found = True
|
||||
assert c.variables["var_password_pam_minlen"] == "1"
|
||||
+ assert variable_found
|
||||
|
||||
+ variable_found = False
|
||||
for c in high_controls:
|
||||
if "var_password_pam_minlen" in c.variables.keys():
|
||||
+ variable_found = True
|
||||
assert c.variables["var_password_pam_minlen"] == "2"
|
||||
+ assert variable_found
|
||||
|
||||
# now test if controls of lower level has the variable definition correctly removed
|
||||
# because it is overriden by higher level controls
|
||||
@@ -141,6 +164,28 @@ def test_controls_levels():
|
||||
assert s2_low[0].variables["var_some_variable"] == "1"
|
||||
assert s2_low[0].variables["var_password_pam_minlen"] == "1"
|
||||
|
||||
+ # check that low, medium and high levels have crypto policy selected
|
||||
+ s5_low = [c for c in low_controls if c.id == "S5"]
|
||||
+ assert len(s5_low) == 1
|
||||
+ assert "configure_crypto_policy" in s5_low[0].selections
|
||||
+
|
||||
+ s5_medium = [c for c in medium_controls if c.id == "S5"]
|
||||
+ assert len(s5_medium) == 1
|
||||
+ assert "configure_crypto_policy" in s5_medium[0].selections
|
||||
+ s6_medium = [c for c in medium_controls if c.id == "S6"]
|
||||
+ assert len(s6_medium) == 1
|
||||
+ assert "configure_crypto_policy" in s6_medium[0].selections
|
||||
+
|
||||
+ s5_high = [c for c in high_controls if c.id == "S5"]
|
||||
+ assert len(s5_high) == 1
|
||||
+ assert "configure_crypto_policy" in s5_high[0].selections
|
||||
+ s6_high = [c for c in high_controls if c.id == "S6"]
|
||||
+ assert len(s6_high) == 1
|
||||
+ assert "configure_crypto_policy" in s6_high[0].selections
|
||||
+ s7_high = [c for c in high_controls if c.id == "S7"]
|
||||
+ assert len(s7_high) == 1
|
||||
+ assert "configure_crypto_policy" in s7_high[0].selections
|
||||
+
|
||||
|
||||
def test_controls_load_product():
|
||||
product_yaml = os.path.join(ssg_root, "products", "rhel8", "product.yml")
|
@ -1,163 +0,0 @@
|
||||
From 573ae69742cf372d41da6c56a3051745326055cd Mon Sep 17 00:00:00 2001
|
||||
From: Gabriel Becker <ggasparb@redhat.com>
|
||||
Date: Mon, 14 Feb 2022 15:54:37 +0100
|
||||
Subject: [PATCH] Update RHEL-08-010385 to allow only one occurrence of config.
|
||||
|
||||
This configuration must appear at only one place so it doesn't get
|
||||
overriden by a different file that can loaded on a different order and
|
||||
the intended configuration is replaced by non-compliant value.
|
||||
---
|
||||
.../ansible/shared.yml | 36 ++++++++++++++++++
|
||||
.../bash/shared.sh | 38 +++++++++++++++++++
|
||||
.../oval/shared.xml | 4 +-
|
||||
.../sudo_require_reauthentication/rule.yml | 14 +------
|
||||
.../tests/multiple_correct_value.fail.sh | 10 +++++
|
||||
5 files changed, 87 insertions(+), 15 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudo_require_reauthentication/ansible/shared.yml
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudo_require_reauthentication/bash/shared.sh
|
||||
create mode 100644 linux_os/guide/system/software/sudo/sudo_require_reauthentication/tests/multiple_correct_value.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/ansible/shared.yml b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/ansible/shared.yml
|
||||
new file mode 100644
|
||||
index 00000000000..b0c67a69af9
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/ansible/shared.yml
|
||||
@@ -0,0 +1,36 @@
|
||||
+# platform = multi_platform_all
|
||||
+# reboot = false
|
||||
+# strategy = restrict
|
||||
+# complexity = low
|
||||
+# disruption = low
|
||||
+
|
||||
+{{{ ansible_instantiate_variables("var_sudo_timestamp_timeout") }}}
|
||||
+- name: "Find out if /etc/sudoers.d/* files contain 'Defaults timestamp_timeout' to be deduplicated"
|
||||
+ find:
|
||||
+ path: "/etc/sudoers.d"
|
||||
+ patterns: "*"
|
||||
+ contains: '^[\s]*Defaults\s.*\btimestamp_timeout=.*'
|
||||
+ register: sudoers_d_defaults_timestamp_timeout
|
||||
+
|
||||
+- name: "Remove found occurrences of 'Defaults timestamp_timeout' from /etc/sudoers.d/* files"
|
||||
+ lineinfile:
|
||||
+ path: "{{ item.path }}"
|
||||
+ regexp: '^[\s]*Defaults\s.*\btimestamp_timeout=.*'
|
||||
+ state: absent
|
||||
+ with_items: "{{ sudoers_d_defaults_timestamp_timeout.files }}"
|
||||
+
|
||||
+- name: Ensure timestamp_timeout is enabled with the appropriate value in /etc/sudoers
|
||||
+ lineinfile:
|
||||
+ path: /etc/sudoers
|
||||
+ regexp: '^[\s]*Defaults\s(.*)\btimestamp_timeout=[-]?\w+\b(.*)$'
|
||||
+ line: 'Defaults \1timestamp_timeout={{ var_sudo_timestamp_timeout }}\2'
|
||||
+ validate: /usr/sbin/visudo -cf %s
|
||||
+ backrefs: yes
|
||||
+ register: edit_sudoers_timestamp_timeout_option
|
||||
+
|
||||
+- name: Enable timestamp_timeout option with appropriate value in /etc/sudoers
|
||||
+ lineinfile: # noqa 503
|
||||
+ path: /etc/sudoers
|
||||
+ line: 'Defaults timestamp_timeout={{ var_sudo_timestamp_timeout }}'
|
||||
+ validate: /usr/sbin/visudo -cf %s
|
||||
+ when: edit_sudoers_timestamp_timeout_option is defined and not edit_sudoers_timestamp_timeout_option.changed
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/bash/shared.sh b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/bash/shared.sh
|
||||
new file mode 100644
|
||||
index 00000000000..0b623ed4a49
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/bash/shared.sh
|
||||
@@ -0,0 +1,38 @@
|
||||
+# platform = multi_platform_all
|
||||
+# reboot = false
|
||||
+# strategy = restrict
|
||||
+# complexity = low
|
||||
+# disruption = low
|
||||
+
|
||||
+
|
||||
+{{{ bash_instantiate_variables("var_sudo_timestamp_timeout") }}}
|
||||
+
|
||||
+if grep -x '^[\s]*Defaults.*\btimestamp_timeout=.*' /etc/sudoers.d/*; then
|
||||
+ find /etc/sudoers.d/ -type f -exec sed -i "/^[\s]*Defaults.*\btimestamp_timeout=.*/d" {} \;
|
||||
+fi
|
||||
+
|
||||
+if /usr/sbin/visudo -qcf /etc/sudoers; then
|
||||
+ cp /etc/sudoers /etc/sudoers.bak
|
||||
+ if ! grep -P '^[\s]*Defaults.*\btimestamp_timeout=[-]?\w+\b\b.*$' /etc/sudoers; then
|
||||
+ # sudoers file doesn't define Option timestamp_timeout
|
||||
+ echo "Defaults timestamp_timeout=${var_sudo_timestamp_timeout}" >> /etc/sudoers
|
||||
+ else
|
||||
+ # sudoers file defines Option timestamp_timeout, remediate if appropriate value is not set
|
||||
+ if ! grep -P "^[\s]*Defaults.*\btimestamp_timeout=${var_sudo_timestamp_timeout}\b.*$" /etc/sudoers; then
|
||||
+
|
||||
+ sed -Ei "s/(^[\s]*Defaults.*\btimestamp_timeout=)[-]?\w+(\b.*$)/\1${var_sudo_timestamp_timeout}\2/" /etc/sudoers
|
||||
+ fi
|
||||
+ fi
|
||||
+
|
||||
+ # Check validity of sudoers and cleanup bak
|
||||
+ if /usr/sbin/visudo -qcf /etc/sudoers; then
|
||||
+ rm -f /etc/sudoers.bak
|
||||
+ else
|
||||
+ echo "Fail to validate remediated /etc/sudoers, reverting to original file."
|
||||
+ mv /etc/sudoers.bak /etc/sudoers
|
||||
+ false
|
||||
+ fi
|
||||
+else
|
||||
+ echo "Skipping remediation, /etc/sudoers failed to validate"
|
||||
+ false
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/oval/shared.xml b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/oval/shared.xml
|
||||
index 8f404ca6065..dfc319b6f1f 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/oval/shared.xml
|
||||
@@ -6,13 +6,13 @@
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
- <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="check correct configuration in /etc/sudoers" id="test_sudo_timestamp_timeout" version="1">
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists" comment="check correct configuration in /etc/sudoers" id="test_sudo_timestamp_timeout" version="1">
|
||||
<ind:object object_ref="obj_sudo_timestamp_timeout"/>
|
||||
<ind:state state_ref="state_sudo_timestamp_timeout" />
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
<ind:textfilecontent54_object id="obj_sudo_timestamp_timeout" version="1">
|
||||
- <ind:filepath>/etc/sudoers</ind:filepath>
|
||||
+ <ind:filepath operation="pattern match">^/etc/sudoers(\.d/.*)?$</ind:filepath>
|
||||
<ind:pattern operation="pattern match">^[\s]*Defaults[\s]+timestamp_timeout=([-]?[\d]+)$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/rule.yml b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/rule.yml
|
||||
index 42c6e28f9e6..eebb96678f1 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/rule.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/rule.yml
|
||||
@@ -50,16 +50,4 @@ ocil: |-
|
||||
<pre>sudo grep -ri '^Defaults.*timestamp_timeout' /etc/sudoers /etc/sudoers.d</pre>
|
||||
The output should be:
|
||||
<pre>/etc/sudoers:Defaults timestamp_timeout=0</pre> or "timestamp_timeout" is set to a positive number.
|
||||
-
|
||||
-template:
|
||||
- name: sudo_defaults_option
|
||||
- vars:
|
||||
- option: timestamp_timeout
|
||||
- variable_name: "var_sudo_timestamp_timeout"
|
||||
- # optional minus char added so remediation can detect properly if item is already configured
|
||||
- option_regex_suffix: '=[-]?\w+\b'
|
||||
- backends:
|
||||
- # Template is not able to accomodate this particular check.
|
||||
- # It needs to check for an integer greater than or equal to zero
|
||||
- oval: "off"
|
||||
-
|
||||
+ If results are returned from more than one file location, this is a finding.
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudo_require_reauthentication/tests/multiple_correct_value.fail.sh b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/tests/multiple_correct_value.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..a258d6632b5
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudo_require_reauthentication/tests/multiple_correct_value.fail.sh
|
||||
@@ -0,0 +1,10 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+
|
||||
+if grep -q 'timestamp_timeout' /etc/sudoers; then
|
||||
+ sed -i 's/.*timestamp_timeout.*/Defaults timestamp_timeout=3/' /etc/sudoers
|
||||
+else
|
||||
+ echo "Defaults timestamp_timeout=3" >> /etc/sudoers
|
||||
+fi
|
||||
+
|
||||
+echo "Defaults timestamp_timeout=3" > /etc/sudoers.d/00-complianceascode-test.conf
|
@ -1,13 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml b/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml
|
||||
index e9d25a34fbd..13231dc2cc9 100644
|
||||
--- a/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml
|
||||
+++ b/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml
|
||||
@@ -90,6 +90,7 @@ ocil: |-
|
||||
/dev/sda2: UUID=" bc98d7ef-6g54-321h-1d24-9870de2ge1a2
|
||||
" TYPE="crypto_LUKS"</pre>
|
||||
<br /><br />
|
||||
- Pseudo-file systems, such as /proc, /sys, and tmpfs, are not required to use disk encryption and are not a finding.
|
||||
+ The boot partition and pseudo-file systems, such as /proc, /sys, and tmpfs,
|
||||
+ are not required to use disk encryption and are not a finding.
|
||||
|
||||
platform: machine
|
@ -1,43 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/software/integrity/crypto/configure_ssh_crypto_policy/rule.yml b/linux_os/guide/system/software/integrity/crypto/configure_ssh_crypto_policy/rule.yml
|
||||
index 395129acb66..60b0ce0eb7d 100644
|
||||
--- a/linux_os/guide/system/software/integrity/crypto/configure_ssh_crypto_policy/rule.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/crypto/configure_ssh_crypto_policy/rule.yml
|
||||
@@ -30,7 +30,7 @@ references:
|
||||
nist: AC-17(a),AC-17(2),CM-6(a),MA-4(6),SC-13
|
||||
srg: SRG-OS-000250-GPOS-00093
|
||||
stigid@ol8: OL08-00-010020
|
||||
- stigid@rhel8: RHEL-08-010020
|
||||
+ stigid@rhel8: RHEL-08-010287
|
||||
|
||||
ocil_clause: 'the CRYPTO_POLICY variable is not set or is commented in the /etc/sysconfig/sshd'
|
||||
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 04f158116ee..60eafa9c566 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -191,9 +191,7 @@ selections:
|
||||
# RHEL-08-010260
|
||||
- file_groupowner_var_log
|
||||
|
||||
- # *** SHARED *** #
|
||||
- # RHEL-08-010290 && RHEL-08-010291
|
||||
- # *** SHARED *** #
|
||||
+ # RHEL-08-010287
|
||||
- configure_ssh_crypto_policy
|
||||
|
||||
# RHEL-08-010290
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 8f79b22e3e4..9bd1a2b0f51 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -192,9 +192,7 @@ selections:
|
||||
# RHEL-08-010260
|
||||
- file_groupowner_var_log
|
||||
|
||||
- # *** SHARED *** #
|
||||
- # RHEL-08-010290 && RHEL-08-010291
|
||||
- # *** SHARED *** #
|
||||
+ # RHEL-08-010287
|
||||
- configure_ssh_crypto_policy
|
||||
|
||||
# RHEL-08-010290
|
@ -1,146 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/ansible/shared.yml b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/ansible/shared.yml
|
||||
index 08ffd76aed6..399ca1ea3ce 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/ansible/shared.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/ansible/shared.yml
|
||||
@@ -4,6 +4,26 @@
|
||||
# complexity = low
|
||||
# disruption = low
|
||||
|
||||
-{{{ ansible_lineinfile(msg='Ensure that Defaults !targetpw is defined in sudoers', path='/etc/sudoers', new_line='Defaults !targetpw', create='yes', state='present') }}}
|
||||
-{{{ ansible_lineinfile(msg='Ensure that Defaults !rootpw is defined in sudoers', path='/etc/sudoers', new_line='Defaults !rootpw', create='yes', state='present') }}}
|
||||
-{{{ ansible_lineinfile(msg='Ensure that Defaults !runaspw is defined in sudoers', path='/etc/sudoers', new_line='Defaults !runaspw', create='yes', state='present') }}}
|
||||
+{{%- macro delete_line_in_sudoers_d(line) %}}
|
||||
+- name: "Find out if /etc/sudoers.d/* files contain {{{ line }}} to be deduplicated"
|
||||
+ find:
|
||||
+ path: "/etc/sudoers.d"
|
||||
+ patterns: "*"
|
||||
+ contains: '^{{{ line }}}$'
|
||||
+ register: sudoers_d_defaults
|
||||
+
|
||||
+- name: "Remove found occurrences of {{{ line }}} from /etc/sudoers.d/* files"
|
||||
+ lineinfile:
|
||||
+ path: "{{ item.path }}"
|
||||
+ regexp: "^{{{ line }}}$"
|
||||
+ state: absent
|
||||
+ with_items: "{{ sudoers_d_defaults.files }}"
|
||||
+{{%- endmacro %}}
|
||||
+
|
||||
+{{{- delete_line_in_sudoers_d("Defaults !targetpw") }}}
|
||||
+{{{- delete_line_in_sudoers_d("Defaults !rootpw") }}}
|
||||
+{{{- delete_line_in_sudoers_d("Defaults !runaspw") }}}
|
||||
+
|
||||
+{{{ ansible_only_lineinfile(msg='Ensure that Defaults !targetpw is defined in sudoers', line_regex='^Defaults !targetpw$', path='/etc/sudoers', new_line='Defaults !targetpw') }}}
|
||||
+{{{ ansible_only_lineinfile(msg='Ensure that Defaults !rootpw is defined in sudoers', line_regex='^Defaults !rootpw$', path='/etc/sudoers', new_line='Defaults !rootpw') }}}
|
||||
+{{{ ansible_only_lineinfile(msg='Ensure that Defaults !runaspw is defined in sudoers', line_regex='^Defaults !runaspw$', path='/etc/sudoers', new_line='Defaults !runaspw') }}}
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/bash/shared.sh b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/bash/shared.sh
|
||||
index ea0ac67fa1c..3b327f3fc88 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/bash/shared.sh
|
||||
@@ -1,5 +1,17 @@
|
||||
# platform = multi_platform_all
|
||||
|
||||
+{{%- macro delete_line_in_sudoers_d(line) %}}
|
||||
+if grep -x '^{{{line}}}$' /etc/sudoers.d/*; then
|
||||
+ find /etc/sudoers.d/ -type f -exec sed -i "/{{{line}}}/d" {} \;
|
||||
+fi
|
||||
+{{%- endmacro %}}
|
||||
+
|
||||
+{{{- delete_line_in_sudoers_d("Defaults !targetpw") }}}
|
||||
+{{{- delete_line_in_sudoers_d("Defaults !rootpw") }}}
|
||||
+{{{- delete_line_in_sudoers_d("Defaults !runaspw") }}}
|
||||
+
|
||||
{{{ set_config_file(path="/etc/sudoers", parameter="Defaults !targetpw", value="", create=true, insensitive=false, separator="", separator_regex="", prefix_regex="") }}}
|
||||
{{{ set_config_file(path="/etc/sudoers", parameter="Defaults !rootpw", value="", create=true, insensitive=false, separator="", separator_regex="", prefix_regex="") }}}
|
||||
{{{ set_config_file(path="/etc/sudoers", parameter="Defaults !runaspw", value="", create=true, insensitive=false, separator="", separator_regex="", prefix_regex="") }}}
|
||||
+
|
||||
+
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/oval/shared.xml b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/oval/shared.xml
|
||||
index 646e6bfb7c0..b3fadd53bee 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/oval/shared.xml
|
||||
@@ -8,17 +8,17 @@
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
- <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensure invoking user's password for privilege escalation when using sudo"
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Ensure invoking user's password for privilege escalation when using sudo"
|
||||
id="test_sudoers_targetpw_config" version="1">
|
||||
<ind:object object_ref="object_test_sudoers_targetpw_config" />
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
- <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensure invoking user's password for privilege escalation when using sudo"
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Ensure invoking user's password for privilege escalation when using sudo"
|
||||
id="test_sudoers_rootpw_config" version="1">
|
||||
<ind:object object_ref="object_test_sudoers_rootpw_config" />
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
- <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensure invoking user's password for privilege escalation when using sudo"
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Ensure invoking user's password for privilege escalation when using sudo"
|
||||
id="test_sudoers_runaspw_config" version="1">
|
||||
<ind:object object_ref="object_test_sudoers_runaspw_config" />
|
||||
</ind:textfilecontent54_test>
|
||||
@@ -26,19 +26,19 @@
|
||||
<ind:textfilecontent54_object id="object_test_sudoers_targetpw_config" version="1">
|
||||
<ind:filepath operation="pattern match">^/etc/sudoers(\.d/.*)?$</ind:filepath>
|
||||
<ind:pattern operation="pattern match">^Defaults !targetpw$\r?\n</ind:pattern>
|
||||
- <ind:instance datatype="int">1</ind:instance>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
<ind:textfilecontent54_object id="object_test_sudoers_rootpw_config" version="1">
|
||||
<ind:filepath operation="pattern match">^/etc/sudoers(\.d/.*)?$</ind:filepath>
|
||||
<ind:pattern operation="pattern match">^Defaults !rootpw$\r?\n</ind:pattern>
|
||||
- <ind:instance datatype="int">1</ind:instance>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
<ind:textfilecontent54_object id="object_test_sudoers_runaspw_config" version="1">
|
||||
<ind:filepath operation="pattern match">^/etc/sudoers(\.d/.*)?$</ind:filepath>
|
||||
<ind:pattern operation="pattern match">^Defaults !runaspw$\r?\n</ind:pattern>
|
||||
- <ind:instance datatype="int">1</ind:instance>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
</def-group>
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/rule.yml b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/rule.yml
|
||||
index ccc29b77d15..698021d8fd0 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/rule.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/rule.yml
|
||||
@@ -42,7 +42,8 @@ ocil_clause: 'invoke user passwd when using sudo'
|
||||
ocil: |-
|
||||
Run the following command to Verify that the sudoers security policy is configured to use the invoking user's password for privilege escalation:
|
||||
<pre> sudo egrep -i '(!rootpw|!targetpw|!runaspw)' /etc/sudoers /etc/sudoers.d/* | grep -v '#'</pre>
|
||||
- If no results are returned, this is a finding
|
||||
+ If no results are returned, this is a finding.
|
||||
+ If results are returned from more than one file location, this is a finding.
|
||||
If "Defaults !targetpw" is not defined, this is a finding.
|
||||
If "Defaults !rootpw" is not defined, this is a finding.
|
||||
If "Defaults !runaspw" is not defined, this is a finding.
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/tests/sudoers_d_duplicate.fail.sh b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/tests/sudoers_d_duplicate.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..a258d108a00
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/tests/sudoers_d_duplicate.fail.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+# platform = multi_platform_fedora,multi_platform_ol,multi_platform_rhel,SUSE Linux Enterprise 15
|
||||
+# packages = sudo
|
||||
+
|
||||
+echo 'Defaults !targetpw' >> /etc/sudoers
|
||||
+echo 'Defaults !rootpw' >> /etc/sudoers
|
||||
+echo 'Defaults !runaspw' >> /etc/sudoers
|
||||
+echo 'Defaults !targetpw' >> /etc/sudoers.d/00-complianceascode.conf
|
||||
+echo 'Defaults !rootpw' >> /etc/sudoers.d/00-complianceascode.conf
|
||||
+echo 'Defaults !runaspw' >> /etc/sudoers.d/00-complianceascode.conf
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_validate_passwd/tests/sudoers_validate_passwd_duplicates.fail.sh b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/tests/sudoers_validate_passwd_duplicates.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..6247b5230e4
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_validate_passwd/tests/sudoers_validate_passwd_duplicates.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+# platform = multi_platform_fedora,multi_platform_ol,multi_platform_rhel,SUSE Linux Enterprise 15
|
||||
+# packages = sudo
|
||||
+
|
||||
+echo 'Defaults !targetpw' >> /etc/sudoers
|
||||
+echo 'Defaults !rootpw' >> /etc/sudoers
|
||||
+echo 'Defaults !runaspw' >> /etc/sudoers
|
||||
+echo 'Defaults !runaspw' >> /etc/sudoers
|
@ -1,300 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/bash/shared.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/bash/shared.sh
|
||||
index 737d725872d..08b62057bde 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/bash/shared.sh
|
||||
@@ -1,7 +1,11 @@
|
||||
# platform = multi_platform_all
|
||||
+# reboot = true
|
||||
+# strategy = enable
|
||||
+# complexity = low
|
||||
+# disruption = low
|
||||
|
||||
if ! grep -x ' case "$name" in sshd|login) exec tmux ;; esac' /etc/bashrc; then
|
||||
- cat >> /etc/bashrc <<'EOF'
|
||||
+ cat >> /etc/profile.d/tmux.sh <<'EOF'
|
||||
if [ "$PS1" ]; then
|
||||
parent=$(ps -o ppid= -p $$)
|
||||
name=$(ps -o comm= -p $parent)
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml
|
||||
index 00ac349e292..4cb2f9e0e04 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/oval/shared.xml
|
||||
@@ -4,21 +4,27 @@
|
||||
<criteria comment="Check exec tmux configured at the end of bashrc" operator="AND">
|
||||
<criterion comment="check tmux is configured to exec on the last line of /etc/bashrc"
|
||||
test_ref="test_configure_bashrc_exec_tmux" />
|
||||
+ <criterion comment="check tmux is running" test_ref="test_tmux_running"/>
|
||||
</criteria>
|
||||
</definition>
|
||||
- <ind:textfilecontent54_test check="only one" check_existence="only_one_exists"
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="all_exist"
|
||||
comment="check tmux is configured to exec on the last line of /etc/bashrc"
|
||||
id="test_configure_bashrc_exec_tmux" version="1">
|
||||
<ind:object object_ref="obj_configure_bashrc_exec_tmux" />
|
||||
- <ind:state state_ref="state_configure_bashrc_exec_tmux" />
|
||||
</ind:textfilecontent54_test>
|
||||
<ind:textfilecontent54_object id="obj_configure_bashrc_exec_tmux" version="1">
|
||||
<ind:behaviors singleline="true" multiline="false" />
|
||||
- <ind:filepath>/etc/bashrc</ind:filepath>
|
||||
- <ind:pattern operation="pattern match">^(.*)$</ind:pattern>
|
||||
- <ind:instance datatype="int">1</ind:instance>
|
||||
+ <ind:filepath operation="pattern match">^/etc/bashrc$|^/etc/profile\.d/.*$</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">if \[ "\$PS1" \]; then\n\s+parent=\$\(ps -o ppid= -p \$\$\)\n\s+name=\$\(ps -o comm= -p \$parent\)\n\s+case "\$name" in sshd\|login\) exec tmux ;; esac\nfi</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
- <ind:textfilecontent54_state id="state_configure_bashrc_exec_tmux" version="1">
|
||||
- <ind:subexpression datatype="string" operation="pattern match">if \[ "\$PS1" \]; then\n\s+parent=\$\(ps -o ppid= -p \$\$\)\n\s+name=\$\(ps -o comm= -p \$parent\)\n\s+case "\$name" in sshd\|login\) exec tmux ;; esac\nfi</ind:subexpression>
|
||||
- </ind:textfilecontent54_state>
|
||||
+
|
||||
+ <unix:process58_test check="all" id="test_tmux_running" comment="is tmux running" version="1">
|
||||
+ <unix:object object_ref="obj_tmux_running"/>
|
||||
+ </unix:process58_test>
|
||||
+
|
||||
+ <unix:process58_object id="obj_tmux_running" version="1">
|
||||
+ <unix:command_line operation="pattern match">^tmux(?:|[\s]+.*)$</unix:command_line>
|
||||
+ <unix:pid datatype="int" operation="greater than">0</unix:pid>
|
||||
+ </unix:process58_object>
|
||||
</def-group>
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
|
||||
index 3ba0f4a2d8f..7afc5fc5e6b 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
|
||||
@@ -7,12 +7,20 @@ title: 'Support session locking with tmux'
|
||||
description: |-
|
||||
The <tt>tmux</tt> terminal multiplexer is used to implement
|
||||
automatic session locking. It should be started from
|
||||
- <tt>/etc/bashrc</tt>.
|
||||
+ <tt>/etc/bashrc</tt> or drop-in files within <tt>/etc/profile.d/</tt>.
|
||||
+ Additionally it must be ensured that the <tt>tmux</tt> process is running
|
||||
+ and it can be verified with the following command:
|
||||
+ <pre>ps all | grep tmux | grep -v grep</pre>
|
||||
|
||||
rationale: |-
|
||||
Unlike <tt>bash</tt> itself, the <tt>tmux</tt> terminal multiplexer
|
||||
provides a mechanism to lock sessions after period of inactivity.
|
||||
|
||||
+warnings:
|
||||
+ - general: |-
|
||||
+ The remediation does not start the tmux process, so it must be
|
||||
+ manually started or have the system rebooted after applying the fix.
|
||||
+
|
||||
severity: medium
|
||||
|
||||
identifiers:
|
||||
@@ -26,17 +34,21 @@ references:
|
||||
stigid@ol8: OL08-00-020041
|
||||
stigid@rhel8: RHEL-08-020041
|
||||
|
||||
-ocil_clause: 'exec tmux is not present at the end of bashrc'
|
||||
+ocil_clause: 'exec tmux is not present at the end of bashrc or tmux process is not running'
|
||||
|
||||
ocil: |-
|
||||
To verify that tmux is configured to execute,
|
||||
run the following command:
|
||||
- <pre>$ grep -A1 -B3 "case ..name. in sshd|login) exec tmux ;; esac" /etc/bashrc</pre>
|
||||
+ <pre>$ grep -A1 -B3 "case ..name. in sshd|login) exec tmux ;; esac" /etc/bashrc /etc/profile.d/*</pre>
|
||||
The output should return the following:
|
||||
<pre>if [ "$PS1" ]; then
|
||||
parent=$(ps -o ppid= -p $$)
|
||||
name=$(ps -o comm= -p $parent)
|
||||
case "$name" in sshd|login) exec tmux ;; esac
|
||||
fi</pre>
|
||||
+ To verify that the tmux process is running,
|
||||
+ run the following command:
|
||||
+ <pre>ps all | grep tmux | grep -v grep</pre>
|
||||
+ If the command does not produce output, this is a finding.
|
||||
|
||||
platform: machine
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..221c18665ef
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value.pass.sh
|
||||
@@ -0,0 +1,12 @@
|
||||
+#!/bin/bash
|
||||
+# packages = tmux
|
||||
+
|
||||
+cat >> /etc/bashrc <<'EOF'
|
||||
+if [ "$PS1" ]; then
|
||||
+ parent=$(ps -o ppid= -p $$)
|
||||
+ name=$(ps -o comm= -p $parent)
|
||||
+ case "$name" in sshd|login) exec tmux ;; esac
|
||||
+fi
|
||||
+EOF
|
||||
+
|
||||
+tmux new-session -s root -d
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..1702bb17e79
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/correct_value_d_directory.pass.sh
|
||||
@@ -0,0 +1,13 @@
|
||||
+#!/bin/bash
|
||||
+# packages = tmux
|
||||
+
|
||||
+
|
||||
+cat >> /etc/profile.d/00-complianceascode.conf <<'EOF'
|
||||
+if [ "$PS1" ]; then
|
||||
+ parent=$(ps -o ppid= -p $$)
|
||||
+ name=$(ps -o comm= -p $parent)
|
||||
+ case "$name" in sshd|login) exec tmux ;; esac
|
||||
+fi
|
||||
+EOF
|
||||
+
|
||||
+tmux new-session -s root -d
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..16d4acfcb5a
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/duplicate_value_multiple_files.pass.sh
|
||||
@@ -0,0 +1,20 @@
|
||||
+#!/bin/bash
|
||||
+# packages = tmux
|
||||
+
|
||||
+cat >> /etc/profile.d/00-complianceascode.conf <<'EOF'
|
||||
+if [ "$PS1" ]; then
|
||||
+ parent=$(ps -o ppid= -p $$)
|
||||
+ name=$(ps -o comm= -p $parent)
|
||||
+ case "$name" in sshd|login) exec tmux ;; esac
|
||||
+fi
|
||||
+EOF
|
||||
+
|
||||
+cat >> /etc/bashrc <<'EOF'
|
||||
+if [ "$PS1" ]; then
|
||||
+ parent=$(ps -o ppid= -p $$)
|
||||
+ name=$(ps -o comm= -p $parent)
|
||||
+ case "$name" in sshd|login) exec tmux ;; esac
|
||||
+fi
|
||||
+EOF
|
||||
+
|
||||
+tmux new-session -s root -d
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..6cb9d83efc5
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/tmux_not_running.fail.sh
|
||||
@@ -0,0 +1,13 @@
|
||||
+#!/bin/bash
|
||||
+# packages = tmux
|
||||
+# remediation = none
|
||||
+
|
||||
+cat >> /etc/bashrc <<'EOF'
|
||||
+if [ "$PS1" ]; then
|
||||
+ parent=$(ps -o ppid= -p $$)
|
||||
+ name=$(ps -o comm= -p $parent)
|
||||
+ case "$name" in sshd|login) exec tmux ;; esac
|
||||
+fi
|
||||
+EOF
|
||||
+
|
||||
+killall tmux || true
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..f13a8b038e4
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/tests/wrong_value.fail.sh
|
||||
@@ -0,0 +1,105 @@
|
||||
+#!/bin/bash
|
||||
+# packages = tmux
|
||||
+
|
||||
+cat > /etc/bashrc <<'EOF'
|
||||
+# /etc/bashrc
|
||||
+
|
||||
+# System wide functions and aliases
|
||||
+# Environment stuff goes in /etc/profile
|
||||
+
|
||||
+# It's NOT a good idea to change this file unless you know what you
|
||||
+# are doing. It's much better to create a custom.sh shell script in
|
||||
+# /etc/profile.d/ to make custom changes to your environment, as this
|
||||
+# will prevent the need for merging in future updates.
|
||||
+
|
||||
+# Prevent doublesourcing
|
||||
+if [ -z "$BASHRCSOURCED" ]; then
|
||||
+ BASHRCSOURCED="Y"
|
||||
+
|
||||
+ # are we an interactive shell?
|
||||
+ if [ "$PS1" ]; then
|
||||
+ if [ -z "$PROMPT_COMMAND" ]; then
|
||||
+ case $TERM in
|
||||
+ xterm*|vte*)
|
||||
+ if [ -e /etc/sysconfig/bash-prompt-xterm ]; then
|
||||
+ PROMPT_COMMAND=/etc/sysconfig/bash-prompt-xterm
|
||||
+ elif [ "${VTE_VERSION:-0}" -ge 3405 ]; then
|
||||
+ PROMPT_COMMAND="__vte_prompt_command"
|
||||
+ else
|
||||
+ PROMPT_COMMAND='printf "\033]0;%s@%s:%s\007" "${USER}" "${HOSTNAME%%.*}" "${PWD/#$HOME/\~}"'
|
||||
+ fi
|
||||
+ ;;
|
||||
+ screen*)
|
||||
+ if [ -e /etc/sysconfig/bash-prompt-screen ]; then
|
||||
+ PROMPT_COMMAND=/etc/sysconfig/bash-prompt-screen
|
||||
+ else
|
||||
+ PROMPT_COMMAND='printf "\033k%s@%s:%s\033\\" "${USER}" "${HOSTNAME%%.*}" "${PWD/#$HOME/\~}"'
|
||||
+ fi
|
||||
+ ;;
|
||||
+ *)
|
||||
+ [ -e /etc/sysconfig/bash-prompt-default ] && PROMPT_COMMAND=/etc/sysconfig/bash-prompt-default
|
||||
+ ;;
|
||||
+ esac
|
||||
+ fi
|
||||
+ # Turn on parallel history
|
||||
+ shopt -s histappend
|
||||
+ history -a
|
||||
+ # Turn on checkwinsize
|
||||
+ shopt -s checkwinsize
|
||||
+ [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\u@\h \W]\\$ "
|
||||
+ # You might want to have e.g. tty in prompt (e.g. more virtual machines)
|
||||
+ # and console windows
|
||||
+ # If you want to do so, just add e.g.
|
||||
+ # if [ "$PS1" ]; then
|
||||
+ # PS1="[\u@\h:\l \W]\\$ "
|
||||
+ # fi
|
||||
+ # to your custom modification shell script in /etc/profile.d/ directory
|
||||
+ fi
|
||||
+
|
||||
+ if ! shopt -q login_shell ; then # We're not a login shell
|
||||
+ # Need to redefine pathmunge, it gets undefined at the end of /etc/profile
|
||||
+ pathmunge () {
|
||||
+ case ":${PATH}:" in
|
||||
+ *:"$1":*)
|
||||
+ ;;
|
||||
+ *)
|
||||
+ if [ "$2" = "after" ] ; then
|
||||
+ PATH=$PATH:$1
|
||||
+ else
|
||||
+ PATH=$1:$PATH
|
||||
+ fi
|
||||
+ esac
|
||||
+ }
|
||||
+
|
||||
+ # By default, we want umask to get set. This sets it for non-login shell.
|
||||
+ # Current threshold for system reserved uid/gids is 200
|
||||
+ # You could check uidgid reservation validity in
|
||||
+ # /usr/share/doc/setup-*/uidgid file
|
||||
+ if [ $UID -gt 199 ] && [ "`/usr/bin/id -gn`" = "`/usr/bin/id -un`" ]; then
|
||||
+ umask 002
|
||||
+ else
|
||||
+ umask 022
|
||||
+ fi
|
||||
+
|
||||
+ SHELL=/bin/bash
|
||||
+ # Only display echos from profile.d scripts if we are no login shell
|
||||
+ # and interactive - otherwise just process them to set envvars
|
||||
+ for i in /etc/profile.d/*.sh; do
|
||||
+ if [ -r "$i" ]; then
|
||||
+ if [ "$PS1" ]; then
|
||||
+ . "$i"
|
||||
+ else
|
||||
+ . "$i" >/dev/null
|
||||
+ fi
|
||||
+ fi
|
||||
+ done
|
||||
+
|
||||
+ unset i
|
||||
+ unset -f pathmunge
|
||||
+ fi
|
||||
+
|
||||
+fi
|
||||
+# vim:ts=4:sw=4
|
||||
+EOF
|
||||
+
|
||||
+tmux new-session -s root -d
|
@ -1,209 +0,0 @@
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/ansible/shared.yml b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/ansible/shared.yml
|
||||
index 5b3afb324df..67d6836e873 100644
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/ansible/shared.yml
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/ansible/shared.yml
|
||||
@@ -14,12 +14,3 @@
|
||||
- xorg-x11-server-Xwayland
|
||||
{{% endif %}}
|
||||
state: absent
|
||||
-
|
||||
-
|
||||
-- name: Switch to multi-user runlevel
|
||||
- file:
|
||||
- src: /usr/lib/systemd/system/multi-user.target
|
||||
- dest: /etc/systemd/system/default.target
|
||||
- state: link
|
||||
- force: yes
|
||||
-
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/bash/shared.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/bash/shared.sh
|
||||
index dbabe572d2a..496dc74be7c 100644
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/bash/shared.sh
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/bash/shared.sh
|
||||
@@ -12,6 +12,3 @@
|
||||
{{% if product not in ["rhel7", "ol7"] %}}
|
||||
{{{ bash_package_remove("xorg-x11-server-Xwayland") }}}
|
||||
{{% endif %}}
|
||||
-
|
||||
-# configure run level
|
||||
-systemctl set-default multi-user.target
|
||||
\ No newline at end of file
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/oval/shared.xml b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/oval/shared.xml
|
||||
index 0710efe9f1b..0868ec6eae7 100644
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/oval/shared.xml
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/oval/shared.xml
|
||||
@@ -2,10 +2,6 @@
|
||||
<definition class="compliance" id="xwindows_remove_packages" version="1">
|
||||
{{{ oval_metadata("Ensure that the default runlevel target is set to multi-user.target.") }}}
|
||||
<criteria>
|
||||
- {{%- if init_system == "systemd" and target_oval_version != [5, 10] %}}
|
||||
- <extend_definition comment="system is configured to boot into multi-user.target"
|
||||
- definition_ref="xwindows_runlevel_target" />
|
||||
- {{%- endif %}}
|
||||
<criterion comment="package xorg-x11-server-Xorg is not installed"
|
||||
test_ref="package_xorg-x11-server-Xorg_removed" />
|
||||
<extend_definition comment="package xorg-x11-server-common is removed"
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/rule.yml b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/rule.yml
|
||||
index 10e51577a12..6ceb07bd574 100644
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/rule.yml
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/rule.yml
|
||||
@@ -19,14 +19,6 @@ description: |-
|
||||
{{% else %}}
|
||||
<pre>sudo {{{ pkg_manager }}} remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils xorg-x11-server-Xwayland</pre>
|
||||
{{% endif %}}
|
||||
- Additionally, setting the system's default target to
|
||||
- <tt>multi-user.target</tt> will prevent automatic startup of the X server.
|
||||
- To do so, run:
|
||||
- <pre>$ systemctl set-default multi-user.target</pre>
|
||||
- You should see the following output:
|
||||
- <pre>Removed symlink /etc/systemd/system/default.target.
|
||||
- Created symlink from /etc/systemd/system/default.target to /usr/lib/systemd/system/multi-user.target.</pre>
|
||||
-
|
||||
|
||||
rationale: |-
|
||||
Unnecessary service packages must not be installed to decrease the attack surface of the system. X windows has a long history of security
|
||||
@@ -72,6 +64,8 @@ warnings:
|
||||
The installation and use of a Graphical User Interface (GUI) increases your attack vector and decreases your
|
||||
overall security posture. Removing the package xorg-x11-server-common package will remove the graphical target
|
||||
which might bring your system to an inconsistent state requiring additional configuration to access the system
|
||||
- again. If a GUI is an operational requirement, a tailored profile that removes this rule should used before
|
||||
+ again.
|
||||
+ The rule <tt>xwindows_runlevel_target</tt> can be used to configure the system to boot into the multi-user.target.
|
||||
+ If a GUI is an operational requirement, a tailored profile that removes this rule should be used before
|
||||
continuing installation.
|
||||
{{{ ovirt_rule_notapplicable_warning("X11 graphic libraries are dependency of OpenStack Cinderlib storage provider") | indent(4) }}}
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/correct_target.pass.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/correct_target.pass.sh
|
||||
deleted file mode 100644
|
||||
index 9bf62a42d28..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/correct_target.pass.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-
|
||||
-yum -y remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils xorg-x11-server-Xwayland
|
||||
-
|
||||
-systemctl set-default multi-user.target
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/correct_target_under_lib.pass.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/correct_target_under_lib.pass.sh
|
||||
deleted file mode 100644
|
||||
index 4eeb6971486..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/correct_target_under_lib.pass.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-
|
||||
-yum -y remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils xorg-x11-server-Xwayland
|
||||
-
|
||||
-ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_installed.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_installed.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..b3908cff002
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_installed.fail.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+{{{ bash_package_install("xorg-x11-server-Xorg") }}}
|
||||
+{{{ bash_package_install("xorg-x11-server-utils") }}}
|
||||
+{{{ bash_package_install("xorg-x11-server-common") }}}
|
||||
+{{% if product not in ["rhel7", "ol7"] %}}
|
||||
+{{{ bash_package_install("xorg-x11-server-Xwayland") }}}
|
||||
+{{% endif %}}
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_installed_removed.pass.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_installed_removed.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..abafdbd624a
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_installed_removed.pass.sh
|
||||
@@ -0,0 +1,16 @@
|
||||
+#!/bin/bash
|
||||
+# based on shared/templates/package_removed/tests/package-installed-removed.pass.sh
|
||||
+
|
||||
+{{{ bash_package_install("xorg-x11-server-Xorg") }}}
|
||||
+{{{ bash_package_install("xorg-x11-server-utils") }}}
|
||||
+{{{ bash_package_install("xorg-x11-server-common") }}}
|
||||
+{{% if product not in ["rhel7", "ol7"] %}}
|
||||
+{{{ bash_package_install("xorg-x11-server-Xwayland") }}}
|
||||
+{{% endif %}}
|
||||
+
|
||||
+{{{ bash_package_remove("xorg-x11-server-Xorg") }}}
|
||||
+{{{ bash_package_remove("xorg-x11-server-utils") }}}
|
||||
+{{{ bash_package_remove("xorg-x11-server-common") }}}
|
||||
+{{% if product not in ["rhel7", "ol7"] %}}
|
||||
+{{{ bash_package_remove("xorg-x11-server-Xwayland") }}}
|
||||
+{{% endif %}}
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_removed.pass.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_removed.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..a403e108082
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/packages_removed.pass.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+{{{ bash_package_remove("xorg-x11-server-Xorg") }}}
|
||||
+{{{ bash_package_remove("xorg-x11-server-utils") }}}
|
||||
+{{{ bash_package_remove("xorg-x11-server-common") }}}
|
||||
+{{% if product not in ["rhel7", "ol7"] %}}
|
||||
+{{{ bash_package_remove("xorg-x11-server-Xwayland") }}}
|
||||
+{{% endif %}}
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel7_packages_installed_correct_target.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel7_packages_installed_correct_target.fail.sh
|
||||
deleted file mode 100644
|
||||
index ff7d0efda29..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel7_packages_installed_correct_target.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,4 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-# platform = Red Hat Enterprise Linux 7
|
||||
-# packages = xorg-x11-server-Xorg,xorg-x11-server-common,xorg-x11-server-utils
|
||||
-
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel7_packages_installed_wrong_target.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel7_packages_installed_wrong_target.fail.sh
|
||||
deleted file mode 100644
|
||||
index d8ecd8c7361..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel7_packages_installed_wrong_target.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-# platform = Red Hat Enterprise Linux 7
|
||||
-# packages = xorg-x11-server-Xorg,xorg-x11-server-common,xorg-x11-server-utils
|
||||
-
|
||||
-systemctl set-default graphical.target
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel8_packages_installed_correct_target.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel8_packages_installed_correct_target.fail.sh
|
||||
deleted file mode 100644
|
||||
index 14f1a97bc4f..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel8_packages_installed_correct_target.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,4 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-# platform = Red Hat Enterprise Linux 8
|
||||
-# packages = xorg-x11-server-Xorg,xorg-x11-server-common,xorg-x11-server-utils,xorg-x11-server-Xwayland
|
||||
-
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel8_packages_installed_wrong_target.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel8_packages_installed_wrong_target.fail.sh
|
||||
deleted file mode 100644
|
||||
index c678ef711d9..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/rhel8_packages_installed_wrong_target.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-# platform = Red Hat Enterprise Linux 8
|
||||
-# packages = xorg-x11-server-Xorg,xorg-x11-server-common,xorg-x11-server-utils,xorg-x11-server-Xwayland
|
||||
-
|
||||
-systemctl set-default graphical.target
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/wrong_target.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/wrong_target.fail.sh
|
||||
deleted file mode 100644
|
||||
index bf8a615b1dc..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/wrong_target.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-
|
||||
-yum -y remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils xorg-x11-server-Xwayland
|
||||
-
|
||||
-systemctl set-default graphical.target
|
||||
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/wrong_target_under_lib.fail.sh b/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/wrong_target_under_lib.fail.sh
|
||||
deleted file mode 100644
|
||||
index 652088b85ae..00000000000
|
||||
--- a/linux_os/guide/services/xwindows/disabling_xwindows/xwindows_remove_packages/tests/wrong_target_under_lib.fail.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-#!/bin/bash
|
||||
-
|
||||
-yum -y remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils xorg-x11-server-Xwayland
|
||||
-
|
||||
-ln -sf /lib/systemd/system/graphical.target /etc/systemd/system/default.target
|
File diff suppressed because one or more lines are too long
@ -1,685 +0,0 @@
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/rule.yml
|
||||
index dac47a1c6d1..3a6167a5717 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/rule.yml
|
||||
@@ -39,7 +39,7 @@ references:
|
||||
nist: CM-5(6),CM-5(6).1
|
||||
srg: SRG-OS-000259-GPOS-00100
|
||||
stigid@ol8: OL08-00-010350
|
||||
- stigid@rhel8: RHEL-08-010350
|
||||
+ stigid@rhel8: RHEL-08-010351
|
||||
stigid@sle12: SLES-12-010876
|
||||
stigid@sle15: SLES-15-010356
|
||||
stigid@ubuntu2004: UBTU-20-010431
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/all_dirs_ok.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
index 50fdb17bd2e..6a05a2b82ea 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora
|
||||
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/correct_groupowner.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/correct_groupowner.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..6a05a2b82ea
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/correct_groupowner.pass.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora
|
||||
+
|
||||
+DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
+for dirPath in $DIRS; do
|
||||
+ find "$dirPath" -type d -exec chgrp root '{}' \;
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/incorrect_groupowner.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/incorrect_groupowner.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..36461f5e5c3
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/incorrect_groupowner.fail.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora
|
||||
+
|
||||
+DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
+for dirPath in $DIRS; do
|
||||
+ mkdir -p "$dirPath/testme" && chgrp nobody "$dirPath/testme"
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/incorrect_groupowner_2.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/incorrect_groupowner_2.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..3f09e3dd018
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/incorrect_groupowner_2.fail.sh
|
||||
@@ -0,0 +1,6 @@
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora
|
||||
+
|
||||
+DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
+for dirPath in $DIRS; do
|
||||
+ mkdir -p "$dirPath/testme/test2" && chgrp nobody "$dirPath/testme/test2"
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/nobody_group_owned_dir_on_lib.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/nobody_group_owned_dir_on_lib.fail.sh
|
||||
index 043ad6b2dee..36461f5e5c3 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/nobody_group_owned_dir_on_lib.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_group_ownership_library_dirs/tests/nobody_group_owned_dir_on_lib.fail.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora
|
||||
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml
|
||||
index e2362388678..ba923d8ac55 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_binary_dirs/rule.yml
|
||||
@@ -27,7 +27,7 @@ references:
|
||||
srg: SRG-OS-000258-GPOS-00099
|
||||
stigid@ubuntu2004: UBTU-20-010424
|
||||
|
||||
-ocil_clause: 'any system exectables directories are found to not be owned by root'
|
||||
+ocil_clause: 'any system executables directories are found to not be owned by root'
|
||||
|
||||
ocil: |-
|
||||
System executables are stored in the following directories by default:
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/oval/shared.xml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/oval/shared.xml
|
||||
deleted file mode 100644
|
||||
index 28e193f827c..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/oval/shared.xml
|
||||
+++ /dev/null
|
||||
@@ -1,28 +0,0 @@
|
||||
-<def-group>
|
||||
- <definition class="compliance" id="dir_ownership_library_dirs" version="1">
|
||||
- {{{ oval_metadata("
|
||||
- Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
|
||||
- directories therein, are owned by root.
|
||||
- ") }}}
|
||||
- <criteria operator="AND">
|
||||
- <criterion test_ref="test_dir_ownership_lib_dir" />
|
||||
- </criteria>
|
||||
- </definition>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="library directories uid root" id="test_dir_ownership_lib_dir" version="1">
|
||||
- <unix:object object_ref="object_dir_ownership_lib_dir" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
-
|
||||
- <unix:file_object comment="library directories" id="object_dir_ownership_lib_dir" version="1">
|
||||
- <!-- Check that /lib, /lib64, /usr/lib, and /usr/lib64 directories belong to user with uid 0 (root) -->
|
||||
- <unix:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</unix:path>
|
||||
- <unix:filename xsi:nil="true" />
|
||||
- <filter action="include">state_owner_library_dirs_not_root</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_state id="state_owner_library_dirs_not_root" version="1">
|
||||
- <unix:user_id datatype="int" operation="not equal">0</unix:user_id>
|
||||
- </unix:file_state>
|
||||
-
|
||||
-</def-group>
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/rule.yml
|
||||
index d6a0beddf6e..f0781b307b3 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/rule.yml
|
||||
@@ -27,6 +27,8 @@ rationale: |-
|
||||
severity: medium
|
||||
|
||||
identifiers:
|
||||
+ cce@rhel8: CCE-89021-0
|
||||
+ cce@rhel9: CCE-89022-8
|
||||
cce@sle12: CCE-83236-0
|
||||
cce@sle15: CCE-85735-9
|
||||
|
||||
@@ -34,6 +36,7 @@ references:
|
||||
disa: CCI-001499
|
||||
nist: CM-5(6),CM-5(6).1
|
||||
srg: SRG-OS-000259-GPOS-00100
|
||||
+ stigid@rhel8: RHEL-08-010341
|
||||
stigid@sle12: SLES-12-010874
|
||||
stigid@sle15: SLES-15-010354
|
||||
stigid@ubuntu2004: UBTU-20-010429
|
||||
@@ -49,3 +52,14 @@ ocil: |-
|
||||
For each of these directories, run the following command to find files not
|
||||
owned by root:
|
||||
<pre>$ sudo find -L <i>$DIR</i> ! -user root -type d -exec chown root {} \;</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_owner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /lib/
|
||||
+ - /lib64/
|
||||
+ - /usr/lib/
|
||||
+ - /usr/lib64/
|
||||
+ recursive: 'true'
|
||||
+ fileuid: '0'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/all_dirs_ok.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/correct_owner.pass.sh
|
||||
similarity index 69%
|
||||
rename from linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
rename to linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/correct_owner.pass.sh
|
||||
index 01891664f64..a0d4990582e 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/all_dirs_ok.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/correct_owner.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_sle,multi_platform_rhel
|
||||
DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
for dirPath in $DIRS; do
|
||||
find "$dirPath" -type d -exec chown root '{}' \;
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/nobody_owned_dir_on_lib.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/incorrect_owner.fail.sh
|
||||
similarity index 63%
|
||||
rename from linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/nobody_owned_dir_on_lib.fail.sh
|
||||
rename to linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/incorrect_owner.fail.sh
|
||||
index 59b8a1867eb..f366c2d7922 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/nobody_owned_dir_on_lib.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_ownership_library_dirs/tests/incorrect_owner.fail.sh
|
||||
@@ -1,4 +1,5 @@
|
||||
-# platform = multi_platform_sle
|
||||
+# platform = multi_platform_sle,multi_platform_rhel
|
||||
+groupadd nogroup
|
||||
DIRS="/lib /lib64"
|
||||
for dirPath in $DIRS; do
|
||||
mkdir -p "$dirPath/testme" && chown nobody:nogroup "$dirPath/testme"
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/oval/shared.xml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/oval/shared.xml
|
||||
index a0e4e24b4f4..add26b2e778 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/oval/shared.xml
|
||||
@@ -1,8 +1,8 @@
|
||||
<def-group>
|
||||
<definition class="compliance" id="dir_permissions_library_dirs" version="1">
|
||||
{{{ oval_metadata("
|
||||
- Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
|
||||
- objects therein, are not group-writable or world-writable.
|
||||
+ Checks that the directories /lib, /lib64, /usr/lib and /usr/lib64
|
||||
+ are not group-writable or world-writable.
|
||||
") }}}
|
||||
<criteria operator="AND">
|
||||
<criterion test_ref="dir_test_perms_lib_dir" />
|
||||
@@ -19,7 +19,7 @@
|
||||
<unix:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</unix:path>
|
||||
<unix:filename xsi:nil="true" />
|
||||
<filter action="include">dir_state_perms_nogroupwrite_noworldwrite</filter>
|
||||
- <filter action="exclude">dir_perms_state_symlink</filter>
|
||||
+ <filter action="exclude">dir_perms_state_nogroupwrite_noworldwrite_symlink</filter>
|
||||
</unix:file_object>
|
||||
|
||||
<unix:file_state id="dir_state_perms_nogroupwrite_noworldwrite" version="1" operator="OR">
|
||||
@@ -27,7 +27,7 @@
|
||||
<unix:owrite datatype="boolean">true</unix:owrite>
|
||||
</unix:file_state>
|
||||
|
||||
- <unix:file_state id="dir_perms_state_symlink" version="1">
|
||||
+ <unix:file_state id="dir_perms_state_nogroupwrite_noworldwrite_symlink" version="1">
|
||||
<unix:type operation="equals">symbolic link</unix:type>
|
||||
</unix:file_state>
|
||||
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml
|
||||
index db89a5e47a1..6e62e8c6bbf 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/dir_permissions_library_dirs/rule.yml
|
||||
@@ -60,3 +60,14 @@ ocil: |-
|
||||
To find shared libraries that are group-writable or world-writable,
|
||||
run the following command for each directory <i>DIR</i> which contains shared libraries:
|
||||
<pre>$ sudo find -L <i>DIR</i> -perm /022 -type d</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_permissions
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /lib/
|
||||
+ - /lib64/
|
||||
+ - /usr/lib/
|
||||
+ - /usr/lib64/
|
||||
+ recursive: 'true'
|
||||
+ filemode: '0755'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/ansible/shared.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/ansible/shared.yml
|
||||
index 6b3a2905068..eec7485f90c 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/ansible/shared.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/ansible/shared.yml
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Oracle Linux 8,Red Hat Enterprise Linux 8,multi_platform_fedora
|
||||
+# platform = multi_platform_sle,Oracle Linux 8,multi_platform_rhel,multi_platform_fedora
|
||||
# reboot = false
|
||||
# strategy = restrict
|
||||
# complexity = medium
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh
|
||||
index a9e8c7d8e25..e352dd34a67 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_groupownership_system_commands_dirs/bash/shared.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Oracle Linux 8,Red Hat Enterprise Linux 8,multi_platform_fedora,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,Oracle Linux 8,multi_platform_rhel,multi_platform_fedora,multi_platform_ubuntu
|
||||
|
||||
for SYSCMDFILES in /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin
|
||||
do
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/ansible/shared.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/ansible/shared.yml
|
||||
deleted file mode 100644
|
||||
index de81a3703b4..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/ansible/shared.yml
|
||||
+++ /dev/null
|
||||
@@ -1,18 +0,0 @@
|
||||
-# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel,multi_platform_ol,multi_platform_sle
|
||||
-# reboot = false
|
||||
-# strategy = restrict
|
||||
-# complexity = medium
|
||||
-# disruption = medium
|
||||
-- name: "Read list libraries without root ownership"
|
||||
- command: "find -L /usr/lib /usr/lib64 /lib /lib64 \\! -user root"
|
||||
- register: libraries_not_owned_by_root
|
||||
- changed_when: False
|
||||
- failed_when: False
|
||||
- check_mode: no
|
||||
-
|
||||
-- name: "Set ownership of system libraries to root"
|
||||
- file:
|
||||
- path: "{{ item }}"
|
||||
- owner: "root"
|
||||
- with_items: "{{ libraries_not_owned_by_root.stdout_lines }}"
|
||||
- when: libraries_not_owned_by_root | length > 0
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/bash/shared.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/bash/shared.sh
|
||||
deleted file mode 100644
|
||||
index c75167d2fe7..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/bash/shared.sh
|
||||
+++ /dev/null
|
||||
@@ -1,8 +0,0 @@
|
||||
-# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel,multi_platform_ol,multi_platform_sle
|
||||
-for LIBDIR in /usr/lib /usr/lib64 /lib /lib64
|
||||
-do
|
||||
- if [ -d $LIBDIR ]
|
||||
- then
|
||||
- find -L $LIBDIR \! -user root -exec chown root {} \;
|
||||
- fi
|
||||
-done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/oval/shared.xml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/oval/shared.xml
|
||||
deleted file mode 100644
|
||||
index 59ee3d82a21..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/oval/shared.xml
|
||||
+++ /dev/null
|
||||
@@ -1,39 +0,0 @@
|
||||
-<def-group>
|
||||
- <definition class="compliance" id="file_ownership_library_dirs" version="1">
|
||||
- {{{ oval_metadata("
|
||||
- Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
|
||||
- objects therein, are owned by root.
|
||||
- ") }}}
|
||||
- <criteria operator="AND">
|
||||
- <criterion test_ref="test_ownership_lib_dir" />
|
||||
- <criterion test_ref="test_ownership_lib_files" />
|
||||
- </criteria>
|
||||
- </definition>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="library directories uid root" id="test_ownership_lib_dir" version="1">
|
||||
- <unix:object object_ref="object_file_ownership_lib_dir" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="library files uid root" id="test_ownership_lib_files" version="1">
|
||||
- <unix:object object_ref="object_file_ownership_lib_files" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
- <unix:file_object comment="library directories" id="object_file_ownership_lib_dir" version="1">
|
||||
- <!-- Check that /lib, /lib64, /usr/lib, and /usr/lib64 directories belong to user with uid 0 (root) -->
|
||||
- <unix:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</unix:path>
|
||||
- <unix:filename xsi:nil="true" />
|
||||
- <filter action="include">state_owner_libraries_not_root</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_object comment="library files" id="object_file_ownership_lib_files" version="1">
|
||||
- <!-- Check that files within /lib, /lib64, /usr/lib, and /usr/lib64 directories belong to user with uid 0 (root) -->
|
||||
- <unix:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</unix:path>
|
||||
- <unix:filename operation="pattern match">^.*$</unix:filename>
|
||||
- <filter action="include">state_owner_libraries_not_root</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_state id="state_owner_libraries_not_root" version="1">
|
||||
- <unix:user_id datatype="int" operation="not equal">0</unix:user_id>
|
||||
- </unix:file_state>
|
||||
-
|
||||
-</def-group>
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
|
||||
index d80681c1e65..b6bc18e8310 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
|
||||
@@ -60,3 +60,14 @@ ocil: |-
|
||||
For each of these directories, run the following command to find files not
|
||||
owned by root:
|
||||
<pre>$ sudo find -L <i>$DIR</i> ! -user root -exec chown root {} \;</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_owner
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /lib/
|
||||
+ - /lib64/
|
||||
+ - /usr/lib/
|
||||
+ - /usr/lib64/
|
||||
+ file_regex: ^.*$
|
||||
+ fileuid: '0'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/tests/correct_owner.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/tests/correct_owner.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..92c6a0889d4
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/tests/correct_owner.pass.sh
|
||||
@@ -0,0 +1,9 @@
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora,multi_platform_ubuntu
|
||||
+
|
||||
+for SYSLIBDIRS in /lib /lib64 /usr/lib /usr/lib64
|
||||
+do
|
||||
+ if [[ -d $SYSLIBDIRS ]]
|
||||
+ then
|
||||
+ find $SYSLIBDIRS ! -user root -type f -exec chown root '{}' \;
|
||||
+ fi
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/tests/incorrect_owner.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/tests/incorrect_owner.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..84da71f45f7
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/tests/incorrect_owner.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora,multi_platform_ubuntu
|
||||
+
|
||||
+useradd user_test
|
||||
+for TESTFILE in /lib/test_me /lib64/test_me /usr/lib/test_me /usr/lib64/test_me
|
||||
+do
|
||||
+ if [[ ! -f $TESTFILE ]]
|
||||
+ then
|
||||
+ touch $TESTFILE
|
||||
+ fi
|
||||
+ chown user_test $TESTFILE
|
||||
+done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/ansible/shared.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/ansible/shared.yml
|
||||
deleted file mode 100644
|
||||
index cf9eebace8b..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/ansible/shared.yml
|
||||
+++ /dev/null
|
||||
@@ -1,18 +0,0 @@
|
||||
-# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_rhel,multi_platform_ol,multi_platform_sle
|
||||
-# reboot = false
|
||||
-# strategy = restrict
|
||||
-# complexity = high
|
||||
-# disruption = medium
|
||||
-- name: "Read list of world and group writable files in libraries directories"
|
||||
- command: "find /lib /lib64 /usr/lib /usr/lib64 -perm /022 -type f"
|
||||
- register: world_writable_library_files
|
||||
- changed_when: False
|
||||
- failed_when: False
|
||||
- check_mode: no
|
||||
-
|
||||
-- name: "Disable world/group writability to library files"
|
||||
- file:
|
||||
- path: "{{ item }}"
|
||||
- mode: "go-w"
|
||||
- with_items: "{{ world_writable_library_files.stdout_lines }}"
|
||||
- when: world_writable_library_files.stdout_lines | length > 0
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/bash/shared.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/bash/shared.sh
|
||||
deleted file mode 100644
|
||||
index af04ad625d3..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/bash/shared.sh
|
||||
+++ /dev/null
|
||||
@@ -1,5 +0,0 @@
|
||||
-# platform = multi_platform_all
|
||||
-DIRS="/lib /lib64 /usr/lib /usr/lib64"
|
||||
-for dirPath in $DIRS; do
|
||||
- find "$dirPath" -perm /022 -type f -exec chmod go-w '{}' \;
|
||||
-done
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/oval/shared.xml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/oval/shared.xml
|
||||
deleted file mode 100644
|
||||
index f25c52260c4..00000000000
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/oval/shared.xml
|
||||
+++ /dev/null
|
||||
@@ -1,46 +0,0 @@
|
||||
-<def-group>
|
||||
- <definition class="compliance" id="file_permissions_library_dirs" version="1">
|
||||
- {{{ oval_metadata("
|
||||
- Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
|
||||
- objects therein, are not group-writable or world-writable.
|
||||
- ") }}}
|
||||
- <criteria operator="AND">
|
||||
- <criterion test_ref="test_perms_lib_dir" />
|
||||
- <criterion test_ref="test_perms_lib_files" />
|
||||
- </criteria>
|
||||
- </definition>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="library directories go-w" id="test_perms_lib_dir" version="1">
|
||||
- <unix:object object_ref="object_file_permissions_lib_dir" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
- <unix:file_test check="all" check_existence="none_exist" comment="library files go-w" id="test_perms_lib_files" version="1">
|
||||
- <unix:object object_ref="object_file_permissions_lib_files" />
|
||||
- </unix:file_test>
|
||||
-
|
||||
- <unix:file_object comment="library directories" id="object_file_permissions_lib_dir" version="1">
|
||||
- <!-- Check that /lib, /lib64, /usr/lib, /usr/lib64 directories have safe permissions (go-w) -->
|
||||
- <unix:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</unix:path>
|
||||
- <unix:filename xsi:nil="true" />
|
||||
- <filter action="include">state_perms_nogroupwrite_noworldwrite</filter>
|
||||
- <filter action="exclude">perms_state_symlink</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_object comment="library files" id="object_file_permissions_lib_files" version="1">
|
||||
- <!-- Check the files within /lib, /lib64, /usr/lib, /usr/lib64 directories have safe permissions (go-w) -->
|
||||
- <unix:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</unix:path>
|
||||
- <unix:filename operation="pattern match">^.*$</unix:filename>
|
||||
- <filter action="include">state_perms_nogroupwrite_noworldwrite</filter>
|
||||
- <filter action="exclude">perms_state_symlink</filter>
|
||||
- </unix:file_object>
|
||||
-
|
||||
- <unix:file_state id="state_perms_nogroupwrite_noworldwrite" version="1" operator="OR">
|
||||
- <unix:gwrite datatype="boolean">true</unix:gwrite>
|
||||
- <unix:owrite datatype="boolean">true</unix:owrite>
|
||||
- </unix:file_state>
|
||||
-
|
||||
- <unix:file_state id="perms_state_symlink" version="1">
|
||||
- <unix:type operation="equals">symbolic link</unix:type>
|
||||
- </unix:file_state>
|
||||
-
|
||||
-</def-group>
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
|
||||
index 9a07e76929e..5a708cf78c3 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
|
||||
@@ -61,3 +61,14 @@ ocil: |-
|
||||
To find shared libraries that are group-writable or world-writable,
|
||||
run the following command for each directory <i>DIR</i> which contains shared libraries:
|
||||
<pre>$ sudo find -L <i>DIR</i> -perm /022 -type f</pre>
|
||||
+
|
||||
+template:
|
||||
+ name: file_permissions
|
||||
+ vars:
|
||||
+ filepath:
|
||||
+ - /lib/
|
||||
+ - /lib64/
|
||||
+ - /usr/lib/
|
||||
+ - /usr/lib64/
|
||||
+ file_regex: ^.*$
|
||||
+ filemode: '0755'
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/incorrect_permissions.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/lenient_permissions.fail.sh
|
||||
similarity index 100%
|
||||
rename from linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/incorrect_permissions.fail.sh
|
||||
rename to linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/tests/lenient_permissions.fail.sh
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml
|
||||
index eaf04c8d36c..ec135b5279c 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/rule.yml
|
||||
@@ -4,7 +4,7 @@ prodtype: fedora,ol8,rhel8,rhel9,sle12,sle15,ubuntu2004
|
||||
|
||||
title: |-
|
||||
Verify the system-wide library files in directories
|
||||
- "/lib", "/lib64", "/usr/lib/" and "/usr/lib64" are owned by root.
|
||||
+ "/lib", "/lib64", "/usr/lib/" and "/usr/lib64" are group-owned by root.
|
||||
|
||||
description: |-
|
||||
System-wide library files are stored in the following directories
|
||||
@@ -15,7 +15,7 @@ description: |-
|
||||
/usr/lib64
|
||||
</pre>
|
||||
All system-wide shared library files should be protected from unauthorised
|
||||
- access. If any of these files is not owned by root, correct its owner with
|
||||
+ access. If any of these files is not group-owned by root, correct its group-owner with
|
||||
the following command:
|
||||
<pre>$ sudo chgrp root <i>FILE</i></pre>
|
||||
|
||||
@@ -48,7 +48,7 @@ references:
|
||||
stigid@sle15: SLES-15-010355
|
||||
stigid@ubuntu2004: UBTU-20-01430
|
||||
|
||||
-ocil_clause: 'system wide library files are not group owned by root'
|
||||
+ocil_clause: 'system wide library files are not group-owned by root'
|
||||
|
||||
ocil: |-
|
||||
System-wide library files are stored in the following directories:
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh
|
||||
index 0e982c3b8ca..5356d3742d3 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/correct_groupowner.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora,multi_platform_ubuntu
|
||||
|
||||
for SYSLIBDIRS in /lib /lib64 /usr/lib /usr/lib64
|
||||
do
|
||||
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh
|
||||
index 23a7703f57d..7352b60aa4b 100644
|
||||
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/root_permissions_syslibrary_files/tests/incorrect_groupowner.fail.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
-# platform = multi_platform_sle,Red Hat Enterprise Linux 8,multi_platform_fedora,multi_platform_ubuntu
|
||||
+# platform = multi_platform_sle,multi_platform_rhel,multi_platform_fedora,multi_platform_ubuntu
|
||||
|
||||
groupadd group_test
|
||||
for TESTFILE in /lib/test_me /lib64/test_me /usr/lib/test_me /usr/lib64/test_me
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index ff23f83cfbf..88b3a7e3783 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -235,8 +235,13 @@ selections:
|
||||
# RHEL-08-010340
|
||||
- file_ownership_library_dirs
|
||||
|
||||
+ # RHEL-08-010341
|
||||
+ - dir_ownership_library_dirs
|
||||
+
|
||||
# RHEL-08-010350
|
||||
- root_permissions_syslibrary_files
|
||||
+
|
||||
+ # RHEL-08-010351
|
||||
- dir_group_ownership_library_dirs
|
||||
|
||||
# RHEL-08-010360
|
||||
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
|
||||
index 8cc6d132591..65465be2c07 100644
|
||||
--- a/products/rhel9/profiles/stig.profile
|
||||
+++ b/products/rhel9/profiles/stig.profile
|
||||
@@ -236,8 +236,13 @@ selections:
|
||||
# RHEL-08-010340
|
||||
- file_ownership_library_dirs
|
||||
|
||||
+ # RHEL-08-010341
|
||||
+ - dir_ownership_library_dirs
|
||||
+
|
||||
# RHEL-08-010350
|
||||
- root_permissions_syslibrary_files
|
||||
+
|
||||
+ # RHEL-08-010351
|
||||
- dir_group_ownership_library_dirs
|
||||
|
||||
# RHEL-08-010360
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 8aad24b20f7..eb3f17f4f3d 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -2957,8 +2957,6 @@ CCE-89017-8
|
||||
CCE-89018-6
|
||||
CCE-89019-4
|
||||
CCE-89020-2
|
||||
-CCE-89021-0
|
||||
-CCE-89022-8
|
||||
CCE-89023-6
|
||||
CCE-89024-4
|
||||
CCE-89025-1
|
||||
diff --git a/shared/templates/file_groupowner/ansible.template b/shared/templates/file_groupowner/ansible.template
|
||||
index 68fc2e1e17e..0b4ab594155 100644
|
||||
--- a/shared/templates/file_groupowner/ansible.template
|
||||
+++ b/shared/templates/file_groupowner/ansible.template
|
||||
@@ -12,6 +12,7 @@
|
||||
paths: "{{{ path }}}"
|
||||
patterns: {{{ FILE_REGEX[loop.index0] }}}
|
||||
use_regex: yes
|
||||
+ hidden: yes
|
||||
register: files_found
|
||||
|
||||
- name: Ensure group owner on {{{ path }}} file(s) matching {{{ FILE_REGEX[loop.index0] }}}
|
||||
diff --git a/shared/templates/file_groupowner/oval.template b/shared/templates/file_groupowner/oval.template
|
||||
index fd2e5db5d93..64a494471a8 100644
|
||||
--- a/shared/templates/file_groupowner/oval.template
|
||||
+++ b/shared/templates/file_groupowner/oval.template
|
||||
@@ -45,6 +45,10 @@
|
||||
{{%- else %}}
|
||||
<unix:filepath{{% if FILEPATH_IS_REGEX %}} operation="pattern match"{{% endif %}}>{{{ filepath }}}</unix:filepath>
|
||||
{{%- endif %}}
|
||||
+ <filter action="exclude">symlink_file_groupowner{{{ FILEID }}}_uid_{{{ FILEGID }}}</filter>
|
||||
</unix:file_object>
|
||||
{{% endfor %}}
|
||||
+ <unix:file_state id="symlink_file_groupowner{{{ FILEID }}}_uid_{{{ FILEGID }}}" version="1">
|
||||
+ <unix:type operation="equals">symbolic link</unix:type>
|
||||
+ </unix:file_state>
|
||||
</def-group>
|
||||
diff --git a/shared/templates/file_owner/ansible.template b/shared/templates/file_owner/ansible.template
|
||||
index 590c9fc6055..dba9e65a277 100644
|
||||
--- a/shared/templates/file_owner/ansible.template
|
||||
+++ b/shared/templates/file_owner/ansible.template
|
||||
@@ -12,6 +12,7 @@
|
||||
paths: "{{{ path }}}"
|
||||
patterns: {{{ FILE_REGEX[loop.index0] }}}
|
||||
use_regex: yes
|
||||
+ hidden: yes
|
||||
register: files_found
|
||||
|
||||
- name: Ensure group owner on {{{ path }}} file(s) matching {{{ FILE_REGEX[loop.index0] }}}
|
||||
diff --git a/shared/templates/file_owner/oval.template b/shared/templates/file_owner/oval.template
|
||||
index 105e29c81c8..777831d790d 100644
|
||||
--- a/shared/templates/file_owner/oval.template
|
||||
+++ b/shared/templates/file_owner/oval.template
|
||||
@@ -44,6 +44,10 @@
|
||||
{{%- else %}}
|
||||
<unix:filepath{{% if FILEPATH_IS_REGEX %}} operation="pattern match"{{% endif %}}>{{{ filepath }}}</unix:filepath>
|
||||
{{%- endif %}}
|
||||
+ <filter action="exclude">symlink_file_owner{{{ FILEID }}}_uid_{{{ FILEUID }}}</filter>
|
||||
</unix:file_object>
|
||||
{{% endfor %}}
|
||||
+ <unix:file_state id="symlink_file_owner{{{ FILEID }}}_uid_{{{ FILEUID }}}" version="1">
|
||||
+ <unix:type operation="equals">symbolic link</unix:type>
|
||||
+ </unix:file_state>
|
||||
</def-group>
|
||||
diff --git a/shared/templates/file_permissions/ansible.template b/shared/templates/file_permissions/ansible.template
|
||||
index fc211bdc4c3..6d4dedcee51 100644
|
||||
--- a/shared/templates/file_permissions/ansible.template
|
||||
+++ b/shared/templates/file_permissions/ansible.template
|
||||
@@ -12,6 +12,7 @@
|
||||
paths: "{{{ path }}}"
|
||||
patterns: {{{ FILE_REGEX[loop.index0] }}}
|
||||
use_regex: yes
|
||||
+ hidden: yes
|
||||
register: files_found
|
||||
|
||||
- name: Set permissions for {{{ path }}} file(s)
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index b5621425b96..c5a9b6a32ad 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -181,6 +181,7 @@ selections:
|
||||
- dconf_gnome_screensaver_idle_delay
|
||||
- dconf_gnome_screensaver_lock_enabled
|
||||
- dir_group_ownership_library_dirs
|
||||
+- dir_ownership_library_dirs
|
||||
- dir_permissions_library_dirs
|
||||
- dir_perms_world_writable_root_owned
|
||||
- dir_perms_world_writable_sticky_bits
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index 31221ed632c..32d195e28aa 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -192,6 +192,7 @@ selections:
|
||||
- dconf_gnome_screensaver_idle_delay
|
||||
- dconf_gnome_screensaver_lock_enabled
|
||||
- dir_group_ownership_library_dirs
|
||||
+- dir_ownership_library_dirs
|
||||
- dir_permissions_library_dirs
|
||||
- dir_perms_world_writable_root_owned
|
||||
- dir_perms_world_writable_sticky_bits
|
@ -1,161 +0,0 @@
|
||||
diff --git a/docs/templates/template_reference.md b/docs/templates/template_reference.md
|
||||
index 65bc439225e..fef4679be39 100644
|
||||
--- a/docs/templates/template_reference.md
|
||||
+++ b/docs/templates/template_reference.md
|
||||
@@ -2,17 +2,20 @@
|
||||
|
||||
#### accounts_password
|
||||
- Checks if PAM enforces password quality requirements. Checks the
|
||||
- configuration in `/etc/pam.d/system-auth` (for RHEL 6 systems) or
|
||||
- `/etc/security/pwquality.conf` (on other systems).
|
||||
+ configuration in `/etc/security/pwquality.conf`.
|
||||
|
||||
- Parameters:
|
||||
|
||||
- - **variable** - PAM `pam_cracklib` (on RHEL 6) or `pam_pwquality`
|
||||
- (on other systems) module name, eg. `ucredit`, `ocredit`
|
||||
+ - **variable** - PAM `pam_pwquality` password quality
|
||||
+ requirement, eg. `ucredit`, `ocredit`
|
||||
|
||||
- **operation** - OVAL operation, eg. `less than or equal`
|
||||
|
||||
-- Languages: OVAL
|
||||
+ - **zero_comparison_operation** - (optional) OVAL operation, eg. `greater than`.
|
||||
+ When set, it will test if the **variable** value matches the OVAL operation
|
||||
+ when compared to zero.
|
||||
+
|
||||
+- Languages: Ansible, Bash, OVAL
|
||||
|
||||
#### auditd_lineinfile
|
||||
- Checks configuration options of the Audit Daemon in
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml
|
||||
index 912c783650a..9a829ac5119 100644
|
||||
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml
|
||||
@@ -47,7 +47,7 @@ ocil_clause: 'that is not the case'
|
||||
ocil: |-
|
||||
To check the value for maximum consecutive repeating characters, run the following command:
|
||||
<pre>$ grep maxclassrepeat /etc/security/pwquality.conf</pre>
|
||||
- For DoD systems, the output should show <tt>maxclassrepeat</tt>=4.
|
||||
+ For DoD systems, the output should show <tt>maxclassrepeat</tt>=4 or less but greater than zero.
|
||||
|
||||
platform: pam
|
||||
|
||||
@@ -56,3 +56,4 @@ template:
|
||||
vars:
|
||||
variable: maxclassrepeat
|
||||
operation: less than or equal
|
||||
+ zero_comparison_operation: greater than
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/correct_value.pass.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/correct_value.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..5d91559d4a2
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/correct_value.pass.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+if grep -q 'maxclassrepeat' /etc/security/pwquality.conf; then
|
||||
+ sed -i 's/.*maxclassrepeat.*/maxclassrepeat = 4/' /etc/security/pwquality.conf
|
||||
+else
|
||||
+ echo "maxclassrepeat = 4" >> /etc/security/pwquality.conf
|
||||
+fi
|
||||
+
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/correct_value_less_than_variable.pass.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/correct_value_less_than_variable.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..4bd8070eb7e
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/correct_value_less_than_variable.pass.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+if grep -q 'maxclassrepeat' /etc/security/pwquality.conf; then
|
||||
+ sed -i 's/.*maxclassrepeat.*/maxclassrepeat = 2/' /etc/security/pwquality.conf
|
||||
+else
|
||||
+ echo "maxclassrepeat = 2" >> /etc/security/pwquality.conf
|
||||
+fi
|
||||
+
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/negative_value.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/negative_value.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..61538a4945f
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/negative_value.fail.sh
|
||||
@@ -0,0 +1,7 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+if grep -q 'maxclassrepeat' /etc/security/pwquality.conf; then
|
||||
+ sed -i 's/.*maxclassrepeat.*/maxclassrepeat = -1/' /etc/security/pwquality.conf
|
||||
+else
|
||||
+ echo "maxclassrepeat = -1" >> /etc/security/pwquality.conf
|
||||
+fi
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/wrong_value.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/wrong_value.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..2218250ec7b
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/wrong_value.fail.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+if grep -q 'maxclassrepeat' /etc/security/pwquality.conf; then
|
||||
+ sed -i 's/.*maxclassrepeat.*/maxclassrepeat = 5/' /etc/security/pwquality.conf
|
||||
+else
|
||||
+ echo "maxclassrepeat = 5" >> /etc/security/pwquality.conf
|
||||
+fi
|
||||
+
|
||||
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/wrong_value_0.fail.sh b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/wrong_value_0.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..780873c6a86
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/tests/wrong_value_0.fail.sh
|
||||
@@ -0,0 +1,8 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+if grep -q 'maxclassrepeat' /etc/security/pwquality.conf; then
|
||||
+ sed -i 's/.*maxclassrepeat.*/maxclassrepeat = 0/' /etc/security/pwquality.conf
|
||||
+else
|
||||
+ echo "maxclassrepeat = 0" >> /etc/security/pwquality.conf
|
||||
+fi
|
||||
+
|
||||
diff --git a/shared/templates/accounts_password/oval.template b/shared/templates/accounts_password/oval.template
|
||||
index 332a2800317..b995db11ea4 100644
|
||||
--- a/shared/templates/accounts_password/oval.template
|
||||
+++ b/shared/templates/accounts_password/oval.template
|
||||
@@ -7,11 +7,14 @@
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
- <ind:textfilecontent54_test check="all"
|
||||
+ <ind:textfilecontent54_test check="all" state_operator="AND"
|
||||
comment="check the configuration of /etc/security/pwquality.conf"
|
||||
id="test_password_pam_pwquality_{{{ VARIABLE }}}" version="3">
|
||||
<ind:object object_ref="obj_password_pam_pwquality_{{{ VARIABLE }}}" />
|
||||
<ind:state state_ref="state_password_pam_{{{ VARIABLE }}}" />
|
||||
+ {{%- if ZERO_COMPARISON_OPERATION %}}
|
||||
+ <ind:state state_ref="state_password_pam_{{{ VARIABLE }}}_zero_comparison" />
|
||||
+ {{%- endif %}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
<ind:textfilecontent54_object id="obj_password_pam_pwquality_{{{ VARIABLE }}}" version="3">
|
||||
@@ -24,5 +27,11 @@
|
||||
<ind:subexpression datatype="int" operation="{{{ OPERATION }}}" var_ref="var_password_pam_{{{ VARIABLE }}}" />
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
+ {{%- if ZERO_COMPARISON_OPERATION %}}
|
||||
+ <ind:textfilecontent54_state id="state_password_pam_{{{ VARIABLE }}}_zero_comparison" version="1">
|
||||
+ <ind:subexpression datatype="int" operation="{{{ ZERO_COMPARISON_OPERATION }}}" >0</ind:subexpression>
|
||||
+ </ind:textfilecontent54_state>
|
||||
+ {{%- endif %}}
|
||||
+
|
||||
<external_variable comment="External variable for pam_{{{ VARIABLE }}}" datatype="int" id="var_password_pam_{{{ VARIABLE }}}" version="3" />
|
||||
</def-group>
|
||||
diff --git a/shared/templates/accounts_password/template.py b/shared/templates/accounts_password/template.py
|
||||
index 65c25ec7991..ab849d1fa72 100644
|
||||
--- a/shared/templates/accounts_password/template.py
|
||||
+++ b/shared/templates/accounts_password/template.py
|
||||
@@ -1,4 +1,7 @@
|
||||
+from ssg.utils import parse_template_boolean_value
|
||||
+
|
||||
def preprocess(data, lang):
|
||||
if lang == "oval":
|
||||
data["sign"] = "-?" if data["variable"].endswith("credit") else ""
|
||||
+ data["zero_comparison_operation"] = data.get("zero_comparison_operation", None)
|
||||
return data
|
@ -1,24 +0,0 @@
|
||||
From 4385fd471749b21fd2e7e5febe7ba273592a0633 Mon Sep 17 00:00:00 2001
|
||||
From: Andrew Becker <A-Beck@users.noreply.github.com>
|
||||
Date: Wed, 30 Mar 2022 16:58:04 -0400
|
||||
Subject: [PATCH] Fix variable path access issue
|
||||
|
||||
Reference the path in the item dictionary, instead of the item dictionary itself
|
||||
Addresses Issue #8275
|
||||
---
|
||||
shared/templates/sysctl/ansible.template | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/templates/sysctl/ansible.template b/shared/templates/sysctl/ansible.template
|
||||
index 3837b313e13..f525cf873f7 100644
|
||||
--- a/shared/templates/sysctl/ansible.template
|
||||
+++ b/shared/templates/sysctl/ansible.template
|
||||
@@ -13,7 +13,7 @@
|
||||
|
||||
- name: Comment out any occurrences of {{{ SYSCTLVAR }}} from /etc/sysctl.d/*.conf files
|
||||
replace:
|
||||
- path: "{{ item }}"
|
||||
+ path: "{{ item.path }}"
|
||||
regexp: '^[\s]*{{{ SYSCTLVAR }}}'
|
||||
replace: '#{{{ SYSCTLVAR }}}'
|
||||
loop: "{{ find_sysctl_d.files }}"
|
@ -1,32 +0,0 @@
|
||||
From 2a7e57d7714e9931ec4d43a0d25269258dd4af2a Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Tue, 17 May 2022 10:24:26 +0200
|
||||
Subject: [PATCH] Do not include symlink_state in 5.10 content
|
||||
|
||||
The symlink_test, object and state were added in OVAL 5.11. These
|
||||
elements should not be included in OVAL 5.10 content because they break
|
||||
validation.
|
||||
---
|
||||
shared/templates/sysctl/oval.template | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index e21b0344cb6..207052664a4 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -222,7 +222,6 @@
|
||||
<unix:filepath operation="equals" var_ref="local_var_conf_files_{{{ SYSCTLID }}}" />
|
||||
<filter action="exclude">state_symlink_points_outside_usual_dirs_{{{ SYSCTLID }}}</filter>
|
||||
</unix:symlink_object>
|
||||
-{{% endif %}}
|
||||
|
||||
<!-- The state matches symlinks that don't point to the default dirs, i.e. paths that are not:
|
||||
^/etc/sysctl.conf$
|
||||
@@ -232,6 +231,7 @@
|
||||
<unix:symlink_state comment="State that matches symlinks referencing files not in the default dirs" id="state_symlink_points_outside_usual_dirs_{{{ SYSCTLID }}}" version="1">
|
||||
<unix:canonical_path operation="pattern match">^(?!(\/etc\/sysctl\.conf$|(\/etc|\/run|\/usr\/lib)\/sysctl\.d\/)).*$</unix:canonical_path>
|
||||
</unix:symlink_state>
|
||||
+{{% endif %}}
|
||||
|
||||
<local_variable comment="List of conf files" datatype="string" id="local_var_conf_files_{{{ SYSCTLID }}}" version="1">
|
||||
<object_component object_ref="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
@ -1,42 +0,0 @@
|
||||
From 484ceb5641f53a8f3b505099a3bebb8d5e481f1a Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Fri, 6 May 2022 11:31:31 +0200
|
||||
Subject: [PATCH] Restrict the symlink test to OVAL 5.11
|
||||
|
||||
The symlink_test was added in OVAL 5.11 and is not availble in 5.10.
|
||||
The 5.10 version of the sysctl template will not check for sysctl
|
||||
options defined in more than on file.
|
||||
---
|
||||
shared/templates/sysctl/oval.template | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index ba4e65cbaef..53456a90a01 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -114,7 +114,9 @@
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /usr/lib/sysctl.d/*.conf"
|
||||
test_ref="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}"/>
|
||||
</criteria>
|
||||
+{{% if target_oval_version >= [5, 11] %}}
|
||||
<criterion comment="Check that {{{ SYSCTLID }}} is defined in only one file" test_ref="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
+{{% endif %}}
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
@@ -140,6 +142,7 @@
|
||||
{{{ state_static_sysctld("usr_lib_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
+{{% if target_oval_version >= [5, 11] %}}
|
||||
<ind:variable_test check="all" check_existence="all_exist" comment="Check that only one file contains {{{ SYSCTLID }}}"
|
||||
id="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
<ind:object object_ref="oject_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
@@ -214,6 +217,7 @@
|
||||
<unix:symlink_object comment="syctl symlinks" id="object_{{{ SYSCTLID }}}_symlinks" version="1">
|
||||
<unix:filepath operation="equals" var_ref="local_var_conf_files_{{{ SYSCTLID }}}" />
|
||||
</unix:symlink_object>
|
||||
+{{% endif %}}
|
||||
|
||||
<local_variable comment="List of conf files" datatype="string" id="local_var_conf_files_{{{ SYSCTLID }}}" version="1">
|
||||
<object_component object_ref="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
@ -1,145 +0,0 @@
|
||||
From 2275e47e111ba89595658f5d91964454c1a65323 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 4 May 2022 19:21:04 +0200
|
||||
Subject: [PATCH 1/3] Add tests to ensure valid symlinks are checked
|
||||
|
||||
These sysctl tests help check cases when:
|
||||
- A symlink points to a file out of the default default dirs
|
||||
- Multile symlinks point to the same file in the default dirs
|
||||
|
||||
Symlinks are a valid use case how to configure sysctls.
|
||||
---
|
||||
.../tests/symlink_root_duplicate.fail.sh | 15 +++++++++++++++
|
||||
.../tests/symlink_root_incompliant.fail.sh | 15 +++++++++++++++
|
||||
.../tests/symlinks_to_same_file.pass.sh | 14 ++++++++++++++
|
||||
3 files changed, 44 insertions(+)
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_duplicate.fail.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_incompliant.fail.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlinks_to_same_file.pass.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_duplicate.fail.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_duplicate.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..c4f756a110f
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_duplicate.fail.sh
|
||||
@@ -0,0 +1,15 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+# Put a config file out of the default dirs
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /root/root-sysctl.conf
|
||||
+
|
||||
+# Add a symlink
|
||||
+ln -s /root/root-sysctl.conf /etc/sysctl.d/90-root.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_incompliant.fail.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_incompliant.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..3b67676ac69
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_root_incompliant.fail.sh
|
||||
@@ -0,0 +1,15 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+# Put a config file out of the default dirs
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 1" >> /root/root-sysctl.conf
|
||||
+
|
||||
+# Add a symlink
|
||||
+ln -s /root/root-sysctl.conf /etc/sysctl.d/90-root.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlinks_to_same_file.pass.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlinks_to_same_file.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..6164d0b1ca9
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlinks_to_same_file.pass.sh
|
||||
@@ -0,0 +1,14 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+# Multiple symliks to the same file should be ignored
|
||||
+ln -s /etc/sysctl.conf /etc/sysctl.d/90-sysctl.conf
|
||||
+ln -s /etc/sysctl.conf /etc/sysctl.d/99-sysctl.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
+
|
||||
|
||||
From 4f4bb24620338b2ff8f59d173b575d2089618357 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 4 May 2022 19:23:41 +0200
|
||||
Subject: [PATCH 2/3] Filter out symlinks referencing default dirs
|
||||
|
||||
Apply a filter on the collected symlinks and exclude the ones that
|
||||
don't point to the default dirs.
|
||||
In other words, only remove ignore options in symlinks if the files they
|
||||
reference will be scanned anyway, because they are in the one of the
|
||||
default dirs.
|
||||
---
|
||||
shared/templates/sysctl/oval.template | 12 +++++++++++-
|
||||
1 file changed, 11 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 0b5cde45045..ac395d545c3 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -217,10 +217,20 @@
|
||||
|
||||
<!-- "pattern match" doesn't seem to work with symlink_object, not sure if a bug or not.
|
||||
Workaround by querying for all conf files found -->
|
||||
- <unix:symlink_object comment="syctl symlinks" id="object_{{{ SYSCTLID }}}_symlinks" version="1">
|
||||
+ <unix:symlink_object comment="Symlinks referencing files in default dirs" id="object_{{{ SYSCTLID }}}_symlinks" version="1">
|
||||
<unix:filepath operation="equals" var_ref="local_var_conf_files_{{{ SYSCTLID }}}" />
|
||||
+ <filter action="exclude">state_symlink_points_outside_usual_dirs_{{{ SYSCTLID }}}</filter>
|
||||
</unix:symlink_object>
|
||||
|
||||
+ <!-- The state matches symlinks that don't point to the default dirs, i.e. paths that are not:
|
||||
+ ^/etc/sysctl.conf$
|
||||
+ ^/etc/sysctl.d/.*$
|
||||
+ ^/run/sysctl.d/.*$
|
||||
+ ^/usr/lib/sysctl.d/.*$ -->
|
||||
+ <unix:symlink_state comment="State that matches symlinks referencing files not in the default dirs" id="state_symlink_points_outside_usual_dirs_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unix:canonical_path operation="pattern match">^(?!(\/etc\/sysctl\.conf$|(\/etc|\/run|\/usr\/lib)\/sysctl\.d\/)).*$</unix:canonical_path>
|
||||
+ </unix:symlink_state>
|
||||
+
|
||||
<local_variable comment="List of conf files" datatype="string" id="local_var_conf_files_{{{ SYSCTLID }}}" version="1">
|
||||
<object_component object_ref="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
||||
</local_variable>
|
||||
|
||||
From 156291af3ae48fc0dff668b05e9e0bbdd42868b2 Mon Sep 17 00:00:00 2001
|
||||
From: Gabriel Becker <ggasparb@redhat.com>
|
||||
Date: Fri, 6 May 2022 11:49:00 +0200
|
||||
Subject: [PATCH 3/3] Consider file/link/dir while applying ansible remediation
|
||||
on sysctl template.
|
||||
|
||||
---
|
||||
shared/templates/sysctl/ansible.template | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/shared/templates/sysctl/ansible.template b/shared/templates/sysctl/ansible.template
|
||||
index f525cf873f7..5a178fa7f49 100644
|
||||
--- a/shared/templates/sysctl/ansible.template
|
||||
+++ b/shared/templates/sysctl/ansible.template
|
||||
@@ -9,6 +9,7 @@
|
||||
paths: "/etc/sysctl.d/"
|
||||
contains: '^[\s]*{{{ SYSCTLVAR }}}.*$'
|
||||
patterns: "*.conf"
|
||||
+ file_type: any
|
||||
register: find_sysctl_d
|
||||
|
||||
- name: Comment out any occurrences of {{{ SYSCTLVAR }}} from /etc/sysctl.d/*.conf files
|
@ -1,115 +0,0 @@
|
||||
From e1c1930d252dee6ba7ef21b856ed1651e82f57ab Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Fri, 6 May 2022 13:32:34 +0200
|
||||
Subject: [PATCH] Don't scan dir with preconfigured sysctls in RHEL
|
||||
|
||||
With the introduction of checks for options defined in multiple
|
||||
files
|
||||
the pre-configured sysctls became prominent and started to cause
|
||||
rules
|
||||
to fail.
|
||||
|
||||
In /usr/lib/sysctl.d there are sysctl options defined by systemd and
|
||||
other packages. The files in witch these options are defined are not
|
||||
meant to be edited, these options should be overriden by options in
|
||||
dirs of higher priorrity, like /etc/sysctl.d, or /etc/sysctl.conf.
|
||||
Remediating these files will cause problems with rule
|
||||
rpm_verify_hashes,
|
||||
as these files are not RPM config files.
|
||||
|
||||
As the sysctl remediations don't edit the pre-configured files the
|
||||
rule will always result in error.
|
||||
This commit removes the checks for the pre-configured directory,
|
||||
i.e. /usr/lib/sysctl.d/.
|
||||
|
||||
The end result is that any sysctl option that is pre-configured in
|
||||
/usr/lib/sysctl.d will be defined in two files, the pre-configured
|
||||
one
|
||||
ane /etc/sysctl.conf.
|
||||
The sysctl option in effect should be the one configured in
|
||||
/etc/sysctl.conf as this file has the highest priority for sysctl.
|
||||
---
|
||||
docs/templates/template_reference.md | 12 +++++++++++-
|
||||
shared/templates/sysctl/oval.template | 8 ++++++++
|
||||
2 files changed, 19 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/docs/templates/template_reference.md b/docs/templates/template_reference.md
|
||||
index fef4679..d49511a 100644
|
||||
--- a/docs/templates/template_reference.md
|
||||
+++ b/docs/templates/template_reference.md
|
||||
@@ -717,10 +717,20 @@ The selected value can be changed in the profile (consult the actual variable fo
|
||||
```
|
||||
|
||||
#### sysctl
|
||||
-- Checks sysctl parameters. The OVAL definition checks both
|
||||
+- Checks sysctl parameters. The OVAL definition checks both static
|
||||
configuration and runtime settings and require both of them to be
|
||||
set to the desired value to return true.
|
||||
|
||||
+ The following file and directories are checked for static
|
||||
+ sysctl configurations:
|
||||
+ - /etc/sysct.conf
|
||||
+ - /etc/sysct.d/\*.conf
|
||||
+ - /run/sysct.d/\*.conf
|
||||
+ - /usr/lib/sysct.d/\*.conf (does not apply to RHEL)
|
||||
+
|
||||
+ A sysctl option defined in more then one file within the scanned directories
|
||||
+ will result in `fail`.
|
||||
+
|
||||
- Parameters:
|
||||
|
||||
- **sysctlvar** - name of the sysctl value, eg.
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 2794638..b692ee3 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -98,8 +98,10 @@
|
||||
test_ref="test_static_etc_sysctld_{{{ SYSCTLID }}}"/>
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /run/sysctl.d/*.conf"
|
||||
test_ref="test_static_run_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+{{% if "rhel" not in product %}}
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /usr/lib/sysctl.d/*.conf"
|
||||
test_ref="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+{{% endif %}}
|
||||
</criteria>
|
||||
<criterion comment="Check that {{{ SYSCTLID }}} is defined in only one file" test_ref="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
</criteria>
|
||||
@@ -117,9 +119,11 @@
|
||||
{{{ state_static_sysctld("run_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
+{{% if "rhel" not in product %}}
|
||||
<ind:textfilecontent54_test check="all" comment="{{{ SYSCTLVAR }}} static configuration in /etc/sysctl.d/*.conf" id="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
{{{ state_static_sysctld("usr_lib_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
+{{% endif %}}
|
||||
|
||||
<ind:variable_test check="all" check_existence="all_exist" comment="Check that only one file contains {{{ SYSCTLID }}}"
|
||||
id="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
@@ -229,7 +233,9 @@
|
||||
<ind:textfilecontent54_object id="object_static_run_usr_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
<set>
|
||||
<object_reference>object_static_run_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+{{% if "rhel" not in product %}}
|
||||
<object_reference>object_static_usr_lib_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+{{% endif %}}
|
||||
</set>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
@@ -250,11 +256,13 @@
|
||||
{{{ sysctl_match() }}}
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
+{{% if "rhel" not in product %}}
|
||||
<ind:textfilecontent54_object id="object_static_usr_lib_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
<ind:path>/usr/lib/sysctl.d</ind:path>
|
||||
<ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
{{{ sysctl_match() }}}
|
||||
</ind:textfilecontent54_object>
|
||||
+{{% endif %}}
|
||||
{{% if SYSCTLVAL == "" %}}
|
||||
|
||||
<ind:textfilecontent54_state id="state_static_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
--
|
||||
2.34.1
|
||||
|
@ -1,190 +0,0 @@
|
||||
From b08b310a02e022d280b76e89282c8b8dcf3b9b55 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 4 May 2022 10:02:05 +0200
|
||||
Subject: [PATCH 1/3] Filter out symlinks
|
||||
|
||||
Create a list of paths to symlinks to filter out from the count of
|
||||
unique filpaths.
|
||||
---
|
||||
shared/templates/sysctl/oval.template | 29 ++++++++++++++++++++++++++-
|
||||
1 file changed, 28 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 97487d6114e..1f30ad86ceb 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -168,9 +168,36 @@
|
||||
</count>
|
||||
</local_variable>
|
||||
|
||||
+ <ind:textfilecontent54_object id="object_static_set_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <set>
|
||||
+ <object_reference>object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <filter action="exclude">state_{{{ SYSCTLID }}}_filepath_is_symlink</filter>
|
||||
+ </set>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_state id="state_{{{ SYSCTLID }}}_filepath_is_symlink" version="1">
|
||||
+ <ind:filepath operation="equals" var_check="at least one" var_ref="local_var_symlinks_{{{ SYSCTLID }}}" datatype="string" />
|
||||
+ </ind:textfilecontent54_state>
|
||||
+
|
||||
+ <local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_symlinks_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unique>
|
||||
+ <object_component object_ref="object_{{{ SYSCTLID }}}_symlinks" item_field="filepath" />
|
||||
+ </unique>
|
||||
+ </local_variable>
|
||||
+
|
||||
+ <!-- "pattern match" doesn't seem to work with symlink_object, not sure if a bug or not.
|
||||
+ Workaround by querying for all conf files found -->
|
||||
+ <unix:symlink_object comment="syctl symlinks" id="object_{{{ SYSCTLID }}}_symlinks" version="1">
|
||||
+ <unix:filepath operation="equals" var_ref="local_var_conf_files_{{{ SYSCTLID }}}" />
|
||||
+ </unix:symlink_object>
|
||||
+
|
||||
+ <local_variable comment="List of conf files" datatype="string" id="local_var_conf_files_{{{ SYSCTLID }}}" version="1">
|
||||
+ <object_component object_ref="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
||||
+ </local_variable>
|
||||
+
|
||||
<!-- Avoid directly referencing a possibly empty collection, one empty collection will cause the
|
||||
variable to have no value even when there are valid objects. -->
|
||||
- <ind:textfilecontent54_object id="object_static_set_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
<set>
|
||||
<object_reference>object_static_etc_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
<object_reference>object_static_run_usr_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
|
||||
From 29bf2a53d29624aa21fe91d5ad0ee34260514b6f Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 4 May 2022 11:18:46 +0200
|
||||
Subject: [PATCH 2/3] Avoid using empty variable when no symlinks exist
|
||||
|
||||
This avoids directly referencing a variable that may have no values.
|
||||
If no symlinks are found, 'local_var_symlinks_{{{ SYSCTLID }}}' will
|
||||
have "no values".
|
||||
Using this variable in the state comparison will automatically cause the
|
||||
definition to evaluate to "unknown".
|
||||
|
||||
What we do here is inject a blank string with the use of <set>, this
|
||||
way, when no symlinks are found, the variable has a single blank string.
|
||||
---
|
||||
shared/templates/sysctl/oval.template | 32 ++++++++++++++++++++++++++-
|
||||
1 file changed, 31 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 1f30ad86ceb..0b5cde45045 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -176,9 +176,39 @@
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
<ind:textfilecontent54_state id="state_{{{ SYSCTLID }}}_filepath_is_symlink" version="1">
|
||||
- <ind:filepath operation="equals" var_check="at least one" var_ref="local_var_symlinks_{{{ SYSCTLID }}}" datatype="string" />
|
||||
+ <ind:filepath operation="equals" var_check="at least one" var_ref="local_var_safe_symlinks_{{{ SYSCTLID }}}" datatype="string" />
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
+ <!-- <no simlink handling> -->
|
||||
+ <!-- We craft a variable with blank string to combine with the symlink paths found.
|
||||
+ This ultimately avoids referencing a variable with "no values",
|
||||
+ we reference a variable with a blank string -->
|
||||
+ <local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_safe_symlinks_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unique>
|
||||
+ <object_component object_ref="var_object_symlink_{{{ SYSCTLID }}}" item_field="value" />
|
||||
+ </unique>
|
||||
+ </local_variable>
|
||||
+
|
||||
+ <ind:variable_object id="var_object_symlink_{{{ SYSCTLID }}}" comment="combine the blank string with symlink paths found" version="1">
|
||||
+ <set>
|
||||
+ <object_reference>var_obj_symlink_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>var_obj_blank_{{{ SYSCTLID }}}</object_reference>
|
||||
+ </set>
|
||||
+ </ind:variable_object>
|
||||
+
|
||||
+ <ind:variable_object id="var_obj_blank_{{{ SYSCTLID }}}" comment="variable object of the blank string" version="1">
|
||||
+ <ind:var_ref>local_var_blank_path_{{{ SYSCTLID }}}</ind:var_ref>
|
||||
+ </ind:variable_object>
|
||||
+
|
||||
+ <local_variable comment="Blank string" datatype="string" id="local_var_blank_path_{{{ SYSCTLID }}}" version="1">
|
||||
+ <literal_component datatype="string"></literal_component>
|
||||
+ </local_variable>
|
||||
+
|
||||
+ <ind:variable_object id="var_obj_symlink_{{{ SYSCTLID }}}" comment="variable object of the symlinks found" version="1">
|
||||
+ <ind:var_ref>local_var_symlinks_{{{ SYSCTLID }}}</ind:var_ref>
|
||||
+ </ind:variable_object>
|
||||
+ <!-- </no simlink handling> -->
|
||||
+
|
||||
<local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_symlinks_{{{ SYSCTLID }}}" version="1">
|
||||
<unique>
|
||||
<object_component object_ref="object_{{{ SYSCTLID }}}_symlinks" item_field="filepath" />
|
||||
|
||||
From 7e9e091517131d30c60a649795d477435017c97b Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Wed, 4 May 2022 11:41:13 +0200
|
||||
Subject: [PATCH 3/3] Add test scenarios for sysctl symlink
|
||||
|
||||
---
|
||||
.../tests/symlink_different_option.pass.sh | 15 +++++++++++++++
|
||||
.../tests/symlink_repeated_sysctl_conf.pass.sh | 11 +++++++++++
|
||||
.../tests/symlink_same_option.fail.sh | 15 +++++++++++++++
|
||||
3 files changed, 41 insertions(+)
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_different_option.pass.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_repeated_sysctl_conf.pass.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_same_option.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_different_option.pass.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_different_option.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..714a8815134
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_different_option.pass.sh
|
||||
@@ -0,0 +1,15 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+# Configure a different sysctl option
|
||||
+echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/90-test.conf
|
||||
+
|
||||
+# Add a symlink
|
||||
+ln -s /etc/sysctl.d/90-test.conf /etc/sysctl.d/99-sysctl.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_repeated_sysctl_conf.pass.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_repeated_sysctl_conf.pass.sh
|
||||
new file mode 100644
|
||||
index 00000000000..1fbbf1b0675
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_repeated_sysctl_conf.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+ln -s /etc/sysctl.conf /etc/sysctl.d/99-sysctl.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_same_option.fail.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_same_option.fail.sh
|
||||
new file mode 100644
|
||||
index 00000000000..51530f6e80c
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/symlink_same_option.fail.sh
|
||||
@@ -0,0 +1,15 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+# Configure the same sysctl option
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.d/90-test.conf
|
||||
+
|
||||
+# and add a symlink
|
||||
+ln -s /etc/sysctl.d/90-test.conf /etc/sysctl.d/99-sysctl.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
@ -1,241 +0,0 @@
|
||||
From 21177e5d44dfd6f4fa6de79737c1e55c4b22660a Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Tue, 3 May 2022 10:49:44 +0200
|
||||
Subject: [PATCH] Edited PR_8656 to apply on 0.1.60
|
||||
|
||||
---
|
||||
.../one_sysctl_conf_one_sysctl_d.fail.sh | 11 +++
|
||||
.../tests/two_sysctls_on_d.fail.sh | 11 +++
|
||||
.../tests/two_sysctls_on_same_file.pass.sh | 11 +++
|
||||
.../two_sysctls_on_same_file_name.fail.sh | 11 +++
|
||||
shared/templates/sysctl/bash.template | 2 +-
|
||||
shared/templates/sysctl/oval.template | 99 +++++++++++++------
|
||||
6 files changed, 114 insertions(+), 31 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/one_sysctl_conf_one_sysctl_d.fail.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_d.fail.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file.pass.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file_name.fail.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/one_sysctl_conf_one_sysctl_d.fail.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/one_sysctl_conf_one_sysctl_d.fail.sh
|
||||
new file mode 100644
|
||||
index 0000000..b2bc2f8
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/one_sysctl_conf_one_sysctl_d.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.d/duplicate.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_d.fail.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_d.fail.sh
|
||||
new file mode 100644
|
||||
index 0000000..49a8f2e
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_d.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.d/first.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.d/duplicate.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file.pass.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000..548e616
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file_name.fail.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file_name.fail.sh
|
||||
new file mode 100644
|
||||
index 0000000..487691d
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_source_route/tests/two_sysctls_on_same_file_name.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.default.accept_source_route/d" /etc/sysctl.conf
|
||||
+
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.default.accept_source_route = 0" >> /etc/sysctl.d/sysctl.conf
|
||||
+
|
||||
+sysctl -w net.ipv4.conf.default.accept_source_route=0
|
||||
diff --git a/shared/templates/sysctl/bash.template b/shared/templates/sysctl/bash.template
|
||||
index 6c82e6e..d68956f 100644
|
||||
--- a/shared/templates/sysctl/bash.template
|
||||
+++ b/shared/templates/sysctl/bash.template
|
||||
@@ -6,7 +6,7 @@
|
||||
|
||||
# Comment out any occurrences of {{{ SYSCTLVAR }}} from /etc/sysctl.d/*.conf files
|
||||
for f in /etc/sysctl.d/*.conf ; do
|
||||
- matching_list=$(grep -P '^(?!#).*[\s]+{{{ SYSCTLVAR }}}.*$' $f | uniq )
|
||||
+ matching_list=$(grep -P '^(?!#).*[\s]*{{{ SYSCTLVAR }}}.*$' $f | uniq )
|
||||
if ! test -z "$matching_list"; then
|
||||
while IFS= read -r entry; do
|
||||
# comment out "{{{ SYSCTLVAR }}}" matches to preserve user data
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 646f5f3..fd19f8b 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -1,3 +1,9 @@
|
||||
+{{%- if SYSCTLVAL == "" %}}
|
||||
+{{%- set COMMENT_VALUE="the appropriate value" %}}
|
||||
+{{%- else %}}
|
||||
+{{%- set COMMENT_VALUE=SYSCTLVAL %}}
|
||||
+{{%- endif %}}
|
||||
+
|
||||
{{% macro state_static_sysctld(prefix) -%}}
|
||||
<ind:object object_ref="object_static_{{{ prefix }}}_{{{ SYSCTLID }}}" />
|
||||
{{%- if SYSCTLVAL == "" %}}
|
||||
@@ -6,7 +12,7 @@
|
||||
{{%- endmacro -%}}
|
||||
{{%- macro sysctl_match() -%}}
|
||||
{{%- if SYSCTLVAL == "" -%}}
|
||||
- <ind:pattern operation="pattern match">(?:^|.*\n)[^#]*{{{ SYSCTLVAR }}}[\s]*=[\s]*(\d+)[\s]*\n</ind:pattern>
|
||||
+ <ind:pattern operation="pattern match">^[\s]*{{{ SYSCTLVAR }}}[\s]*=[\s]*(\d+)[\s]*$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
{{%- else -%}}
|
||||
{{% if OPERATION == "pattern match" %}}
|
||||
@@ -53,20 +59,12 @@
|
||||
|
||||
<def-group>
|
||||
<definition class="compliance" id="sysctl_runtime_{{{ SYSCTLID }}}" version="3">
|
||||
- {{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to " + ("'" + SYSCTLVAL + "'") if SYSCTLVAL else " the appropriate value" + " in the system runtime.") }}}
|
||||
+ {{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to " + COMMENT_VALUE + " in the system runtime.") }}}
|
||||
<criteria operator="AND">
|
||||
-{{%- if SYSCTLVAL == "" %}}
|
||||
- <criterion comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to the appropriate value" test_ref="test_sysctl_runtime_{{{ SYSCTLID }}}" />
|
||||
-{{%- else %}}
|
||||
- <criterion comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to {{{ SYSCTLVAL }}}" test_ref="test_sysctl_runtime_{{{ SYSCTLID }}}" />
|
||||
-{{%- endif %}}
|
||||
+ <criterion comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}}" test_ref="test_sysctl_runtime_{{{ SYSCTLID }}}"/>
|
||||
</criteria>
|
||||
</definition>
|
||||
-{{% if SYSCTLVAL == "" %}}
|
||||
- <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to the appropriate value" id="test_sysctl_runtime_{{{ SYSCTLID }}}" version="1">
|
||||
-{{%- else %}}
|
||||
- <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to {{{ SYSCTLVAL }}}" id="test_sysctl_runtime_{{{ SYSCTLID }}}" version="1">
|
||||
-{{%- endif %}}
|
||||
+ <unix:sysctl_test id="test_sysctl_runtime_{{{ SYSCTLID }}}" version="1" comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}}" check="all" check_existence="all_exist">
|
||||
<unix:object object_ref="object_sysctl_runtime_{{{ SYSCTLID }}}" />
|
||||
<unix:state state_ref="state_sysctl_runtime_{{{ SYSCTLID }}}" />
|
||||
</unix:sysctl_test>
|
||||
@@ -96,25 +94,21 @@
|
||||
|
||||
<def-group>
|
||||
<definition class="compliance" id="sysctl_static_{{{ SYSCTLID }}}" version="3">
|
||||
- {{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to " + ("'" + SYSCTLVAL + "'") if SYSCTLVAL else " the appropriate value" + " in the system configuration.") }}}
|
||||
-{{%- if SYSCTLVAL == "" %}}
|
||||
- <criteria operator="OR">
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to the appropriate value in /etc/sysctl.conf" test_ref="test_static_sysctl_{{{ SYSCTLID }}}" />
|
||||
- <!-- see sysctl.d(5) -->
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="test_static_etc_sysctld_{{{ SYSCTLID }}}" />
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to the appropriate value in /run/sysctl.d/*.conf" test_ref="test_static_run_sysctld_{{{ SYSCTLID }}}" />
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}" />
|
||||
- </criteria>
|
||||
-{{%- else %}}
|
||||
-
|
||||
- <criteria operator="OR">
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ SYSCTLVAL }}} in /etc/sysctl.conf" test_ref="test_static_sysctl_{{{ SYSCTLID }}}" />
|
||||
- <!-- see sysctl.d(5) -->
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ SYSCTLVAL }}} in /etc/sysctl.d/*.conf" test_ref="test_static_etc_sysctld_{{{ SYSCTLID }}}" />
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ SYSCTLVAL }}} in /run/sysctl.d/*.conf" test_ref="test_static_run_sysctld_{{{ SYSCTLID }}}" />
|
||||
- <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ SYSCTLVAL }}} in /usr/lib/sysctl.d/*.conf" test_ref="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}" />
|
||||
+ {{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to " + COMMENT_VALUE + " in the system configuration.") }}}
|
||||
+ <criteria operator="AND">
|
||||
+ <criteria operator="OR">
|
||||
+ <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /etc/sysctl.conf"
|
||||
+ test_ref="test_static_sysctl_{{{ SYSCTLID }}}"/>
|
||||
+ <!-- see sysctl.d(5) -->
|
||||
+ <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /etc/sysctl.d/*.conf"
|
||||
+ test_ref="test_static_etc_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /run/sysctl.d/*.conf"
|
||||
+ test_ref="test_static_run_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ <criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /usr/lib/sysctl.d/*.conf"
|
||||
+ test_ref="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ </criteria>
|
||||
+ <criterion comment="Check that {{{ SYSCTLID }}} is defined in only one file" test_ref="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
</criteria>
|
||||
-{{%- endif %}}
|
||||
</definition>
|
||||
|
||||
<ind:textfilecontent54_test check="all" check_existence="all_exist" comment="{{{ SYSCTLVAR }}} static configuration" id="test_static_sysctl_{{{ SYSCTLID }}}" version="1">
|
||||
@@ -133,6 +127,51 @@
|
||||
{{{ state_static_sysctld("usr_lib_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
+ <ind:variable_test check="all" check_existence="all_exist" comment="Check that only one file contains {{{ SYSCTLID }}}"
|
||||
+ id="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
+ <ind:object object_ref="oject_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
+ <ind:state state_ref="state_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
+ </ind:variable_test>
|
||||
+
|
||||
+ <ind:variable_object id="oject_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
+ <ind:var_ref>local_var_unique_sysctl_{{{ SYSCTLID }}}_counter</ind:var_ref>
|
||||
+ </ind:variable_object>
|
||||
+
|
||||
+ <ind:variable_state id="state_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
+ <ind:value operation="equals" datatype="int">1</ind:value>
|
||||
+ </ind:variable_state>
|
||||
+
|
||||
+ <local_variable comment="Count unique sysctls" datatype="int" id="local_var_unique_sysctl_{{{ SYSCTLID }}}_counter" version="1">
|
||||
+ <count>
|
||||
+ <unique>
|
||||
+ <object_component object_ref="object_static_set_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
||||
+ </unique>
|
||||
+ </count>
|
||||
+ </local_variable>
|
||||
+
|
||||
+ <!-- Avoid directly referencing a possibly empty collection, one empty collection will cause the
|
||||
+ variable to have no value even when there are valid objects. -->
|
||||
+ <ind:textfilecontent54_object id="object_static_set_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <set>
|
||||
+ <object_reference>object_static_etc_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_run_usr_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
+ </set>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_object id="object_static_etc_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <set>
|
||||
+ <object_reference>object_static_sysctl_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_etc_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+ </set>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
+ <ind:textfilecontent54_object id="object_static_run_usr_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <set>
|
||||
+ <object_reference>object_static_run_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_usr_lib_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+ </set>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
<ind:textfilecontent54_object id="object_static_sysctl_{{{ SYSCTLID }}}" version="1">
|
||||
<ind:filepath>/etc/sysctl.conf</ind:filepath>
|
||||
{{{ sysctl_match() }}}
|
||||
--
|
||||
2.34.1
|
||||
|
@ -1,88 +0,0 @@
|
||||
From 1c403af00f39fcfa3c7cf898b1e832d4580cfb59 Mon Sep 17 00:00:00 2001
|
||||
From: Watson Sato <wsato@redhat.com>
|
||||
Date: Thu, 5 May 2022 10:28:34 +0200
|
||||
Subject: [PATCH] PR #8704 edited manually
|
||||
|
||||
- Restrict test to sysctl.conf and /usr/sysctl.d
|
||||
- Separate the state from the object and check it
|
||||
---
|
||||
.../tests/wrong_value_d_directory.fail.sh | 12 ++++++------
|
||||
shared/templates/sysctl/oval.template | 18 ++++++++++--------
|
||||
2 files changed, 16 insertions(+), 14 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/tests/wrong_value_d_directory.fail.sh b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/tests/wrong_value_d_directory.fail.sh
|
||||
index 48a2665..5fb8ddc 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/tests/wrong_value_d_directory.fail.sh
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/tests/wrong_value_d_directory.fail.sh
|
||||
@@ -5,19 +5,19 @@
|
||||
setting_name="kernel.randomize_va_space"
|
||||
setting_value="2"
|
||||
# sysctl -w "$setting_name=$setting_value"
|
||||
-if grep -q "^$setting_name" /usr/lib/sysctl.d/50-sysctl.conf; then
|
||||
- sed -i "s/^$setting_name.*/$setting_name = $setting_value/" /usr/lib/sysctl.d/50-sysctl.conf
|
||||
+if grep -q "^$setting_name" /etc/sysctl.conf; then
|
||||
+ sed -i "s/^$setting_name.*/$setting_name = $setting_value/" /etc/sysctl.conf
|
||||
else
|
||||
- echo "$setting_name = $setting_value" >> /usr/lib/sysctl.d/50-sysctl.conf
|
||||
+ echo "$setting_name = $setting_value" >> /etc/sysctl.conf
|
||||
fi
|
||||
|
||||
setting_name="kernel.randomize_va_space"
|
||||
setting_value="0"
|
||||
# sysctl -w "$setting_name=$setting_value"
|
||||
-if grep -q "^$setting_name" /etc/sysctl.d/99-sysctl.conf; then
|
||||
- sed -i "s/^$setting_name.*/$setting_name = $setting_value/" /etc/sysctl.d/99-sysctl.conf
|
||||
+if grep -q "^$setting_name" /etc/sysctl.d/98-sysctl.conf; then
|
||||
+ sed -i "s/^$setting_name.*/$setting_name = $setting_value/" /etc/sysctl.d/98-sysctl.conf
|
||||
else
|
||||
- echo "$setting_name = $setting_value" >> /etc/sysctl.d/99-sysctl.conf
|
||||
+ echo "$setting_name = $setting_value" >> /etc/sysctl.d/98-sysctl.conf
|
||||
fi
|
||||
|
||||
sysctl --system
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 564cc33..97f1e05 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -6,21 +6,15 @@
|
||||
|
||||
{{% macro state_static_sysctld(prefix) -%}}
|
||||
<ind:object object_ref="object_static_{{{ prefix }}}_{{{ SYSCTLID }}}" />
|
||||
-{{%- if SYSCTLVAL == "" %}}
|
||||
<ind:state state_ref="state_static_sysctld_{{{ SYSCTLID }}}" />
|
||||
-{{%- endif -%}}
|
||||
{{%- endmacro -%}}
|
||||
{{%- macro sysctl_match() -%}}
|
||||
{{%- if SYSCTLVAL == "" -%}}
|
||||
<ind:pattern operation="pattern match">^[\s]*{{{ SYSCTLVAR }}}[\s]*=[\s]*(\d+)[\s]*$</ind:pattern>
|
||||
<ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
{{%- else -%}}
|
||||
-{{% if OPERATION == "pattern match" %}}
|
||||
- <ind:pattern operation="pattern match">^[\s]*{{{ SYSCTLVAR }}}[\s]*=[\s]*{{{ SYSCTLVAL_REGEX }}}[\s]*$</ind:pattern>
|
||||
-{{% else %}}
|
||||
- <ind:pattern operation="pattern match">^[\s]*{{{ SYSCTLVAR }}}[\s]*=[\s]*{{{ SYSCTLVAL }}}[\s]*$</ind:pattern>
|
||||
-{{% endif %}}
|
||||
- <ind:instance datatype="int">1</ind:instance>
|
||||
+ <ind:pattern operation="pattern match">^[\s]*{{{ SYSCTLVAR }}}[\s]*=[\s]*(.*)[\s]*$</ind:pattern>
|
||||
+ <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
|
||||
{{%- endif -%}}
|
||||
{{%- endmacro -%}}
|
||||
{{%- if "P" in FLAGS -%}}
|
||||
@@ -258,6 +252,14 @@
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
<external_variable comment="External variable for {{{ SYSCTLVAR }}}" datatype="{{{ DATATYPE }}}" id="sysctl_{{{ SYSCTLID }}}_value" version="1" />
|
||||
+{{% else %}}
|
||||
+ <ind:textfilecontent54_state id="state_static_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
+{{% if OPERATION == "pattern match" %}}
|
||||
+ <ind:subexpression operation="{{{ OPERATION }}}" datatype="{{{ DATATYPE }}}">{{{ SYSCTLVAL_REGEX }}}</ind:subexpression>
|
||||
+{{% else %}}
|
||||
+ <ind:subexpression operation="{{{ OPERATION }}}" datatype="{{{ DATATYPE }}}">{{{ SYSCTLVAL }}}</ind:subexpression>
|
||||
+{{% endif %}}
|
||||
+ </ind:textfilecontent54_state>
|
||||
{{% endif %}}
|
||||
</def-group>
|
||||
{{%- endif -%}}
|
||||
--
|
||||
2.34.1
|
||||
|
@ -0,0 +1,92 @@
|
||||
From 07261c69afcdc5f9afcdd5aefc2ee9510d705f37 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Jan=20=C4=8Cern=C3=BD?= <jcerny@redhat.com>
|
||||
Date: Wed, 3 Aug 2022 13:08:25 +0200
|
||||
Subject: [PATCH 6/8] Merge pull request #9283 from
|
||||
yuumasato/accept_sudoers_without_includes
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-accept_sudoers_wihout_includes-PR_9283.patch
|
||||
Patch-status: Accept sudoers files without includes as compliant
|
||||
---
|
||||
.../oval/shared.xml | 24 +++++++++++++++----
|
||||
.../sudo/sudoers_default_includedir/rule.yml | 8 ++++---
|
||||
...cludedir.fail.sh => no_includedir.pass.sh} | 2 +-
|
||||
3 files changed, 26 insertions(+), 8 deletions(-)
|
||||
rename linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/{no_includedir.fail.sh => no_includedir.pass.sh} (51%)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
index 59cab0b89d..82095acc6e 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/oval/shared.xml
|
||||
@@ -1,10 +1,16 @@
|
||||
<def-group>
|
||||
<definition class="compliance" id="{{{ rule_id }}}" version="1">
|
||||
{{{ oval_metadata("Check if sudo includes only the default includedir") }}}
|
||||
- <criteria operator="AND">
|
||||
- <criterion comment="Check /etc/sudoers for #includedir" test_ref="test_sudoers_default_includedir" />
|
||||
- <criterion comment="Check /etc/sudoers for #include" test_ref="test_sudoers_without_include" />
|
||||
- <criterion comment="Check /etc/sudoers.d for includes" test_ref="test_sudoersd_without_includes" />
|
||||
+ <criteria operator="OR">
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion comment="Check /etc/sudoers doesn't have any #include" test_ref="test_sudoers_without_include" />
|
||||
+ <criterion comment="Check /etc/sudoers doesn't have any #includedir" test_ref="test_sudoers_without_includedir" />
|
||||
+ </criteria>
|
||||
+ <criteria operator="AND">
|
||||
+ <criterion comment="Check /etc/sudoers for #includedir" test_ref="test_sudoers_default_includedir" />
|
||||
+ <criterion comment="Check /etc/sudoers doesn't have any #include" test_ref="test_sudoers_without_include" />
|
||||
+ <criterion comment="Check /etc/sudoers.d doesn't have any #include or #includedir" test_ref="test_sudoersd_without_includes" />
|
||||
+ </criteria>
|
||||
</criteria>
|
||||
</definition>
|
||||
|
||||
@@ -32,6 +38,16 @@
|
||||
<ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
+ <ind:textfilecontent54_test check="all" check_existence="none_exist"
|
||||
+ comment="audit augenrules rmmod" id="test_sudoers_without_includedir" version="1">
|
||||
+ <ind:object object_ref="object_sudoers_without_includedir" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+ <ind:textfilecontent54_object id="object_sudoers_without_includedir" version="1">
|
||||
+ <ind:filepath>/etc/sudoers</ind:filepath>
|
||||
+ <ind:pattern operation="pattern match">^#includedir[\s]+.*$</ind:pattern>
|
||||
+ <ind:instance operation="greater than or equal" datatype="int">1</ind:instance>
|
||||
+ </ind:textfilecontent54_object>
|
||||
+
|
||||
<ind:textfilecontent54_test check="all" check_existence="none_exist"
|
||||
comment="audit augenrules rmmod" id="test_sudoersd_without_includes" version="1">
|
||||
<ind:object object_ref="object_sudoersd_without_includes" />
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
index aa2aaee19f..83bfb0183b 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/rule.yml
|
||||
@@ -8,9 +8,11 @@ description: |-
|
||||
Administrators can configure authorized <tt>sudo</tt> users via drop-in files, and it is possible to include
|
||||
other directories and configuration files from the file currently being parsed.
|
||||
|
||||
- Make sure that <tt>/etc/sudoers</tt> only includes drop-in configuration files from <tt>/etc/sudoers.d</tt>.
|
||||
- The <tt>/etc/sudoers</tt> should contain only one <tt>#includedir</tt> directive pointing to
|
||||
- <tt>/etc/sudoers.d</tt>, and no file in <tt>/etc/sudoers.d/</tt> should include other files or directories.
|
||||
+ Make sure that <tt>/etc/sudoers</tt> only includes drop-in configuration files from <tt>/etc/sudoers.d</tt>,
|
||||
+ or that no drop-in file is included.
|
||||
+ Either the <tt>/etc/sudoers</tt> should contain only one <tt>#includedir</tt> directive pointing to
|
||||
+ <tt>/etc/sudoers.d</tt>, and no file in <tt>/etc/sudoers.d/</tt> should include other files or directories;
|
||||
+ Or the <tt>/etc/sudoers</tt> should not contain any <tt>#include</tt> or <tt>#includedir</tt> directives.
|
||||
Note that the '#' character doesn't denote a comment in the configuration file.
|
||||
|
||||
rationale: |-
|
||||
diff --git a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.pass.sh
|
||||
similarity index 51%
|
||||
rename from linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh
|
||||
rename to linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.pass.sh
|
||||
index 1e0ab8aea9..fe73cb2507 100644
|
||||
--- a/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.fail.sh
|
||||
+++ b/linux_os/guide/system/software/sudo/sudoers_default_includedir/tests/no_includedir.pass.sh
|
||||
@@ -1,4 +1,4 @@
|
||||
#!/bin/bash
|
||||
# platform = multi_platform_all
|
||||
|
||||
-sed -i "/#includedir.*/d" /etc/sudoers
|
||||
+sed -i "/#include(dir)?.*/d" /etc/sudoers
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,238 @@
|
||||
From b4f98a72871d3f8f277e3357eed843b041a248a3 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Jan=20=C4=8Cern=C3=BD?= <jcerny@redhat.com>
|
||||
Date: Thu, 4 Aug 2022 14:20:20 +0200
|
||||
Subject: [PATCH 7/8] Merge pull request #9286 from
|
||||
yuumasato/update_sysctl_rules_with_new_compliant_values
|
||||
|
||||
Update few sysctl rules to accept multiple compliant values
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-add_multivalue_compliance_kptr_rp_filter-PR_9286.patch
|
||||
Patch-status: Update few sysctl rules to accept multiple compliant values
|
||||
---
|
||||
.../rule.yml | 35 +++++++++++++++++--
|
||||
.../tests/value_1.pass.sh | 11 ++++++
|
||||
.../tests/value_2.pass.sh | 11 ++++++
|
||||
...sctl_net_ipv4_conf_all_rp_filter_value.var | 2 +-
|
||||
.../sysctl_kernel_kptr_restrict/rule.yml | 35 ++++++++++++++++++-
|
||||
.../tests/value_1.pass.sh | 11 ++++++
|
||||
.../tests/value_2.pass.sh | 11 ++++++
|
||||
.../sysctl_kernel_kptr_restrict_value.var | 1 -
|
||||
...kernel_unprivileged_bpf_disabled_value.var | 1 -
|
||||
9 files changed, 112 insertions(+), 6 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_1.pass.sh
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_2.pass.sh
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_1.pass.sh
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_2.pass.sh
|
||||
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml
|
||||
index 496a8491f3..4d31c6c3eb 100644
|
||||
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml
|
||||
@@ -47,11 +47,36 @@ references:
|
||||
stigid@rhel7: RHEL-07-040611
|
||||
stigid@rhel8: RHEL-08-040285
|
||||
|
||||
-{{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.all.rp_filter", value="1") }}}
|
||||
+ocil: |-
|
||||
+ The runtime status of the <code>net.ipv4.conf.all.rp_filter</code> parameter can be queried
|
||||
+ by running the following command:
|
||||
+ <pre>$ sysctl net.ipv4.conf.all.rp_filter</pre>
|
||||
+ The output of the command should indicate either:
|
||||
+ <code>net.ipv4.conf.all.rp_filter = 1</code>
|
||||
+ or:
|
||||
+ <code>net.ipv4.conf.all.rp_filter = 2</code>
|
||||
+ The output of the command should not indicate:
|
||||
+ <code>net.ipv4.conf.all.rp_filter = 0</code>
|
||||
+
|
||||
+ The preferable way how to assure the runtime compliance is to have
|
||||
+ correct persistent configuration, and rebooting the system.
|
||||
+
|
||||
+ The persistent sysctl parameter configuration is performed by specifying the appropriate
|
||||
+ assignment in any file located in the <pre>/etc/sysctl.d</pre> directory.
|
||||
+ Verify that there is not any existing incorrect configuration by executing the following command:
|
||||
+ <pre>$ grep -r '^\s*net.ipv4.conf.all.rp_filter\s*=' /etc/sysctl.conf /etc/sysctl.d</pre>
|
||||
+ The command should not find any assignments other than:
|
||||
+ net.ipv4.conf.all.rp_filter = 1
|
||||
+ or:
|
||||
+ net.ipv4.conf.all.rp_filter = 2
|
||||
+
|
||||
+ Conflicting assignments are not allowed.
|
||||
+
|
||||
+ocil_clause: "the net.ipv4.conf.all.rp_filter is not set to 1 or 2 or is configured to be 0"
|
||||
|
||||
fixtext: |-
|
||||
Configure {{{ full_name }}} to use reverse path filtering on all IPv4 interfaces.
|
||||
- {{{ fixtext_sysctl(sysctl="net.ipv4.conf.all.rp_filter", value="1") | indent(4) }}}
|
||||
+ {{{ fixtext_sysctl(sysctl="net.ipv4.conf.all.rp_filter", value=xccdf_value("sysctl_net_ipv4_conf_all_rp_filter_value")) | indent(4) }}}
|
||||
|
||||
srg_requirement: '{{{ full_name }}} must use reverse path filtering on all IPv4 interfaces.'
|
||||
|
||||
@@ -59,4 +84,10 @@ template:
|
||||
name: sysctl
|
||||
vars:
|
||||
sysctlvar: net.ipv4.conf.all.rp_filter
|
||||
+ {{% if 'ol' in product or 'rhel' in product %}}
|
||||
+ sysctlval:
|
||||
+ - '1'
|
||||
+ - '2'
|
||||
+ wrong_sysctlval_for_testing: "0"
|
||||
+ {{% endif %}}
|
||||
datatype: int
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_1.pass.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_1.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..583b70a3b9
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_1.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_ol,multi_platform_rhel
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.all.rp_filter/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w net.ipv4.conf.all.rp_filter="1"
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_2.pass.sh b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_2.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..ef545976dc
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/tests/value_2.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_ol,multi_platform_rhel
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/net.ipv4.conf.all.rp_filter/d" /etc/sysctl.conf
|
||||
+echo "net.ipv4.conf.all.rp_filter = 2" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w net.ipv4.conf.all.rp_filter="2"
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter_value.var b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter_value.var
|
||||
index e3fc78e3f0..1eae854f6b 100644
|
||||
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter_value.var
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter_value.var
|
||||
@@ -17,5 +17,5 @@ interactive: false
|
||||
|
||||
options:
|
||||
default: 1
|
||||
- disabled: "0"
|
||||
enabled: 1
|
||||
+ loose: 2
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml
|
||||
index 1984b3c869..367934b567 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml
|
||||
@@ -34,6 +34,33 @@ references:
|
||||
|
||||
{{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.kptr_restrict", value="1") }}}
|
||||
|
||||
+ocil: |-
|
||||
+ The runtime status of the <code>kernel.kptr_restrict</code> kernel parameter can be queried
|
||||
+ by running the following command:
|
||||
+ <pre>$ sysctl kernel.kptr_restrict</pre>
|
||||
+ The output of the command should indicate either:
|
||||
+ <code>kernel.kptr_restrict = 1</code>
|
||||
+ or:
|
||||
+ <code>kernel.kptr_restrict = 2</code>
|
||||
+ The output of the command should not indicate:
|
||||
+ <code>kernel.kptr_restrict = 0</code>
|
||||
+
|
||||
+ The preferable way how to assure the runtime compliance is to have
|
||||
+ correct persistent configuration, and rebooting the system.
|
||||
+
|
||||
+ The persistent kernel parameter configuration is performed by specifying the appropriate
|
||||
+ assignment in any file located in the <pre>/etc/sysctl.d</pre> directory.
|
||||
+ Verify that there is not any existing incorrect configuration by executing the following command:
|
||||
+ <pre>$ grep -r '^\s*kernel.kptr_restrict\s*=' /etc/sysctl.conf /etc/sysctl.d</pre>
|
||||
+ The command should not find any assignments other than:
|
||||
+ kernel.kptr_restrict = 1
|
||||
+ or:
|
||||
+ kernel.kptr_restrict = 2
|
||||
+
|
||||
+ Conflicting assignments are not allowed.
|
||||
+
|
||||
+ocil_clause: "the kernel.kptr_restrict is not set to 1 or 2 or is configured to be 0"
|
||||
+
|
||||
srg_requirement: '{{{ full_name }}} must restrict exposed kernel pointer addresses access.'
|
||||
|
||||
platform: machine
|
||||
@@ -42,8 +69,14 @@ template:
|
||||
name: sysctl
|
||||
vars:
|
||||
sysctlvar: kernel.kptr_restrict
|
||||
+ {{% if 'ol' in product or 'rhel' in product %}}
|
||||
+ sysctlval:
|
||||
+ - '1'
|
||||
+ - '2'
|
||||
+ wrong_sysctlval_for_testing: "0"
|
||||
+ {{% endif %}}
|
||||
datatype: int
|
||||
|
||||
fixtext: |-
|
||||
Configure {{{ full_name }}} to restrict exposed kernel pointer addresses access.
|
||||
- {{{ fixtext_sysctl("kernel.kptr_restrict", "1") | indent(4) }}}
|
||||
+ {{{ fixtext_sysctl("kernel.kptr_restrict", value=xccdf_value("sysctl_kernel_kptr_restrict_value")) | indent(4) }}}
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_1.pass.sh b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_1.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..70189666c1
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_1.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_ol,multi_platform_rhel
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/kernel.kptr_restrict/d" /etc/sysctl.conf
|
||||
+echo "kernel.kptr_restrict = 1" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w kernel.kptr_restrict="1"
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_2.pass.sh b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_2.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..209395fa9a
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/tests/value_2.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = multi_platform_ol,multi_platform_rhel
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/kernel.kptr_restrict/d" /etc/sysctl.conf
|
||||
+echo "kernel.kptr_restrict = 2" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w kernel.kptr_restrict="2"
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict_value.var b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict_value.var
|
||||
index 452328e3ef..268550de53 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict_value.var
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict_value.var
|
||||
@@ -12,6 +12,5 @@ interactive: false
|
||||
|
||||
options:
|
||||
default: 1
|
||||
- 0: 0
|
||||
1: 1
|
||||
2: 2
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var
|
||||
index b8bf965a25..cbfd9bafa9 100644
|
||||
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var
|
||||
@@ -13,6 +13,5 @@ interactive: false
|
||||
|
||||
options:
|
||||
default: 2
|
||||
- 0: "0"
|
||||
1: "1"
|
||||
2: "2"
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,180 @@
|
||||
From 26ca545c89207d2ac2ba2fb68824c1c323fece79 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Burket <mburket@redhat.com>
|
||||
Date: Wed, 3 Aug 2022 07:44:35 -0500
|
||||
Subject: [PATCH 4/8] Merge pull request #9277 from
|
||||
yuumasato/new_sysctl_ipv4_forwarding_rule
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-add_new_rule_sysctl_ipv4_forwarding-PR_9277.patch
|
||||
Patch-status: New sysctl ipv4 forwarding rule
|
||||
---
|
||||
.../rule.yml | 44 +++++++++++++++++++
|
||||
...ctl_net_ipv4_conf_all_forwarding_value.var | 17 +++++++
|
||||
.../sysctl_net_ipv4_ip_forward/rule.yml | 1 -
|
||||
products/rhel8/profiles/stig.profile | 2 +-
|
||||
shared/references/cce-redhat-avail.txt | 1 -
|
||||
.../data/profile_stability/rhel8/stig.profile | 4 +-
|
||||
.../profile_stability/rhel8/stig_gui.profile | 2 +-
|
||||
7 files changed, 65 insertions(+), 6 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding/rule.yml
|
||||
create mode 100644 linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding_value.var
|
||||
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding/rule.yml
|
||||
new file mode 100644
|
||||
index 0000000000..7b0066f7c2
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding/rule.yml
|
||||
@@ -0,0 +1,44 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: rhel8
|
||||
+
|
||||
+title: 'Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces'
|
||||
+
|
||||
+description: '{{{ describe_sysctl_option_value(sysctl="net.ipv4.conf.all.forwarding", value="0") }}}'
|
||||
+
|
||||
+rationale: |-
|
||||
+ IP forwarding permits the kernel to forward packets from one network
|
||||
+ interface to another. The ability to forward packets between two networks is
|
||||
+ only appropriate for systems acting as routers.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel8: CCE-86220-1
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-000366
|
||||
+ nist: CM-6(b)
|
||||
+ srg: SRG-OS-000480-GPOS-00227
|
||||
+ stigid@rhel8: RHEL-08-040259
|
||||
+
|
||||
+ocil_clause: 'IP forwarding value is "1" and the system is not router'
|
||||
+
|
||||
+ocil: |-
|
||||
+ {{{ ocil_sysctl_option_value(sysctl="net.ipv4.conf.all.forwarding", value="0") }}}
|
||||
+ The ability to forward packets is only appropriate for routers.
|
||||
+
|
||||
+fixtext: |-
|
||||
+ Configure {{{ full_name }}} to not allow packet forwarding unless the system is a router with the following commands:
|
||||
+ {{{ fixtext_sysctl(sysctl="net.ipv4.conf.all.forwarding", value="0") | indent(4) }}}
|
||||
+
|
||||
+srg_requirement: '{{{ full_name }}} must not perform packet forwarding unless the system is a router.'
|
||||
+
|
||||
+platform: machine
|
||||
+
|
||||
+template:
|
||||
+ name: sysctl
|
||||
+ vars:
|
||||
+ sysctlvar: net.ipv4.conf.all.forwarding
|
||||
+ datatype: int
|
||||
+
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding_value.var b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding_value.var
|
||||
new file mode 100644
|
||||
index 0000000000..2aedd6e643
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_forwarding_value.var
|
||||
@@ -0,0 +1,17 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: net.ipv4.conf.all.forwarding
|
||||
+
|
||||
+description: 'Toggle IPv4 Forwarding'
|
||||
+
|
||||
+type: number
|
||||
+
|
||||
+operator: equals
|
||||
+
|
||||
+interactive: false
|
||||
+
|
||||
+options:
|
||||
+ default: "0"
|
||||
+ disabled: "0"
|
||||
+ enabled: 1
|
||||
+
|
||||
diff --git a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml
|
||||
index 5c449db7f3..7acfc0b05b 100644
|
||||
--- a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml
|
||||
+++ b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml
|
||||
@@ -45,7 +45,6 @@ references:
|
||||
stigid@ol7: OL07-00-040740
|
||||
stigid@ol8: OL08-00-040260
|
||||
stigid@rhel7: RHEL-07-040740
|
||||
- stigid@rhel8: RHEL-08-040259
|
||||
stigid@sle12: SLES-12-030430
|
||||
stigid@sle15: SLES-15-040380
|
||||
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 4b480bd2c1..6b44436a2b 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -1127,7 +1127,7 @@ selections:
|
||||
- sysctl_net_ipv6_conf_default_accept_source_route
|
||||
|
||||
# RHEL-08-040259
|
||||
- - sysctl_net_ipv4_ip_forward
|
||||
+ - sysctl_net_ipv4_conf_all_forwarding
|
||||
|
||||
# RHEL-08-040260
|
||||
- sysctl_net_ipv6_conf_all_forwarding
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index a613a152ae..9480db3eae 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -176,7 +176,6 @@ CCE-86216-9
|
||||
CCE-86217-7
|
||||
CCE-86218-5
|
||||
CCE-86219-3
|
||||
-CCE-86220-1
|
||||
CCE-86221-9
|
||||
CCE-86222-7
|
||||
CCE-86223-5
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index 4bee72830d..47f53a9d02 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -1,7 +1,7 @@
|
||||
title: DISA STIG for Red Hat Enterprise Linux 8
|
||||
description: 'This profile contains configuration checks that align to the
|
||||
|
||||
- DISA STIG for Red Hat Enterprise Linux 8 V1R7
|
||||
+ DISA STIG for Red Hat Enterprise Linux 8 V1R7.
|
||||
|
||||
|
||||
In addition to being applicable to Red Hat Enterprise Linux 8, DISA recognizes
|
||||
@@ -395,13 +395,13 @@ selections:
|
||||
- sysctl_net_core_bpf_jit_harden
|
||||
- sysctl_net_ipv4_conf_all_accept_redirects
|
||||
- sysctl_net_ipv4_conf_all_accept_source_route
|
||||
+- sysctl_net_ipv4_conf_all_forwarding
|
||||
- sysctl_net_ipv4_conf_all_rp_filter
|
||||
- sysctl_net_ipv4_conf_all_send_redirects
|
||||
- sysctl_net_ipv4_conf_default_accept_redirects
|
||||
- sysctl_net_ipv4_conf_default_accept_source_route
|
||||
- sysctl_net_ipv4_conf_default_send_redirects
|
||||
- sysctl_net_ipv4_icmp_echo_ignore_broadcasts
|
||||
-- sysctl_net_ipv4_ip_forward
|
||||
- sysctl_net_ipv6_conf_all_accept_ra
|
||||
- sysctl_net_ipv6_conf_all_accept_redirects
|
||||
- sysctl_net_ipv6_conf_all_accept_source_route
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index ece32d06a6..c4e60ddcde 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -405,13 +405,13 @@ selections:
|
||||
- sysctl_net_core_bpf_jit_harden
|
||||
- sysctl_net_ipv4_conf_all_accept_redirects
|
||||
- sysctl_net_ipv4_conf_all_accept_source_route
|
||||
+- sysctl_net_ipv4_conf_all_forwarding
|
||||
- sysctl_net_ipv4_conf_all_rp_filter
|
||||
- sysctl_net_ipv4_conf_all_send_redirects
|
||||
- sysctl_net_ipv4_conf_default_accept_redirects
|
||||
- sysctl_net_ipv4_conf_default_accept_source_route
|
||||
- sysctl_net_ipv4_conf_default_send_redirects
|
||||
- sysctl_net_ipv4_icmp_echo_ignore_broadcasts
|
||||
-- sysctl_net_ipv4_ip_forward
|
||||
- sysctl_net_ipv6_conf_all_accept_ra
|
||||
- sysctl_net_ipv6_conf_all_accept_redirects
|
||||
- sysctl_net_ipv6_conf_all_accept_source_route
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,98 @@
|
||||
From 89687cb88490f24428ae553021c667303980d8f4 Mon Sep 17 00:00:00 2001
|
||||
From: Evgeny Kolesnikov <ekolesni@redhat.com>
|
||||
Date: Wed, 10 Aug 2022 16:16:54 +0200
|
||||
Subject: [PATCH 12/12] Merge pull request #9324 from
|
||||
matejak/applicability_var_tmp
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-add_partition_platform_to_relevant_rules-PR_9324.path
|
||||
Patch-status: Add the platform applicability to relevant rules
|
||||
---
|
||||
.../permissions/partitions/mount_option_tmp_nodev/rule.yml | 2 +-
|
||||
.../permissions/partitions/mount_option_tmp_noexec/rule.yml | 2 +-
|
||||
.../permissions/partitions/mount_option_tmp_nosuid/rule.yml | 2 +-
|
||||
.../permissions/partitions/mount_option_var_tmp_bind/rule.yml | 2 +-
|
||||
.../permissions/partitions/mount_option_var_tmp_noexec/rule.yml | 2 +-
|
||||
.../permissions/partitions/mount_option_var_tmp_nosuid/rule.yml | 2 +-
|
||||
6 files changed, 6 insertions(+), 6 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
|
||||
index 45a73e0286..79a19a8d30 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
|
||||
@@ -45,7 +45,7 @@ references:
|
||||
stigid@ol8: OL08-00-040123
|
||||
stigid@rhel8: RHEL-08-040123
|
||||
|
||||
-platform: machine
|
||||
+platform: machine and partition-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
|
||||
index 7356183bab..d3f6d6175e 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
|
||||
@@ -44,7 +44,7 @@ references:
|
||||
stigid@ol8: OL08-00-040125
|
||||
stigid@rhel8: RHEL-08-040125
|
||||
|
||||
-platform: machine
|
||||
+platform: machine and partition-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
|
||||
index d153b86934..10790dc95a 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
|
||||
@@ -45,7 +45,7 @@ references:
|
||||
stigid@ol8: OL08-00-040124
|
||||
stigid@rhel8: RHEL-08-040124
|
||||
|
||||
-platform: machine
|
||||
+platform: machine and partition-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_bind/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_bind/rule.yml
|
||||
index 133e7727ca..05992df4b4 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_bind/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_bind/rule.yml
|
||||
@@ -31,7 +31,7 @@ references:
|
||||
nist: CM-7(a),CM-7(b),CM-6(a),AC-6,AC-6(1),MP-7
|
||||
nist-csf: PR.IP-1,PR.PT-3
|
||||
|
||||
-platform: machine
|
||||
+platform: machine and partition-var-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
|
||||
index 39fd458ec6..dc00b2f237 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
|
||||
@@ -38,7 +38,7 @@ references:
|
||||
stigid@ol8: OL08-00-040134
|
||||
stigid@rhel8: RHEL-08-040134
|
||||
|
||||
-platform: machine
|
||||
+platform: machine and partition-var-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
|
||||
index 349f334895..f0c26b6d9c 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
|
||||
@@ -38,7 +38,7 @@ references:
|
||||
stigid@ol8: OL08-00-040133
|
||||
stigid@rhel8: RHEL-08-040133
|
||||
|
||||
-platform: machine
|
||||
+platform: machine and partition-var-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,161 @@
|
||||
From c4ce06ce707529c14376ca8bb6e2b03f072e81fd Mon Sep 17 00:00:00 2001
|
||||
From: Evgeny Kolesnikov <ekolesni@redhat.com>
|
||||
Date: Wed, 10 Aug 2022 13:20:29 +0200
|
||||
Subject: [PATCH 11/12] Merge pull request #9204 from
|
||||
matejak/applicability_var_tmp
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-add_platform_partition_exists-PR_9204.patch
|
||||
Patch-status: Introduce and apply the "partition exists" platform
|
||||
---
|
||||
.../mount_option_var_tmp_nodev/rule.yml | 3 ++-
|
||||
.../tests/notapplicable.pass.sh | 5 +++++
|
||||
shared/applicability/general.yml | 14 +++++++++++++
|
||||
.../checks/oval/installed_env_mounts_tmp.xml | 10 ++++++++++
|
||||
.../oval/installed_env_mounts_var_tmp.xml | 10 ++++++++++
|
||||
shared/macros/10-ansible.jinja | 5 +++++
|
||||
shared/macros/10-bash.jinja | 5 +++++
|
||||
shared/macros/10-oval.jinja | 20 +++++++++++++++++++
|
||||
8 files changed, 71 insertions(+), 1 deletion(-)
|
||||
create mode 100644 linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/tests/notapplicable.pass.sh
|
||||
create mode 100644 shared/checks/oval/installed_env_mounts_tmp.xml
|
||||
create mode 100644 shared/checks/oval/installed_env_mounts_var_tmp.xml
|
||||
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
|
||||
index 8ee8c8b12e..741d097328 100644
|
||||
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
|
||||
@@ -38,7 +38,8 @@ references:
|
||||
stigid@ol8: OL08-00-040132
|
||||
stigid@rhel8: RHEL-08-040132
|
||||
|
||||
-platform: machine
|
||||
+platforms:
|
||||
+ - machine and partition-var-tmp
|
||||
|
||||
template:
|
||||
name: mount_option
|
||||
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/tests/notapplicable.pass.sh b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/tests/notapplicable.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..241c0103d8
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/tests/notapplicable.pass.sh
|
||||
@@ -0,0 +1,5 @@
|
||||
+#!/bin/bash
|
||||
+
|
||||
+. $SHARED/partition.sh
|
||||
+
|
||||
+clean_up_partition /var/tmp # Remove the partition from the system, and unmount it
|
||||
diff --git a/shared/applicability/general.yml b/shared/applicability/general.yml
|
||||
index 2d23d75314..e2f5d04ce0 100644
|
||||
--- a/shared/applicability/general.yml
|
||||
+++ b/shared/applicability/general.yml
|
||||
@@ -77,6 +77,20 @@ cpes:
|
||||
bash_conditional: {{{ bash_pkg_conditional("pam") }}}
|
||||
ansible_conditional: {{{ ansible_pkg_conditional("pam") }}}
|
||||
|
||||
+ - partition-var-tmp:
|
||||
+ name: "cpe:/a:partition-var-tmp"
|
||||
+ title: "There is a /var/tmp partition"
|
||||
+ check_id: installed_env_mounts_var_tmp
|
||||
+ bash_conditional: {{{ bash_partition_conditional("/var/tmp") }}}
|
||||
+ ansible_conditional: {{{ ansible_partition_conditional("/var/tmp") }}}
|
||||
+
|
||||
+ - partition-tmp:
|
||||
+ name: "cpe:/a:partition-tmp"
|
||||
+ title: "There is a /tmp partition"
|
||||
+ check_id: installed_env_mounts_tmp
|
||||
+ bash_conditional: {{{ bash_partition_conditional("/tmp") }}}
|
||||
+ ansible_conditional: {{{ ansible_partition_conditional("/tmp") }}}
|
||||
+
|
||||
- polkit:
|
||||
name: "cpe:/a:polkit"
|
||||
title: "Package polkit is installed"
|
||||
diff --git a/shared/checks/oval/installed_env_mounts_tmp.xml b/shared/checks/oval/installed_env_mounts_tmp.xml
|
||||
new file mode 100644
|
||||
index 0000000000..edd8ad050f
|
||||
--- /dev/null
|
||||
+++ b/shared/checks/oval/installed_env_mounts_tmp.xml
|
||||
@@ -0,0 +1,10 @@
|
||||
+<def-group>
|
||||
+ <definition class="inventory" id="installed_env_mounts_tmp" version="1">
|
||||
+ {{{ oval_metadata("", title="Partition /tmp exists", affected_platforms=[full_name]) }}}
|
||||
+ <criteria>
|
||||
+ {{{ partition_exists_criterion("/tmp") }}}
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ {{{ partition_exists_test_object("/tmp") }}}
|
||||
+</def-group>
|
||||
diff --git a/shared/checks/oval/installed_env_mounts_var_tmp.xml b/shared/checks/oval/installed_env_mounts_var_tmp.xml
|
||||
new file mode 100644
|
||||
index 0000000000..cf9aafbdb0
|
||||
--- /dev/null
|
||||
+++ b/shared/checks/oval/installed_env_mounts_var_tmp.xml
|
||||
@@ -0,0 +1,10 @@
|
||||
+<def-group>
|
||||
+ <definition class="inventory" id="installed_env_mounts_var_tmp" version="1">
|
||||
+ {{{ oval_metadata("", title="Partition /var/tmp exists", affected_platforms=[full_name]) }}}
|
||||
+ <criteria>
|
||||
+ {{{ partition_exists_criterion("/var/tmp") }}}
|
||||
+ </criteria>
|
||||
+ </definition>
|
||||
+
|
||||
+ {{{ partition_exists_test_object("/var/tmp") }}}
|
||||
+</def-group>
|
||||
diff --git a/shared/macros/10-ansible.jinja b/shared/macros/10-ansible.jinja
|
||||
index 20dc2020e4..5e40fe4aa2 100644
|
||||
--- a/shared/macros/10-ansible.jinja
|
||||
+++ b/shared/macros/10-ansible.jinja
|
||||
@@ -1432,3 +1432,8 @@ Part of the grub2_bootloader_argument_absent template.
|
||||
when:
|
||||
- result_pam_file_present.stat.exists
|
||||
{{%- endmacro -%}}
|
||||
+
|
||||
+
|
||||
+{{%- macro ansible_partition_conditional(path) -%}}
|
||||
+"ansible_facts.ansible_mounts | json_query(\"[?mount=='{{{ path }}}'].mount\") | length == 1"
|
||||
+{{%- endmacro -%}}
|
||||
diff --git a/shared/macros/10-bash.jinja b/shared/macros/10-bash.jinja
|
||||
index 41d9e18a1e..b0f7f3cf4a 100644
|
||||
--- a/shared/macros/10-bash.jinja
|
||||
+++ b/shared/macros/10-bash.jinja
|
||||
@@ -2073,3 +2073,8 @@ else
|
||||
echo "{{{ pam_file }}} was not found" >&2
|
||||
fi
|
||||
{{%- endmacro -%}}
|
||||
+
|
||||
+
|
||||
+{{%- macro bash_partition_conditional(path) -%}}
|
||||
+'findmnt --mountpoint "{{{ path }}}" > /dev/null'
|
||||
+{{%- endmacro -%}}
|
||||
diff --git a/shared/macros/10-oval.jinja b/shared/macros/10-oval.jinja
|
||||
index c8d7bbeffb..f302091f7d 100644
|
||||
--- a/shared/macros/10-oval.jinja
|
||||
+++ b/shared/macros/10-oval.jinja
|
||||
@@ -926,3 +926,23 @@ Generates the :code:`<affected>` tag for OVAL check using correct product platfo
|
||||
{{%- else %}}
|
||||
{{%- set user_list="nobody" %}}
|
||||
{{%- endif %}}
|
||||
+
|
||||
+
|
||||
+{{%- macro partition_exists_criterion(path) %}}
|
||||
+{{%- set escaped_path = path | escape_id %}}
|
||||
+ <criterion comment="The path {{{ path }}} is a partition's mount point" test_ref="test_partition_{{{ escaped_path }}}_exists" />
|
||||
+{{%- endmacro %}}
|
||||
+
|
||||
+{{%- macro partition_exists_test_object(path) %}}
|
||||
+{{%- set escaped_path = path | escape_id %}}
|
||||
+ <linux:partition_test check="all" check_existence="all_exist"
|
||||
+ comment="Partition {{{ path }}} exists"
|
||||
+ id="test_partition_{{{ escaped_path }}}_exists"
|
||||
+ version="1">
|
||||
+ <linux:object object_ref="object_partition_{{{ escaped_path }}}_exists" />
|
||||
+ </linux:partition_test>
|
||||
+
|
||||
+ <linux:partition_object id="object_partition_{{{ escaped_path }}}_exists" version="1">
|
||||
+ <linux:mount_point>{{{ path }}}</linux:mount_point>
|
||||
+ </linux:partition_object>
|
||||
+{{%- endmacro %}}
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,102 @@
|
||||
From 04459c1b82cc495af2bfcaac301a3805ec0addf6 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Burket <mburket@redhat.com>
|
||||
Date: Wed, 3 Aug 2022 07:42:59 -0500
|
||||
Subject: [PATCH 5/8] Merge pull request #9282 from
|
||||
yuumasato/rhel_align_aide_check_tools
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-aide_check_rsyslogd-PR_9282.patch
|
||||
Patch-status: Add rsyslogd to the list of tools checked by aide
|
||||
---
|
||||
.../aide/aide_check_audit_tools/ansible/shared.yml | 1 +
|
||||
.../aide/aide_check_audit_tools/bash/shared.sh | 3 +--
|
||||
.../aide/aide_check_audit_tools/oval/shared.xml | 2 +-
|
||||
.../aide/aide_check_audit_tools/tests/correct.pass.sh | 2 +-
|
||||
.../aide_check_audit_tools/tests/correct_with_selinux.pass.sh | 2 +-
|
||||
.../aide/aide_check_audit_tools/tests/not_config.fail.sh | 2 +-
|
||||
6 files changed, 6 insertions(+), 6 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml
|
||||
index 9d1b7b675c..5905ea8d0e 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml
|
||||
@@ -22,6 +22,7 @@
|
||||
- /usr/sbin/aureport
|
||||
- /usr/sbin/ausearch
|
||||
- /usr/sbin/autrace
|
||||
+ {{% if product == 'ol8' or 'rhel' in product %}}- /usr/sbin/rsyslogd{{% endif %}}
|
||||
|
||||
- name: Ensure existing AIDE configuration for audit tools are correct
|
||||
lineinfile:
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh
|
||||
index d0a1ba2522..a81e25c395 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh
|
||||
@@ -18,12 +18,11 @@
|
||||
{{% set auditfiles = auditfiles + ["/usr/sbin/audispd"] %}}
|
||||
{{% endif %}}
|
||||
|
||||
-{{% if product == 'ol8' %}}
|
||||
+{{% if product == 'ol8' or 'rhel' in product %}}
|
||||
{{% set auditfiles = auditfiles + ["/usr/sbin/rsyslogd"] %}}
|
||||
{{% endif %}}
|
||||
|
||||
{{% for file in auditfiles %}}
|
||||
-
|
||||
if grep -i '^.*{{{file}}}.*$' {{{ aide_conf_path }}}; then
|
||||
sed -i "s#.*{{{file}}}.*#{{{file}}} {{{ aide_string() }}}#" {{{ aide_conf_path }}}
|
||||
else
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml
|
||||
index 6ce56c1137..ca9bf4f94d 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml
|
||||
@@ -11,7 +11,7 @@
|
||||
{{% if 'rhel' not in product and product != 'ol8' %}}
|
||||
<criterion comment="audispd is checked in {{{ aide_conf_path }}}" test_ref="test_aide_verify_audispd" />
|
||||
{{% endif %}}
|
||||
- {{% if product == 'ol8' %}}
|
||||
+ {{% if product == 'ol8' or 'rhel' in product %}}
|
||||
<criterion comment="rsyslogd is checked in {{{ aide_conf_path }}}" test_ref="test_aide_verify_rsyslogd" />
|
||||
{{% endif %}}
|
||||
<criterion comment="augenrules is checked in {{{ aide_conf_path }}}" test_ref="test_aide_verify_augenrules" />
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh
|
||||
index 756b88d8a2..071dde1329 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh
|
||||
@@ -7,7 +7,7 @@ aide --init
|
||||
|
||||
|
||||
declare -a bins
|
||||
-bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace')
|
||||
+bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace' '/usr/sbin/rsyslogd')
|
||||
|
||||
for theFile in "${bins[@]}"
|
||||
do
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh
|
||||
index f3a2a126d3..cb9bbfa735 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh
|
||||
@@ -4,7 +4,7 @@
|
||||
yum -y install aide
|
||||
|
||||
declare -a bins
|
||||
-bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace')
|
||||
+bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace' '/usr/sbin/rsyslogd')
|
||||
|
||||
for theFile in "${bins[@]}"
|
||||
do
|
||||
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh
|
||||
index 4315cef207..a22aecb000 100644
|
||||
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh
|
||||
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh
|
||||
@@ -6,7 +6,7 @@ yum -y install aide
|
||||
aide --init
|
||||
|
||||
declare -a bins
|
||||
-bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace')
|
||||
+bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace' '/usr/sbin/rsyslogd')
|
||||
|
||||
for theFile in "${bins[@]}"
|
||||
do
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,68 @@
|
||||
From f802557b2a84b830a8a8742b535a5602925e438d Mon Sep 17 00:00:00 2001
|
||||
From: Watson Yuuma Sato <wsato@redhat.com>
|
||||
Date: Mon, 8 Aug 2022 15:28:37 +0200
|
||||
Subject: [PATCH 09/10] Merge pull request #9298 from vojtapolasek/rhbz2114979
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-authselect_minimal_in_ospp-PR_9298.patch
|
||||
Patch-status: Make OSPP profiles use minimal Authselect profile
|
||||
---
|
||||
linux_os/guide/system/accounts/enable_authselect/rule.yml | 1 +
|
||||
products/rhel8/profiles/ospp.profile | 2 +-
|
||||
products/rhel9/profiles/ospp.profile | 2 +-
|
||||
tests/data/profile_stability/rhel8/ospp.profile | 2 +-
|
||||
4 files changed, 4 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/accounts/enable_authselect/rule.yml b/linux_os/guide/system/accounts/enable_authselect/rule.yml
|
||||
index 8d1758e8c9..3edb3642df 100644
|
||||
--- a/linux_os/guide/system/accounts/enable_authselect/rule.yml
|
||||
+++ b/linux_os/guide/system/accounts/enable_authselect/rule.yml
|
||||
@@ -34,6 +34,7 @@ references:
|
||||
disa: CCI-000213
|
||||
hipaa: 164.308(a)(1)(ii)(B),164.308(a)(7)(i),164.308(a)(7)(ii)(A),164.310(a)(1),164.310(a)(2)(i),164.310(a)(2)(ii),164.310(a)(2)(iii),164.310(b),164.310(c),164.310(d)(1),164.310(d)(2)(iii) # taken from require_singleuser_auth
|
||||
nist: AC-3
|
||||
+ ospp: FIA_UAU.1,FIA_AFL.1
|
||||
srg: SRG-OS-000480-GPOS-00227
|
||||
|
||||
ocil: |-
|
||||
diff --git a/products/rhel8/profiles/ospp.profile b/products/rhel8/profiles/ospp.profile
|
||||
index 39ad1797c7..ebec8a3a6f 100644
|
||||
--- a/products/rhel8/profiles/ospp.profile
|
||||
+++ b/products/rhel8/profiles/ospp.profile
|
||||
@@ -220,7 +220,7 @@ selections:
|
||||
- var_accounts_max_concurrent_login_sessions=10
|
||||
- accounts_max_concurrent_login_sessions
|
||||
- securetty_root_login_console_only
|
||||
- - var_authselect_profile=sssd
|
||||
+ - var_authselect_profile=minimal
|
||||
- enable_authselect
|
||||
- var_password_pam_unix_remember=5
|
||||
- accounts_password_pam_unix_remember
|
||||
diff --git a/products/rhel9/profiles/ospp.profile b/products/rhel9/profiles/ospp.profile
|
||||
index f27f961a7a..b21ddcee6d 100644
|
||||
--- a/products/rhel9/profiles/ospp.profile
|
||||
+++ b/products/rhel9/profiles/ospp.profile
|
||||
@@ -115,7 +115,7 @@ selections:
|
||||
- coredump_disable_storage
|
||||
- coredump_disable_backtraces
|
||||
- service_systemd-coredump_disabled
|
||||
- - var_authselect_profile=sssd
|
||||
+ - var_authselect_profile=minimal
|
||||
- enable_authselect
|
||||
- use_pam_wheel_for_su
|
||||
|
||||
diff --git a/tests/data/profile_stability/rhel8/ospp.profile b/tests/data/profile_stability/rhel8/ospp.profile
|
||||
index 5d73a8c6fe..21e93e310d 100644
|
||||
--- a/tests/data/profile_stability/rhel8/ospp.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/ospp.profile
|
||||
@@ -242,7 +242,7 @@ selections:
|
||||
- var_slub_debug_options=P
|
||||
- var_auditd_flush=incremental_async
|
||||
- var_accounts_max_concurrent_login_sessions=10
|
||||
-- var_authselect_profile=sssd
|
||||
+- var_authselect_profile=minimal
|
||||
- var_password_pam_unix_remember=5
|
||||
- var_selinux_state=enforcing
|
||||
- var_selinux_policy_name=targeted
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,26 @@
|
||||
From 7db8ad5f312b632d6b8a176b615929ffa5cb1de3 Mon Sep 17 00:00:00 2001
|
||||
From: Gabriel Becker <ggasparb@redhat.com>
|
||||
Date: Mon, 15 Aug 2022 14:47:40 +0200
|
||||
Subject: [PATCH 13/13] Merge pull request #9339 from
|
||||
yuumasato/fix_ansible_partition_conditionals
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-fix_ansible_partition_conditional-PR_9339.patch
|
||||
Patch-status: Fix ansible partition conditionals
|
||||
---
|
||||
shared/macros/10-ansible.jinja | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/shared/macros/10-ansible.jinja b/shared/macros/10-ansible.jinja
|
||||
index 5e40fe4aa2..55a78c3a8b 100644
|
||||
--- a/shared/macros/10-ansible.jinja
|
||||
+++ b/shared/macros/10-ansible.jinja
|
||||
@@ -1435,5 +1435,5 @@ Part of the grub2_bootloader_argument_absent template.
|
||||
|
||||
|
||||
{{%- macro ansible_partition_conditional(path) -%}}
|
||||
-"ansible_facts.ansible_mounts | json_query(\"[?mount=='{{{ path }}}'].mount\") | length == 1"
|
||||
+'"{{{ path }}}" in ansible_mounts | map(attribute="mount") | list'
|
||||
{{%- endmacro -%}}
|
||||
--
|
||||
2.37.2
|
||||
|
@ -0,0 +1,94 @@
|
||||
From 44bcccbe3a3b00ef1151089b0faacf82770bdc98 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Burket <mburket@redhat.com>
|
||||
Date: Tue, 9 Aug 2022 13:09:07 -0500
|
||||
Subject: [PATCH 8/8] Merge pull request #9318 from
|
||||
ggbecker/reintroduce-sshd-timeout
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-readd-sshd_timeout-rules-PR_9318.patch
|
||||
Patch-status: Reintroduce back the sshd timeout rules in RHEL8 STIG profile
|
||||
---
|
||||
.../ssh/ssh_server/sshd_set_idle_timeout/rule.yml | 1 +
|
||||
.../ssh/ssh_server/sshd_set_keepalive_0/rule.yml | 1 +
|
||||
products/rhel8/profiles/stig.profile | 14 +++++++-------
|
||||
tests/data/profile_stability/rhel8/stig.profile | 2 ++
|
||||
.../data/profile_stability/rhel8/stig_gui.profile | 2 ++
|
||||
5 files changed, 13 insertions(+), 7 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml
|
||||
index 46ea0558a4..1e9c617275 100644
|
||||
--- a/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml
|
||||
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml
|
||||
@@ -57,6 +57,7 @@ references:
|
||||
stigid@ol7: OL07-00-040320
|
||||
stigid@ol8: OL08-00-010201
|
||||
stigid@rhel7: RHEL-07-040320
|
||||
+ stigid@rhel8: RHEL-08-010201
|
||||
stigid@sle12: SLES-12-030190
|
||||
stigid@sle15: SLES-15-010280
|
||||
stigid@ubuntu2004: UBTU-20-010037
|
||||
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive_0/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive_0/rule.yml
|
||||
index 0f0693ddc6..f6e98a61d9 100644
|
||||
--- a/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive_0/rule.yml
|
||||
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive_0/rule.yml
|
||||
@@ -53,6 +53,7 @@ references:
|
||||
stigid@ol7: OL07-00-040340
|
||||
stigid@ol8: OL08-00-010200
|
||||
stigid@rhel7: RHEL-07-040340
|
||||
+ stigid@rhel8: RHEL-08-010200
|
||||
stigid@sle12: SLES-12-030191
|
||||
stigid@sle15: SLES-15-010320
|
||||
vmmsrg: SRG-OS-000480-VMM-002000
|
||||
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
|
||||
index 6b44436a2b..124b7520d3 100644
|
||||
--- a/products/rhel8/profiles/stig.profile
|
||||
+++ b/products/rhel8/profiles/stig.profile
|
||||
@@ -170,13 +170,13 @@ selections:
|
||||
# RHEL-08-010190
|
||||
- dir_perms_world_writable_sticky_bits
|
||||
|
||||
- # These two items don't behave as they used to in RHEL8.6 and RHEL9
|
||||
- # anymore. They will be disabled for now until an alternative
|
||||
- # solution is found.
|
||||
- # # RHEL-08-010200
|
||||
- # - sshd_set_keepalive_0
|
||||
- # # RHEL-08-010201
|
||||
- # - sshd_set_idle_timeout
|
||||
+ # Although these rules have a different behavior in RHEL>=8.6
|
||||
+ # they still need to be selected so it follows exactly what STIG
|
||||
+ # states.
|
||||
+ # RHEL-08-010200
|
||||
+ - sshd_set_keepalive_0
|
||||
+ # RHEL-08-010201
|
||||
+ - sshd_set_idle_timeout
|
||||
|
||||
# RHEL-08-010210
|
||||
- file_permissions_var_log_messages
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
|
||||
index 47f53a9d02..6c75d0ae1b 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig.profile
|
||||
@@ -369,6 +369,8 @@ selections:
|
||||
- sshd_enable_warning_banner
|
||||
- sshd_print_last_log
|
||||
- sshd_rekey_limit
|
||||
+- sshd_set_idle_timeout
|
||||
+- sshd_set_keepalive_0
|
||||
- sshd_use_strong_rng
|
||||
- sshd_x11_use_localhost
|
||||
- sssd_certificate_verification
|
||||
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
index c4e60ddcde..8a7a469b94 100644
|
||||
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
|
||||
@@ -379,6 +379,8 @@ selections:
|
||||
- sshd_enable_warning_banner
|
||||
- sshd_print_last_log
|
||||
- sshd_rekey_limit
|
||||
+- sshd_set_idle_timeout
|
||||
+- sshd_set_keepalive_0
|
||||
- sshd_use_strong_rng
|
||||
- sshd_x11_use_localhost
|
||||
- sssd_certificate_verification
|
||||
--
|
||||
2.37.1
|
||||
|
@ -0,0 +1,75 @@
|
||||
From 8d36cef25fc9d890f7ec9756246513a92110b3db Mon Sep 17 00:00:00 2001
|
||||
From: Watson Yuuma Sato <wsato@redhat.com>
|
||||
Date: Wed, 10 Aug 2022 10:53:26 +0200
|
||||
Subject: [PATCH 10/10] Merge pull request #9321 from
|
||||
vojtapolasek/fix_rhel8_iboot
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-select_grub2_disable_recovery-PR_9231.patch
|
||||
Patch-status: change rules protecting boot in RHEL8 OSPP
|
||||
---
|
||||
.../bootloader-grub2/grub2_disable_recovery/rule.yml | 1 +
|
||||
products/rhel8/profiles/ospp.profile | 2 +-
|
||||
shared/references/cce-redhat-avail.txt | 11 -----------
|
||||
tests/data/profile_stability/rhel8/ospp.profile | 2 +-
|
||||
4 files changed, 3 insertions(+), 13 deletions(-)
|
||||
|
||||
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_disable_recovery/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_disable_recovery/rule.yml
|
||||
index 4f8d4ddcfd..fb126cbe7d 100644
|
||||
--- a/linux_os/guide/system/bootloader-grub2/grub2_disable_recovery/rule.yml
|
||||
+++ b/linux_os/guide/system/bootloader-grub2/grub2_disable_recovery/rule.yml
|
||||
@@ -17,6 +17,7 @@ rationale: |-
|
||||
severity: medium
|
||||
|
||||
identifiers:
|
||||
+ cce@rhel8: CCE-86006-4
|
||||
cce@rhel9: CCE-85986-8
|
||||
|
||||
references:
|
||||
diff --git a/products/rhel8/profiles/ospp.profile b/products/rhel8/profiles/ospp.profile
|
||||
index ebec8a3a6f..6e3b30f64b 100644
|
||||
--- a/products/rhel8/profiles/ospp.profile
|
||||
+++ b/products/rhel8/profiles/ospp.profile
|
||||
@@ -304,7 +304,7 @@ selections:
|
||||
## Disable Unauthenticated Login (such as Guest Accounts)
|
||||
## FIA_UAU.1
|
||||
- require_singleuser_auth
|
||||
- - grub2_disable_interactive_boot
|
||||
+ - grub2_disable_recovery
|
||||
- grub2_uefi_password
|
||||
- no_empty_passwords
|
||||
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index 9480db3eae..903fc848eb 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -1,14 +1,3 @@
|
||||
-CCE-85985-0
|
||||
-CCE-85988-4
|
||||
-CCE-85997-5
|
||||
-CCE-85998-3
|
||||
-CCE-85999-1
|
||||
-CCE-86000-7
|
||||
-CCE-86001-5
|
||||
-CCE-86002-3
|
||||
-CCE-86003-1
|
||||
-CCE-86005-6
|
||||
-CCE-86006-4
|
||||
CCE-86007-2
|
||||
CCE-86008-0
|
||||
CCE-86009-8
|
||||
diff --git a/tests/data/profile_stability/rhel8/ospp.profile b/tests/data/profile_stability/rhel8/ospp.profile
|
||||
index 21e93e310d..267b66a4f8 100644
|
||||
--- a/tests/data/profile_stability/rhel8/ospp.profile
|
||||
+++ b/tests/data/profile_stability/rhel8/ospp.profile
|
||||
@@ -89,7 +89,7 @@ selections:
|
||||
- ensure_redhat_gpgkey_installed
|
||||
- grub2_audit_argument
|
||||
- grub2_audit_backlog_limit_argument
|
||||
-- grub2_disable_interactive_boot
|
||||
+- grub2_disable_recovery
|
||||
- grub2_kernel_trust_cpu_rng
|
||||
- grub2_page_poison_argument
|
||||
- grub2_pti_argument
|
||||
--
|
||||
2.37.1
|
||||
|
File diff suppressed because one or more lines are too long
@ -0,0 +1,801 @@
|
||||
From 48a361a41eff571e8c0d6f8c759c56d41cec5c5a Mon Sep 17 00:00:00 2001
|
||||
From: vojtapolasek <vpolasek@redhat.com>
|
||||
Date: Tue, 2 Aug 2022 13:21:45 +0200
|
||||
Subject: [PATCH 3/8] Merge pull request #9147 from jan-cerny/rhbz2081728
|
||||
|
||||
Patch-name: scap-security-guide-0.1.64-update_sysctl_template_with_multivalue_compliance-PR_9147.patch
|
||||
Patch-status: Refresh BPF related rules in RHEL 9 OSPP profile
|
||||
---
|
||||
docs/templates/template_reference.md | 24 +-
|
||||
.../rule.yml | 82 +++++++
|
||||
.../tests/system_default.pass.sh | 5 +
|
||||
.../tests/test_config.yml | 6 +
|
||||
.../tests/value_0.fail.sh | 11 +
|
||||
.../tests/value_1.pass.sh | 11 +
|
||||
.../tests/value_2.pass.sh | 11 +
|
||||
...kernel_unprivileged_bpf_disabled_value.var | 18 ++
|
||||
products/rhel9/profiles/ospp.profile | 4 +-
|
||||
.../oval/sysctl_kernel_ipv6_disable.xml | 4 +-
|
||||
shared/references/cce-redhat-avail.txt | 1 -
|
||||
shared/templates/sysctl/ansible.template | 2 +-
|
||||
shared/templates/sysctl/bash.template | 2 +-
|
||||
shared/templates/sysctl/oval.template | 213 +++++++++++-------
|
||||
shared/templates/sysctl/template.py | 24 +-
|
||||
15 files changed, 316 insertions(+), 102 deletions(-)
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/rule.yml
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/system_default.pass.sh
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/test_config.yml
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_0.fail.sh
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_1.pass.sh
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_2.pass.sh
|
||||
create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var
|
||||
|
||||
diff --git a/docs/templates/template_reference.md b/docs/templates/template_reference.md
|
||||
index a439e3dca9..e73b95450f 100644
|
||||
--- a/docs/templates/template_reference.md
|
||||
+++ b/docs/templates/template_reference.md
|
||||
@@ -815,8 +815,28 @@ The selected value can be changed in the profile (consult the actual variable fo
|
||||
|
||||
- **datatype** - data type of the sysctl value, eg. `int`.
|
||||
|
||||
- - **sysctlval** - value of the sysctl value, eg. `'1'`. If this
|
||||
- parameter is not specified, XCCDF Value is used instead.
|
||||
+ - **sysctlval** - value of the sysctl value. This can be either not
|
||||
+ specified, or an atomic value, eg. `'1'`, or a list of values,
|
||||
+ eg. `['1','2']`.
|
||||
+ - If this parameter is not specified, an XCCDF Value is used instead
|
||||
+ in OVAL check and remediations. The XCCDF Value should have a file
|
||||
+ name in the form `"sysctl_" + $escaped_sysctlvar + "_value.var"`,
|
||||
+ where the `escaped_sysctlvar` is a value of the **sysctlvar**
|
||||
+ parameter in which all characters that don't match the `\w` regular
|
||||
+ expression are replaced by an underscore (`_`).
|
||||
+ - If this parameter is set to an atomic value, this atomic value
|
||||
+ will be used in OVAL check and remediations.
|
||||
+ - If this parameter is set to a list of values, the list will be used
|
||||
+ in the OVAL check, but won't be used in the remediations.
|
||||
+ All remediations will use an XCCDF value instead.
|
||||
+
|
||||
+ - **wrong_sysctlval_for_testing** - the value that is always wrong. This
|
||||
+ will be used in templated test scenarios when **sysctlval** is a list.
|
||||
+
|
||||
+ - **missing_parameter_pass** - if set to `true` the check will pass if the
|
||||
+ setting for the given **sysctlvar** is not present in sysctl
|
||||
+ configuration files. In other words, the check will pass if the system
|
||||
+ default isn't overriden by configuration. Default value: `false`.
|
||||
|
||||
- **operation** - operation used for comparison of collected object
|
||||
with **sysctlval**. Default value: `equals`.
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/rule.yml
|
||||
new file mode 100644
|
||||
index 0000000000..259d1f901c
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/rule.yml
|
||||
@@ -0,0 +1,82 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+prodtype: rhel9
|
||||
+
|
||||
+title: 'Disable Access to Network bpf() Syscall From Unprivileged Processes'
|
||||
+
|
||||
+description: |-
|
||||
+ To prevent unprivileged processes from using the <code>bpf()</code> syscall
|
||||
+ the <code>kernel.unprivileged_bpf_disabled</code> kernel parameter must
|
||||
+ be set to <code>1</code> or <code>2</code>.
|
||||
+
|
||||
+ Writing <code>1</code> to this entry will disable unprivileged calls to <code>bpf()</code>; once
|
||||
+ disabled, calling <code>bpf()</code> without <code>CAP_SYS_ADMIN</code> or <code>CAP_BPF</code> will return <code>-EPERM</code>.
|
||||
+ Once set to <code>1</code>, this can't be cleared from the running kernel anymore.
|
||||
+
|
||||
+ {{{ describe_sysctl_option_value(sysctl="kernel.unprivileged_bpf_disabled", value="1") }}}
|
||||
+
|
||||
+ Writing <code>2</code> to this entry will also disable unprivileged calls to <code>bpf()</code>,
|
||||
+ however, an admin can still change this setting later on, if needed, by
|
||||
+ writing <code>0</code> or <code>1</code> to this entry.
|
||||
+
|
||||
+ {{{ describe_sysctl_option_value(sysctl="kernel.unprivileged_bpf_disabled", value="2") }}}
|
||||
+
|
||||
+rationale: |-
|
||||
+ Loading and accessing the packet filters programs and maps using the bpf()
|
||||
+ syscall has the potential of revealing sensitive information about the kernel state.
|
||||
+
|
||||
+severity: medium
|
||||
+
|
||||
+identifiers:
|
||||
+ cce@rhel9: CCE-87712-6
|
||||
+
|
||||
+references:
|
||||
+ disa: CCI-000366
|
||||
+ nist: AC-6,SC-7(10)
|
||||
+ ospp: FMT_SMF_EXT.1
|
||||
+ srg: SRG-OS-000132-GPOS-00067,SRG-OS-000480-GPOS-00227
|
||||
+
|
||||
+ocil: |-
|
||||
+ The runtime status of the <code>kernel.unprivileged_bpf_disabled</code>
|
||||
+ kernel parameter can be queried by running the following command:
|
||||
+ <pre>$ sysctl kernel.unprivileged_bpf_disabled</pre>
|
||||
+ The output of the command should indicate either:
|
||||
+ kernel.unprivileged_bpf_disabled = 1
|
||||
+ or:
|
||||
+ kernel.unprivileged_bpf_disabled = 2
|
||||
+ The output of the command should not indicate:
|
||||
+ kernel.unprivileged_bpf_disabled = 0
|
||||
+
|
||||
+ The preferable way how to assure the runtime compliance is to have
|
||||
+ correct persistent configuration, and rebooting the system.
|
||||
+
|
||||
+ The persistent kernel parameter configuration is performed by specifying the appropriate
|
||||
+ assignment in any file located in the <pre>/etc/sysctl.d</pre> directory.
|
||||
+ Verify that there is not any existing incorrect configuration by executing the following command:
|
||||
+ <pre>$ grep -r '^\s*{{{ sysctl }}}\s*=' /etc/sysctl.conf /etc/sysctl.d</pre>
|
||||
+ The command should not find any assignments other than:
|
||||
+ kernel.unprivileged_bpf_disabled = 1
|
||||
+ or:
|
||||
+ kernel.unprivileged_bpf_disabled = 2
|
||||
+
|
||||
+ Duplicate assignments are not allowed. Empty output is allowed, because the system default is 2.
|
||||
+
|
||||
+ocil_clause: "the kernel.unprivileged_bpf_disabled is not set to 1 or 2 or is configured to be 0"
|
||||
+
|
||||
+fixtext: |-
|
||||
+ Configure {{{ full_name }}} to prevent privilege escalation through the kernel by disabling access to the bpf syscall.
|
||||
+
|
||||
+srg_requirement: '{{{ full_name }}} must disable access to network bpf syscall from unprivileged processes.'
|
||||
+
|
||||
+platform: machine
|
||||
+
|
||||
+template:
|
||||
+ name: sysctl
|
||||
+ vars:
|
||||
+ sysctlvar: kernel.unprivileged_bpf_disabled
|
||||
+ sysctlval:
|
||||
+ - '1'
|
||||
+ - '2'
|
||||
+ wrong_sysctlval_for_testing: "0"
|
||||
+ missing_parameter_pass: "true"
|
||||
+ datatype: int
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/system_default.pass.sh b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/system_default.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..b9776227bd
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/system_default.pass.sh
|
||||
@@ -0,0 +1,5 @@
|
||||
+#!/bin/bash
|
||||
+# platform = Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/test_config.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/test_config.yml
|
||||
new file mode 100644
|
||||
index 0000000000..5cf6807405
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/test_config.yml
|
||||
@@ -0,0 +1,6 @@
|
||||
+deny_templated_scenarios:
|
||||
+ # this rule uses missing_parameter_pass: true which means the check should pass
|
||||
+ # if the configuration is missing (or commented out) therefore we disable
|
||||
+ # line_not_there.fail.sh and comment.fail.sh test scenarios
|
||||
+ - line_not_there.fail.sh
|
||||
+ - comment.fail.sh
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_0.fail.sh b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_0.fail.sh
|
||||
new file mode 100644
|
||||
index 0000000000..9f19e0140b
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_0.fail.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/kernel.unprivileged_bpf_disabled/d" /etc/sysctl.conf
|
||||
+echo "kernel.unprivileged_bpf_disabled = 0" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w kernel.unprivileged_bpf_disabled="0"
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_1.pass.sh b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_1.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..e976db594c
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_1.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/kernel.unprivileged_bpf_disabled/d" /etc/sysctl.conf
|
||||
+echo "kernel.unprivileged_bpf_disabled = 1" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w kernel.unprivileged_bpf_disabled="1"
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_2.pass.sh b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_2.pass.sh
|
||||
new file mode 100644
|
||||
index 0000000000..b1537175eb
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_accept_default/tests/value_2.pass.sh
|
||||
@@ -0,0 +1,11 @@
|
||||
+#!/bin/bash
|
||||
+# platform = Red Hat Enterprise Linux 9
|
||||
+
|
||||
+# Clean sysctl config directories
|
||||
+rm -rf /usr/lib/sysctl.d/* /run/sysctl.d/* /etc/sysctl.d/*
|
||||
+
|
||||
+sed -i "/kernel.unprivileged_bpf_disabled/d" /etc/sysctl.conf
|
||||
+echo "kernel.unprivileged_bpf_disabled = 2" >> /etc/sysctl.conf
|
||||
+
|
||||
+# set correct runtime value to check if the filesystem configuration is evaluated properly
|
||||
+sysctl -w kernel.unprivileged_bpf_disabled="2"
|
||||
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var
|
||||
new file mode 100644
|
||||
index 0000000000..b8bf965a25
|
||||
--- /dev/null
|
||||
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled_value.var
|
||||
@@ -0,0 +1,18 @@
|
||||
+documentation_complete: true
|
||||
+
|
||||
+title: kernel.unprivileged_bpf_disabled
|
||||
+
|
||||
+description: |-
|
||||
+ Prevent unprivileged processes from using the bpf() syscall.
|
||||
+
|
||||
+type: number
|
||||
+
|
||||
+operator: equals
|
||||
+
|
||||
+interactive: false
|
||||
+
|
||||
+options:
|
||||
+ default: 2
|
||||
+ 0: "0"
|
||||
+ 1: "1"
|
||||
+ 2: "2"
|
||||
diff --git a/products/rhel9/profiles/ospp.profile b/products/rhel9/profiles/ospp.profile
|
||||
index feb96501a9..f27f961a7a 100644
|
||||
--- a/products/rhel9/profiles/ospp.profile
|
||||
+++ b/products/rhel9/profiles/ospp.profile
|
||||
@@ -74,8 +74,8 @@ selections:
|
||||
- sysctl_kernel_yama_ptrace_scope
|
||||
- sysctl_kernel_perf_event_paranoid
|
||||
- sysctl_user_max_user_namespaces
|
||||
- - sysctl_kernel_unprivileged_bpf_disabled
|
||||
- - sysctl_net_core_bpf_jit_harden
|
||||
+ - sysctl_kernel_unprivileged_bpf_disabled_accept_default
|
||||
+ - sysctl_kernel_unprivileged_bpf_disabled_value=2
|
||||
- service_kdump_disabled
|
||||
|
||||
### Audit
|
||||
diff --git a/shared/checks/oval/sysctl_kernel_ipv6_disable.xml b/shared/checks/oval/sysctl_kernel_ipv6_disable.xml
|
||||
index 1195cea518..f971d28a04 100644
|
||||
--- a/shared/checks/oval/sysctl_kernel_ipv6_disable.xml
|
||||
+++ b/shared/checks/oval/sysctl_kernel_ipv6_disable.xml
|
||||
@@ -19,8 +19,8 @@
|
||||
</metadata>
|
||||
<criteria comment="IPv6 disabled or net.ipv6.conf.all.disable_ipv6 set correctly" operator="OR">
|
||||
<criteria operator="AND">
|
||||
- <extend_definition comment="net.ipv6.conf.all.disable_ipv6 configuration setting check" definition_ref="sysctl_static_net_ipv6_conf_all_disable_ipv6" />
|
||||
- <extend_definition comment="net.ipv6.conf.all.disable_ipv6 runtime setting check" definition_ref="sysctl_runtime_net_ipv6_conf_all_disable_ipv6" />
|
||||
+ <extend_definition comment="net.ipv6.conf.all.disable_ipv6 configuration setting check" definition_ref="sysctl_net_ipv6_conf_all_disable_ipv6_static" />
|
||||
+ <extend_definition comment="net.ipv6.conf.all.disable_ipv6 runtime setting check" definition_ref="sysctl_net_ipv6_conf_all_disable_ipv6_runtime" />
|
||||
</criteria>
|
||||
</criteria>
|
||||
</definition>
|
||||
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
|
||||
index fb2f59fd09..a613a152ae 100644
|
||||
--- a/shared/references/cce-redhat-avail.txt
|
||||
+++ b/shared/references/cce-redhat-avail.txt
|
||||
@@ -1443,7 +1443,6 @@ CCE-87708-4
|
||||
CCE-87709-2
|
||||
CCE-87710-0
|
||||
CCE-87711-8
|
||||
-CCE-87712-6
|
||||
CCE-87713-4
|
||||
CCE-87714-2
|
||||
CCE-87715-9
|
||||
diff --git a/shared/templates/sysctl/ansible.template b/shared/templates/sysctl/ansible.template
|
||||
index c13bb6637f..edc4d3fb66 100644
|
||||
--- a/shared/templates/sysctl/ansible.template
|
||||
+++ b/shared/templates/sysctl/ansible.template
|
||||
@@ -21,7 +21,7 @@
|
||||
replace: '#{{{ SYSCTLVAR }}}'
|
||||
loop: "{{ find_sysctl_d.files }}"
|
||||
|
||||
-{{%- if SYSCTLVAL == "" %}}
|
||||
+{{%- if SYSCTLVAL == "" or SYSCTLVAL is not string %}}
|
||||
- (xccdf-var sysctl_{{{ SYSCTLID }}}_value)
|
||||
|
||||
- name: Ensure sysctl {{{ SYSCTLVAR }}} is set
|
||||
diff --git a/shared/templates/sysctl/bash.template b/shared/templates/sysctl/bash.template
|
||||
index d67a59c388..cd3424b022 100644
|
||||
--- a/shared/templates/sysctl/bash.template
|
||||
+++ b/shared/templates/sysctl/bash.template
|
||||
@@ -20,7 +20,7 @@ for f in /etc/sysctl.d/*.conf /run/sysctl.d/*.conf; do
|
||||
fi
|
||||
done
|
||||
|
||||
-{{%- if SYSCTLVAL == "" %}}
|
||||
+{{%- if SYSCTLVAL == "" or SYSCTLVAL is not string %}}
|
||||
{{{ bash_instantiate_variables("sysctl_" + SYSCTLID + "_value") }}}
|
||||
|
||||
#
|
||||
diff --git a/shared/templates/sysctl/oval.template b/shared/templates/sysctl/oval.template
|
||||
index 74583dbee1..1a7c4979bb 100644
|
||||
--- a/shared/templates/sysctl/oval.template
|
||||
+++ b/shared/templates/sysctl/oval.template
|
||||
@@ -1,12 +1,20 @@
|
||||
{{%- if SYSCTLVAL == "" %}}
|
||||
{{%- set COMMENT_VALUE="the appropriate value" %}}
|
||||
+{{%- elif SYSCTLVAL is sequence %}}
|
||||
+{{%- set COMMENT_VALUE = SYSCTLVAL | join(" or " ) %}}
|
||||
{{%- else %}}
|
||||
{{%- set COMMENT_VALUE=SYSCTLVAL %}}
|
||||
{{%- endif %}}
|
||||
|
||||
{{% macro state_static_sysctld(prefix) -%}}
|
||||
- <ind:object object_ref="object_static_{{{ prefix }}}_{{{ SYSCTLID }}}"/>
|
||||
- <ind:state state_ref="state_static_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ <ind:object object_ref="object_static_{{{ prefix }}}_{{{ rule_id }}}"/>
|
||||
+{{% if SYSCTLVAL is string %}}
|
||||
+ <ind:state state_ref="state_static_sysctld_{{{ rule_id }}}"/>
|
||||
+{{% elif SYSCTLVAL is sequence %}}
|
||||
+{{% for x in SYSCTLVAL %}}
|
||||
+ <ind:state state_ref="state_static_sysctld_{{{ rule_id }}}_{{{ x }}}" />
|
||||
+{{% endfor %}}
|
||||
+{{% endif %}}
|
||||
{{%- endmacro -%}}
|
||||
{{%- macro sysctl_match() -%}}
|
||||
{{%- if SYSCTLVAL == "" -%}}
|
||||
@@ -20,13 +28,13 @@
|
||||
{{%- if "P" in FLAGS -%}}
|
||||
|
||||
<def-group>
|
||||
- <definition class="compliance" id="sysctl_{{{ SYSCTLID }}}" version="3">
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}" version="3">
|
||||
{{{ oval_metadata("The '" + SYSCTLVAR + "' kernel parameter should be set to the appropriate value in both system configuration and system runtime.") }}}
|
||||
<criteria operator="AND">
|
||||
<extend_definition comment="{{{ SYSCTLVAR }}} configuration setting check"
|
||||
- definition_ref="sysctl_static_{{{ SYSCTLID }}}"/>
|
||||
+ definition_ref="{{{ rule_id }}}_static"/>
|
||||
<extend_definition comment="{{{ SYSCTLVAR }}} runtime setting check"
|
||||
- definition_ref="sysctl_runtime_{{{ SYSCTLID }}}"/>
|
||||
+ definition_ref="{{{ rule_id }}}_runtime"/>
|
||||
</criteria>
|
||||
</definition>
|
||||
</def-group>
|
||||
@@ -34,7 +42,7 @@
|
||||
{{%- elif "I" in FLAGS -%}}
|
||||
|
||||
<def-group>
|
||||
- <definition class="compliance" id="sysctl_{{{ SYSCTLID }}}" version="4">
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}" version="4">
|
||||
{{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to the appropriate value in both system configuration and system runtime.") }}}
|
||||
<criteria comment="IPv6 disabled or {{{ SYSCTLVAR }}} set correctly" operator="OR">
|
||||
{{% if product in ["ubuntu1604", "ubuntu1804"] %}}
|
||||
@@ -46,9 +54,9 @@
|
||||
{{% endif %}}
|
||||
<criteria operator="AND">
|
||||
<extend_definition comment="{{{ SYSCTLVAR }}} configuration setting check"
|
||||
- definition_ref="sysctl_static_{{{ SYSCTLID }}}"/>
|
||||
+ definition_ref="{{{ rule_id }}}_static"/>
|
||||
<extend_definition comment="{{{ SYSCTLVAR }}} runtime setting check"
|
||||
- definition_ref="sysctl_runtime_{{{ SYSCTLID }}}"/>
|
||||
+ definition_ref="{{{ rule_id }}}_runtime"/>
|
||||
</criteria>
|
||||
</criteria>
|
||||
</definition>
|
||||
@@ -58,33 +66,41 @@
|
||||
{{%- if "R" in FLAGS -%}}
|
||||
|
||||
<def-group>
|
||||
- <definition class="compliance" id="sysctl_runtime_{{{ SYSCTLID }}}" version="3">
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}_runtime" version="3">
|
||||
{{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to " + COMMENT_VALUE + " in the system runtime.") }}}
|
||||
<criteria operator="AND">
|
||||
<criterion comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}}"
|
||||
- test_ref="test_sysctl_runtime_{{{ SYSCTLID }}}"/>
|
||||
+ test_ref="test_{{{ rule_id }}}_runtime"/>
|
||||
</criteria>
|
||||
</definition>
|
||||
- <unix:sysctl_test id="test_sysctl_runtime_{{{ SYSCTLID }}}" version="1"
|
||||
+
|
||||
+ <unix:sysctl_test id="test_{{{ rule_id }}}_runtime" version="1"
|
||||
comment="kernel runtime parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}}"
|
||||
- check="all" check_existence="all_exist">
|
||||
- <unix:object object_ref="object_sysctl_runtime_{{{ SYSCTLID }}}"/>
|
||||
- <unix:state state_ref="state_sysctl_runtime_{{{ SYSCTLID }}}"/>
|
||||
+ check="all" check_existence="all_exist" state_operator="OR">
|
||||
+ <unix:object object_ref="object_{{{ rule_id }}}_runtime"/>
|
||||
+{{% if SYSCTLVAL is string %}}
|
||||
+ <unix:state state_ref="state_{{{ rule_id }}}_runtime"/>
|
||||
+{{% elif SYSCTLVAL is sequence %}}
|
||||
+{{% for x in SYSCTLVAL %}}
|
||||
+ <unix:state state_ref="state_{{{ rule_id }}}_runtime_{{{ x }}}" />
|
||||
+{{% endfor %}}
|
||||
+{{% endif %}}
|
||||
</unix:sysctl_test>
|
||||
|
||||
- <unix:sysctl_object id="object_sysctl_runtime_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unix:sysctl_object id="object_{{{ rule_id }}}_runtime" version="1">
|
||||
<unix:name>{{{ SYSCTLVAR }}}</unix:name>
|
||||
</unix:sysctl_object>
|
||||
+{{% if SYSCTLVAL is string %}}
|
||||
{{% if SYSCTLVAL == "" %}}
|
||||
- <unix:sysctl_state id="state_sysctl_runtime_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unix:sysctl_state id="state_{{{ rule_id }}}_runtime" version="1">
|
||||
<unix:value datatype="{{{ DATATYPE }}}" operation="equals"
|
||||
- var_ref="sysctl_{{{ SYSCTLID }}}_value"/>
|
||||
+ var_ref="{{{ rule_id }}}_value"/>
|
||||
</unix:sysctl_state>
|
||||
|
||||
- <external_variable id="sysctl_{{{ SYSCTLID }}}_value" version="1"
|
||||
+ <external_variable id="{{{ rule_id }}}_value" version="1"
|
||||
comment="External variable for {{{ SYSCTLVAR }}}" datatype="{{{ DATATYPE }}}"/>
|
||||
{{%- else %}}
|
||||
- <unix:sysctl_state id="state_sysctl_runtime_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unix:sysctl_state id="state_{{{ rule_id }}}_runtime" version="1">
|
||||
{{% if OPERATION == "pattern match" %}}
|
||||
<unix:value datatype="{{{ DATATYPE }}}"
|
||||
operation="{{{ OPERATION }}}">{{{ SYSCTLVAL_REGEX }}}</unix:value>
|
||||
@@ -94,133 +110,156 @@
|
||||
{{% endif %}}
|
||||
</unix:sysctl_state>
|
||||
{{%- endif %}}
|
||||
+{{% elif SYSCTLVAL is sequence %}}
|
||||
+{{% for x in SYSCTLVAL %}}
|
||||
+ <unix:sysctl_state id="state_{{{ rule_id }}}_runtime_{{{ x }}}" version="1">
|
||||
+ <unix:value datatype="{{{ DATATYPE }}}"
|
||||
+ operation="{{{ OPERATION }}}">{{{ x }}}</unix:value>
|
||||
+ </unix:sysctl_state>
|
||||
+{{% endfor %}}
|
||||
+{{% endif %}}
|
||||
</def-group>
|
||||
|
||||
{{%- endif -%}}
|
||||
{{%- if "S" in FLAGS -%}}
|
||||
|
||||
<def-group>
|
||||
- <definition class="compliance" id="sysctl_static_{{{ SYSCTLID }}}" version="3">
|
||||
+ <definition class="compliance" id="{{{ rule_id }}}_static" version="3">
|
||||
{{{ oval_metadata("The kernel '" + SYSCTLVAR + "' parameter should be set to " + COMMENT_VALUE + " in the system configuration.") }}}
|
||||
+{{% if MISSING_PARAMETER_PASS == "true" %}}
|
||||
+ <criteria operator="OR">
|
||||
+{{% endif %}}
|
||||
<criteria operator="AND">
|
||||
<criteria operator="OR">
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /etc/sysctl.conf"
|
||||
- test_ref="test_static_sysctl_{{{ SYSCTLID }}}"/>
|
||||
+ test_ref="test_{{{ rule_id }}}_static"/>
|
||||
<!-- see sysctl.d(5) -->
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /etc/sysctl.d/*.conf"
|
||||
- test_ref="test_static_etc_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ test_ref="test_{{{ rule_id }}}_static_etc_sysctld"/>
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /run/sysctl.d/*.conf"
|
||||
- test_ref="test_static_run_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ test_ref="test_{{{ rule_id }}}_static_run_sysctld"/>
|
||||
{{% if product not in [ "ol7", "ol8", "ol9", "rhcos4", "rhel7", "rhel8", "rhel9"] %}}
|
||||
<criterion comment="kernel static parameter {{{ SYSCTLVAR }}} set to {{{ COMMENT_VALUE }}} in /usr/lib/sysctl.d/*.conf"
|
||||
- test_ref="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}"/>
|
||||
+ test_ref="test_{{{ rule_id }}}_static_usr_lib_sysctld"/>
|
||||
{{% endif %}}
|
||||
</criteria>
|
||||
{{% if target_oval_version >= [5, 11] %}}
|
||||
- <criterion comment="Check that {{{ SYSCTLID }}} is defined in only one file" test_ref="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
+ <criterion comment="Check that {{{ SYSCTLID }}} is defined in only one file" test_ref="test_{{{ rule_id }}}_defined_in_one_file" />
|
||||
{{% endif %}}
|
||||
</criteria>
|
||||
+{{% if MISSING_PARAMETER_PASS == "true" %}}
|
||||
+ <criterion comment="Check that {{{ SYSCTLID }}} is not defined in any file" test_ref="test_{{{ rule_id }}}_not_defined" />
|
||||
+ </criteria>
|
||||
+{{% endif %}}
|
||||
</definition>
|
||||
|
||||
- <ind:textfilecontent54_test id="test_static_sysctl_{{{ SYSCTLID }}}" version="1"
|
||||
- check="all" check_existence="all_exist"
|
||||
+{{% if MISSING_PARAMETER_PASS == "true" %}}
|
||||
+ <ind:textfilecontent54_test id="test_{{{ rule_id }}}_not_defined" version="1"
|
||||
+ check="all" check_existence="none_exist"
|
||||
comment="{{{ SYSCTLVAR }}} static configuration">
|
||||
+ <ind:object object_ref="object_{{{ rule_id }}}_static_set_sysctls" />
|
||||
+ </ind:textfilecontent54_test>
|
||||
+{{% endif %}}
|
||||
+
|
||||
+ <ind:textfilecontent54_test id="test_{{{ rule_id }}}_static" version="1"
|
||||
+ check="all" check_existence="all_exist"
|
||||
+ comment="{{{ SYSCTLVAR }}} static configuration" state_operator="OR">
|
||||
{{{ state_static_sysctld("sysctl") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
- <ind:textfilecontent54_test id="test_static_etc_sysctld_{{{ SYSCTLID }}}" version="1" check="all"
|
||||
- comment="{{{ SYSCTLVAR }}} static configuration in /etc/sysctl.d/*.conf">
|
||||
+ <ind:textfilecontent54_test id="test_{{{ rule_id }}}_static_etc_sysctld" version="1" check="all"
|
||||
+ comment="{{{ SYSCTLVAR }}} static configuration in /etc/sysctl.d/*.conf" state_operator="OR">
|
||||
{{{ state_static_sysctld("etc_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
- <ind:textfilecontent54_test id="test_static_run_sysctld_{{{ SYSCTLID }}}" version="1" check="all"
|
||||
- comment="{{{ SYSCTLVAR }}} static configuration in /run/sysctl.d/*.conf">
|
||||
+ <ind:textfilecontent54_test id="test_{{{ rule_id }}}_static_run_sysctld" version="1" check="all"
|
||||
+ comment="{{{ SYSCTLVAR }}} static configuration in /run/sysctl.d/*.conf" state_operator="OR">
|
||||
{{{ state_static_sysctld("run_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
|
||||
{{% if product not in [ "ol7", "ol8", "ol9", "rhcos4", "rhel7", "rhel8", "rhel9"] %}}
|
||||
- <ind:textfilecontent54_test id="test_static_usr_lib_sysctld_{{{ SYSCTLID }}}" version="1"
|
||||
+ <ind:textfilecontent54_test id="test_{{{ rule_id }}}_static_usr_lib_sysctld" version="1"
|
||||
check="all"
|
||||
- comment="{{{ SYSCTLVAR }}} static configuration in /usr/lib/sysctl.d/*.conf">
|
||||
+ comment="{{{ SYSCTLVAR }}} static configuration in /usr/lib/sysctl.d/*.conf" state_operator="OR">
|
||||
{{{ state_static_sysctld("usr_lib_sysctld") }}}
|
||||
</ind:textfilecontent54_test>
|
||||
{{% endif %}}
|
||||
|
||||
{{% if target_oval_version >= [5, 11] %}}
|
||||
<ind:variable_test check="all" check_existence="all_exist" comment="Check that only one file contains {{{ SYSCTLID }}}"
|
||||
- id="test_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
- <ind:object object_ref="oject_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
- <ind:state state_ref="state_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" />
|
||||
+ id="test_{{{ rule_id }}}_defined_in_one_file" version="1">
|
||||
+ <ind:object object_ref="object_{{{ rule_id }}}_defined_in_one_file" />
|
||||
+ <ind:state state_ref="state_{{{ rule_id }}}_defined_in_one_file" />
|
||||
</ind:variable_test>
|
||||
|
||||
- <ind:variable_object id="oject_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
- <ind:var_ref>local_var_unique_sysctl_{{{ SYSCTLID }}}_counter</ind:var_ref>
|
||||
+ <ind:variable_object id="object_{{{ rule_id }}}_defined_in_one_file" version="1">
|
||||
+ <ind:var_ref>local_var_{{{ rule_id }}}_counter</ind:var_ref>
|
||||
</ind:variable_object>
|
||||
|
||||
- <ind:variable_state id="state_sysctl_{{{ SYSCTLID }}}_defined_in_one_file" version="1">
|
||||
+ <ind:variable_state id="state_{{{ rule_id }}}_defined_in_one_file" version="1">
|
||||
<ind:value operation="equals" datatype="int">1</ind:value>
|
||||
</ind:variable_state>
|
||||
|
||||
- <local_variable comment="Count unique sysctls" datatype="int" id="local_var_unique_sysctl_{{{ SYSCTLID }}}_counter" version="1">
|
||||
+ <local_variable comment="Count unique sysctls" datatype="int" id="local_var_{{{ rule_id }}}_counter" version="1">
|
||||
<count>
|
||||
<unique>
|
||||
- <object_component object_ref="object_static_set_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
||||
+ <object_component object_ref="object_{{{ rule_id }}}_static_set_sysctls" item_field="filepath" />
|
||||
</unique>
|
||||
</count>
|
||||
</local_variable>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_static_set_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_{{{ rule_id }}}_static_set_sysctls" version="1">
|
||||
<set>
|
||||
- <object_reference>object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
- <filter action="exclude">state_{{{ SYSCTLID }}}_filepath_is_symlink</filter>
|
||||
+ <object_reference>object_{{{ rule_id }}}_static_set_sysctls_unfiltered</object_reference>
|
||||
+ <filter action="exclude">state_{{{ rule_id }}}_filepath_is_symlink</filter>
|
||||
</set>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
- <ind:textfilecontent54_state id="state_{{{ SYSCTLID }}}_filepath_is_symlink" version="1">
|
||||
- <ind:filepath operation="equals" var_check="at least one" var_ref="local_var_safe_symlinks_{{{ SYSCTLID }}}" datatype="string" />
|
||||
+ <ind:textfilecontent54_state id="state_{{{ rule_id }}}_filepath_is_symlink" version="1">
|
||||
+ <ind:filepath operation="equals" var_check="at least one" var_ref="local_var_{{{ rule_id }}}_safe_symlinks" datatype="string" />
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
- <!-- <no simlink handling> -->
|
||||
+ <!-- <no symlink handling> -->
|
||||
<!-- We craft a variable with blank string to combine with the symlink paths found.
|
||||
This ultimately avoids referencing a variable with "no values",
|
||||
we reference a variable with a blank string -->
|
||||
- <local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_safe_symlinks_{{{ SYSCTLID }}}" version="1">
|
||||
+ <local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_{{{ rule_id }}}_safe_symlinks" version="1">
|
||||
<unique>
|
||||
- <object_component object_ref="var_object_symlink_{{{ SYSCTLID }}}" item_field="value" />
|
||||
+ <object_component object_ref="var_object_symlink_{{{ rule_id }}}" item_field="value" />
|
||||
</unique>
|
||||
</local_variable>
|
||||
|
||||
- <ind:variable_object id="var_object_symlink_{{{ SYSCTLID }}}" comment="combine the blank string with symlink paths found" version="1">
|
||||
+ <ind:variable_object id="var_object_symlink_{{{ rule_id }}}" comment="combine the blank string with symlink paths found" version="1">
|
||||
<set>
|
||||
- <object_reference>var_obj_symlink_{{{ SYSCTLID }}}</object_reference>
|
||||
- <object_reference>var_obj_blank_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>var_obj_symlink_{{{ rule_id }}}</object_reference>
|
||||
+ <object_reference>var_obj_blank_{{{ rule_id }}}</object_reference>
|
||||
</set>
|
||||
</ind:variable_object>
|
||||
|
||||
- <ind:variable_object id="var_obj_blank_{{{ SYSCTLID }}}" comment="variable object of the blank string" version="1">
|
||||
- <ind:var_ref>local_var_blank_path_{{{ SYSCTLID }}}</ind:var_ref>
|
||||
+ <ind:variable_object id="var_obj_blank_{{{ rule_id }}}" comment="variable object of the blank string" version="1">
|
||||
+ <ind:var_ref>local_var_blank_path_{{{ rule_id }}}</ind:var_ref>
|
||||
</ind:variable_object>
|
||||
|
||||
- <local_variable comment="Blank string" datatype="string" id="local_var_blank_path_{{{ SYSCTLID }}}" version="1">
|
||||
+ <local_variable comment="Blank string" datatype="string" id="local_var_blank_path_{{{ rule_id }}}" version="1">
|
||||
<literal_component datatype="string"></literal_component>
|
||||
</local_variable>
|
||||
|
||||
- <ind:variable_object id="var_obj_symlink_{{{ SYSCTLID }}}" comment="variable object of the symlinks found" version="1">
|
||||
- <ind:var_ref>local_var_symlinks_{{{ SYSCTLID }}}</ind:var_ref>
|
||||
+ <ind:variable_object id="var_obj_symlink_{{{ rule_id }}}" comment="variable object of the symlinks found" version="1">
|
||||
+ <ind:var_ref>local_var_symlinks_{{{ rule_id }}}</ind:var_ref>
|
||||
</ind:variable_object>
|
||||
- <!-- </no simlink handling> -->
|
||||
+ <!-- </no symlink handling> -->
|
||||
|
||||
- <local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_symlinks_{{{ SYSCTLID }}}" version="1">
|
||||
+ <local_variable comment="Unique list of symlink conf files" datatype="string" id="local_var_symlinks_{{{ rule_id }}}" version="1">
|
||||
<unique>
|
||||
- <object_component object_ref="object_{{{ SYSCTLID }}}_symlinks" item_field="filepath" />
|
||||
+ <object_component object_ref="object_{{{ rule_id }}}_symlinks" item_field="filepath" />
|
||||
</unique>
|
||||
</local_variable>
|
||||
|
||||
<!-- "pattern match" doesn't seem to work with symlink_object, not sure if a bug or not.
|
||||
Workaround by querying for all conf files found -->
|
||||
- <unix:symlink_object comment="Symlinks referencing files in default dirs" id="object_{{{ SYSCTLID }}}_symlinks" version="1">
|
||||
- <unix:filepath operation="equals" var_ref="local_var_conf_files_{{{ SYSCTLID }}}" />
|
||||
- <filter action="exclude">state_symlink_points_outside_usual_dirs_{{{ SYSCTLID }}}</filter>
|
||||
+ <unix:symlink_object comment="Symlinks referencing files in default dirs" id="object_{{{ rule_id }}}_symlinks" version="1">
|
||||
+ <unix:filepath operation="equals" var_ref="local_var_conf_files_{{{ rule_id }}}" />
|
||||
+ <filter action="exclude">state_symlink_points_outside_usual_dirs_{{{ rule_id }}}</filter>
|
||||
</unix:symlink_object>
|
||||
|
||||
<!-- The state matches symlinks that don't point to the default dirs, i.e. paths that are not:
|
||||
@@ -228,75 +267,76 @@
|
||||
^/etc/sysctl.d/.*$
|
||||
^/run/sysctl.d/.*$
|
||||
^/usr/lib/sysctl.d/.*$ -->
|
||||
- <unix:symlink_state comment="State that matches symlinks referencing files not in the default dirs" id="state_symlink_points_outside_usual_dirs_{{{ SYSCTLID }}}" version="1">
|
||||
+ <unix:symlink_state comment="State that matches symlinks referencing files not in the default dirs" id="state_symlink_points_outside_usual_dirs_{{{ rule_id }}}" version="1">
|
||||
<unix:canonical_path operation="pattern match">^(?!(\/etc\/sysctl\.conf$|(\/etc|\/run|\/usr\/lib)\/sysctl\.d\/)).*$</unix:canonical_path>
|
||||
</unix:symlink_state>
|
||||
{{% endif %}}
|
||||
|
||||
- <local_variable comment="List of conf files" datatype="string" id="local_var_conf_files_{{{ SYSCTLID }}}" version="1">
|
||||
- <object_component object_ref="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" item_field="filepath" />
|
||||
+ <local_variable comment="List of conf files" datatype="string" id="local_var_conf_files_{{{ rule_id }}}" version="1">
|
||||
+ <object_component object_ref="object_{{{ rule_id }}}_static_set_sysctls_unfiltered" item_field="filepath" />
|
||||
</local_variable>
|
||||
|
||||
<!-- Avoid directly referencing a possibly empty collection, one empty collection will cause the
|
||||
variable to have no value even when there are valid objects. -->
|
||||
- <ind:textfilecontent54_object id="object_static_set_unfiltered_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_{{{ rule_id }}}_static_set_sysctls_unfiltered" version="1">
|
||||
<set>
|
||||
- <object_reference>object_static_etc_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
- <object_reference>object_static_run_usr_sysctls_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_etc_sysctls_{{{ rule_id }}}</object_reference>
|
||||
+ <object_reference>object_static_run_usr_sysctls_{{{ rule_id }}}</object_reference>
|
||||
</set>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_static_etc_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_etc_sysctls_{{{ rule_id }}}" version="1">
|
||||
<set>
|
||||
- <object_reference>object_static_sysctl_{{{ SYSCTLID }}}</object_reference>
|
||||
- <object_reference>object_static_etc_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_sysctl_{{{ rule_id }}}</object_reference>
|
||||
+ <object_reference>object_static_etc_sysctld_{{{ rule_id }}}</object_reference>
|
||||
</set>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_static_run_usr_sysctls_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_run_usr_sysctls_{{{ rule_id }}}" version="1">
|
||||
<set>
|
||||
- <object_reference>object_static_run_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_run_sysctld_{{{ rule_id }}}</object_reference>
|
||||
{{% if product not in [ "ol7", "ol8", "ol9", "rhcos4", "rhel7", "rhel8", "rhel9"] %}}
|
||||
- <object_reference>object_static_usr_lib_sysctld_{{{ SYSCTLID }}}</object_reference>
|
||||
+ <object_reference>object_static_usr_lib_sysctld_{{{ rule_id }}}</object_reference>
|
||||
{{% endif %}}
|
||||
</set>
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_static_sysctl_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_sysctl_{{{ rule_id }}}" version="1">
|
||||
<ind:filepath>/etc/sysctl.conf</ind:filepath>
|
||||
{{{ sysctl_match() }}}
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_static_etc_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_etc_sysctld_{{{ rule_id }}}" version="1">
|
||||
<ind:path>/etc/sysctl.d</ind:path>
|
||||
<ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
{{{ sysctl_match() }}}
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
- <ind:textfilecontent54_object id="object_static_run_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_run_sysctld_{{{ rule_id }}}" version="1">
|
||||
<ind:path>/run/sysctl.d</ind:path>
|
||||
<ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
{{{ sysctl_match() }}}
|
||||
</ind:textfilecontent54_object>
|
||||
|
||||
{{% if product not in [ "ol7", "ol8", "ol9", "rhcos4", "rhel7", "rhel8", "rhel9"] %}}
|
||||
- <ind:textfilecontent54_object id="object_static_usr_lib_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_object id="object_static_usr_lib_sysctld_{{{ rule_id }}}" version="1">
|
||||
<ind:path>/usr/lib/sysctl.d</ind:path>
|
||||
<ind:filename operation="pattern match">^.*\.conf$</ind:filename>
|
||||
{{{ sysctl_match() }}}
|
||||
</ind:textfilecontent54_object>
|
||||
{{% endif %}}
|
||||
+{{% if SYSCTLVAL is string %}}
|
||||
{{% if SYSCTLVAL == "" %}}
|
||||
|
||||
- <ind:textfilecontent54_state id="state_static_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
- <ind:subexpression operation="{{{ OPERATION }}}" var_ref="sysctl_{{{ SYSCTLID }}}_value"
|
||||
+ <ind:textfilecontent54_state id="state_static_sysctld_{{{ rule_id }}}" version="1">
|
||||
+ <ind:subexpression operation="{{{ OPERATION }}}" var_ref="{{{ rule_id }}}_value"
|
||||
datatype="{{{ DATATYPE }}}" />
|
||||
</ind:textfilecontent54_state>
|
||||
|
||||
- <external_variable id="sysctl_{{{ SYSCTLID }}}_value" version="1"
|
||||
+ <external_variable id="{{{ rule_id }}}_value" version="1"
|
||||
comment="External variable for {{{ SYSCTLVAR }}}" datatype="{{{ DATATYPE }}}"/>
|
||||
{{% else %}}
|
||||
- <ind:textfilecontent54_state id="state_static_sysctld_{{{ SYSCTLID }}}" version="1">
|
||||
+ <ind:textfilecontent54_state id="state_static_sysctld_{{{ rule_id }}}" version="1">
|
||||
{{% if OPERATION == "pattern match" %}}
|
||||
<ind:subexpression operation="{{{ OPERATION }}}" datatype="{{{ DATATYPE }}}">{{{ SYSCTLVAL_REGEX }}}</ind:subexpression>
|
||||
{{% else %}}
|
||||
@@ -304,5 +344,12 @@
|
||||
{{% endif %}}
|
||||
</ind:textfilecontent54_state>
|
||||
{{% endif %}}
|
||||
+{{% elif SYSCTLVAL is sequence %}}
|
||||
+{{% for x in SYSCTLVAL %}}
|
||||
+ <ind:textfilecontent54_state id="state_static_sysctld_{{{ rule_id }}}_{{{ x }}}" version="1">
|
||||
+ <ind:subexpression operation="{{{ OPERATION }}}" datatype="{{{ DATATYPE }}}">{{{ x }}}</ind:subexpression>
|
||||
+ </ind:textfilecontent54_state>
|
||||
+{{% endfor %}}
|
||||
+{{% endif %}}
|
||||
</def-group>
|
||||
{{%- endif -%}}
|
||||
diff --git a/shared/templates/sysctl/template.py b/shared/templates/sysctl/template.py
|
||||
index fa981a9dce..9083a6a418 100644
|
||||
--- a/shared/templates/sysctl/template.py
|
||||
+++ b/shared/templates/sysctl/template.py
|
||||
@@ -11,8 +11,19 @@ def preprocess(data, lang):
|
||||
data["flags"] = "SR" + ipv6_flag
|
||||
if "operation" not in data:
|
||||
data["operation"] = "equals"
|
||||
+ if isinstance(data["sysctlval"], list) and len(data["sysctlval"]) == 0:
|
||||
+ raise ValueError(
|
||||
+ "The sysctlval parameter of {0} is an empty list".format(
|
||||
+ data["_rule_id"]))
|
||||
|
||||
# Configure data for test scenarios
|
||||
+ if data["datatype"] not in ["string", "int"]:
|
||||
+ raise ValueError(
|
||||
+ "Test scenarios for data type '{0}' are not implemented yet.\n"
|
||||
+ "Please check if rule '{1}' has correct data type and edit "
|
||||
+ "{2} to add tests for it.".format(
|
||||
+ data["datatype"], data["_rule_id"], __file__))
|
||||
+
|
||||
if data["sysctlval"] == "":
|
||||
if data["datatype"] == "int":
|
||||
data["sysctl_correct_value"] = "0"
|
||||
@@ -20,20 +31,13 @@ def preprocess(data, lang):
|
||||
elif data["datatype"] == "string":
|
||||
data["sysctl_correct_value"] = "correct_value"
|
||||
data["sysctl_wrong_value"] = "wrong_value"
|
||||
- else:
|
||||
- raise ValueError(
|
||||
- "Test scenarios for data type '{0}' are not implemented yet.\n"
|
||||
- "Please check if rule '{1}' has correct data type and edit "
|
||||
- "{2} to add tests for it.".format(data["datatype"], data["_rule_id"], __file__))
|
||||
+ elif isinstance(data["sysctlval"], list):
|
||||
+ data["sysctl_correct_value"] = data["sysctlval"][0]
|
||||
+ data["sysctl_wrong_value"] = data["wrong_sysctlval_for_testing"]
|
||||
else:
|
||||
data["sysctl_correct_value"] = data["sysctlval"]
|
||||
if data["datatype"] == "int":
|
||||
data["sysctl_wrong_value"] = "1" + data["sysctlval"]
|
||||
elif data["datatype"] == "string":
|
||||
data["sysctl_wrong_value"] = "wrong_value"
|
||||
- else:
|
||||
- raise ValueError(
|
||||
- "Test scenarios for data type '{0}' are not implemented yet.\n"
|
||||
- "Please check if rule '{1}' has correct data type and edit "
|
||||
- "{2} to add tests for it.".format(data["datatype"], data["_rule_id"], __file__))
|
||||
return data
|
||||
--
|
||||
2.37.1
|
||||
|
@ -5,8 +5,8 @@
|
||||
%global _default_patch_fuzz 2
|
||||
|
||||
Name: scap-security-guide
|
||||
Version: 0.1.60
|
||||
Release: 9%{?dist}
|
||||
Version: 0.1.63
|
||||
Release: 1%{?dist}
|
||||
Summary: Security guidance and baselines in SCAP formats
|
||||
License: BSD-3-Clause
|
||||
Group: Applications/System
|
||||
@ -14,67 +14,35 @@ URL: https://github.com/ComplianceAsCode/content/
|
||||
Source0: https://github.com/ComplianceAsCode/content/releases/download/v%{version}/scap-security-guide-%{version}.tar.bz2
|
||||
# Include tarball with last released rhel6 content
|
||||
Source1: %{_static_rhel6_content}.tar.bz2
|
||||
# Disable profiles that are not in good shape for products/rhel8
|
||||
Patch0: disable-not-in-good-shape-profiles.patch
|
||||
# Update RHEL8 STIG to V1R7
|
||||
Patch1: scap-security-guide-0.1.64-update-rhel8-stig-to-v1r7-PR_9276.patch
|
||||
# Refresh BPF related rules in RHEL 9 OSPP profile
|
||||
Patch2: scap-security-guide-0.1.64-update_sysctl_template_with_multivalue_compliance-PR_9147.patch
|
||||
# New sysctl ipv4 forwarding rule
|
||||
Patch3: scap-security-guide-0.1.64-add_new_rule_sysctl_ipv4_forwarding-PR_9277.patch
|
||||
# Add rsyslogd to the list of tools checked by aide
|
||||
Patch4: scap-security-guide-0.1.64-aide_check_rsyslogd-PR_9282.patch
|
||||
# Accept sudoers files without includes as compliant
|
||||
Patch5: scap-security-guide-0.1.64-accept_sudoers_wihout_includes-PR_9283.patch
|
||||
# Update few sysctl rules to accept multiple compliant values
|
||||
Patch6: scap-security-guide-0.1.64-add_multivalue_compliance_kptr_rp_filter-PR_9286.patch
|
||||
# Reintroduce back the sshd timeout rules in RHEL8 STIG profile
|
||||
Patch7: scap-security-guide-0.1.64-readd-sshd_timeout-rules-PR_9318.patch
|
||||
# Make OSPP profiles use minimal Authselect profile
|
||||
Patch8: scap-security-guide-0.1.64-authselect_minimal_in_ospp-PR_9298.patch
|
||||
# change rules protecting boot in RHEL8 OSPP
|
||||
Patch9: scap-security-guide-0.1.64-select_grub2_disable_recovery-PR_9231.patch
|
||||
# Introduce and apply the "partition exists" platform
|
||||
Patch10: scap-security-guide-0.1.64-add_platform_partition_exists-PR_9204.patch
|
||||
# Add the platform applicability to relevant rules
|
||||
Patch11: scap-security-guide-0.1.64-add_partition_platform_to_relevant_rules-PR_9324.path
|
||||
# Fix ansible partition conditionals
|
||||
Patch12: scap-security-guide-0.1.64-fix_ansible_partition_conditional-PR_9339.patch
|
||||
|
||||
BuildArch: noarch
|
||||
|
||||
# Patch allows only OSPP, PCI-DSS, E8 and STIG profiles in RHEL8 datastream
|
||||
Patch0: disable-not-in-good-shape-profiles.patch
|
||||
Patch1: scap-security-guide-0.1.61-file_groupowner-PR_7791.patch
|
||||
Patch2: scap-security-guide-0.1.61-file_owner-PR_7789.patch
|
||||
Patch3: scap-security-guide-0.1.61-file_permissions-PR_7788.patch
|
||||
Patch4: scap-security-guide-0.1.61-update_RHEL_08_010287-PR_8051.patch
|
||||
Patch5: scap-security-guide-0.1.61-add_RHEL_08_010331-PR_8055.patch
|
||||
Patch6: scap-security-guide-0.1.61-rhel8_stig_v1r5-PR_8050.patch
|
||||
Patch7: scap-security-guide-0.1.61-RC_277_245-PR_8069.patch
|
||||
Patch8: scap-security-guide-0.1.61-RC_248_249-PR_8071.patch
|
||||
Patch9: scap-security-guide-0.1.61-RC_251-PR_8072.patch
|
||||
Patch10: scap-security-guide-0.1.61-RC_246_250-PR_8070.patch
|
||||
Patch11: scap-security-guide-0.1.61-RC_247-PR_8114.patch
|
||||
Patch12: scap-security-guide-0.1.61-RC_254-PR_8113.patch
|
||||
Patch13: scap-security-guide-0.1.61-RC_253-PR_8111.patch
|
||||
Patch14: scap-security-guide-0.1.61-RC_255-PR_8112.patch
|
||||
Patch15: scap-security-guide-0.1.61-add_RHEL_08_010359-PR_8131.patch
|
||||
Patch16: scap-security-guide-0.1.61-RC_244-PR_8133.patch
|
||||
Patch17: scap-security-guide-0.1.61-update_RHEL_STIG-PR_8130.patch
|
||||
Patch18: scap-security-guide-0.1.61-update_RHEL_08_STIG-PR_8139.patch
|
||||
Patch19: scap-security-guide-0.1.61-remove_RHEL_08_010560-PR_8145.patch
|
||||
Patch20: scap-security-guide-0.1.61-add_RHEL_08_040321-PR_8169.patch
|
||||
Patch21: scap-security-guide-0.1.61-add_RHEL_08_020221-PR_8173.patch
|
||||
Patch22: scap-security-guide-0.1.61-update_RHEL_08_040320-PR_8170.patch
|
||||
Patch23: scap-security-guide-0.1.61-rhel8_stig_audit_rules-PR_8174.patch
|
||||
Patch24: scap-security-guide-0.1.61-update_RHEL_08_010030-PR_8183.patch
|
||||
Patch25: scap-security-guide-0.1.61-selinux_state_rhel8_anssi_enhanced-PR_8182.patch
|
||||
Patch26: scap-security-guide-0.1.61-update_accounts_password_template-PR_8164.patch
|
||||
Patch27: scap-security-guide-0.1.61-update_RHEL_08_010383-PR_8138.patch
|
||||
Patch28: scap-security-guide-0.1.61-remove_client_alive_max-PR_8197.patch
|
||||
Patch29: scap-security-guide-0.1.61-pwquality-PR_8185.patch
|
||||
Patch30: scap-security-guide-0.1.61-update_RHEL_08_020041-PR_8146.patch
|
||||
Patch31: scap-security-guide-0.1.61-rhel86_ospp_fix_audit_ospp_general-PR_8152.patch
|
||||
Patch32: scap-security-guide-0.1.61-chrony_maxpoll-PR_8187.patch
|
||||
Patch33: scap-security-guide-0.1.61-add_missing_srgs-PR_8218.patch
|
||||
Patch34: scap-security-guide-0.1.61-sudoers_timestamp_timeout-PR_8220.patch
|
||||
Patch35: scap-security-guide-0.1.61-rhel9_ospp_remove_kernel_rules-PR_8092.patch
|
||||
Patch36: scap-security-guide-0.1.61-grub2_rule_desc_update-PR_8184.patch
|
||||
Patch37: scap-security-guide-0.1.61-grub2_template_fix-PR_8180.patch
|
||||
Patch38: scap-security-guide-0.1.61-rear_not_applicable_aarch64-PR_8221.patch
|
||||
Patch39: scap-security-guide-0.1.61-add_RHEL_08_0103789_include_sudoers-PR_8196.patch
|
||||
Patch40: scap-security-guide-0.1.61-fix-ansible-service-disabled-task-PR_8226.patch
|
||||
Patch41: scap-security-guide-0.1.61-dont-remove-krb5-workstation-on-ovirt-PR_8233.patch
|
||||
Patch42: scap-security-guide-0.1.61-remove_tmux_process_running_check-PR_8246.patch
|
||||
Patch43: scap-security-guide-0.1.61-fix_bug_in_delta_tailering_script-PR_8245.patch
|
||||
Patch44: scap-security-guide-0.1.61-fix_enable_fips_mode-PR_8255.patch
|
||||
Patch45: scap-security-guide-0.1.61-delta_tailoring_fix-PR_8262.patch
|
||||
Patch46: scap-security-guide-0.1.61-resize-anssi-kickstart-partitions-PR_8261.patch
|
||||
Patch47: scap-security-guide-0.1.62-sysctl_parameter_on_single_file-PR_8656.patch
|
||||
Patch48: scap-security-guide-0.1.62-sysctl_filter_symlinks_out-PR_8698.patch
|
||||
Patch49: scap-security-guide-0.1.62-sysctl_separate_object_from_state-PR_8704.patch
|
||||
Patch50: scap-security-guide-0.1.62-sysctl_dont_ignore_all_symlinks-PR_8707.patch
|
||||
Patch51: scap-security-guide-0.1.62-sysctl_dont_scan_usr_lib-PR_8718.patch
|
||||
Patch52: scap-security-guide-0.1.62-sysctl-restrict_symlink_test_to_oval_5_10-PR_8721.patch
|
||||
Patch53: scap-security-guide-0.1.62-update_rhel8_stig_v1r6-PR_8670.patch
|
||||
Patch54: scap-security-guide-0.1.62-fix_oval_5_10_validation-PR_8782.patch
|
||||
Patch55: scap-security-guide-0.1.62-fix_loop_variable_path-PR_8462.patch
|
||||
|
||||
BuildRequires: libxslt
|
||||
BuildRequires: expat
|
||||
BuildRequires: openscap-scanner >= 1.2.5
|
||||
@ -178,6 +146,13 @@ cp -r %{_builddir}/%{_static_rhel6_content}/guides %{buildroot}%{_docdir}/%{name
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Mon Aug 15 2022 Watson Sato <wsato@redhat.com> - 0.1.63-1
|
||||
- Update to the latest upstream release (RHBZ#2116347)
|
||||
- Update RHEL8 STIG profile to V1R7 (RHBZ#2116408)
|
||||
- Select grub2_disable_recovery in OSPP Profile (RHBZ#2117308)
|
||||
- Use authselect minimal profile in OSPP Profile (RHBZ#2117306)
|
||||
- Improve rules for CIS level1 partition options (RHBZ#2117510)
|
||||
|
||||
* Tue May 17 2022 Watson Sato <wsato@redhat.com> - 0.1.60-9
|
||||
- Fix validation of OVAL 5.10 content (RHBZ#2082556)
|
||||
- Fix Ansible sysctl remediation (RHBZ#2082556)
|
||||
|
Loading…
Reference in New Issue
Block a user