# SSG build system and tests count with build directory name `build`. # For more details see: # https://fedoraproject.org/wiki/Changes/CMake_to_do_out-of-source_builds %global _vpath_builddir build # global _default_patch_fuzz 2 # Normally shouldn't be needed as patches should apply cleanly Name: scap-security-guide Version: 0.1.69 Release: 3%{?dist}.alma.1 Summary: Security guidance and baselines in SCAP formats License: BSD-3-Clause URL: https://github.com/ComplianceAsCode/content/ Source0: https://github.com/ComplianceAsCode/content/releases/download/v%{version}/scap-security-guide-%{version}.tar.bz2 # Fix rule enable_fips_mode Patch1: scap-security-guide-0.1.70-improve_readability_enable_fips_mode-PR_10911.patch Patch2: scap-security-guide-0.1.70-fix_enable_fips_mode-PR_10961.patch # remove rules harden_sshd_(macs/ciphers)_openssh_conf_crypto_policy from STIG profile Patch3: scap-security-guide-0.1.70-remove_openssh_hardening_stig-PR_10996.patch # remove rule sebool_secure_mode_insmod from ANSSI high profile because it prevents UEFI-based systems from booting Patch4: scap-security-guide-0.1.70-remove_secure_mode_insmod_anssi-PR_11001.patch # Update sshd_approved_ciphers value for RHEL in STIG profile Patch5: scap-security-guide-0.1.70-sshd_approved_ciphers_stig-PR_10966.patch # Add rule `package_s-nail-installed` Patch6: scap-security-guide-0.1.70-add_package_smail_installed-PR_11144.patch # New Rule networkmanager_dns_mode Patch7: scap-security-guide-0.1.71-new_rule_dns_mode_nm-PR_11160.patch # Add cron.deny Owership Rules Patch8: scap-security-guide-0.1.71-add_cron_deny_rules-PR_11185.patch # Add RHEL 9 STIG Patch9: scap-security-guide-0.1.71-add_rhel9_stig-PR_11193.patch # Add var_networkmanager_dns_mode to RHEL 9 STIG Patch10: scap-security-guide-0.1.71-fix_var_networkmanager_dns_mode_rhel9_stig-PR_11242.patch # Add SRG id to `file_owner_grub2_cfg` for RHEL 9 STIG Patch11: scap-security-guide-0.1.71-add_srg_to_file_owner_grub2_cfg-PR_11261.patch # Minor modifications to RHEL STIG profiles Patch12: scap-security-guide-0.1.72-remove_stig_ids-PR_11327.patch # Add variable support to `auditd_name_format` rule Patch13: scap-security-guide-0.1.70-name_format_variable-PR_11019.patch # Update ssh stig HMACS and Ciphers allowed in OL8 STIG Patch14: scap-security-guide-0.1.70-update_ssh_stig_algos-PR_10920.patch BuildArch: noarch # AlmaLinux 9 Patch1000: scap-security-guide-0.1.69-add-almalinux9-product.patch BuildRequires: libxslt BuildRequires: expat BuildRequires: openscap-scanner >= 1.2.5 BuildRequires: cmake >= 2.8 # To get python3 inside the buildroot require its path explicitly in BuildRequires BuildRequires: /usr/bin/python3 BuildRequires: python%{python3_pkgversion} BuildRequires: python%{python3_pkgversion}-jinja2 BuildRequires: python%{python3_pkgversion}-PyYAML Requires: xml-common, openscap-scanner >= 1.2.5 %description The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. The system administrator can use the oscap CLI tool from openscap-scanner package, or the scap-workbench GUI tool from scap-workbench package to verify that the system conforms to provided guideline. Refer to scap-security-guide(8) manual page for further information. %package doc Summary: HTML formatted security guides generated from XCCDF benchmarks Requires: %{name} = %{version}-%{release} %description doc The %{name}-doc package contains HTML formatted documents containing hardening guidances that have been generated from XCCDF benchmarks present in %{name} package. %if %{defined rhel} %package rule-playbooks Summary: Ansible playbooks per each rule. Group: System Environment/Base Requires: %{name} = %{version}-%{release} %description rule-playbooks The %{name}-rule-playbooks package contains individual ansible playbooks per rule. %endif %prep %autosetup -p1 %define cmake_defines_common -DSSG_SEPARATE_SCAP_FILES_ENABLED=OFF -DSSG_BASH_SCRIPTS_ENABLED=OFF -DSSG_BUILD_SCAP_12_DS=OFF %define cmake_defines_specific %{nil} %if 0%{?rhel} %define cmake_defines_specific -DSSG_PRODUCT_DEFAULT:BOOLEAN=FALSE -DSSG_PRODUCT_RHEL%{rhel}:BOOLEAN=TRUE -DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED:BOOL=OFF -DSSG_CENTOS_DERIVATIVES_ENABLED:BOOL=OFF -DSSG_ANSIBLE_PLAYBOOKS_PER_RULE_ENABLED:BOOL=ON %endif %if 0%{?centos} %define cmake_defines_specific -DSSG_PRODUCT_DEFAULT:BOOLEAN=FALSE -DSSG_PRODUCT_RHEL%{centos}:BOOLEAN=TRUE -DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED:BOOL=OFF -DSSG_CENTOS_DERIVATIVES_ENABLED:BOOL=ON %endif %if 0%{?almalinux} %define cmake_defines_specific -DSSG_PRODUCT_DEFAULT:BOOLEAN=FALSE -DSSG_PRODUCT_ALMALINUX%{almalinux}:BOOLEAN=TRUE -DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED:BOOL=OFF -DSSG_CENTOS_DERIVATIVES_ENABLED:BOOL=OFF -DSSG_ANSIBLE_PLAYBOOKS_PER_RULE_ENABLED:BOOL=ON %endif mkdir -p build %build %cmake %{cmake_defines_common} %{cmake_defines_specific} %cmake_build %install %cmake_install rm %{buildroot}/%{_docdir}/%{name}/README.md rm %{buildroot}/%{_docdir}/%{name}/Contributors.md %files %{_datadir}/xml/scap/ssg/content %{_datadir}/%{name}/kickstart %{_datadir}/%{name}/ansible/*.yml %lang(en) %{_mandir}/man8/scap-security-guide.8.* %doc %{_docdir}/%{name}/LICENSE %if ( %{defined rhel} && (! %{defined centos}) ) %exclude %{_datadir}/%{name}/ansible/rule_playbooks %endif %files doc %doc %{_docdir}/%{name}/guides/*.html %doc %{_docdir}/%{name}/tables/*.html %if %{defined rhel} %files rule-playbooks %defattr(-,root,root,-) %{_datadir}/%{name}/ansible/rule_playbooks %endif %changelog * Tue Jan 23 2024 Andrew Lukoshko - 0.1.69-3.alma.1 - Add AlmaLinux 9 support * Tue Dec 05 2023 Jan Černý - 0.1.69-3 - Align STIG profile with official DISA STIG for RHEL 9 (RHEL-1807) * Thu Aug 17 2023 Jan Černý - 0.1.69-2 - Remove OpenSSH crypto policy hardening rules from STIG profile (RHBZ#2221697) - Fix ANSSI High profile with secure boot (RHBZ#2221697) * Wed Aug 09 2023 Jan Černý - 0.1.69-1 - Rebase to a new upstream release 0.1.69 (RHBZ#2221697) - Improve CIS benchmark rules related to auditing of kernel module related events (RHBZ#2209657) - SSSD configuration files are now created with correct permissions whenever remediating SSSD related rules (RHBZ#2211511) - add warning about migration of network configuration files when upgrading from RHEL 8 to RHEL 9 (RHBZ#2172555) - Correct URL used to download CVE checks. (RHBZ#2223178) - update ANSSI BP-028 profiles to be aligned with version 2.0 (RHBZ#2155790) - Fixed excess quotes in journald configuration files (RHBZ#2193169) - Change rules checking home directories to apply only to local users (RHBZ#2203791) - Change rules checking password age to apply only to local users (RHBZ#2213958) - Updated man page (RHBZ#2060028) * Mon Feb 13 2023 Watson Sato - 0.1.66-1 - Rebase to a new upstream release 0.1.66 (RHBZ#2169443) - Fix remediation of audit watch rules (RHBZ#2169441) - Fix check firewalld_sshd_port_enabled (RHBZ#2169443) - Fix accepted control flags for pam_pwhistory (RHBZ#2169443) - Unselect rule logind_session_timeout (RHBZ#2169443) - Add support rainer scripts in rsyslog rules (RHBZ#2169445) * Thu Aug 25 2022 Gabriel Becker - 0.1.63-5 - OSPP: fix rule related to coredump (RHBZ#2081688) * Tue Aug 23 2022 Vojtech Polasek - 0.1.63-4 - use sysctl_kernel_core_pattern rule again in RHEL9 OSPP (RHBZ#2081688) * Thu Aug 11 2022 Matej Tyc - 0.1.63-3 - Readd rules to the benchmark to be compatible across all minor versions of RHEL9 (RHBZ#2117669) * Wed Aug 10 2022 Vojtech Polasek - 0.1.63-2 - OSPP: utilize different audit rule set for different hardware platforms (RHBZ#1998583) - OSPP: update rules related to coredumps (RHBZ#2081688) - OSPP: update rules related to BPF (RHBZ#2081728) - fix description of require_singleuser_mode (RHBZ#2092799) - fix remediation of OpenSSL cryptopolicy (RHBZ#2108569) - OSPP: use minimal Authselect profile(RHBZ#2114979) * Mon Aug 01 2022 Vojtech Polasek - 0.1.63-1 - Rebase to a new upstream release 0.1.63 (RHBZ#2070563) * Mon Jul 18 2022 Vojtech Polasek - 0.1.62-2 - Remove sysctl_fs_protected_* rules from RHEL9 OSPP (RHBZ#2081719) - Make rule audit_access_success_ unenforcing in RHEL9 OSPP (RHBZ#2058154) - Drop zipl_vsyscall_argument rule from RHEL9 OSPP profile (RHBZ#2060049) - make sysctl_user_max_user_namespaces in RHEL9 OSPP (RHBZ#2083716) - Remove some sysctl rules related to network from RHEL9 OSPP (RHBZ#2081708) - Add rule to check if Grub2 recovery is disabled to RHEL9 OSPP (RHBZ#2092809) - Add rule grub2_systemd_debug-shell_argument_absent (RHBZ#2092840) - Remove rule accounts_password_minlen_login_defs from all profiles (RHBZ#2073040) - Remove rules related to remove logging from RHEL9 OSPP (RHBZ#2105016) - Remove sshd_enable_strictmodes from OSPP (RHBZ#2105278) - Remove rules related to NIS services (RHBZ#2096602) - Make rule stricter when checking for FIPS crypto-policies (RHBZ#2057082) * Wed Jun 01 2022 Matej Tyc - 0.1.62-1 - Rebase to a new upstream release (RHBZ#2070563) * Mon Feb 21 2022 Gabriel Becker - 0.1.60-5 - Remove tmux process runinng check in configure_bashrc_exec_tmux (RHBZ#2056847) - Fix issue with getting STIG items in create_scap_delta_tailoring.py (RHBZ#2014561) - Update rule enable_fips_mode to check only for technical state (RHBZ#2057457) * Tue Feb 15 2022 Watson Sato - 0.1.60-4 - Fix Ansible service disabled tasks (RHBZ#2014561) - Update description of OSPP profile (RHBZ#2045386) - Add page_aloc.shuffle rules for OSPP profile (RHBZ#2055118) * Mon Feb 14 2022 Gabriel Becker - 0.1.60-3 - Update sudoers rules in RHEL8 STIG V1R5 (RHBZ#2045403) - Add missing SRG references in RHEL8 STIG V1R5 rules (RHBZ#2045403) - Update chronyd_or_ntpd_set_maxpoll to disregard server and poll directives (RHBZ#2045403) - Fix GRUB2 rule template to configure the module correctly on RHEL8 (RHBZ#2014561) - Update GRUB2 rule descriptions (RHBZ#2020623) - Make package_rear_installed not applicable on AARCH64 (RHBZ#2014561) * Fri Feb 11 2022 Watson Sato - 0.1.60-2 - Update OSPP profile (RHBZ#2016038, RHBZ#2043036, RHBZ#2020670, RHBZ#2046289) * Thu Jan 27 2022 Watson Sato - 0.1.60-1 - Rebase to a new upstream release (RHBZ#2014561) * Wed Dec 08 2021 Gabriel Becker - 0.1.59-1 - Rebase to a new upstream release (RHBZ#2014561) - Enable Centos Stream 9 content (RHBZ#2021284) * Fri Oct 15 2021 Matej Tyc - 0.1.58-1 - Rebase to a new upstream release (RHBZ#2014561) - Disable profiles that we disable in RHEL8 - Add a VM wait handling to fix issues with tests. * Wed Aug 25 2021 Matej Tyc - 0.1.57-5 - Fix remediations applicability of zipl rules Resolves: rhbz#1996847 * Tue Aug 24 2021 Matej Tyc - 0.1.57-4 - Fix a broken HTTP link Add CIS profile based on RHEL8 CIS, fix its Crypto Policy usage Resolves: rhbz#1962564 * Tue Aug 17 2021 Matej Tyc - 0.1.57-3 - Use SSHD directory-based configuration. Resolves: rhbz#1962564 - Introduce ISM kickstarts Resolves: rhbz#1978290 - Deliver numerous RHEL9 fixes to rules - see related BZs for details. TLDR: Enable remediations by means of platform metadata, enable the RHEL9 GPG rule, introduce the s390x platform, fix the ctrl-alt-del reboot disable, fix grub2 UEFI config file location, address the subscription-manager package merge, and enable and select more rules applicable to RHEL9. Resolves: rhbz#1987227 Resolves: rhbz#1987226 Resolves: rhbz#1987231 Resolves: rhbz#1988289 * Tue Aug 10 2021 Mohan Boddu - 0.1.57-2 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Wed Jul 28 2021 Matej Tyc - 0.1.57-1 - Upgrade to the latest upstream release - Introduce more complete RHEL9 content in terms of rules, profiles and kickstarts. * Wed Jul 07 2021 Matej Tyc - 0.1.56-3 - Introduced the playbooks subpackage. - Enabled CentOS content on CentOS systems. - Solved missing CCEs problem by unselecting problematic rules by means of editing patches or by porting PRs that unselect them. * Mon Jun 28 2021 Matej Tyc - 0.1.56-2 - Enable more RHEL9 rules and introduce RHEL9 profile stubs * Wed May 19 2021 Jan Černý - 0.1.56-1 - Upgrade to the latest upstream release - remove README.md and Contributors.md - remove SCAP component files - remove SCAP 1.2 source data streams - remove HTML guides for the virtual “(default)” profile - remove profile Bash remediation scripts - build only RHEL9 content - remove other products - use autosetup in %prep phase * Fri Apr 16 2021 Mohan Boddu - 0.1.54-3 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Fri Feb 12 2021 Vojtech Polasek - 0.1.54-2 - fix definition of build directory * Fri Feb 05 2021 Vojtech Polasek - 0.1.54-1 - Update to latest upstream SCAP-Security-Guide-0.1.54 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.54 * Wed Jan 27 2021 Fedora Release Engineering - 0.1.53-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Mon Nov 16 2020 Vojtech Polasek - 0.1.53-1 - Update to latest upstream SCAP-Security-Guide-0.1.53 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.53 * Wed Sep 23 2020 Vojtech Polasek - 0.1.52-3 - revert previous rework, it did not solve the problem * Wed Sep 23 2020 Vojtech Polasek - 0.1.52-2 - rewrite solution for CMake out of source builds * Mon Sep 21 2020 Vojtech Polasek - 0.1.52-1 - Update to latest upstream SCAP-Security-Guide-0.1.52 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.52 * Tue Aug 04 2020 Jan Černý - 0.1.51-4 - Update for new CMake out of source builds https://fedoraproject.org/wiki/Changes/CMake_to_do_out-of-source_builds - Fix FTBS in Rawhide/F33 (RHBZ#1863741) * Sat Aug 01 2020 Fedora Release Engineering - 0.1.51-3 - Second attempt - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Wed Jul 29 2020 Fedora Release Engineering - 0.1.51-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Fri Jul 17 2020 Vojtech Polasek - 0.1.51-1 - Update to latest upstream SCAP-Security-Guide-0.1.51 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.51 * Mon Mar 23 2020 Watson Sato - 0.1.49-1 - Update to latest upstream SCAP-Security-Guide-0.1.49 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.49 * Thu Jan 30 2020 Fedora Release Engineering - 0.1.48-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Thu Jan 16 2020 Watson Sato - 0.1.48-1 - Update to latest upstream SCAP-Security-Guide-0.1.48 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.48 * Mon Dec 09 2019 Matěj Týč - 0.1.47-2 - Hotfix of the XML parsing fix. * Mon Dec 09 2019 Matěj Týč - 0.1.47-1 - Update to latest upstream SCAP-Security-Guide-0.1.47 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.47 - Fixed XML parsing of remediation functions. * Mon Jul 29 2019 Watson Sato - 0.1.45-1 - Update to latest upstream SCAP-Security-Guide-0.1.45 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.45 * Fri Jul 26 2019 Fedora Release Engineering - 0.1.44-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Mon May 06 2019 Watson Yuuma Sato - 0.1.44-1 - Update to latest upstream SCAP-Security-Guide-0.1.44 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.44 * Fri Feb 22 2019 Watson Yuuma Sato - 0.1.43-1 - Update to latest upstream SCAP-Security-Guide-0.1.43 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.43 - Update URL and source URL * Sat Feb 02 2019 Fedora Release Engineering - 0.1.42-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Wed Dec 12 2018 Watson Yuuma Sato - 0.1.42-1 - Update to latest upstream SCAP-Security-Guide-0.1.42 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.42 - Fix man page build dependency on derivative content * Mon Oct 01 2018 Watson Yuuma Sato - 0.1.41-1 - Update to latest upstream SCAP-Security-Guide-0.1.41 release: https://github.com/ComplianceAsCode/content/releases/tag/v0.1.41 - Fix Licence of this package * Wed Jul 25 2018 Matěj Týč - 0.1.40-1 - Update to latest upstream SCAP-Security-Guide-0.1.40 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.40 - Update to use Python3 for build. * Sat Jul 14 2018 Fedora Release Engineering - 0.1.39-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild * Fri May 04 2018 Watson Yuuma Sato - 0.1.39-2 - Add python version to python2-jinja2 package * Fri May 04 2018 Watson Yuuma Sato - 0.1.39-1 - Update to latest upstream SCAP-Security-Guide-0.1.39 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.39 * Mon Mar 05 2018 Watson Yuuma Sato - 0.1.38-2 - Add python version to python package prefixes * Mon Mar 05 2018 Watson Yuuma Sato - 0.1.38-1 - Update to latest upstream SCAP-Security-Guide-0.1.38 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.38 * Fri Feb 09 2018 Fedora Release Engineering - 0.1.37-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild * Thu Jan 04 2018 Watson Yuuma Sato - 0.1.37-1 - Update to latest upstream SCAP-Security-Guide-0.1.37 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.37 * Wed Nov 01 2017 Watson Yuuma Sato - 0.1.36-1 - Update to latest upstream SCAP-Security-Guide-0.1.36 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.36 * Tue Aug 29 2017 Watson Sato - 0.1.35-1 - Update to latest upstream SCAP-Security-Guide-0.1.35 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.35 * Thu Jul 27 2017 Fedora Release Engineering - 0.1.34-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild * Mon Jul 03 2017 Watson Sato - 0.1.34-1 - updated to latest upstream release * Mon May 01 2017 Martin Preisler - 0.1.33-1 - updated to latest upstream release * Thu Mar 30 2017 Martin Preisler - 0.1.32-1 - updated to latest upstream release * Sat Feb 11 2017 Fedora Release Engineering - 0.1.31-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild * Mon Nov 28 2016 Martin Preisler - 0.1.31-2 - use make_build and make_install RPM macros * Mon Nov 28 2016 Martin Preisler - 0.1.31-1 - update to the latest upstream release - new default location for content /usr/share/scap/ssg - install HTML tables in the doc subpackage * Mon Jun 27 2016 Jan iankko Lieskovsky - 0.1.30-2 - Correct currently failing parallel SCAP Security Guide build * Mon Jun 27 2016 Jan iankko Lieskovsky - 0.1.30-1 - Update to latest upstream SCAP-Security-Guide-0.1.30 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.30 - Drop shell library for remediation functions since it is not required starting from 0.1.30 release any more * Thu May 05 2016 Jan iankko Lieskovsky - 0.1.29-1 - Update to latest upstream SCAP-Security-Guide-0.1.29 release: https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.29 - Do not ship Firefox/DISCLAIMER documentation file since it has been removed in 0.1.29 upstream release * Thu Feb 04 2016 Fedora Release Engineering - 0.1.28-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild * Wed Jan 20 2016 Šimon Lukašík - 0.1.28-1 - upgrade to the latest upstream release * Fri Dec 11 2015 Šimon Lukašík - 0.1.27-1 - update to the latest upstream release * Tue Oct 20 2015 Šimon Lukašík - 0.1.26-1 - update to the latest upstream release * Sat Sep 05 2015 Šimon Lukašík - 0.1.25-1 - update to the latest upstream release * Thu Jul 09 2015 Šimon Lukašík - 0.1.24-1 - update to the latest upstream release - created doc sub-package to ship all the guides - start distributing centos and scientific linux content - rename java content to jre * Fri Jun 19 2015 Fedora Release Engineering - 0.1.22-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild * Tue May 05 2015 Šimon Lukašík - 0.1.22-1 - update to the latest upstream release - only DataStream file is now available for Fedora - start distributing security baseline for Firefox - start distributing security baseline for Java RunTime deployments * Wed Mar 04 2015 Šimon Lukašík - 0.1.21-1 - update to the latest upstream release - move content to /usr/share/scap/ssg/content * Thu Oct 02 2014 Šimon Lukašík - 0.1.19-1 - update to the latest upstream release * Mon Jul 14 2014 Šimon Lukašík - 0.1.5-4 - require only openscap-scanner, not whole openscap-utils package * Tue Jul 01 2014 Šimon Lukašík - 0.1.5-3 - Rebase the RHEL part of SSG to the latest upstream version (0.1.18) - Add STIG DISCLAIMER to the shipped documentation * Sun Jun 08 2014 Fedora Release Engineering - 0.1.5-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Thu Feb 27 2014 Jan iankko Lieskovsky 0.1.5-1 - Fix fedora-srpm and fedora-rpm Make targets to work again - Include RHEL-6 and RHEL-7 datastream files to support remote RHEL system scans - EOL for Fedora 18 support - Include Fedora datastream file for remote Fedora system scans * Mon Jan 06 2014 Jan iankko Lieskovsky 0.1.4-2 - Drop -compat package, provide openscap-content directly (RH BZ#1040335#c14) * Fri Dec 20 2013 Jan iankko Lieskovsky 0.1.4-1 - Fix remediation for sshd set keepalive (ClientAliveCountMax) and move it to /shared - Add shared remediations for sshd disable empty passwords and sshd set idle timeout - Shared remediation for sshd disable root login - Add empty -compat subpackage to ensure backward-compatibility with openscap-content and firstaidkit-plugin-openscap packages (RH BZ#1040335) - OVAL check for sshd disable root login - Fix typo in OVAL check for sshd disable empty passwords - OVAL check for sshd disable empty passwords - Unselect no shelllogin for systemaccounts rule from being run by default - Rename XCCDF rules - Revert Set up Fedora release name and CPE based on build system properties - Shared OVAL check for Verify that Shared Library Files Have Root Ownership - Shared OVAL check for Verify that System Executables Have Restrictive Permissions - Shared OVAL check for Verify that System Executables Have Root Ownership - Shared OVAL check for Verify that Shared Library Files Have Restrictive Permissions - Fix remediation for Disable Prelinking rule - OVAL check and remediation for sshd's ClientAliveCountMax rule - OVAL check for sshd's ClientAliveInterval rule - Include descriptions for permissions section, and rules for checking permissions and ownership of shared library files and system executables - Disable selected rules by default - Add remediation for Disable Prelinking rule - Adjust service-enable-macro, service-disable-macro XSLT transforms definition to evaluate to proper systemd syntax - Fix service_ntpd_enabled OVAL check make validate to pass again - Include patch from Šimon Lukašík to obsolete openscap-content package (RH BZ#1028706) - Add OVAL check to test if there's is remote NTP server configured for time data - Add system settings section for the guide (to track system wide hardening configurations) - Include disable prelink rule and OVAL check for it - Initial OVAL check if ntpd service is enabled. Add package_installed OVAL templating directory structure and functionality. - Include services section, and XCCDF description for selected ntpd's sshd's service rules - Include remediations for login.defs' based password minimum, maximum and warning age rules - Include directory structure to support remediations - Add SCAP "replace or append pattern value in text file based on variable" remediation script generator - Add remediation for "Set Password Minimum Length in login.defs" rule * Mon Nov 18 2013 Jan iankko Lieskovsky 0.1.3-1 - Update versioning scheme - move fedorassgrelease to be part of upstream version. Rename it to fedorassgversion to avoid name collision with Fedora package release. * Tue Oct 22 2013 Jan iankko Lieskovsky 0.1-3 - Add .gitignore for Fedora output directory - Set up Fedora release name and CPE based on build system properties - Use correct file paths in scap-security-guide(8) manual page (RH BZ#1018905, c#10) - Apply further changes motivated by scap-security-guide Fedora RPM review request (RH BZ#1018905, c#8): * update package description, * make content files to be owned by the scap-security-guide package, * remove Fedora release number from generated content files, * move HTML form of the guide under the doc directory (together with that drop fedora/content subdir and place the content directly under fedora/ subdir). - Fixes for scap-security-guide Fedora RPM review request (RH BZ#1018905): * drop Fedora release from package provided files' final path (c#5), * drop BuildRoot, selected Requires:, clean section, drop chcon for manual page, don't gzip man page (c#4), * change package's description (c#4), * include PD license text (#c4). * Mon Oct 14 2013 Jan iankko Lieskovsky 0.1-2 - Provide manual page for scap-security-guide - Remove percent sign from spec's changelog to silence rpmlint warning - Convert RHEL6 'Restrict Root Logins' section's rules to Fedora - Convert RHEL6 'Set Password Expiration Parameter' rules to Fedora - Introduce 'Account and Access Control' section - Convert RHEL6 'Verify Proper Storage and Existence of Password Hashes' section's rules to Fedora - Set proper name of the build directory in the spec's setup macro. - Replace hard-coded paths with macros. Preserve attributes when copying files. * Tue Sep 17 2013 Jan iankko Lieskovsky 0.1-1 - Initial Fedora SSG RPM.