-
Notifications
You must be signed in to change notification settings - Fork 718
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement] [BugFix] Port selected audit DAC && time rules to RHEL-7 && Fedora systems #536
[Enhancement] [BugFix] Port selected audit DAC && time rules to RHEL-7 && Fedora systems #536
Conversation
…&& Fedora Testing report: --------------- Verified manually on both products the proposed change works fine
…ification rule to reflect the fact there are two locations where the settings can be applied Testing report: --------------- Have built the updated guide on both products manually && verified the prose contains the expected form
…cation OVAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products the OVAL check works fine for both (auditctl && augenrules) cases
…config_modification rule to reflect the fact there are two possible locations where the settings can be applied Testing report: --------------- Have built the guide manually for both products && verified the updated prose has expected form on both of them
check in the common profile for both products
… OVAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products the proposed check works fine
* audit_rules_usergroup_modification, and * audit_rules_time_watch_localtime rules to reflect the fact there are two possible locations where the setting can be applied. Testing report: --------------- Have built the guide manually on both products && verified the updated prose has the expected form.
…VAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually the proposed checks works fine on both products (for both auditctl && augenrules cases)
…ock_settime to reflect the fact there are two locations where the setting can be applied Testing report: --------------- Have built the guide for both products manually && verified the updated prose has the expected form
to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products (RHEL-7 && Fedora 20) the check works fine
…&& Fedora Testing report: --------------- Verified manually on both products the proposed change works fine
…ification rule to reflect the fact there are two locations where the settings can be applied Testing report: --------------- Have built the updated guide on both products manually && verified the prose contains the expected form
…cation OVAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products the OVAL check works fine for both (auditctl && augenrules) cases
…config_modification rule to reflect the fact there are two possible locations where the settings can be applied Testing report: --------------- Have built the guide manually for both products && verified the updated prose has expected form on both of them
check in the common profile for both products
… OVAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products the proposed check works fine
* audit_rules_usergroup_modification, and * audit_rules_time_watch_localtime rules to reflect the fact there are two possible locations where the setting can be applied. Testing report: --------------- Have built the guide manually on both products && verified the updated prose has the expected form.
…VAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually the proposed checks works fine on both products (for both auditctl && augenrules cases)
…ock_settime to reflect the fact there are two locations where the setting can be applied Testing report: --------------- Have built the guide for both products manually && verified the updated prose has the expected form
to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products (RHEL-7 && Fedora 20) the check works fine
…ty-guide into even_more_rhel7_audit
…e_stime rule to reflect the fact there are two possible locations where the setting can be applied Testing report: --------------- Have built the updated guide for both products manually && verified the updated prose for the *_stime rule contains expected form for both products
OVAL check to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products the ported check works as expected
…ttimeofday rule to: * reflect the fact there are two possible locations, where the setting can be applied, * correct the arch recommendation (current version recommends b32 rule form for 32-bit arch, and b64 rule form for 64-bit arch. But it should be b32 rule form for 32-bit arch, and *both* b32 and b64 rule forms for 64-bit arch, since according to ausyscall settimeofday() system call has different numbers on 32-bit vs 64-bit audit tables, therefore on a 64-bit system to track both 32-bit & 64-bit calls we need to write two rules). Testing report: --------------- Have built updated guides on both products && verified the *_settimeofday rule prose contains the expected form
…heck to RHEL-7 && Fedora Testing report: --------------- Verified manually on both products (RHEL-7 && Fedora 20) it works as expected (see test_attestations)
…jtimex rule to: * reflect the fact there are two possible locations where the setting can be applied, * correct the recommendation for 64-bit architecture (on 64-bit system both b32 && b64 form audit rule versions need to be present since adjtimex has different audit syscall table numbers for i386 and x86_64 architectures, * drop couple of space characters at end of line in selected descriptions.
satisfies common requirements. | ||
The following example from Fedora Documentation available at | ||
satisfies common requirements. | ||
The following example from Fedora Documentation available at | ||
<tt>http://docs.fedoraproject.org/en-US/Fedora/13/html/Security-Enhanced_Linux/sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages.html</tt> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* ComplianceAsCode#536 (comment) (update raw audit messages explanation URL), * ComplianceAsCode#536 (comment) (update audit_rules_time_stime rule's XCCDF prose to more explicitly reflect the "-F arch=b64" rule form is not required on 64 bit systems), * perform couple of s/lines/line/ replacements
@shawndwells
Feel free to re-review. Thank you for catching those issues! Jan |
Kind bump for re-review -- anyone? |
@iankko I will take it. |
@iankko looks like |
…k.py script too Don't include the underlying OVAL entity ID when creating final OVAL XML check file via testcheck.py script in the case particular OVAL entity (definition, object, state, or variable) with the same ID has been already included in the check. This prevents creation of an invalid OVAL content file. Fixes issue reported by Gabe Alford in: ComplianceAsCode#536 (comment)
Thanks. I was able to reproduce the issue. The problem is the I have fixed this issue by submitting a new PR: Margin note: As mentioned e.g. in
It's not possible to use just one occurrence of the The issue should be fixed now (under assumption change from #547 is applied together with the changes from this PR). |
Ack. Will merge this one after #547 is merged. |
#547 has been merged, so I am merging this one as well. |
[Enhancement] [BugFix] Port selected audit DAC && time rules to RHEL-7 && Fedora systems
Thank you. |
This patchset ports the following audit DAC and time modification rules:
audit_rules_mac_modification
,audit_rules_networkconfig_modification
,audit_rules_time_watch_localtime
,audit_rules_time_clock_settime
,audit_rules_time_stime
,audit_rules_time_settimeofday
, andaudit_rules_time_adjtimex
to RHEL-7 && Fedora operating systems.
Note: The
audit_rules_usergroup_modification
has been previously ported to RHEL-7 && Fedora by Shawn, so it was just enabled to be called by default in thecommon
profile for both of the products.Porting of each rule consists of two corresponding commits:
augenrules
vsauditctl
tools to load audit rule entries into final/etc/audit/audit.rules
file respectively).Testing report:
Each of the committed changes (the OVAL check port, and also the XCCDF text / prose update) has been tested prior commit on Red Hat Enterprise Linux 7 and Fedora 20 x86_64 architecture based systems, and AFAICT both of the changes for each rule are fine (the OVAL check works for both auditctl && augenrules tools, subsequently the XCCDF prose update is shown in the guide built for that product).
Please review.
Thank you, Jan.