Guide to the Secure Configuration of Red Hat Enterprise Linux 6
with profile United States Government Configuration Baseline (USGCB)
scap-security-guide
package which is developed at
http://fedorahosted.org/scap-security-guide.
Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settings, with its associated references to higher-level security control catalogs, in order to assist them in security baseline creation. This guide is a catalog, not a checklist, and satisfaction of every item is not likely to be possible or sensible in any operational scenario. However, the XCCDF format enables granular selection and adjustment of settings, and their association with OVAL and OCIL content provides an automated checking capability. Transformations of this document, and its associated automated checking content, are capable of providing baselines that meet a diverse set of policy objectives. Some example XCCDF Profiles, which are selections of items that form checklists and can be used as baselines, are available with this guide. They can be processed, in an automated fashion, with tools that support the Security Content Automation Protocol (SCAP). The DISA STIG for RHEL 6, which provides required settings for US Department of Defense systems, is one example of a baseline created from this guidance.
Evaluation Characteristics
Target machine | localhost.localdomain |
---|---|
Benchmark URL | /tmp/tmp.rMIVmr94bL |
Benchmark ID | xccdf_org.ssgproject.content_benchmark_RHEL-6 |
Profile ID | xccdf_org.ssgproject.content_profile_usgcb-rhel6-server |
Started at | 2015-08-22T01:29:00 |
Finished at | 2015-08-22T01:36:05 |
Performed by | msrubar |
CPE Platforms
- cpe:/o:redhat:enterprise_linux:6
- cpe:/o:redhat:enterprise_linux:6::client
Addresses
- IPv4 127.0.0.1
- IPv4 192.168.122.31
- IPv6 0:0:0:0:0:0:0:1
- IPv6 fe80:0:0:0:5054:ff:febf:46ad
- MAC 00:00:00:00:00:00
- MAC 52:54:00:BF:46:AD
Compliance and Scoring
Rule results
Severity of failed rules
Score
Scoring system | Score | Maximum | Percent |
---|---|---|---|
urn:xccdf:scoring:default | 57.476181 | 100.000000 |
Rule Overview
Result Details
Ensure /tmp Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_tmp | ||
Result | fail | ||
Time | 2015-08-22T01:29:01 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26435-8 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 1208, test_attestation | ||
Description |
The | ||
Rationale |
The | ||
OVAL details Items not found violating /tmp on own partition:Object oval:ssg:obj:1501 of type partition_object
|
Ensure /var Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_var | ||
Result | fail | ||
Time | 2015-08-22T01:29:01 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26639-5 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 1208, test_attestation | ||
Description | The | ||
Rationale |
Ensuring that | ||
OVAL details Items not found violating /var on own partition:Object oval:ssg:obj:2047 of type partition_object
|
Ensure /var/log Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_var_log | ||
Result | fail | ||
Time | 2015-08-22T01:29:01 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26215-4 references: AU-9, 1208, test_attestation | ||
Description |
System logs are stored in the | ||
Rationale |
Placing | ||
OVAL details Items not found violating /var/log on own partition:Object oval:ssg:obj:2088 of type partition_object
|
Ensure /var/log/audit Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_var_log_audit | ||
Result | fail | ||
Time | 2015-08-22T01:29:01 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26436-6 | ||
Description |
Audit logs are stored in the | ||
Rationale |
Placing | ||
OVAL details Items not found violating check for /var/log/audit partition:Object oval:ssg:obj:1451 of type partition_object
|
Ensure /home Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_home | ||
Result | fail | ||
Time | 2015-08-22T01:29:01 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26557-9 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 1208, test_attestation | ||
Description |
If user home directories will be stored locally, create a separate partition
for | ||
Rationale |
Ensuring that | ||
OVAL details Items not found violating /home on own partition:Object oval:ssg:obj:2207 of type partition_object
|
Encrypt Partitions
Rule ID | xccdf_org.ssgproject.content_rule_encrypt_partitions |
Result | notselected |
Time | 2015-08-22T01:29:01 |
Severity | low |
Identifiers and References | identifiers: CCE-27596-6 |
Description |
Red Hat Enterprise Linux 6 natively supports partition encryption through the
Linux Unified Key Setup-on-disk-format (LUKS) technology. The easiest way to
encrypt a partition is during installation time.
part / --fstype=ext3 --size=100 --onpart=hda1 --encrypted --passphrase=PASSPHRASEAny PASSPHRASE is stored in the Kickstart in plaintext, and the Kickstart must then be protected accordingly. Omitting the --passphrase= option from the partition definition will cause the
installer to pause and interactively ask for the passphrase during installation.
Detailed information on encrypting partitions using LUKS can be found on the Red Hat Documentation web site: https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html |
Rationale | The risk of a system's physical compromise, particularly mobile systems such as laptops, places its data at risk of compromise. Encrypting this data mitigates the risk of its loss if the system is lost. |
Ensure Red Hat GPG Key Installed
Rule ID | xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed | ||||||||||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:29:01 | ||||||||||||||||||||||||||||||||
Severity | high | ||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26506-6 references: SI-7, MA-1(b), 351, test_attestation | ||||||||||||||||||||||||||||||||
Description | To ensure the system can cryptographically verify base software packages come from Red Hat (and to connect to the Red Hat Network to receive them), the Red Hat GPG key must properly be installed. To install the Red Hat GPG key, run: $ sudo rhn_registerIf the system is not connected to the Internet or an RHN Satellite, then install the Red Hat GPG key from trusted media such as the Red Hat installation CD-ROM or DVD. Assuming the disc is mounted in /media/cdrom , use the following command as the root user to import
it into the keyring:
$ sudo rpm --import /media/cdrom/RPM-GPG-KEY | ||||||||||||||||||||||||||||||||
Rationale | The Red Hat GPG key is necessary to cryptographically verify packages are from Red Hat. | ||||||||||||||||||||||||||||||||
OVAL details Items found violating Red Hat release key package is installed:
Items found violating Red Hat auxiliary key package is installed:
|
Ensure gpgcheck Enabled In Main Yum Configuration
Rule ID | xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated | ||||
Result | pass | ||||
Time | 2015-08-22T01:29:01 | ||||
Severity | high | ||||
Identifiers and References | identifiers: CCE-26709-6 references: SI-7, MA-1(b), 352, 663, test_attestation | ||||
Description | The gpgcheck=1 | ||||
Rationale | Ensuring the validity of packages' cryptographic signatures prior to installation ensures the authenticity of the software and protects against malicious tampering. | ||||
OVAL details Items found satisfying check value of gpgcheck in /etc/yum.conf:
|
Ensure gpgcheck Enabled For All Yum Package Repositories
Rule ID | xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled | ||||
Result | fail | ||||
Time | 2015-08-22T01:29:01 | ||||
Severity | high | ||||
Identifiers and References | identifiers: CCE-26647-8 references: SI-7, MA-1(b), 352, 663, test_attestation | ||||
Description | To ensure signature checking is not disabled for
any repos, remove any lines from files in gpgcheck=0 | ||||
Rationale | Ensuring all packages' cryptographic signatures are valid prior to installation ensures the authenticity of the software and protects against malicious tampering. | ||||
OVAL details Items found violating check for existence of gpgcheck=0 in /etc/yum.repos.d/ files:
|
Ensure Software Patches Installed
Rule ID | xccdf_org.ssgproject.content_rule_security_patches_up_to_date |
Result | notchecked |
Time | 2015-08-22T01:29:01 |
Severity | high |
Identifiers and References | identifiers: CCE-27635-2 references: SI-2, MA-1(b), 1227, 1233, test_attestation |
Description | If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or a yum server, run the following command to install updates: $ sudo yum updateIf the system is not configured to use one of these sources, updates (in the form of RPM packages) can be manually downloaded from the Red Hat Network and installed using rpm .
|
Rationale | Installing software updates is a fundamental mitigation against the exploitation of publicly-known vulnerabilities. |
Install AIDE
Rule ID | xccdf_org.ssgproject.content_rule_package_aide_installed | ||
Result | error | ||
Time | 2015-08-22T01:36:04 | ||
Severity | medium | ||
Identifiers and References | identifiers: CCE-27024-9 references: CM-3(d), CM-3(e), CM-6(d), SC-28, SI-7, 1069, test_attestation | ||
Description | Install the AIDE package with the command: $ sudo yum install aide | ||
Rationale | The AIDE package must be installed if it is to be available for integrity checking. | ||
OVAL details Items not found violating package aide is installed:Object oval:ssg:obj:2066 of type rpminfo_object
| |||
Remediation script:
|
Disable Prelinking
Rule ID | xccdf_org.ssgproject.content_rule_disable_prelink | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:29:01 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27221-1 | ||||||
Description |
The prelinking feature changes binaries in an attempt to decrease their startup
time. In order to disable it, change or add the following line inside the file
PRELINKING=noNext, run the following command to return binaries to a normal, non-prelinked state: $ sudo /usr/sbin/prelink -ua | ||||||
Rationale | The prelinking feature can interfere with the operation of AIDE, because it changes binaries. | ||||||
OVAL details Items not found violating Tests whether prelinking is disabled:Object oval:ssg:obj:1580 of type textfilecontent54_object
|
Build and Test AIDE Database
Rule ID | xccdf_org.ssgproject.content_rule_aide_build_database |
Result | notselected |
Time | 2015-08-22T01:29:01 |
Severity | medium |
Identifiers and References | identifiers: CCE-27135-3 references: CM-3(d), CM-3(e), CM-6(d), SC-28, SI-7, 374, 416, 1069, 1263, 1297, 1589 |
Description | Run the following command to generate a new database: $ sudo /usr/sbin/aide --initBy default, the database will be written to the file /var/lib/aide/aide.db.new.gz .
Storing the database, the configuration file /etc/aide.conf , and the binary
/usr/sbin/aide (or hashes of these files), in a secure location (such as on read-only media) provides additional assurance about their integrity.
The newly-generated database can be installed as follows:
$ sudo cp /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gzTo initiate a manual check, run the following command: $ sudo /usr/sbin/aide --checkIf this check produces any unexpected output, investigate. |
Rationale | For AIDE to be effective, an initial database of "known-good" information about files must be captured and it should be able to be verified against the installed files. |
Configure Periodic Execution of AIDE
Rule ID | xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking | ||||||||||||||
Result | notselected | ||||||||||||||
Time | 2015-08-22T01:29:01 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-27222-9 references: CM-3(d), CM-3(e), CM-6(d), SC-28, SI-7, 374, 416, 1069, 1263, 1297, 1589 | ||||||||||||||
Description |
To implement a daily execution of AIDE at 4:05am using cron, add the following line to 05 4 * * * root /usr/sbin/aide --checkAIDE can be executed periodically through other means; this is merely one example. | ||||||||||||||
Rationale | By default, AIDE does not install itself for periodic execution. Periodically running AIDE is necessary to reveal unexpected changes in installed files. | ||||||||||||||
OVAL details Items not found violating run aide daily with cron:Object oval:ssg:obj:1852 of type textfilecontent54_object
Items not found violating run aide daily with cron:Object oval:ssg:obj:1853 of type textfilecontent54_object
|
Verify File Hashes with RPM
Rule ID | xccdf_org.ssgproject.content_rule_rpm_verify_hashes | ||||||||
Result | pass | ||||||||
Time | 2015-08-22T01:29:31 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27223-7 | ||||||||
Description | The RPM package management system can check the hashes of installed software packages, including many that are important to system security. Run the following command to list which files on the system have hashes that differ from what is expected by the RPM database: $ rpm -Va | grep '^..5'A "c" in the second column indicates that a file is a configuration file, which may appropriately be expected to change. If the file was not expected to change, investigate the cause of the change using audit logs or other means. The package can then be reinstalled to restore the file. Run the following command to determine which package owns the file: $ rpm -qf FILENAMEThe package can be reinstalled from a yum repository using the command: $ sudo yum reinstall PACKAGENAMEAlternatively, the package can be reinstalled from trusted media using the command: $ sudo rpm -Uvh PACKAGENAME | ||||||||
Rationale | The hashes of important files like system executables should match the information given by the RPM database. Executables with erroneous hashes could be a sign of nefarious activity on the system. | ||||||||
OVAL details Items not found satisfying verify file md5 hashes:Object oval:ssg:obj:2071 of type rpmverifyfile_object
|
Install Intrusion Detection Software
Rule ID | xccdf_org.ssgproject.content_rule_install_hids |
Result | notselected |
Time | 2015-08-22T01:29:31 |
Severity | high |
Identifiers and References | identifiers: CCE-27409-2 |
Description |
The base Red Hat platform already includes a sophisticated auditing system that
can detect intruder activity, as well as SELinux, which provides host-based
intrusion prevention capabilities by confining privileged programs and user
sessions which may become compromised. |
Rationale | Host-based intrusion detection tools provide a system-level defense when an intruder gains access to a system or network. |
Install Virus Scanning Software
Rule ID | xccdf_org.ssgproject.content_rule_install_antivirus | ||
Result | notselected | ||
Time | 2015-08-22T01:29:31 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27529-7 | ||
Description | Install virus scanning software, which uses signatures to search for the presence of viruses on the filesystem. The McAfee VirusScan Enterprise for Linux virus scanning tool is provided for DoD systems. Ensure virus definition files are no older than 7 days, or their last release. Configure the virus scanning software to perform scans dynamically on all accessed files. If this is not possible, configure the system to scan all altered files on the system on a daily basis. If the system processes inbound SMTP mail, configure the virus scanner to scan all received mail. | ||
Rationale | Virus scanning software can be used to detect if a system has been compromised by computer viruses, as well as to limit their spread to other systems. | ||
OVAL details Items not found violating AntiVirus package is installed:Object oval:ssg:obj:1318 of type rpminfo_object
|
Add nodev Option to Non-Root Local Partitions
Rule ID | xccdf_org.ssgproject.content_rule_mountopt_nodev_on_nonroot_partitions | ||||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27045-4 references: CM-7 | ||||||||||||||||||||||||||
Description | The | ||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||
OVAL details Items found violating nodev on local filesystems:
|
Add nodev Option to Removable Media Partitions
Rule ID | xccdf_org.ssgproject.content_rule_mountopt_nodev_on_removable_partitions | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26860-7 | ||||||||||||
Description | The | ||||||||||||
Rationale | The only legitimate location for device files is the | ||||||||||||
OVAL details Items not found violating nodev on removable partition:Object oval:ssg:obj:1743 of type partition_object
State oval:ssg:ste:1744 of type partition_state
Items not found violating removable partition /etc/fstab:Object oval:ssg:obj:1745 of type textfilecontent54_object
State oval:ssg:ste:1746 of type textfilecontent54_state
|
Add noexec Option to Removable Media Partitions
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27196-5 | ||||||||||||
Description | The | ||||||||||||
Rationale | Allowing users to execute binaries from removable media such as USB keys exposes the system to potential compromise. | ||||||||||||
OVAL details Items not found violating noexec on removable partition:Object oval:ssg:obj:2191 of type partition_object
State oval:ssg:ste:2192 of type partition_state
Items not found violating removable partition /etc/fstab:Object oval:ssg:obj:2193 of type textfilecontent54_object
State oval:ssg:ste:2194 of type textfilecontent54_state
|
Add nosuid Option to Removable Media Partitions
Rule ID | xccdf_org.ssgproject.content_rule_mountopt_nosuid_on_removable_partitions | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27056-1 | ||||||||||||
Description | The | ||||||||||||
Rationale | The presence of SUID and SGID executables should be tightly controlled. Allowing users to introduce SUID or SGID binaries from partitions mounted off of removable media would allow them to introduce their own highly-privileged programs. | ||||||||||||
OVAL details Items not found violating nosuid on removable partition:Object oval:ssg:obj:1624 of type partition_object
State oval:ssg:ste:1625 of type partition_state
Items not found violating removable partition /etc/fstab:Object oval:ssg:obj:1626 of type textfilecontent54_object
State oval:ssg:ste:1627 of type textfilecontent54_state
|
Add nodev Option to /tmp
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev | ||||
Result | fail | ||||
Time | 2015-08-22T01:29:31 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-26499-4 | ||||
Description |
The | ||||
Rationale | The only legitimate location for device files is the | ||||
OVAL details Items not found violating nodev on /tmp:Object oval:ssg:obj:2277 of type partition_object
State oval:ssg:ste:2278 of type partition_state
|
Add noexec Option to /tmp
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec | ||||
Result | fail | ||||
Time | 2015-08-22T01:29:31 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-26720-3 | ||||
Description | The | ||||
Rationale | Allowing users to execute binaries from world-writable directories
such as | ||||
OVAL details Items not found violating noexec on /tmp:Object oval:ssg:obj:1319 of type partition_object
State oval:ssg:ste:1320 of type partition_state
|
Add nosuid Option to /tmp
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid | ||||
Result | fail | ||||
Time | 2015-08-22T01:29:31 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-26762-5 | ||||
Description | The | ||||
Rationale | The presence of SUID and SGID executables should be tightly controlled. Users should not be able to execute SUID or SGID binaries from temporary storage partitions. | ||||
OVAL details Items not found violating nosuid on /tmp:Object oval:ssg:obj:1594 of type partition_object
State oval:ssg:ste:1595 of type partition_state
|
Add nodev Option to /dev/shm
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev | ||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26778-1 | ||||||||||||||||||||||
Description | The | ||||||||||||||||||||||
Rationale | The only legitimate location for device files is the | ||||||||||||||||||||||
OVAL details Items found violating nodev on /dev/shm:
|
Add noexec Option to /dev/shm
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec | ||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26622-1 | ||||||||||||||||||||||
Description | The | ||||||||||||||||||||||
Rationale | Allowing users to execute binaries from world-writable directories
such as | ||||||||||||||||||||||
OVAL details Items found violating noexec on /dev/shm:
|
Add nosuid Option to /dev/shm
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid | ||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26486-1 | ||||||||||||||||||||||
Description | The | ||||||||||||||||||||||
Rationale | The presence of SUID and SGID executables should be tightly controlled. Users should not be able to execute SUID or SGID binaries from temporary storage partitions. | ||||||||||||||||||||||
OVAL details Items found violating nosuid on /dev/shm:
|
Bind Mount /var/tmp To /tmp
Rule ID | xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind_var | ||||||||
Result | fail | ||||||||
Time | 2015-08-22T01:29:31 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-26582-7 references: CM-7 | ||||||||
Description | The /tmp /var/tmp none rw,nodev,noexec,nosuid,bind 0 0See the mount(8) man page for further explanation of bind mounting.
| ||||||||
Rationale | Having multiple locations for temporary storage is not required. Unless absolutely
necessary to meet requirements, the storage location | ||||||||
OVAL details Items not found violating Ensure /var/tmp is mounted:Object oval:ssg:obj:2272 of type partition_object
Items not found violating Ensure bind mount option is on /var/tmp:Object oval:ssg:obj:2273 of type textfilecontent54_object
|
Disable Modprobe Loading of USB Storage Driver
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled | ||||||||||||||
Result | notselected | ||||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-27016-5 | ||||||||||||||
Description |
To prevent USB storage devices from being used, configure the kernel module loading system
to prevent automatic loading of the USB storage driver.
To configure the system to prevent the install usb-storage /bin/falseThis will prevent the modprobe program from loading the usb-storage
module, but will not prevent an administrator (or another program) from using the
insmod program to load the module manually. | ||||||||||||||
Rationale | USB storage devices such as thumb drives can be used to introduce malicious software. | ||||||||||||||
OVAL details Items not found violating kernel module usb-storage disabled:Object oval:ssg:obj:1325 of type textfilecontent54_object
Items not found violating kernel module usb-storage disabled in /etc/modprobe.conf:Object oval:ssg:obj:1326 of type textfilecontent54_object
|
Disable Kernel Support for USB via Bootloader Configuration
Rule ID | xccdf_org.ssgproject.content_rule_bootloader_nousb_argument | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:29:31 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27011-6 | ||||||||
Description |
All USB support can be disabled by adding the kernel /vmlinuz-VERSION ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet nousbWARNING: Disabling all kernel support for USB will cause problems for systems with USB-based keyboards, mice, or printers. This configuration is infeasible for systems which require USB devices, which is common. | ||||||||
Rationale | Disabling the USB subsystem within the Linux kernel at system boot will protect against potentially malicious USB devices, although it is only practical in specialized systems. | ||||||||
OVAL details Items not found violating look for argument 'nousb' in the kernel line in /etc/grub.conf:Object oval:ssg:obj:1918 of type textfilecontent54_object
|
Disable Booting from USB Devices in Boot Firmware
Rule ID | xccdf_org.ssgproject.content_rule_bios_disable_usb_boot |
Result | notselected |
Time | 2015-08-22T01:29:31 |
Severity | low |
Identifiers and References | identifiers: CCE-26923-3 |
Description | Configure the system boot firmware (historically called BIOS on PC systems) to disallow booting from USB drives. |
Rationale | Booting a system from a USB device would allow an attacker to circumvent any security measures provided by the operating system. Attackers could mount partitions and modify the configuration of the OS. |
Assign Password to Prevent Changes to Boot Firmware Configuration
Rule ID | xccdf_org.ssgproject.content_rule_bios_assign_password |
Result | notselected |
Time | 2015-08-22T01:29:31 |
Severity | low |
Identifiers and References | identifiers: CCE-27131-2 |
Description | Assign a password to the system boot firmware (historically called BIOS on PC systems) to require a password for any configuration changes. |
Rationale | Assigning a password to the system boot firmware prevents anyone with physical access from configuring the system to boot from local media and circumvent the operating system's access controls. For systems in physically secure locations, such as a data center or Sensitive Compartmented Information Facility (SCIF), this risk must be weighed against the risk of administrative personnel being unable to conduct recovery operations in a timely fashion. |
Disable the Automounter
Rule ID | xccdf_org.ssgproject.content_rule_service_autofs_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26976-1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig autofs off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Disabling the automounter permits the administrator to
statically control filesystem mounting through | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Disable GNOME Automounting
Rule ID | xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount | ||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27035-5 | ||||||||||||||||||||||||
Description | The system's default desktop environment, GNOME, will mount devices and removable media (such as DVDs, CDs and USB flash drives) whenever they are inserted into the system. Disable automount and autorun within GNOME by running the following: $ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type bool \ --set /apps/nautilus/preferences/media_automount false $ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type bool \ --set /apps/nautilus/preferences/media_autorun_never true | ||||||||||||||||||||||||
Rationale | Disabling automatic mounting in GNOME can prevent the introduction of malware via removable media. It will, however, also prevent desktop users from legitimate use of removable media. | ||||||||||||||||||||||||
OVAL details Items not found violating Disable automount in GNOME:Object oval:ssg:obj:1960 of type xmlfilecontent_object
State oval:ssg:ste:1961 of type xmlfilecontent_state
Items not found violating Disable automount in GNOME:Object oval:ssg:obj:1962 of type xmlfilecontent_object
State oval:ssg:ste:1961 of type xmlfilecontent_state
Items not found violating Disable autorun in GNOME:Object oval:ssg:obj:1963 of type xmlfilecontent_object
State oval:ssg:ste:1964 of type xmlfilecontent_state
Items not found violating Disable autorun in GNOME:Object oval:ssg:obj:1965 of type xmlfilecontent_object
State oval:ssg:ste:1964 of type xmlfilecontent_state
|
Disable Mounting of cramfs
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26340-0 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install cramfs /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module cramfs disabled:Object oval:ssg:obj:2115 of type textfilecontent54_object
Items not found violating kernel module cramfs disabled in /etc/modprobe.conf:Object oval:ssg:obj:2116 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable Mounting of freevxfs
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26544-7 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install freevxfs /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module freevxfs disabled:Object oval:ssg:obj:2089 of type textfilecontent54_object
Items not found violating kernel module freevxfs disabled in /etc/modprobe.conf:Object oval:ssg:obj:2090 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable Mounting of jffs2
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26670-0 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install jffs2 /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module jffs2 disabled:Object oval:ssg:obj:1773 of type textfilecontent54_object
Items not found violating kernel module jffs2 disabled in /etc/modprobe.conf:Object oval:ssg:obj:1774 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable Mounting of hfs
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26800-3 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install hfs /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module hfs disabled:Object oval:ssg:obj:1849 of type textfilecontent54_object
Items not found violating kernel module hfs disabled in /etc/modprobe.conf:Object oval:ssg:obj:1850 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable Mounting of hfsplus
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26361-6 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install hfsplus /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module hfsplus disabled:Object oval:ssg:obj:2069 of type textfilecontent54_object
Items not found violating kernel module hfsplus disabled in /etc/modprobe.conf:Object oval:ssg:obj:2070 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable Mounting of squashfs
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26404-4 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install squashfs /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module squashfs disabled:Object oval:ssg:obj:1648 of type textfilecontent54_object
Items not found violating kernel module squashfs disabled in /etc/modprobe.conf:Object oval:ssg:obj:1649 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable Mounting of udf
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26677-5 references: CM-7 | ||||||||||||||
Description |
To configure the system to prevent the install udf /bin/falseThis effectively prevents usage of this uncommon filesystem. | ||||||||||||||
Rationale | Linux kernel modules which implement filesystems that are not needed by the local system should be disabled. | ||||||||||||||
OVAL details Items not found violating kernel module udf disabled:Object oval:ssg:obj:1554 of type textfilecontent54_object
Items not found violating kernel module udf disabled in /etc/modprobe.conf:Object oval:ssg:obj:1555 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable All GNOME Thumbnailers
Rule ID | xccdf_org.ssgproject.content_rule_disable_gnome_thumbnailers | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27224-5 references: CM-7 | ||||||||||||
Description | The system's default desktop environment, GNOME, uses a number of different thumbnailer programs to generate thumbnails for any new or modified content in an opened folder. The following command can disable the execution of these thumbnail applications: $ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type bool \ --set /desktop/gnome/thumbnailers/disable_all trueThis effectively prevents an attacker from gaining access to a system through a flaw in GNOME's Nautilus thumbnail creators. | ||||||||||||
Rationale | An attacker with knowledge of a flaw in a GNOME thumbnailer application could craft a malicious file to exploit this flaw. Assuming the attacker could place the malicious file on the local filesystem (via a web upload for example) and assuming a user browses the same location using Nautilus, the malicious file would exploit the thumbnailer with the potential for malicious code execution. It is best to disable these thumbnailer applications unless they are explicitly required. | ||||||||||||
OVAL details Items not found violating Disable thumbnailers in GNOME:Object oval:ssg:obj:1939 of type xmlfilecontent_object
State oval:ssg:ste:1940 of type xmlfilecontent_state
Items not found violating Disable thumbnailers in GNOME:Object oval:ssg:obj:1941 of type xmlfilecontent_object
State oval:ssg:ste:1940 of type xmlfilecontent_state
|
Verify User Who Owns shadow File
Rule ID | xccdf_org.ssgproject.content_rule_userowner_shadow_file | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26947-2 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the owner of # chown root/etc/shadow | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing user ownership of /etc/shadow:
|
Verify Group Who Owns shadow File
Rule ID | xccdf_org.ssgproject.content_rule_groupowner_shadow_file | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26967-0 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the group owner of # chgrp root/etc/shadow | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing group ownership /etc/shadow:
|
Verify User Who Owns group File
Rule ID | xccdf_org.ssgproject.content_rule_file_owner_etc_group | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26822-7 references: AC-6, test_attestation | ||||||||||||
Description |
To properly set the owner of # chown root/etc/group | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing user ownership:
|
Verify Group Who Owns group File
Rule ID | xccdf_org.ssgproject.content_rule_file_groupowner_etc_group | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26930-8 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the group owner of # chgrp root/etc/group | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing group ownership:
|
Verify User Who Owns gshadow File
Rule ID | xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-27026-4 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the owner of # chown root/etc/gshadow | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing gshadow ownership:
|
Verify Group Who Owns gshadow File
Rule ID | xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26975-3 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the group owner of # chgrp root/etc/gshadow | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing gshadow ownership:
|
Verify User Who Owns passwd File
Rule ID | xccdf_org.ssgproject.content_rule_file_owner_etc_passwd | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26953-0 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the owner of # chown root/etc/passwd | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing user ownership:
|
Verify Group Who Owns passwd File
Rule ID | xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26856-5 references: AC-6, 225, test_attestation | ||||||||||||
Description |
To properly set the group owner of # chgrp root/etc/passwd | ||||||||||||
Rationale | The | ||||||||||||
OVAL details Items found satisfying Testing group ownership of /etc/passwd:
|
Verify that Shared Library Files Have Root Ownership
Rule ID | xccdf_org.ssgproject.content_rule_file_ownership_library_dirs | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-27424-1 references: AC-6, 1499, test_attestation | ||||||||||||
Description | System-wide shared library files, which are linked to executables during process load time or run time, are stored in the following directories by default: /lib /lib64 /usr/lib /usr/lib64Kernel modules, which can be added to the kernel during runtime, are also stored in /lib/modules . All files in these directories should be
owned by the root user. If the directory, or any file in these
directories, is found to be owned by a user other than root correct its
ownership with the following command:
$ sudo chown root FILE | ||||||||||||
Rationale | Files from shared library directories are loaded into the address space of processes (including privileged ones) or of the kernel itself at runtime. Proper ownership is necessary to protect the integrity of the system. | ||||||||||||
OVAL details Items not found violating library directories uid root:Object oval:ssg:obj:2179 of type file_object
Items not found violating library files uid root:Object oval:ssg:obj:2180 of type file_object
|
Verify that System Executables Have Root Ownership
Rule ID | xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:29:31 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-27623-8 | ||||||||||||
Description | System executables are stored in the following directories by default: /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbinAll files in these directories should be owned by the root user.
If any file FILE in these directories is found
to be owned by a user other than root, correct its ownership with the
following command:
$ sudo chown root FILE | ||||||||||||
Rationale | System binaries are executed by privileged users as well as system services, and restrictive permissions are necessary to ensure that their execution of these programs cannot be co-opted. | ||||||||||||
OVAL details Items not found violating binary directories uid root:Object oval:ssg:obj:1435 of type file_object
Items not found violating binary files uid root:Object oval:ssg:obj:1436 of type file_object
|
Verify that All World-Writable Directories Have Sticky Bits Set
Rule ID | xccdf_org.ssgproject.content_rule_sticky_world_writable_dirs | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:29:32 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26840-9 references: AC-6, test_attestation | ||||||||||||
Description | When the so-called 'sticky bit' is set on a directory,
only the owner of a given file may remove that file from the
directory. Without the sticky bit, any user with write access to a
directory may remove any file in the directory. Setting the sticky
bit prevents users from removing each other's files. In cases where
there is no reason for a directory to be world-writable, a better
solution is to remove that permission rather than to set the sticky
bit. However, if a directory is used by a particular application,
consult that application's documentation instead of blindly
changing modes.
$ sudo chmod +t DIR | ||||||||||||
Rationale |
Failing to set the sticky bit on public directories allows unauthorized users to delete files in the directory structure.
| ||||||||||||
OVAL details Items not found satisfying all local world-writable directories have sticky bit set:Object oval:ssg:obj:1520 of type file_object
State oval:ssg:ste:1521 of type file_state
|
Ensure No World-Writable Files Exist
Rule ID | xccdf_org.ssgproject.content_rule_world_writeable_files | ||||||||||||||
Result | pass | ||||||||||||||
Time | 2015-08-22T01:29:37 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-26910-0 references: AC-6 | ||||||||||||||
Description | It is generally a good idea to remove global (other) write access to a file when it is discovered. However, check with documentation for specific applications before making changes. Also, monitor for recurring world-writable files, as these may be symptoms of a misconfigured application or user account. | ||||||||||||||
Rationale | Data in world-writable files can be modified by any user on the system. In almost all circumstances, files can be configured using a combination of user and group permissions to support whatever legitimate access is needed without the risk caused by world-writable files. | ||||||||||||||
OVAL details Items not found satisfying world writable files:Object oval:ssg:obj:1762 of type file_object
|
Ensure All SGID Executables Are Authorized
Rule ID | xccdf_org.ssgproject.content_rule_no_unpackaged_sgid_files | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:29:41 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26769-0 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||||||
Description | The SGID (set group id) bit should be set only on files that were installed via authorized means. A straightforward means of identifying unauthorized SGID files is determine if any were not installed as part of an RPM package, which is cryptographically verified. Investigate the origin of any unpackaged SGID files. | ||||||||||||
Rationale | Executable files with the SGID permission run with the privileges of the owner of the file. SGID files of uncertain provenance could allow for unprivileged users to elevate privileges. The presence of these files should be strictly controlled on the system. | ||||||||||||
OVAL details Items found violating setgid files outside system RPMs:
|
Ensure All SUID Executables Are Authorized
Rule ID | xccdf_org.ssgproject.content_rule_no_unpackaged_suid_files | ||||||||||
Result | pass | ||||||||||
Time | 2015-08-22T01:29:45 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-26497-8 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||||
Description | The SUID (set user id) bit should be set only on files that were installed via authorized means. A straightforward means of identifying unauthorized SGID files is determine if any were not installed as part of an RPM package, which is cryptographically verified. Investigate the origin of any unpackaged SUID files. | ||||||||||
Rationale | Executable files with the SUID permission run with the privileges of the owner of the file. SUID files of uncertain provenance could allow for unprivileged users to elevate privileges. The presence of these files should be strictly controlled on the system. | ||||||||||
OVAL details Items not found satisfying setuid files outside system RPMs:Object oval:ssg:obj:1442 of type file_object
|
Ensure All Files Are Owned by a User
Rule ID | xccdf_org.ssgproject.content_rule_no_files_unowned_by_user | ||||||||
Result | pass | ||||||||
Time | 2015-08-22T01:29:49 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27032-2 | ||||||||
Description | If any files are not owned by a user, then the cause of their lack of ownership should be investigated. Following this, the files should be deleted or assigned to an appropriate user. | ||||||||
Rationale | Unowned files do not directly imply a security problem, but they are generally a sign that something is amiss. They may be caused by an intruder, by incorrect software installation or draft software removal, or by failure to remove all files belonging to a deleted account. The files should be repaired so they will not cause problems when accounts are created in the future, and the cause should be discovered and addressed. | ||||||||
OVAL details Items not found satisfying Check user ids on all files on the system:Object oval:ssg:obj:2087 of type file_object
|
Ensure All Files Are Owned by a Group
Rule ID | xccdf_org.ssgproject.content_rule_no_files_unowned_by_group | ||||||||
Result | unknown | ||||||||
Time | 2015-08-22T01:35:55 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-26872-2 | ||||||||
Description | If any files are not owned by a group, then the cause of their lack of group-ownership should be investigated. Following this, the files should be deleted or assigned to an appropriate group. | ||||||||
Rationale | Unowned files do not directly imply a security problem, but they are generally a sign that something is amiss. They may be caused by an intruder, by incorrect software installation or draft software removal, or by failure to remove all files belonging to a deleted account. The files should be repaired so they will not cause problems when accounts are created in the future, and the cause should be discovered and addressed. | ||||||||
OVAL details Items not found violating files with no group owner:Object oval:ssg:obj:1766 of type file_object
State oval:ssg:ste:1767 of type file_state
|
Ensure All World-Writable Directories Are Owned by a System Account
Rule ID | xccdf_org.ssgproject.content_rule_world_writable_files_system_ownership | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:35:57 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26642-9 references: AC-6, test_attestation | ||||||||||||
Description | All directories in local partitions which are world-writable should be owned by root or another system account. If any world-writable directories are not owned by a system account, this should be investigated. Following this, the files should be deleted or assigned to an appropriate group. | ||||||||||||
Rationale | Allowing a user account to own a world-writable directory is undesirable because it allows the owner of that directory to remove or replace any files that may be placed in the directory by other users. | ||||||||||||
OVAL details Items not found satisfying check for local directories that are world writable and have uid greater than or equal to 500:Object oval:ssg:obj:2189 of type file_object
State oval:ssg:ste:2190 of type file_state
|
Set Daemon Umask
Rule ID | xccdf_org.ssgproject.content_rule_umask_for_daemons | ||||
Result | error | ||||
Time | 2015-08-22T01:36:05 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-27031-4 references: AC-6, test_attestation | ||||
Description | The file umask 027Setting the umask to too restrictive a setting can cause serious errors at runtime. Many daemons on the system already individually restrict themselves to a umask of 077 in their own init scripts. | ||||
Rationale | The umask influences the permissions assigned to files created by a process at run time. An unnecessarily permissive umask could result in files being created with insecure permissions. | ||||
OVAL details Items found violating Test the retrieved /etc/init.d/functions umask value(s) match the var_umask_for_daemons requirement:
| |||||
Remediation script:
|
Disable Core Dumps for All Users
Rule ID | xccdf_org.ssgproject.content_rule_disable_users_coredumps | ||||||||
Result | error | ||||||||
Time | 2015-08-22T01:36:05 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27033-0 references: SC-5 | ||||||||
Description | To disable core dumps for all users, add the following line to
* hard core 0 | ||||||||
Rationale | A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data and is generally useful only for developers trying to debug problems. | ||||||||
OVAL details Items not found violating Tests the value of the ^[\s]*\*[\s]+(hard|-)[\s]+core[\s]+([\d]+) setting in the /etc/security/limits.conf file:Object oval:ssg:obj:1619 of type textfilecontent54_object
State oval:ssg:ste:1620 of type textfilecontent54_state
| |||||||||
Remediation script:
|
Disable Core Dumps for SUID programs
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27044-7 references: SI-11 | ||||||||||
Description |
To set the runtime status of the # sysctl -w fs.suid_dumpable=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
fs.suid_dumpable = 0 | ||||||||||
Rationale | The core dump of a setuid program is more likely to contain sensitive data, as the program itself runs with greater privileges than the user who initiated execution of the program. Disabling the ability for any setuid program to write a core file decreases the risk of unauthorized access of such data. | ||||||||||
OVAL details Items found violating kernel runtime parameter fs.suid_dumpable set to 0:
Items not found violating fs.suid_dumpable static configuration:Object oval:ssg:obj:1934 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable ExecShield
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-27007-4 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w kernel.exec-shield=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
kernel.exec-shield = 1 | ||||||||||
Rationale | ExecShield uses the segmentation feature on all x86 systems to prevent execution in memory higher than a certain address. It writes an address as a limit in the code segment descriptor, to control where code can be executed, on a per-process basis. When the kernel places a process's memory regions such as the stack and heap higher than this address, the hardware prevents execution in that address range. | ||||||||||
OVAL details Items found violating kernel runtime parameter kernel.exec-shield set to 1:
Items not found violating kernel.exec-shield static configuration:Object oval:ssg:obj:2013 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable Randomized Layout of Virtual Address Space
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-26999-3 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w kernel.randomize_va_space=2If this is not the system's default value, add the following line to /etc/sysctl.conf :
kernel.randomize_va_space = 2 | ||||||||||
Rationale | Address space layout randomization (ASLR) makes it more difficult for an attacker to predict the location of attack code they have introduced into a process's address space during an attempt at exploitation. Additionally, ASLR makes it more difficult for an attacker to know the location of existing code in order to re-purpose it using return oriented programming (ROP) techniques. | ||||||||||
OVAL details Items found violating kernel runtime parameter kernel.randomize_va_space set to 2:
Items not found violating kernel.randomize_va_space static configuration:Object oval:ssg:obj:1533 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Install PAE Kernel on Supported 32-bit x86 Systems
Rule ID | xccdf_org.ssgproject.content_rule_install_PAE_kernel_on_x86-32 |
Result | notchecked |
Time | 2015-08-22T01:35:57 |
Severity | low |
Identifiers and References | identifiers: CCE-27010-8 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf |
Description | Systems that are using the 64-bit x86 kernel package do not need to install the kernel-PAE package because the 64-bit x86 kernel already includes this support. However, if the system is 32-bit and also supports the PAE and NX features as determined in the previous section, the kernel-PAE package should be installed to enable XD or NX support: $ sudo yum install kernel-PAEThe installation process should also have configured the bootloader to load the new kernel at boot. Verify this at reboot and modify /etc/grub.conf if necessary. |
Rationale | On 32-bit systems that support the XD or NX bit, the vendor-supplied PAE kernel is required to enable either Execute Disable (XD) or No Execute (NX) support. |
Warnings | warning
The kernel-PAE package should not be
installed on older systems that do not support the XD or NX bit, as
this may prevent them from booting. |
Enable NX or XD Support in the BIOS
Rule ID | xccdf_org.ssgproject.content_rule_bios_enable_execution_restrictions |
Result | notselected |
Time | 2015-08-22T01:35:57 |
Severity | low |
Identifiers and References | identifiers: CCE-27163-5 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf |
Description | Reboot the system and enter the BIOS or Setup configuration menu. Navigate the BIOS configuration menu and make sure that the option is enabled. The setting may be located under a Security section. Look for Execute Disable (XD) on Intel-based systems and No Execute (NX) on AMD-based systems. |
Rationale | Computers with the ability to prevent this type of code execution frequently put an option in the BIOS that will allow users to turn the feature on or off at will. |
Restrict Access to Kernel Message Buffer
Rule ID | xccdf_org.ssgproject.content_rule_enable_dmesg_restriction | ||||||||||
Result | notselected | ||||||||||
Time | 2015-08-22T01:35:57 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27366-4 | ||||||||||
Description |
To set the runtime status of the # sysctl -w kernel.dmesg_restrict=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
kernel.dmesg_restrict = 1 | ||||||||||
Rationale | Unprivileged access to the kernel syslog can expose sensitive kernel address information. | ||||||||||
OVAL details Items not found violating kernel runtime parameter kernel.dmesg_restrict set to 1:Object oval:ssg:obj:2017 of type sysctl_object
State oval:ssg:ste:2018 of type sysctl_state
Items not found violating kernel.dmesg_restrict static configuration:Object oval:ssg:obj:2019 of type textfilecontent54_object
|
Ensure SELinux Not Disabled in /etc/grub.conf
Rule ID | xccdf_org.ssgproject.content_rule_enable_selinux_bootloader | ||||||
Result | error | ||||||
Time | 2015-08-22T01:35:57 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26956-3 references: AC-3, AC-3(3), AC-6, AU-9, 22, 32, test_attestation | ||||||
Description | SELinux can be disabled at boot time by an argument in
| ||||||
Rationale | Disabling a major host protection feature, such as SELinux, at boot time prevents it from confining system services at boot time. Further, it increases the chances that it will remain off during system operation. | ||||||
OVAL details Items not found violating check value selinux|enforcing=0 in /etc/grub.conf, fail if found:Object oval:ssg:obj:1492 of type textfilecontent54_object
| |||||||
Remediation script:
|
Ensure SELinux State is Enforcing
Rule ID | xccdf_org.ssgproject.content_rule_selinux_state | ||||
Result | pass | ||||
Time | 2015-08-22T01:35:57 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-26969-6 references: AC-3, AC-3(3), AC-4, AC-6, AU-9, 22, 32, 26, test_attestation | ||||
Description | The SELinux state should be set to SELINUX=enforcing | ||||
Rationale | Setting the SELinux state to enforcing ensures SELinux is able to confine potentially compromised processes to the security policy, which is designed to prevent them from causing damage to the system or further elevating their privileges. | ||||
OVAL details Items found satisfying /selinux/enforce is 1:
|
Configure SELinux Policy
Rule ID | xccdf_org.ssgproject.content_rule_selinux_policytype | ||||
Result | pass | ||||
Time | 2015-08-22T01:35:57 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-26875-5 references: AC-3, AC-3(3), AC-4, AC-6, AU-9, 22, 32, test_attestation | ||||
Description | The SELinux SELINUXTYPE=targetedOther policies, such as mls , provide additional security labeling
and greater confinement but are not compatible with many general-purpose
use cases.
| ||||
Rationale |
Setting the SELinux policy to | ||||
OVAL details Items found satisfying Tests the value of the ^[\s]*SELINUXTYPE[\s]*=[\s]*([^#]*) expression in the /etc/selinux/config file:
|
Enable the SELinux Context Restoration Service (restorecond)
Rule ID | xccdf_org.ssgproject.content_rule_service_restorecond_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:57 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26991-0 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig --level 2345 restorecond on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1876 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1878 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1879 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1880 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1881 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1882 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1883 of type runlevel_object
State oval:ssg:ste:1877 of type runlevel_state
|
Uninstall setroubleshoot Package
Rule ID | xccdf_org.ssgproject.content_rule_package_setroubleshoot_removed | ||
Result | notselected | ||
Time | 2015-08-22T01:35:57 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE- | ||
Description | The SETroubleshoot service notifies desktop users of SELinux
denials. The service provides information around configuration errors,
unauthorized intrusions, and other potential errors.
The # yum erase setroubleshoot | ||
Rationale | The SETroubleshoot service is an unnecessary daemon to have running on a server | ||
OVAL details Items not found violating package setroubleshoot is removed:Object oval:ssg:obj:1585 of type rpminfo_object
|
Uninstall mcstrans Package
Rule ID | xccdf_org.ssgproject.content_rule_package_mcstrans_removed | ||
Result | notselected | ||
Time | 2015-08-22T01:35:57 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE- | ||
Description | The # yum erase mcstrans | ||
Rationale | Since this service is not used very often, disable it to reduce the amount of potentially vulnerable code running on the system. NOTE: This rule was added in support of the CIS RHEL6 v1.2.0 benchmark. Please note that Red Hat does not feel this rule is security relevant. | ||
OVAL details Items not found violating package mcstrans is removed:Object oval:ssg:obj:1889 of type rpminfo_object
|
Ensure No Daemons are Unconfined by SELinux
Rule ID | xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons |
Result | notchecked |
Time | 2015-08-22T01:35:57 |
Severity | medium |
Identifiers and References | identifiers: CCE-27111-4 |
Description |
Daemons for which the SELinux policy does not contain rules will inherit the
context of the parent process. Because daemons are launched during
startup and descend from the $ sudo ps -eZ | egrep "initrc" | egrep -vw "tr|ps|egrep|bash|awk" | tr ':' ' ' | awk '{ print $NF }'It should produce no output in a well-configured system. |
Rationale |
Daemons which run with the |
Ensure No Device Files are Unlabeled by SELinux
Rule ID | xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled | ||||||||||
Result | pass | ||||||||||
Time | 2015-08-22T01:35:57 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-26774-0 | ||||||||||
Description | Device files, which are used for communication with important
system resources, should be labeled with proper SELinux types. If any device
files carry the SELinux type | ||||||||||
Rationale |
If a device file carries the SELinux type | ||||||||||
OVAL details Items not found satisfying unlabeled_t in /dev:Object oval:ssg:obj:1419 of type selinuxsecuritycontext_object
State oval:ssg:ste:1420 of type selinuxsecuritycontext_state
|
Direct root Logins Not Allowed
Rule ID | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | medium |
Identifiers and References | identifiers: CCE-26891-2 references: IA-2(1), test_attestation |
Description | To further limit access to the $ sudo echo > /etc/securetty |
Rationale | Disabling direct root logins ensures proper accountability and multifactor authentication to privileged accounts. Users will first login, then escalate to privileged (root) access via su / sudo. This is required for FISMA Low and FISMA Moderate systems. |
Restrict Virtual Console Root Logins
Rule ID | xccdf_org.ssgproject.content_rule_securetty_root_login_console_only | ||||||
Result | error | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26855-7 references: AC-6(2), 770, test_attestation | ||||||
Description |
To restrict root logins through the (deprecated) virtual console devices,
ensure lines of this form do not appear in vc/1 vc/2 vc/3 vc/4 | ||||||
Rationale | Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account. | ||||||
OVAL details Items not found violating virtual consoles /etc/securetty:Object oval:ssg:obj:2006 of type textfilecontent54_object
| |||||||
Remediation script:
|
Restrict Serial Port Root Logins
Rule ID | xccdf_org.ssgproject.content_rule_restrict_serial_port_logins | ||||||||
Result | error | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27047-0 references: AC-6(2), 770, test_attestation | ||||||||
Description | To restrict root logins on serial ports,
ensure lines of this form do not appear in ttyS0 ttyS1 | ||||||||
Rationale | Preventing direct root login to serial port interfaces helps ensure accountability for actions taken on the systems using the root account. | ||||||||
OVAL details Items not found violating serial ports /etc/securetty:Object oval:ssg:obj:1699 of type textfilecontent54_object
|
Restrict Web Browser Use for Administrative Accounts
Rule ID | xccdf_org.ssgproject.content_rule_no_root_webbrowsing |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-26795-5 |
Description | Enforce policy requiring administrative accounts use web browsers only for local service administration. |
Rationale | If a browser vulnerability is exploited while running with administrative privileges, the entire system could be compromised. Specific exceptions for local service administration should be documented in site-defined policy. |
Ensure that System Accounts Do Not Run a Shell Upon Login
Rule ID | xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26966-2 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 178, test_attestation | ||||||
Description |
Some accounts are not associated with a human
user of the system, and exist to perform some administrative
function. Should an attacker be able to log into these accounts,
they should not be granted access to a shell.
$ sudo usermod -s /sbin/nologin SYSACCT | ||||||
Rationale | Ensuring shells are not given to system accounts upon login makes it more difficult for attackers to make use of system accounts. | ||||||
Warnings | warning
Do not perform the steps in this
section on the root account. Doing so might cause the system to
become inaccessible.
| ||||||
OVAL details Items not found violating tests for the presence of login shells (not /sbin/nologin) for system accounts in /etc/passwd file:Object oval:ssg:obj:1378 of type textfilecontent54_object
|
Verify Only Root Has UID 0
Rule ID | xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero | ||||||
Result | pass | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26971-2 references: AC-6, IA-2(1), 366, test_attestation | ||||||
Description | If any account other than root has a UID of 0, this misconfiguration should be investigated and the accounts other than root should be removed or have their UID changed. | ||||||
Rationale | An account has root authority if it has a UID of 0. Multiple accounts with a UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account. Proper configuration of sudo is recommended to afford multiple system administrators access to root privileges in an accountable manner. | ||||||
OVAL details Items not found satisfying test that there are no accounts with UID 0 except root in the /etc/passwd file:Object oval:ssg:obj:1475 of type textfilecontent54_object
|
Root Path Must Be Vendor Default
Rule ID | xccdf_org.ssgproject.content_rule_root_path_default |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-27125-4 references: test_attestation |
Description | Assuming root shell is bash, edit the following files: ~/.profile ~/.bashrcChange any PATH variables to the vendor default for root and remove any
empty PATH entries or references to relative paths.
|
Rationale | The root account's executable search path must be the vendor default, and must contain only absolute paths. |
Prevent Log In to Accounts With Empty Password
Rule ID | xccdf_org.ssgproject.content_rule_no_empty_passwords | ||||
Result | error | ||||
Time | 2015-08-22T01:36:05 | ||||
Severity | high | ||||
Identifiers and References | identifiers: CCE-27038-9 references: IA-5(b), IA-5(c), IA-5(1)(a), test_attestation | ||||
Description | If an account is configured for password authentication
but does not have an assigned password, it may be possible to log
into the account without authentication. Remove any instances of the | ||||
Rationale | If an account has an empty password, anyone could log in and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments. | ||||
OVAL details Items found violating make sure nullok is not used in /etc/pam.d/system-auth:
| |||||
Remediation script:
|
Verify All Account Password Hashes are Shadowed
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26476-2 references: IA-5(h), 201, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
If any password hashes are stored in | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale |
The hashes for all user account passwords should be stored in
the file | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying password hashes are shadowed:
|
All GIDs referenced in /etc/passwd must be defined in /etc/group
Rule ID | xccdf_org.ssgproject.content_rule_gid_passwd_group_same |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-27379-7 references: 366, test_attestation |
Description | Add a group to the system for each GID referenced without a corresponding group. |
Rationale |
Inconsistency in GIDs between |
Verify No netrc Files Exist
Rule ID | xccdf_org.ssgproject.content_rule_no_netrc_files | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27225-2 | ||||||
Description | The | ||||||
Rationale |
Unencrypted passwords for remote FTP servers may be stored in | ||||||
OVAL details Items not found violating look for .netrc in /home:Object oval:ssg:obj:1390 of type file_object
|
Set Password Minimum Length in login.defs
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs | ||||
Result | error | ||||
Time | 2015-08-22T01:36:05 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-27002-5 references: IA-5(f), IA-5(1)(a), 205, test_attestation | ||||
Description | To specify password length requirements for new accounts,
edit the file PASS_MIN_LEN 12 The DoD requirement is 14 .
The FISMA requirement is 12 .
If a program consults /etc/login.defs and also another PAM module
(such as pam_cracklib ) during a password change operation,
then the most restrictive must be satisfied. See PAM section
for more information about enforcing password quality requirements.
| ||||
Rationale | Requiring a minimum password length makes password cracking attacks more difficult by ensuring a larger search space. However, any security benefit from an onerous requirement must be carefully weighed against usability problems, support costs, or counterproductive behavior that may result. | ||||
OVAL details Items found violating check PASS_MIN_LEN in /etc/login.defs:
| |||||
Remediation script:
|
Set Password Minimum Age
Rule ID | xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27013-2 references: IA-5(f), IA-5(1)(d), 198, test_attestation | ||||||||
Description | To specify password minimum age for new accounts,
edit the file PASS_MIN_DAYS 7A value of 1 day is considered for sufficient for many environments. The DoD requirement is 1. | ||||||||
Rationale | Setting the minimum password age protects against users cycling back to a favorite password after satisfying the password reuse requirement. | ||||||||
OVAL details Items not found violating Tests the value of PASS_MIN_DAYS in /etc/login.defs:Object oval:ssg:obj:1617 of type textfilecontent54_object
State oval:ssg:ste:1618 of type textfilecontent54_state
|
Set Password Maximum Age
Rule ID | xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs | ||||
Result | error | ||||
Time | 2015-08-22T01:36:05 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-26985-2 references: IA-5(f), IA-5(g), IA-5(1)(d), 180, 199, 76, test_attestation | ||||
Description | To specify password maximum age for new accounts,
edit the file PASS_MAX_DAYS 60A value of 180 days is sufficient for many environments. The DoD requirement is 60. | ||||
Rationale | Setting the password maximum age ensures users are required to periodically change their passwords. This could possibly decrease the utility of a stolen password. Requiring shorter password lifetimes increases the risk of users writing down the password in a convenient location subject to physical compromise. | ||||
OVAL details Items found violating the value PASS_MAX_DAYS should be set appropriately in /etc/login.defs:
| |||||
Remediation script:
|
Set Password Warning Age
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs | ||||
Result | error | ||||
Time | 2015-08-22T01:36:05 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-26988-6 references: IA-5(f), test_attestation | ||||
Description | To specify how many days prior to password
expiration that a warning will be issued to users,
edit the file PASS_WARN_AGE 14The DoD requirement is 7. | ||||
Rationale | Setting the password warning age enables users to make the change at a practical time. | ||||
OVAL details Items found violating Tests the value of PASS_WARN_AGE in /etc/login.defs:
| |||||
Remediation script:
|
Set Account Expiration Following Inactivity
Rule ID | xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration | |||||||||
Result | error | |||||||||
Time | 2015-08-22T01:35:58 | |||||||||
Severity | low | |||||||||
Identifiers and References | identifiers: CCE-27283-1 | |||||||||
Description | To specify the number of days after a password expires (which
signifies inactivity) until an account is permanently disabled, add or correct
the following lines in INACTIVE=NUM_DAYSA value of 35 is recommended. If a password is currently on the verge of expiration, then 35 days remain until the account is automatically disabled. However, if the password will not expire for another 60 days, then 95 days could elapse until the account would be automatically disabled. See the useradd man page for more information. Determining the inactivity
timeout must be done with careful consideration of the length of a "normal"
period of inactivity for users in the particular environment. Setting
the timeout too low incurs support costs and also has the potential to impact
availability of the system to legitimate users.
| |||||||||
Rationale | Disabling inactive accounts ensures that accounts which may not have been responsibly removed are not available to attackers who may have compromised their credentials. | |||||||||
OVAL details Items not found violating the value INACTIVE parameter should be set appropriately in /etc/default/useradd:Object oval:ssg:obj:2279 of type textfilecontent54_object
State oval:ssg:ste:2280 of type textfilecontent54_state
| ||||||||||
Remediation script:
|
Ensure All Accounts on the System Have Unique Names
Rule ID | xccdf_org.ssgproject.content_rule_account_unique_name |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-27609-7 |
Description | Change usernames, or delete accounts, so each has a unique name. |
Rationale | Unique usernames allow for accountability on the system. |
Assign Expiration Date to Temporary Accounts
Rule ID | xccdf_org.ssgproject.content_rule_account_temp_expire_date |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-27474-6 |
Description |
In the event temporary or emergency accounts are required, configure the system
to terminate them after a documented time period. For every temporary and
emergency account, run the following command to set an expiration date on it,
substituting $ sudo chage -E YYYY-MM-DD USER YYYY-MM-DD indicates the documented expiration date for the account.
|
Rationale |
When temporary and emergency accounts are created, there is a risk they may
remain in place and active after the need for them no longer exists. Account
expiration greatly reduces the risk of accounts being misused or hijacked.
|
Set Password Retry Prompts Permitted Per-Session
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_retry | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27123-9 references: IA-5(c), 1092, test_attestation | ||||||||||||
Description | To configure the number of retry prompts that are permitted per-session:
| ||||||||||||
Rationale | Setting the password retry prompts that are permitted on a per-session basis to a low value requires some software, such as SSH, to re-connect. This can slow down and draw additional attention to some types of password-guessing attacks. Note that this is different from account lockout, which is provided by the pam_faillock module. | ||||||||||||
OVAL details Items found satisfying check the configuration of /etc/pam.d/system-auth:
Items not found satisfying check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:1667 of type textfilecontent54_object
State oval:ssg:ste:1666 of type textfilecontent54_state
|
Set Password to Maximum of Three Consecutive Repeating Characters
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_cracklib_maxrepeat | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27227-8 | ||||||||
Description | The pam_cracklib module's | ||||||||
Rationale | Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks. | ||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:1835 of type textfilecontent54_object
State oval:ssg:ste:1836 of type textfilecontent54_state
|
Set Password Strength Minimum Digit Characters
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit | ||||||||||||||||||||
Result | error | ||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||
Severity | low | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-26374-9 references: IA-5(b), IA-5(c), 194, 194, test_attestation | ||||||||||||||||||||
Description | The pam_cracklib module's | ||||||||||||||||||||
Rationale | Requiring digits makes password guessing attacks more difficult by ensuring a larger search space. | ||||||||||||||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:1365 of type textfilecontent54_object
State oval:ssg:ste:1366 of type textfilecontent54_state
Items not found violating check the configuration of /etc/pam.d/system-auth pwquality:Object oval:ssg:obj:1367 of type textfilecontent54_object
State oval:ssg:ste:1366 of type textfilecontent54_state
| |||||||||||||||||||||
Remediation script:
|
Set Password Strength Minimum Uppercase Characters
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit | ||||||||||||||||||||
Result | error | ||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||
Severity | low | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-26601-5 references: IA-5(b), IA-5(c), IA-5(1)(a), 192, test_attestation | ||||||||||||||||||||
Description | The pam_cracklib module's | ||||||||||||||||||||
Rationale | Requiring a minimum number of uppercase characters makes password guessing attacks more difficult by ensuring a larger search space. | ||||||||||||||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:1312 of type textfilecontent54_object
State oval:ssg:ste:1313 of type textfilecontent54_state
Items not found violating check the configuration of /etc/pam.d/system-auth pwquality:Object oval:ssg:obj:1314 of type textfilecontent54_object
State oval:ssg:ste:1313 of type textfilecontent54_state
| |||||||||||||||||||||
Remediation script:
|
Set Password Strength Minimum Special Characters
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit | ||||||||||||||||||||
Result | error | ||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||
Severity | low | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-26409-3 references: IA-5(b), IA-5(c), IA-5(1)(a), 1619, 266, test_attestation | ||||||||||||||||||||
Description | The pam_cracklib module's | ||||||||||||||||||||
Rationale | Requiring a minimum number of special characters makes password guessing attacks more difficult by ensuring a larger search space. | ||||||||||||||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:1472 of type textfilecontent54_object
State oval:ssg:ste:1473 of type textfilecontent54_state
Items not found violating check the configuration of /etc/pam.d/system-auth pwquality:Object oval:ssg:obj:1474 of type textfilecontent54_object
State oval:ssg:ste:1473 of type textfilecontent54_state
| |||||||||||||||||||||
Remediation script:
|
Set Password Strength Minimum Lowercase Characters
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit | ||||||||||||||||||||
Result | error | ||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||
Severity | low | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-26631-2 references: IA-5(b), IA-5(c), IA-5(1)(a), 193, test_attestation | ||||||||||||||||||||
Description | The pam_cracklib module's | ||||||||||||||||||||
Rationale | Requiring a minimum number of lowercase characters makes password guessing attacks more difficult by ensuring a larger search space. | ||||||||||||||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:2231 of type textfilecontent54_object
State oval:ssg:ste:2232 of type textfilecontent54_state
Items not found violating check the configuration of /etc/pam.d/system-auth pwquality:Object oval:ssg:obj:2233 of type textfilecontent54_object
State oval:ssg:ste:2232 of type textfilecontent54_state
| |||||||||||||||||||||
Remediation script:
|
Set Password Strength Minimum Different Characters
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_difok | ||||||||||||||||||||
Result | error | ||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||
Severity | low | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-26615-5 references: IA-5(b), IA-5(c), IA-5(1)(b), 195, test_attestation | ||||||||||||||||||||
Description | The pam_cracklib module's | ||||||||||||||||||||
Rationale | Requiring a minimum number of different characters during password changes ensures that newly changed passwords should not resemble previously compromised ones. Note that passwords which are changed on compromised systems will still be compromised, however. | ||||||||||||||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:2072 of type textfilecontent54_object
State oval:ssg:ste:2073 of type textfilecontent54_state
Items not found violating check the configuration of /etc/pam.d/system-auth pwquality:Object oval:ssg:obj:2074 of type textfilecontent54_object
State oval:ssg:ste:2073 of type textfilecontent54_state
| |||||||||||||||||||||
Remediation script:
|
Set Password Strength Minimum Different Categories
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_cracklib_minclass | ||||||||||
Result | notselected | ||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27115-5 references: test_attestation | ||||||||||
Description | The pam_cracklib module's * Upper-case characters * Lower-case characters * Digits * Special characters (for example, punctuation)Add minclass=3 after pam_cracklib.so entry into the
/etc/pam.d/system-auth file in order to require 3 differing categories of
characters when changing passwords.
For example to require at least three character classes to be used in password, use minclass=3 .
| ||||||||||
Rationale | Requiring a minimum number of character categories makes password guessing attacks more difficult by ensuring a larger search space. | ||||||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:2161 of type textfilecontent54_object
State oval:ssg:ste:2162 of type textfilecontent54_state
|
Set Deny For Failed Password Attempts
Rule ID | xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny | ||||||||||||||||
Result | error | ||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||
Severity | medium | ||||||||||||||||
Identifiers and References | identifiers: CCE-26844-1 | ||||||||||||||||
Description |
To configure the system to lock out accounts after a number of incorrect login
attempts using
| ||||||||||||||||
Rationale | Locking out user accounts after a number of incorrect attempts prevents direct password guessing attacks. | ||||||||||||||||
OVAL details Items not found violating check maximum failed login attempts allowed in /etc/pam.d/system-auth:Object oval:ssg:obj:1299 of type textfilecontent54_object
State oval:ssg:ste:1300 of type textfilecontent54_state
Items not found violating check maximum failed login attempts allowed in /etc/pam.d/password-auth:Object oval:ssg:obj:1301 of type textfilecontent54_object
State oval:ssg:ste:1302 of type textfilecontent54_state
| |||||||||||||||||
Remediation script:
|
Set Lockout Time For Failed Password Attempts
Rule ID | xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time | ||||||||||||||||||||
Result | notselected | ||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||
Severity | medium | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-27110-6 | ||||||||||||||||||||
Description |
To configure the system to lock out accounts after a number of incorrect login
attempts and require an administrator to unlock the account using
| ||||||||||||||||||||
Rationale | Locking out user accounts after a number of incorrect attempts prevents direct password guessing attacks. Ensuring that an administrator is involved in unlocking locked accounts draws appropriate attention to such situations. | ||||||||||||||||||||
OVAL details Items not found violating check maximum failed login attempts allowed in /etc/pam.d/system-auth:Object oval:ssg:obj:1467 of type textfilecontent54_object
State oval:ssg:ste:1468 of type textfilecontent54_state
Items not found violating check maximum failed login attempts allowed in /etc/pam.d/password-auth:Object oval:ssg:obj:1469 of type textfilecontent54_object
State oval:ssg:ste:1470 of type textfilecontent54_state
|
Set Interval For Counting Failed Password Attempts
Rule ID | xccdf_org.ssgproject.content_rule_accounts_passwords_pam_fail_interval | ||||||||||||||||||||
Result | notselected | ||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||
Severity | medium | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-27215-3 | ||||||||||||||||||||
Description |
Utilizing
| ||||||||||||||||||||
Rationale | Locking out user accounts after a number of incorrect attempts within a specific period of time prevents direct password guessing attacks. | ||||||||||||||||||||
OVAL details Items not found violating check maximum failed login attempts allowed in /etc/pam.d/system-auth:Object oval:ssg:obj:1935 of type textfilecontent54_object
State oval:ssg:ste:1936 of type textfilecontent54_state
Items not found violating check maximum failed login attempts allowed in /etc/pam.d/password-auth:Object oval:ssg:obj:1937 of type textfilecontent54_object
State oval:ssg:ste:1938 of type textfilecontent54_state
|
Limit Password Reuse
Rule ID | xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember | ||||||||
Result | error | ||||||||
Time | 2015-08-22T01:36:05 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-26741-9 references: IA-5(f), IA-5(1)(e), 200, test_attestation | ||||||||
Description | Do not allow users to reuse recent passwords. This can
be accomplished by using the password sufficient pam_unix.so existing_options remember=24The DoD STIG requirement is 5 passwords. | ||||||||
Rationale | Preventing re-use of previous passwords helps ensure that a compromised password is not re-used by a user. | ||||||||
OVAL details Items not found violating remember is set in /etc/pam.d/system-auth:Object oval:ssg:obj:2159 of type textfilecontent54_object
State oval:ssg:ste:2160 of type textfilecontent54_state
| |||||||||
Remediation script:
|
Set Password Hashing Algorithm in /etc/pam.d/system-auth
Rule ID | xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth | ||||
Result | pass | ||||
Time | 2015-08-22T01:35:58 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-26303-8 references: IA-5(b), IA-5(c), IA-5(1)(c), IA-7, 803, test_attestation | ||||
Description |
In password sufficient pam_unix.so sha512 other arguments...This will help ensure when local users change their passwords, hashes for the new passwords will be generated using the SHA-512 algorithm. This is the default. | ||||
Rationale | Using a stronger hashing algorithm makes password cracking attacks more difficult. | ||||
OVAL details Items found satisfying check /etc/pam.d/system-auth for correct settings:
|
Set Password Hashing Algorithm in /etc/login.defs
Rule ID | xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs | ||||
Result | pass | ||||
Time | 2015-08-22T01:35:58 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-27228-6 references: IA-5(b), IA-5(c), IA-5(1)(c), IA-7, 803, test_attestation | ||||
Description |
In ENCRYPT_METHOD SHA512 | ||||
Rationale | Using a stronger hashing algorithm makes password cracking attacks more difficult. | ||||
OVAL details Items found satisfying check ENCRYPT_METHOD in /etc/login.defs:
|
Set Password Hashing Algorithm in /etc/libuser.conf
Rule ID | xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27229-4 references: IA-5(b), IA-5(c), IA-5(1)(c), IA-7, 803, test_attestation | ||||||
Description |
In crypt_style = sha512 | ||||||
Rationale | Using a stronger hashing algorithm makes password cracking attacks more difficult. | ||||||
OVAL details Items not found violating The password hashing algorithm should be set correctly in /etc/libuser.conf:Object oval:ssg:obj:1340 of type textfilecontent54_object
|
Set Last Logon/Access Notification
Rule ID | xccdf_org.ssgproject.content_rule_display_login_attempts | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27291-4 references: 366 | ||||||
Description | To configure the system to notify users of last logon/access
using session required pam_lastlog.so showfailed | ||||||
Rationale | Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the number of unsuccessful attempts that were made to login to their account allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators. | ||||||
OVAL details Items not found violating check the configuration of /etc/pam.d/system-auth:Object oval:ssg:obj:1471 of type textfilecontent54_object
|
Ensure that Root's Path Does Not Include Relative Paths or Null Directories
Rule ID | xccdf_org.ssgproject.content_rule_root_path_no_dot | ||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26826-8 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||||||||||||||||||||||||||||||
Description |
Ensure that none of the directories in root's path is equal to a single
PATH=:/bin PATH=/bin: PATH=/bin::/sbinThese empty elements have the same effect as a single . character.
| ||||||||||||||||||||||||||||||||||||
Rationale | Including these entries increases the risk that root could execute code from an untrusted location. | ||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying environment variable PATH starts with : or .:
Items found satisfying environment variable PATH doesn't contain : twice in a row:
Items found satisfying environment variable PATH doesn't contain . twice in a row:
Items found satisfying environment variable PATH ends with : or .:
Items found satisfying environment variable PATH starts with an absolute path /:
Items found satisfying environment variable PATH contains relative paths:
|
Ensure that Root's Path Does Not Include World or Group-Writable Directories
Rule ID | xccdf_org.ssgproject.content_rule_root_path_no_groupother_writable | ||||||||||||||||||||
Result | fail | ||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||
Severity | low | ||||||||||||||||||||
Identifiers and References | identifiers: CCE-26768-2 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||||||||||||||
Description | For each element in root's path, run: $ sudo ls -ld DIRand ensure that write permissions are disabled for group and other. | ||||||||||||||||||||
Rationale | Such entries increase the risk that root could execute code provided by unprivileged users, and potentially malicious code. | ||||||||||||||||||||
OVAL details Items not found violating Check that write permission to group in root's path is denied:Object oval:ssg:obj:1795 of type file_object
Items not found violating Check that write permission to other in root's path is denied:Object oval:ssg:obj:1796 of type file_object
|
Ensure the Default Bash Umask is Set Correctly
Rule ID | xccdf_org.ssgproject.content_rule_accounts_umask_bashrc | ||||||||||||||||||
Result | error | ||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||
Severity | low | ||||||||||||||||||
Identifiers and References | identifiers: CCE-26917-5 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 366, test_attestation | ||||||||||||||||||
Description |
To ensure the default umask for users of the Bash shell is set properly,
add or correct the umask 077 | ||||||||||||||||||
Rationale | The umask value influences the permissions assigned to files when they are created. A misconfigured umask value could result in files with excessive permissions that can be read or written to by unauthorized users. | ||||||||||||||||||
OVAL details Items found violating Test the retrieved /etc/bashrc umask value(s) match the var_accounts_user_umask requirement:
| |||||||||||||||||||
Remediation script:
|
Ensure the Default C Shell Umask is Set Correctly
Rule ID | xccdf_org.ssgproject.content_rule_accounts_umask_cshrc | ||||||||||||||||||
Result | error | ||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||
Severity | low | ||||||||||||||||||
Identifiers and References | identifiers: CCE-27034-8 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 366, test_attestation | ||||||||||||||||||
Description |
To ensure the default umask for users of the C shell is set properly,
add or correct the umask 077 | ||||||||||||||||||
Rationale | The umask value influences the permissions assigned to files when they are created. A misconfigured umask value could result in files with excessive permissions that can be read or written to by unauthorized users. | ||||||||||||||||||
OVAL details Items found violating Test the retrieved /etc/csh.cshrc umask value(s) match the var_accounts_user_umask requirement:
| |||||||||||||||||||
Remediation script:
|
Ensure the Default Umask is Set Correctly in /etc/profile
Rule ID | xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile | ||||||||||||||||||
Result | error | ||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||
Severity | low | ||||||||||||||||||
Identifiers and References | identifiers: CCE-26669-2 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 366, test_attestation | ||||||||||||||||||
Description |
To ensure the default umask controlled by umask 077 | ||||||||||||||||||
Rationale | The umask value influences the permissions assigned to files when they are created. A misconfigured umask value could result in files with excessive permissions that can be read or written to by unauthorized users. | ||||||||||||||||||
OVAL details Items found violating Test the retrieved /etc/profile umask value(s) match the var_accounts_user_umask requirement:
| |||||||||||||||||||
Remediation script:
|
Ensure the Default Umask is Set Correctly in login.defs
Rule ID | xccdf_org.ssgproject.content_rule_accounts_umask_login_defs | ||||
Result | pass | ||||
Time | 2015-08-22T01:35:58 | ||||
Severity | low | ||||
Identifiers and References | identifiers: CCE-26371-5 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 366, test_attestation | ||||
Description |
To ensure the default umask controlled by UMASK 077 | ||||
Rationale | The umask value influences the permissions assigned to files when they are created. A misconfigured umask value could result in files with excessive permissions that can be read and written to by unauthorized users. | ||||
OVAL details Items found satisfying Test the retrieved /etc/login.defs umask value(s) match the var_accounts_user_umask requirement:
|
Limit the Number of Concurrent Login Sessions Allowed Per User
Rule ID | xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27457-1 | ||||||||
Description |
Limiting the number of allowed users and sessions per user can limit risks related to Denial of
Service attacks. This addresses concurrent sessions for a single account and does not address
concurrent sessions by a single user via multiple accounts. The DoD requirement is 10. To set the number of concurrent
sessions per user add the following line in * hard maxlogins 1 | ||||||||
Rationale | Limiting simultaneous user logins can insulate the system from denial of service problems caused by excessive logins. Automated login processes operating improperly or maliciously may result in an exceptional number of simultaneous login sessions. | ||||||||
OVAL details Items not found violating the value maxlogins should be set appropriately in /etc/security/limits.conf:Object oval:ssg:obj:2075 of type textfilecontent54_object
State oval:ssg:ste:2076 of type textfilecontent54_state
|
Ensure that User Home Directories are not Group-Writable or World-Readable
Rule ID | xccdf_org.ssgproject.content_rule_homedir_perms_no_groupwrite_worldread | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26981-1 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||||||
Description | For each human user of the system, view the permissions of the user's home directory: $ sudo ls -ld /home/USEREnsure that the directory is not group-writable and that it is not world-readable. If necessary, repair the permissions: $ sudo chmod g-w /home/USER $ sudo chmod o-rwx /home/USER | ||||||||||||
Rationale | User home directories contain many configuration files which affect the behavior of a user's account. No user should ever have write permission to another user's home directory. Group shared directories can be configured in sub-directories or elsewhere in the filesystem if they are needed. Typically, user home directories should not be world-readable, as it would disclose file names to other users. If a subset of users need read access to one another's home directories, this can be provided using groups or ACLs. | ||||||||||||
Warnings | warning
This action may involve
modifying user home directories. Notify your user community, and
solicit input if appropriate, before making this type of
change. | ||||||||||||
OVAL details Items found violating home directories:
|
Verify /etc/grub.conf User Ownership
Rule ID | xccdf_org.ssgproject.content_rule_user_owner_grub_conf | ||||||||||||||||
Result | pass | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | medium | ||||||||||||||||
Identifiers and References | identifiers: CCE-26995-1 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 225, test_attestation | ||||||||||||||||
Description | The file # chown root/etc/grub.conf | ||||||||||||||||
Rationale | Only root should be able to modify important boot parameters. | ||||||||||||||||
OVAL details Items found satisfying /boot/grub/grub.conf owned by root:
Items not found satisfying /boot/efi/EFI/redhat/grub.conf owned by root:Object oval:ssg:obj:1777 of type file_object
State oval:ssg:ste:1776 of type file_state
|
Verify /etc/grub.conf Group Ownership
Rule ID | xccdf_org.ssgproject.content_rule_group_owner_grub_conf | ||||||||||||||||
Result | pass | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | medium | ||||||||||||||||
Identifiers and References | identifiers: CCE-27022-3 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf, 225, test_attestation | ||||||||||||||||
Description | The file # chgrp root/etc/grub.conf | ||||||||||||||||
Rationale |
The | ||||||||||||||||
OVAL details Items found satisfying /boot/grub/grub.conf owned by root:
Items not found satisfying /boot/efi/EFI/redhat/grub.conf owned by root:Object oval:ssg:obj:1972 of type file_object
State oval:ssg:ste:1971 of type file_state
|
Set Boot Loader Password
Rule ID | xccdf_org.ssgproject.content_rule_bootloader_password | ||||||||
Result | error | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-26911-8 references: IA-2(1), IA-5(e), 213, test_attestation | ||||||||
Description | The grub boot loader should have password protection enabled to protect boot-time settings. To do so, select a password and then generate a hash from it by running the following command: $ grub-crypt --sha-512When prompted to enter a password, insert the following line into /etc/grub.conf
immediately after the header comments. (Use the output from grub-crypt as the
value of password-hash):
password --encrypted password-hashNOTE: To meet FISMA Moderate, the bootloader password MUST differ from the root password. | ||||||||
Rationale | Password protection on the boot loader configuration ensures users with physical access cannot trivially alter important bootloader settings. These include which kernel to use, and whether to enter single-user mode. | ||||||||
OVAL details Items not found violating make sure a password is defined in /etc/grub.conf:Object oval:ssg:obj:1781 of type textfilecontent54_object
|
Set GNOME Login Inactivity Timeout
Rule ID | xccdf_org.ssgproject.content_rule_set_screensaver_inactivity_timeout | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26828-4 | ||||||||||||
Description | Run the following command to set the idle time-out value for inactivity in the GNOME desktop to 15 minutes: $ sudo gconftool-2 \ --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type int \ --set /desktop/gnome/session/idle_delay 15 | ||||||||||||
Rationale | Setting the idle delay controls when the screensaver will start, and can be combined with screen locking to prevent access from passersby. | ||||||||||||
OVAL details Items not found violating test screensaver timeout period:Object oval:ssg:obj:1375 of type xmlfilecontent_object
State oval:ssg:ste:1376 of type xmlfilecontent_state
Items not found violating test screensaver timeout period:Object oval:ssg:obj:1377 of type xmlfilecontent_object
State oval:ssg:ste:1376 of type xmlfilecontent_state
|
GNOME Desktop Screensaver Mandatory Use
Rule ID | xccdf_org.ssgproject.content_rule_enable_screensaver_after_idle | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26600-7 | ||||||||||||
Description | Run the following command to activate the screensaver in the GNOME desktop after a period of inactivity: $ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type bool \ --set /apps/gnome-screensaver/idle_activation_enabled true | ||||||||||||
Rationale | Enabling idle activation of the screensaver ensures the screensaver will be activated after the idle delay. Applications requiring continuous, real-time screen display (such as network management products) require the login session does not have administrator rights and the display station is located in a controlled-access area. | ||||||||||||
OVAL details Items not found violating gnome screensaver is activated on idle:Object oval:ssg:obj:1432 of type xmlfilecontent_object
State oval:ssg:ste:1433 of type xmlfilecontent_state
Items not found violating gnome screensaver is activated on idle:Object oval:ssg:obj:1434 of type xmlfilecontent_object
State oval:ssg:ste:1433 of type xmlfilecontent_state
|
Enable Screen Lock Activation After Idle Period
Rule ID | xccdf_org.ssgproject.content_rule_enable_screensaver_password_lock | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26235-2 | ||||||||||||
Description | Run the following command to activate locking of the screensaver in the GNOME desktop when it is activated: $ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type bool \ --set /apps/gnome-screensaver/lock_enabled true | ||||||||||||
Rationale | Enabling the activation of the screen lock after an idle period ensures password entry will be required in order to access the system, preventing access by passersby. | ||||||||||||
OVAL details Items not found violating screensaver lock is enabled:Object oval:ssg:obj:2139 of type xmlfilecontent_object
State oval:ssg:ste:2140 of type xmlfilecontent_state
Items not found violating screensaver lock is enabled:Object oval:ssg:obj:2141 of type xmlfilecontent_object
State oval:ssg:ste:2140 of type xmlfilecontent_state
|
Implement Blank Screensaver
Rule ID | xccdf_org.ssgproject.content_rule_set_blank_screensaver | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26638-7 | ||||||||||||
Description | Run the following command to set the screensaver mode in the GNOME desktop to a blank screen: $ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type string \ --set /apps/gnome-screensaver/mode blank-only | ||||||||||||
Rationale | Setting the screensaver mode to blank-only conceals the contents of the display from passersby. | ||||||||||||
OVAL details Items not found violating gnome screensaver set to blank screen:Object oval:ssg:obj:1476 of type xmlfilecontent_object
State oval:ssg:ste:1477 of type xmlfilecontent_state
Items not found violating gnome screensaver set to blank screen:Object oval:ssg:obj:1478 of type xmlfilecontent_object
State oval:ssg:ste:1477 of type xmlfilecontent_state
|
Install the screen Package
Rule ID | xccdf_org.ssgproject.content_rule_package_screen_installed | ||
Result | notselected | ||
Time | 2015-08-22T01:35:58 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26940-7 references: 58, test_attestation | ||
Description |
To enable console screen locking, install the $ sudo yum install screenInstruct users to begin new terminal sessions with the following command: $ screenThe console can now be locked with the following key combination: ctrl+a x | ||
Rationale |
Installing | ||
OVAL details Items not found violating package screen is installed:Object oval:ssg:obj:1652 of type rpminfo_object
|
Enable Smart Card Login
Rule ID | xccdf_org.ssgproject.content_rule_smartcard_auth |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | medium |
Identifiers and References | identifiers: CCE-27440-7 |
Description | To enable smart card authentication, consult the documentation at:
|
Rationale | Smart card login provides two-factor authentication stronger than that provided by a username and password combination. Smart cards leverage PKI (public key infrastructure) in order to provide and verify credentials. |
Require Authentication for Single User Mode
Rule ID | xccdf_org.ssgproject.content_rule_require_singleuser_auth | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27040-5 references: IA-2(1), 213, test_attestation | ||||||
Description | Single-user mode is intended as a system recovery
method, providing a single user root access to the system by
providing a boot option at startup. By default, no authentication
is performed if single-user mode is selected.
SINGLE=/sbin/sulogin | ||||||
Rationale | This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such accesses are further prevented by configuring the bootloader password. | ||||||
OVAL details Items not found violating Tests that the SINGLE variable in the /etc/sysconfig/init file is set to /sbin/sulogin, to ensure that a password must be entered to access single user mode:Object oval:ssg:obj:1658 of type textfilecontent54_object
|
Disable Ctrl-Alt-Del Reboot Activation
Rule ID | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-27567-7 | ||||||
Description |
By default, the system includes the following line in
exec /sbin/shutdown -r now "Control-Alt-Delete pressed" To configure the system to log a message instead of rebooting the system, alter that line to read as follows: exec /usr/bin/logger -p security.info "Control-Alt-Delete pressed" | ||||||
Rationale |
A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.
In the GNOME graphical environment, risk of unintentional reboot from the
Ctrl-Alt-Del sequence is reduced because the user will be
prompted before any action is taken.
NOTE: When updating the | ||||||
OVAL details Items not found violating Disable Ctrl-Alt-Del key sequence:Object oval:ssg:obj:2152 of type textfilecontent54_object
|
Disable Interactive Boot
Rule ID | xccdf_org.ssgproject.content_rule_disable_interactive_boot | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:05 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27043-9 references: SC-2, 213, test_attestation | ||||||
Description |
To disable the ability for users to perform interactive startups,
edit the file PROMPT=noThe PROMPT option allows the console user to perform an
interactive system startup, in which it is possible to select the
set of services which are started on boot.
| ||||||
Rationale | Using interactive boot, the console user could disable auditing, firewalls, or other services, weakening system security. | ||||||
OVAL details Items not found violating Tests that PROMPT=no in /etc/sysconfig/init:Object oval:ssg:obj:1922 of type textfilecontent54_object
| |||||||
Remediation script:
|
Disable the User List
Rule ID | xccdf_org.ssgproject.content_rule_disable_user_list | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27230-2 references: AC-23 | ||||||||||||
Description | In the default graphical environment, users logging
directly into the system are greeted with a login screen that displays
all known users. This functionality should be disabled.
$ sudo gconftool-2 --direct \ --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \ --type bool \ --set /apps/gdm/simple-greeter/disable_user_list true | ||||||||||||
Rationale | Leaving the user list enabled is a security risk since it allows anyone with physical access to the system to quickly enumerate known user accounts without logging in. | ||||||||||||
OVAL details Items not found violating checks for gconf-tree file:Object oval:ssg:obj:2176 of type xmlfilecontent_object
State oval:ssg:ste:2177 of type xmlfilecontent_state
Items not found violating checks for absent gconf-tree file:Object oval:ssg:obj:2178 of type xmlfilecontent_object
State oval:ssg:ste:2177 of type xmlfilecontent_state
|
Disable Kernel Parameter for Sending ICMP Redirects by Default
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-27001-7 | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.default.send_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.default.send_redirects = 0 | ||||||||||
Rationale | Sending ICMP redirects permits the system to instruct other systems to update their routing information. The ability to send ICMP redirects is only appropriate for systems acting as routers. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0:
Items not found violating net.ipv4.conf.default.send_redirects static configuration:Object oval:ssg:obj:1389 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-27004-1 references: CM-7, 1551, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.all.send_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.all.send_redirects = 0 | ||||||||||
Rationale | Sending ICMP redirects permits the system to instruct other systems to update their routing information. The ability to send ICMP redirects is only appropriate for systems acting as routers. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0:
Items not found violating net.ipv4.conf.all.send_redirects static configuration:Object oval:ssg:obj:1401 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Disable Kernel Parameter for IP Forwarding
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_ipv4_ip_forward | ||||||||
Result | pass | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-26866-4 references: CM-7, SC-5, 366, test_attestation | ||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.ip_forward=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.ip_forward = 0 | ||||||||
Rationale | IP forwarding permits the kernel to forward packets from one network interface to another. The ability to forward packets between two networks is only appropriate for systems acting as routers. | ||||||||
OVAL details Items found satisfying kernel runtime parameter net.ipv4.ip_forward set to 0:
Items found satisfying net.ipv4.ip_forward static configuration:
|
Disable Kernel Parameter for Accepting Source-Routed Packets for All Interfaces
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route | ||||||||||
Result | notselected | ||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-27037-1 references: CM-7, 1551, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.all.accept_source_route=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.all.accept_source_route = 0 | ||||||||||
Rationale | Accepting source-routed packets in the IPv4 protocol has few legitimate uses. It should be disabled unless it is absolutely required. | ||||||||||
OVAL details Items not found violating kernel runtime parameter net.ipv4.conf.all.accept_source_route set to 0:Object oval:ssg:obj:1604 of type sysctl_object
State oval:ssg:ste:1605 of type sysctl_state
Items not found violating net.ipv4.conf.all.accept_source_route static configuration:Object oval:ssg:obj:1606 of type textfilecontent54_object
|
Disable Kernel Parameter for Accepting ICMP Redirects for All Interfaces
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-27027-2 references: CM-7, 1503, 1551, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.all.accept_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.all.accept_redirects = 0 | ||||||||||
Rationale | Accepting ICMP redirects has few legitimate uses. It should be disabled unless it is absolutely required. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.all.accept_redirects set to 0:
Items not found violating net.ipv4.conf.all.accept_redirects static configuration:Object oval:ssg:obj:1412 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Disable Kernel Parameter for Accepting Secure Redirects for All Interfaces
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-26854-0 references: AC-4, CM-7, 1503, 1551, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.all.secure_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.all.secure_redirects = 0 | ||||||||||
Rationale | Accepting "secure" ICMP redirects (from those gateways listed as default gateways) has few legitimate uses. It should be disabled unless it is absolutely required. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.all.secure_redirects set to 0:
Items not found violating net.ipv4.conf.all.secure_redirects static configuration:Object oval:ssg:obj:1785 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable Kernel Parameter to Log Martian Packets
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27066-0 references: AC-3(10), CM-7, 126, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.all.log_martians=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.all.log_martians = 1 | ||||||||||
Rationale | The presence of "martian" packets (which have impossible addresses) as well as spoofed packets, source-routed packets, and redirects could be a sign of nefarious network activity. Logging these packets enables this activity to be detected. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.all.log_martians set to 1:
Items not found violating net.ipv4.conf.all.log_martians static configuration:Object oval:ssg:obj:1840 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Disable Kernel Parameter for Accepting Source-Routed Packets By Default
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route | ||||||||
Result | pass | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-26983-7 | ||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.default.accept_source_route=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.default.accept_source_route = 0 | ||||||||
Rationale | Accepting source-routed packets in the IPv4 protocol has few legitimate uses. It should be disabled unless it is absolutely required. | ||||||||
OVAL details Items found satisfying kernel runtime parameter net.ipv4.conf.default.accept_source_route set to 0:
Items found satisfying net.ipv4.conf.default.accept_source_route static configuration:
|
Disable Kernel Parameter for Accepting ICMP Redirects By Default
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27015-7 | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.default.accept_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.default.accept_redirects = 0 | ||||||||||
Rationale | This feature of the IPv4 protocol has few legitimate uses. It should be disabled unless it is absolutely required. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.default.accept_redirects set to 0:
Items not found violating net.ipv4.conf.default.accept_redirects static configuration:Object oval:ssg:obj:1664 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Disable Kernel Parameter for Accepting Secure Redirects By Default
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-26831-8 | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.default.secure_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.default.secure_redirects = 0 | ||||||||||
Rationale | Accepting "secure" ICMP redirects (from those gateways listed as default gateways) has few legitimate uses. It should be disabled unless it is absolutely required. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.default.secure_redirects set to 0:
Items not found violating net.ipv4.conf.default.secure_redirects static configuration:Object oval:ssg:obj:1758 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-26883-9 references: CM-7, SC-5, 1551, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.icmp_echo_ignore_broadcasts = 1 | ||||||||||
Rationale | Ignoring ICMP echo requests (pings) sent to broadcast or multicast addresses makes the system slightly more difficult to enumerate on the network. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to 1:
Items not found violating net.ipv4.icmp_echo_ignore_broadcasts static configuration:Object oval:ssg:obj:1894 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable Kernel Parameter to Ignore Bogus ICMP Error Responses
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-26993-6 references: CM-7, SC-5, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.icmp_ignore_bogus_error_responses = 1 | ||||||||||
Rationale | Ignoring bogus ICMP error responses reduces log size, although some activity would not be logged. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to 1:
Items not found violating net.ipv4.icmp_ignore_bogus_error_responses static configuration:Object oval:ssg:obj:2101 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable Kernel Parameter to Use Reverse Path Filtering for All Interfaces
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-26979-5 references: AC-4, SC-5, SC-7, 1551, test_attestation | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.all.rp_filter=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.all.rp_filter = 1 | ||||||||||
Rationale | Enabling reverse path filtering drops packets with source addresses that should not have been able to be received on the interface they were received on. It should not be used on systems which are routers for complicated networks, but is helpful for end hosts and routers serving small networks. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv4.conf.all.rp_filter set to 1:
Items not found violating net.ipv4.conf.all.rp_filter static configuration:Object oval:ssg:obj:2046 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Enable Kernel Parameter to Use Reverse Path Filtering by Default
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter | ||||||||
Result | pass | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-26915-9 references: AC-4, SC-5, SC-7, test_attestation | ||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv4.conf.default.rp_filter=1If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv4.conf.default.rp_filter = 1 | ||||||||
Rationale | Enabling reverse path filtering drops packets with source addresses that should not have been able to be received on the interface they were received on. It should not be used on systems which are routers for complicated networks, but is helpful for end hosts and routers serving small networks. | ||||||||
OVAL details Items found satisfying kernel runtime parameter net.ipv4.conf.default.rp_filter set to 1:
Items found satisfying net.ipv4.conf.default.rp_filter static configuration:
|
Disable WiFi or Bluetooth in BIOS
Rule ID | xccdf_org.ssgproject.content_rule_wireless_disable_in_bios |
Result | notchecked |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-26878-9 |
Description | Some systems that include built-in wireless support offer the ability to disable the device through the BIOS. This is system-specific; consult your hardware manual or explore the BIOS setup during boot. |
Rationale | Disabling wireless support in the BIOS prevents easy activation of the wireless interface, generally requiring administrators to reboot the system first. |
Deactivate Wireless Network Interfaces
Rule ID | xccdf_org.ssgproject.content_rule_deactivate_wireless_interfaces | ||||||
Result | pass | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27057-9 references: AC-18(a), AC-18(d), AC-18(3), CM-7, 85, test_attestation | ||||||
Description | Deactivating wireless network interfaces should prevent
normal usage of the wireless capability.
$ ifconfig -aAdditionally, the following command may be used to determine whether wireless support is included for a particular interface, though this may not always be a clear indicator: $ iwconfigAfter identifying any wireless interfaces (which may have names like wlan0 , ath0 , wifi0 , em1 or
eth0 ), deactivate the interface with the command:
$ sudo ifdown interfaceThese changes will only last until the next reboot. To disable the interface for future boots, remove the appropriate interface file from /etc/sysconfig/network-scripts :
$ sudo rm /etc/sysconfig/network-scripts/ifcfg-interface | ||||||
Rationale | Wireless networking allows attackers within physical proximity to launch network-based attacks against systems, including those against local LAN protocols which were not designed with security in mind. | ||||||
OVAL details Items not found satisfying query /proc/net/wireless:Object oval:ssg:obj:2203 of type textfilecontent54_object
|
Disable Bluetooth Service
Rule ID | xccdf_org.ssgproject.content_rule_service_bluetooth_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27081-9 references: AC-18(a), AC-18(d), AC-18(3), CM-7, 85, 1551, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig bluetooth off $ sudo service bluetooth stop | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Disabling the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:2252 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2254 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2255 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2256 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2257 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2258 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2259 of type runlevel_object
State oval:ssg:ste:2253 of type runlevel_state
|
Disable Bluetooth Kernel Modules
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled | ||||||||||||||||
Result | fail | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | medium | ||||||||||||||||
Identifiers and References | identifiers: CCE-26763-3 references: AC-18(a), AC-18(d), AC-18(3), CM-7, 85, 1551, test_attestation | ||||||||||||||||
Description | The kernel's module loading system can be configured to prevent
loading of the Bluetooth module. Add the following to
the appropriate install net-pf-31 /bin/false install bluetooth /bin/false | ||||||||||||||||
Rationale | If Bluetooth functionality must be disabled, preventing the kernel from loading the kernel module provides an additional safeguard against its activation. | ||||||||||||||||
OVAL details Items not found violating kernel module bluetooth disabled:Object oval:ssg:obj:1534 of type textfilecontent54_object
Items not found violating kernel module net-pf-31 disabled:Object oval:ssg:obj:1535 of type textfilecontent54_object
|
Disable IPv6 Networking Support Automatic Loading
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled | ||||||||
Result | fail | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27153-6 references: CM-7, 1551, test_attestation | ||||||||
Description | To prevent the IPv6 kernel module ( options ipv6 disable=1This permits the IPv6 module to be loaded (and thus satisfy other modules that depend on it), while disabling support for the IPv6 protocol. | ||||||||
Rationale | Any unnecessary network stacks - including IPv6 - should be disabled, to reduce the vulnerability to exploitation. | ||||||||
OVAL details Items not found violating ipv6 disabled any modprobe conf file:Object oval:ssg:obj:1333 of type textfilecontent54_object
|
Disable Interface Usage of IPv6
Rule ID | xccdf_org.ssgproject.content_rule_network_ipv6_disable_interfaces |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-27161-9 |
Description | To disable interface usage of IPv6, add or correct the following lines in NETWORKING_IPV6=no IPV6INIT=no |
Disable Support for RPC IPv6
Rule ID | xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc | ||||||||
Result | fail | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27232-8 references: CM-7 | ||||||||
Description | RPC services for NFSv4 try to load transport modules for
udp6 tpi_clts v inet6 udp - - tcp6 tpi_cots_ord v inet6 tcp - - | ||||||||
OVAL details Items found violating Test for udp6 based rpc services:
Items found violating Test for tcp6 based rpc services:
|
Disable Accepting IPv6 Router Advertisements
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27164-3 references: CM-7 | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv6.conf.default.accept_ra=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv6.conf.default.accept_ra = 0 | ||||||||||
Rationale | An illicit router advertisement message could result in a man-in-the-middle attack. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv6.conf.default.accept_ra set to 0:
Items not found violating net.ipv6.conf.default.accept_ra static configuration:Object oval:ssg:obj:1815 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Disable Accepting IPv6 Redirects
Rule ID | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects | ||||||||||
Result | error | ||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||
Severity | medium | ||||||||||
Identifiers and References | identifiers: CCE-27166-8 | ||||||||||
Description |
To set the runtime status of the # sysctl -w net.ipv6.conf.default.accept_redirects=0If this is not the system's default value, add the following line to /etc/sysctl.conf :
net.ipv6.conf.default.accept_redirects = 0 | ||||||||||
Rationale | An illicit ICMP redirect message could result in a man-in-the-middle attack. | ||||||||||
OVAL details Items found violating kernel runtime parameter net.ipv6.conf.default.accept_redirects set to 0:
Items not found violating net.ipv6.conf.default.accept_redirects static configuration:Object oval:ssg:obj:1593 of type textfilecontent54_object
| |||||||||||
Remediation script:
|
Manually Assign Global IPv6 Address
Rule ID | xccdf_org.ssgproject.content_rule_network_ipv6_static_address | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27233-6 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||
Description | To manually assign an IP address for an interface, edit the
file IPV6ADDR=2001:0DB8::ABCD/64Manually assigning an IP address is preferable to accepting one from routers or from the network otherwise. The example address here is an IPv6 address reserved for documentation purposes, as defined by RFC3849. | ||||||||
OVAL details Items not found violating Set static IPv6 address on each interface:Object oval:ssg:obj:1931 of type textfilecontent54_object
|
Use Privacy Extensions for Address
Rule ID | xccdf_org.ssgproject.content_rule_network_ipv6_privacy_extensions | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27154-4 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||
Description | To introduce randomness into the automatic generation of IPv6
addresses, add or correct the following line in
IPV6_PRIVACY=rfc3041Automatically-generated IPv6 addresses are based on the underlying hardware (e.g. Ethernet) address, and so it becomes possible to track a piece of hardware over its lifetime using its traffic. If it is important for a system's IP address to not trivially reveal its hardware address, this setting should be applied. | ||||||||
OVAL details Items not found violating Enable privacy extensions on each interface:Object oval:ssg:obj:1542 of type textfilecontent54_object
|
Manually Assign IPv6 Router Address
Rule ID | xccdf_org.ssgproject.content_rule_network_ipv6_default_gateway | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27234-4 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf | ||||||||
Description | Edit the file
IPV6_DEFAULTGW=2001:0DB8::0001Router addresses should be manually set and not accepted via any auto-configuration or router advertisement. | ||||||||
OVAL details Items not found violating Define default gateways:Object oval:ssg:obj:1303 of type textfilecontent54_object
|
Verify ip6tables Enabled if Using IPv6
Rule ID | xccdf_org.ssgproject.content_rule_service_ip6tables_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27006-6 references: AC-4, CA-3(c), CM-7, 32, 66, 1115, 1118, 1092, 1117, 1098, 1100, 1097, 1414, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig --level 2345 ip6tables on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Set Default ip6tables Policy for Incoming Packets
Rule ID | xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-27317-7 | ||||||||||||
Description | To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
:INPUT DROP [0:0]If changes were required, reload the ip6tables rules: $ sudo service ip6tables reload | ||||||||||||
Rationale | In | ||||||||||||
OVAL details Items not found violating Check /etc/sysconfig/ip6tables for line :INPUT DROP [0:0]:Object oval:ssg:obj:2183 of type textfilecontent54_object
Items not found violating Check /etc/sysconfig/ip6tables for line :INPUT ACCEPT [0:0]:Object oval:ssg:obj:2184 of type textfilecontent54_object
|
Verify iptables Enabled
Rule ID | xccdf_org.ssgproject.content_rule_service_iptables_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27018-1 references: AC-4, CA-3(c), CM-7, 32, 66, 1115, 1118, 1092, 1117, 1098, 1100, 1097, 1414, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig --level 2345 iptables on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale |
The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Set Default iptables Policy for Incoming Packets
Rule ID | xccdf_org.ssgproject.content_rule_set_iptables_default_rule | ||||||||||||
Result | error | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-26444-0 | ||||||||||||
Description | To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
:INPUT DROP [0:0] | ||||||||||||
Rationale | In | ||||||||||||
OVAL details Items not found violating Check /etc/sysconfig/iptables for line :INPUT DROP [0:0]:Object oval:ssg:obj:1692 of type textfilecontent54_object
Items not found violating Check /etc/sysconfig/iptables for line :INPUT ACCEPT [0:0]:Object oval:ssg:obj:1693 of type textfilecontent54_object
| |||||||||||||
Remediation script:
|
Set Default iptables Policy for Forwarded Packets
Rule ID | xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward | ||||||||||||
Result | error | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-27186-6 | ||||||||||||
Description | To set the default policy to DROP (instead of ACCEPT) for
the built-in FORWARD chain which processes packets that will be forwarded from
one interface to another,
add or correct the following line in
:FORWARD DROP [0:0] | ||||||||||||
Rationale | In | ||||||||||||
OVAL details Items not found violating Check /etc/sysconfig/iptables for line :FORWARD DROP [0:0]:Object oval:ssg:obj:1306 of type textfilecontent54_object
Items not found violating Check /etc/sysconfig/iptables for line :FORWARD ACCEPT [0:0]:Object oval:ssg:obj:1307 of type textfilecontent54_object
| |||||||||||||
Remediation script:
|
Disable DCCP Support
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-26448-1 references: CM-7, 382, test_attestation | ||||||||||||||
Description |
The Datagram Congestion Control Protocol (DCCP) is a
relatively new transport layer protocol, designed to support
streaming media and telephony.
To configure the system to prevent the install dccp /bin/false | ||||||||||||||
Rationale | Disabling DCCP protects the system against exploitation of any flaws in its implementation. | ||||||||||||||
OVAL details Items not found violating kernel module dccp disabled:Object oval:ssg:obj:2249 of type textfilecontent54_object
Items not found violating kernel module dccp disabled in /etc/modprobe.conf:Object oval:ssg:obj:2250 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable SCTP Support
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-26410-1 references: CM-7, 382, test_attestation | ||||||||||||||
Description |
The Stream Control Transmission Protocol (SCTP) is a
transport layer protocol, designed to support the idea of
message-oriented communication, with several streams of messages
within one connection.
To configure the system to prevent the install sctp /bin/false | ||||||||||||||
Rationale | Disabling SCTP protects the system against exploitation of any flaws in its implementation. | ||||||||||||||
OVAL details Items not found violating kernel module sctp disabled:Object oval:ssg:obj:1373 of type textfilecontent54_object
Items not found violating kernel module sctp disabled in /etc/modprobe.conf:Object oval:ssg:obj:1374 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable RDS Support
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26239-4 references: CM-7, 382, test_attestation | ||||||||||||||
Description |
The Reliable Datagram Sockets (RDS) protocol is a transport
layer protocol designed to provide reliable high- bandwidth,
low-latency communications between nodes in a cluster.
To configure the system to prevent the install rds /bin/false | ||||||||||||||
Rationale | Disabling RDS protects the system against exploitation of any flaws in its implementation. | ||||||||||||||
OVAL details Items not found violating kernel module rds disabled:Object oval:ssg:obj:1786 of type textfilecontent54_object
Items not found violating kernel module rds disabled in /etc/modprobe.conf:Object oval:ssg:obj:1787 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Disable TIPC Support
Rule ID | xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled | ||||||||||||||
Result | error | ||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-26696-5 references: CM-7, 382, test_attestation | ||||||||||||||
Description |
The Transparent Inter-Process Communication (TIPC) protocol
is designed to provide communications between nodes in a
cluster.
To configure the system to prevent the install tipc /bin/false | ||||||||||||||
Rationale | Disabling TIPC protects the system against exploitation of any flaws in its implementation. | ||||||||||||||
OVAL details Items not found violating kernel module tipc disabled:Object oval:ssg:obj:1900 of type textfilecontent54_object
Items not found violating kernel module tipc disabled in /etc/modprobe.conf:Object oval:ssg:obj:1901 of type textfilecontent54_object
| |||||||||||||||
Remediation script:
|
Install openswan Package
Rule ID | xccdf_org.ssgproject.content_rule_package_openswan_installed | ||
Result | notselected | ||
Time | 2015-08-22T01:35:58 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27626-1 | ||
Description | The Openswan package provides an implementation of IPsec
and IKE, which permits the creation of secure tunnels over
untrusted networks.
The # yum install openswan | ||
Rationale | Providing the ability for remote users or systems to initiate a secure VPN connection protects information when it is transmitted over a wide area network. | ||
OVAL details Items not found violating package openswan is installed:Object oval:ssg:obj:2156 of type rpminfo_object
|
Disable Zeroconf Networking
Rule ID | xccdf_org.ssgproject.content_rule_network_disable_zeroconf | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:05 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27151-0 references: CM-7 | ||||||
Description | Zeroconf networking allows the system to assign itself an IP
address and engage in IP communication without a statically-assigned address or
even a DHCP server. Automatic address assignment via Zeroconf (or DHCP) is not
recommended. To disable Zeroconf automatic route assignment in the 169.254.0.0
subnet, add or correct the following line in NOZEROCONF=yes | ||||||
Rationale | Zeroconf addresses are in the network 169.254.0.0. The networking scripts add entries to the system's routing table for these addresses. Zeroconf address assignment commonly occurs when the system is configured to use DHCP but fails to receive an address assignment from the DHCP server. | ||||||
OVAL details Items not found violating check NOZEROCONF=yes in /etc/sysconfig/network:Object oval:ssg:obj:1816 of type textfilecontent54_object
| |||||||
Remediation script:
|
Ensure System is Not Acting as a Network Sniffer
Rule ID | xccdf_org.ssgproject.content_rule_network_sniffer_disabled | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27152-8 | ||||||
Description | The system should not be acting as a network sniffer, which can capture all traffic on the network to which it is connected. Run the following to determine if any interface is running in promiscuous mode: $ ip link | grep PROMISC | ||||||
Rationale | If any results are returned, then a sniffing process (such as tcpdump or Wireshark) is likely to be using the interface and this should be investigated. | ||||||
OVAL details Items not found violating random:Object oval:ssg:obj:1316 of type interface_object
State oval:ssg:ste:1317 of type interface_state
|
Ensure Log Files Are Owned By Appropriate User
Rule ID | xccdf_org.ssgproject.content_rule_userowner_rsyslog_files | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26812-8 references: AC-6, 1314, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The owner of all log files written by
$ ls -l LOGFILEIf the owner is not root , run the following command to
correct this:
$ sudo chown root LOGFILE | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The log files generated by rsyslog contain valuable information regarding system configuration, user authentication, and other such information. Log files should be protected from unauthorized access. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Files that end in .log in /var/log owned by root:
|
Ensure Log Files Are Owned By Appropriate Group
Rule ID | xccdf_org.ssgproject.content_rule_groupowner_rsyslog_files |
Result | unknown |
Time | 2015-08-22T01:35:58 |
Severity | medium |
Identifiers and References | identifiers: CCE-26821-9 references: AC-6, 1314, test_attestation |
Description | The group-owner of all log files written by
$ ls -l LOGFILEIf the owner is not root , run the following command to
correct this:
$ sudo chgrp root LOGFILE |
Rationale | The log files generated by rsyslog contain valuable information regarding system configuration, user authentication, and other such information. Log files should be protected from unauthorized access. |
Ensure Logrotate Runs Periodically
Rule ID | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated | ||||||||||||||||
Result | error | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | low | ||||||||||||||||
Identifiers and References | identifiers: CCE-27014-0 | ||||||||||||||||
Description | The # rotate log files frequency daily | ||||||||||||||||
Rationale | Log files that are not properly rotated run the risk of growing so large that they fill up the /var/log partition. Valuable logging information could be lost if the /var/log partition becomes full. | ||||||||||||||||
OVAL details Items not found violating Tests the presence of daily setting in /etc/logrotate.conf file:Object oval:ssg:obj:2163 of type textfilecontent54_object
Items not found violating Tests the existence of /etc/cron.daily/logrotate file (and verify it actually calls logrotate utility):Object oval:ssg:obj:2164 of type textfilecontent54_object
|
Configure Logwatch HostLimit Line
Rule ID | xccdf_org.ssgproject.content_rule_configure_logwatch_hostlimit | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27197-3 | ||||||||
Description | On a central logserver, you want Logwatch to summarize all syslog entries, including those which did not originate
on the logserver itself. The HostLimit = no | ||||||||
OVAL details Items not found violating Test HostLimit:Object oval:ssg:obj:2077 of type textfilecontent54_object
|
Configure Logwatch SplitHosts Line
Rule ID | xccdf_org.ssgproject.content_rule_configure_logwatch_splithosts | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27069-4 | ||||||||
Description |
If SplitHosts = yes | ||||||||
OVAL details Items not found violating Test SplitHosts:Object oval:ssg:obj:1837 of type textfilecontent54_object
|
Ensure rsyslog is Installed
Rule ID | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | ||||||||||||||||
Result | pass | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | medium | ||||||||||||||||
Identifiers and References | identifiers: CCE-26809-4 references: AU-9(2), 1311, 1312, test_attestation | ||||||||||||||||
Description |
Rsyslog is installed by default.
The # yum install rsyslog | ||||||||||||||||
Rationale | The rsyslog package provides the rsyslog daemon, which provides system logging services. | ||||||||||||||||
OVAL details Items found satisfying package rsyslog is installed:
|
Enable rsyslog Service
Rule ID | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26807-8 references: AU-12, 1557, 1312, 1311, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig --level 2345 rsyslog on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Disable Logwatch on Clients if a Logserver Exists
Rule ID | xccdf_org.ssgproject.content_rule_disable_logwatch_for_logserver |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | low |
Identifiers and References | identifiers: CCE-27162-7 |
Description | Does your site have a central logserver which has been configured to report on logs received from all systems? If so: $ sudo rm /etc/cron.daily/0logwatchIf no logserver exists, it will be necessary for each machine to run Logwatch individually. Using a central logserver provides the security and reliability benefits discussed earlier, and also makes monitoring logs easier and less time-intensive for administrators. |
Configure auditd Number of Logs Retained
Rule ID | xccdf_org.ssgproject.content_rule_configure_auditd_num_logs | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27522-2 references: AU-1(b), AU-11, IR-5, test_attestation | ||||||||
Description | Determine how many log files
num_logs = NUMLOGSSet the value to 5 for general-purpose systems. Note that values less than 2 result in no log rotation. | ||||||||
Rationale | The total storage for audit log files must be large enough to retain log information over the period required. This is a function of the maximum log file size and the number of logs retained. | ||||||||
OVAL details Items not found violating admin space left action :Object oval:ssg:obj:2064 of type textfilecontent54_object
State oval:ssg:ste:2065 of type textfilecontent54_state
|
Configure auditd Max Log File Size
Rule ID | xccdf_org.ssgproject.content_rule_configure_auditd_max_log_file | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27550-3 references: AU-1(b), AU-11, IR-5, test_attestation | ||||||||
Description | Determine the amount of audit data (in megabytes)
which should be retained in each log file. Edit the file
max_log_file = STOREMBSet the value to 6 (MB) or higher for general-purpose systems.
Larger values, of course,
support retention of even more audit data. | ||||||||
Rationale | The total storage for audit log files must be large enough to retain log information over the period required. This is a function of the maximum log file size and the number of logs retained. | ||||||||
OVAL details Items not found violating max log file size:Object oval:ssg:obj:1914 of type textfilecontent54_object
State oval:ssg:ste:1915 of type textfilecontent54_state
|
Configure auditd max_log_file_action Upon Reaching Maximum Log Size
Rule ID | xccdf_org.ssgproject.content_rule_configure_auditd_max_log_file_action | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27237-7 references: AU-1(b), AU-4, AU-11, IR-5, test_attestation | ||||||||
Description | The default action to take when the logs reach their maximum size
is to rotate the log files, discarding the oldest one. To configure the action taken
by max_log_file_action = ACTIONPossible values for ACTION are described in the auditd.conf man
page. These include:
ACTION to rotate to ensure log rotation
occurs. This is the default. The setting is case-insensitive.
| ||||||||
Rationale | Automatically rotating logs (by setting this to | ||||||||
OVAL details Items not found violating admin space left action :Object oval:ssg:obj:1487 of type textfilecontent54_object
State oval:ssg:ste:1488 of type textfilecontent54_state
|
Configure auditd space_left Action on Low Disk Space
Rule ID | xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27238-5 references: AU-1(b), AU-4, AU-5(b), IR-5, 140, 143, test_attestation | ||||||||
Description | The space_left_action = ACTIONPossible values for ACTION are described in the auditd.conf man page.
These include:
email (instead of the default,
which is suspend ) as it is more likely to get prompt attention. Acceptable values
also include suspend , single , and halt .
| ||||||||
Rationale | Notifying administrators of an impending disk space problem may allow them to take corrective action prior to any disruption. | ||||||||
OVAL details Items not found violating space left action:Object oval:ssg:obj:1437 of type textfilecontent54_object
State oval:ssg:ste:1438 of type textfilecontent54_state
|
Configure auditd admin_space_left Action on Low Disk Space
Rule ID | xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27239-3 references: AU-1(b), AU-4, AU-5(b), IR-5, 140, 1343, test_attestation | ||||||||
Description | The admin_space_left_action = ACTIONSet this value to single to cause the system to switch to single user
mode for corrective action. Acceptable values also include suspend and
halt . For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined. Details regarding all possible values for ACTION are described in the
auditd.conf man page.
| ||||||||
Rationale | Administrators should be made aware of an inability to record audit records. If a separate partition or logical volume of adequate size is used, running low on space for audit records should never occur. | ||||||||
OVAL details Items not found violating space left action:Object oval:ssg:obj:2217 of type textfilecontent54_object
State oval:ssg:ste:2218 of type textfilecontent54_state
|
Configure auditd mail_acct Action on Low Disk Space
Rule ID | xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | medium | ||||||||
Identifiers and References | identifiers: CCE-27241-9 | ||||||||
Description | The action_mail_acct = root | ||||||||
Rationale | Email sent to the root account is typically aliased to the administrators of the system, who can take appropriate action. | ||||||||
OVAL details Items not found violating email account for actions:Object oval:ssg:obj:1690 of type textfilecontent54_object
State oval:ssg:ste:1691 of type textfilecontent54_state
|
Configure auditd to use audispd plugin
Rule ID | xccdf_org.ssgproject.content_rule_configure_auditd_audispd |
Result | notselected |
Time | 2015-08-22T01:35:58 |
Severity | medium |
Identifiers and References | identifiers: CCE-26933-2 |
Description | To configure the $ sudo service auditd restart |
Rationale | The auditd service does not include the ability to send audit records to a centralized server for management directly. It does, however, include an audit event multiplexor plugin (audispd) to pass audit records to the local syslog server |
Record attempts to alter time through adjtimex
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | ||||||||||||||||
Result | fail | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | low | ||||||||||||||||
Identifiers and References | identifiers: CCE-26242-8 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 1487, 169 | ||||||||||||||||
Description | On a 32-bit system, add the following to # audit_time_rules -a always,exit -F arch=b32 -S adjtimex -k audit_time_rulesOn a 64-bit system, add the following to /etc/audit/audit.rules :
# audit_time_rules -a always,exit -F arch=b64 -S adjtimex -k audit_time_rulesThe -k option allows for the specification of a key in string form that can be used for better reporting capability through ausearch and aureport. Multiple system calls can be defined on the same line to save space if desired, but is not required. See an example of multiple combined syscalls: -a always,exit -F arch=b64 -S adjtimex -S settimeofday -S clock_settime -k audit_time_rules | ||||||||||||||||
Rationale | Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. | ||||||||||||||||
OVAL details Items not found violating Tests the for presence of 32bit -S adjtime and key:Object oval:ssg:obj:1696 of type textfilecontent54_object
Items not found violating Tests the for presence of 64bit -S adjtime and key:Object oval:ssg:obj:1697 of type textfilecontent54_object
|
Record attempts to alter time through settimeofday
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | ||||||||||||||||
Result | fail | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | low | ||||||||||||||||
Identifiers and References | identifiers: CCE-27203-9 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 1487, 169 | ||||||||||||||||
Description | On a 32-bit system, add the following to # audit_time_rules -a always,exit -F arch=b32 -S settimeofday -k audit_time_rulesOn a 64-bit system, add the following to /etc/audit/audit.rules :
# audit_time_rules -a always,exit -F arch=b64 -S settimeofday -k audit_time_rulesThe -k option allows for the specification of a key in string form that can be used for better reporting capability through ausearch and aureport. Multiple system calls can be defined on the same line to save space if desired, but is not required. See an example of multiple combined syscalls: -a always,exit -F arch=b64 -S adjtimex -S settimeofday -S clock_settime -k audit_time_rules | ||||||||||||||||
Rationale | Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. | ||||||||||||||||
OVAL details Items not found violating Tests the for presence of 32bit -S settimeofday and key:Object oval:ssg:obj:1770 of type textfilecontent54_object
Items not found violating Tests the for presence of 64bit -S settimeofday and key:Object oval:ssg:obj:1771 of type textfilecontent54_object
|
Record Attempts to Alter Time Through stime
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_time_stime | ||||||||
Result | pass | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27169-2 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 1487, 169 | ||||||||
Description | On a 32-bit system, add the following to # audit_time_rules -a always,exit -F arch=b32 -S stime -k audit_time_rulesOn a 64-bit system, the "-S stime" is not necessary. The -k option allows for the specification of a key in string form that can be used for better reporting capability through ausearch and aureport. Multiple system calls can be defined on the same line to save space if desired, but is not required. See an example of multiple combined syscalls: -a always,exit -F arch=b64 -S adjtimex -S settimeofday -S clock_settime -k audit_time_rules | ||||||||
Rationale | Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. | ||||||||
OVAL details Items not found satisfying Tests the for presence of 32bit -S stime and key:Object oval:ssg:obj:2114 of type textfilecontent54_object
|
Record Attempts to Alter Time Through clock_settime
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | ||||||||||||||||
Result | fail | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | low | ||||||||||||||||
Identifiers and References | identifiers: CCE-27170-0 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 1487, 169 | ||||||||||||||||
Description | On a 32-bit system, add the following to # audit_time_rules -a always,exit -F arch=b32 -S clock_settime -k audit_time_rulesOn a 64-bit system, add the following to /etc/audit/audit.rules :
# audit_time_rules -a always,exit -F arch=b64 -S clock_settime -k audit_time_rulesThe -k option allows for the specification of a key in string form that can be used for better reporting capability through ausearch and aureport. Multiple system calls can be defined on the same line to save space if desired, but is not required. See an example of multiple combined syscalls: -a always,exit -F arch=b64 -S adjtimex -S settimeofday -S clock_settime -k audit_time_rules | ||||||||||||||||
Rationale | Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. | ||||||||||||||||
OVAL details Items not found violating Tests the for presence of 32bit -S clock_settime and key:Object oval:ssg:obj:1984 of type textfilecontent54_object
Items not found violating Tests the for presence of 64bit -S clock_settime and key:Object oval:ssg:obj:1985 of type textfilecontent54_object
|
Record Attempts to Alter the localtime File
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime | ||||||||
Result | fail | ||||||||
Time | 2015-08-22T01:35:58 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27172-6 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 1487, 169 | ||||||||
Description | Add the following to -w /etc/localtime -p wa -k audit_time_rulesThe -k option allows for the specification of a key in string form that can be used for better reporting capability through ausearch and aureport and should always be used. | ||||||||
Rationale | Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. | ||||||||
OVAL details Items not found violating Tests the for presence etc localtime file in the rules file:Object oval:ssg:obj:2185 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - chmod
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26280-8 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S chmod -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S chmod -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification chmod x32:Object oval:ssg:obj:2107 of type textfilecontent54_object
Items not found violating dac modification chmod x64:Object oval:ssg:obj:2108 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - chown
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27173-4 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S chown -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S chown -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification chown x32:Object oval:ssg:obj:1805 of type textfilecontent54_object
Items not found violating dac modification chown x64:Object oval:ssg:obj:1806 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - fchmod
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27174-2 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S fchmod -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S fchmod -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification fchmod x32:Object oval:ssg:obj:1518 of type textfilecontent54_object
Items not found violating dac modification fchmod x64:Object oval:ssg:obj:1519 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27175-9 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification fchmodat x32:Object oval:ssg:obj:2157 of type textfilecontent54_object
Items not found violating dac modification fchmodat x64:Object oval:ssg:obj:2158 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - fchown
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27177-5 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S fchown -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S fchown -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification fchown x32:Object oval:ssg:obj:1512 of type textfilecontent54_object
Items not found violating dac modification fchown x64:Object oval:ssg:obj:1513 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - fchownat
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27178-3 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S fchownat -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S fchownat -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification fchownat x32:Object oval:ssg:obj:1362 of type textfilecontent54_object
Items not found violating dac modification fchownat x64:Object oval:ssg:obj:1363 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27179-1 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification fremovexattr x32:Object oval:ssg:obj:1371 of type textfilecontent54_object
Items not found violating dac modification fremovexattr x64:Object oval:ssg:obj:1372 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27180-9 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification fsetxattr x32:Object oval:ssg:obj:1349 of type textfilecontent54_object
Items not found violating dac modification fsetxattr x64:Object oval:ssg:obj:1350 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - lchown
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27181-7 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S lchown -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification lchown x32:Object oval:ssg:obj:1310 of type textfilecontent54_object
Items not found violating dac modification lchown x64:Object oval:ssg:obj:1311 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27182-5 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification lremovexattr x32:Object oval:ssg:obj:1537 of type textfilecontent54_object
Items not found violating dac modification lremovexattr x64:Object oval:ssg:obj:1538 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27183-3 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification lsetxattr x32:Object oval:ssg:obj:1417 of type textfilecontent54_object
Items not found violating dac modification lsetxattr x64:Object oval:ssg:obj:1418 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - removexattr
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27184-1 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S removexattr -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S removexattr -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification removexattr x32:Object oval:ssg:obj:1494 of type textfilecontent54_object
Items not found violating dac modification removexattr x64:Object oval:ssg:obj:1495 of type textfilecontent54_object
|
Record Events that Modify the System's Discretionary Access Controls - setxattr
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr | ||||||||||||
Result | fail | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27185-8 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||
Description | At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
-a always,exit -F arch=b32 -S setxattr -F auid>=500 -F auid!=4294967295 -k perm_modIf the system is 64 bit then also add the following: -a always,exit -F arch=b64 -S setxattr -F auid>=500 -F auid!=4294967295 -k perm_mod | ||||||||||||
Rationale | The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identification of patterns of abuse among both authorized and unauthorized users. | ||||||||||||
Warnings | warning
Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
| ||||||||||||
OVAL details Items not found violating dac modification setxattr x32:Object oval:ssg:obj:1650 of type textfilecontent54_object
Items not found violating dac modification setxattr x64:Object oval:ssg:obj:1651 of type textfilecontent54_object
|
Record Events that Modify User/Group Information
Rule ID | xccdf_org.ssgproject.content_rule_audit_account_changes | ||||||||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26664-3 references: AC-2(4), AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 18, 1403, 1404, 1405, 1684, 1683, 1685, 1686 | ||||||||||||||||||||||||||||||
Description | Add the following to # audit_account_changes -w /etc/group -p wa -k audit_account_changes -w /etc/passwd -p wa -k audit_account_changes -w /etc/gshadow -p wa -k audit_account_changes -w /etc/shadow -p wa -k audit_account_changes -w /etc/security/opasswd -p wa -k audit_account_changes | ||||||||||||||||||||||||||||||
Rationale | In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications. Any unexpected users, groups, or modifications should be investigated for legitimacy. | ||||||||||||||||||||||||||||||
OVAL details Items not found violating audit /etc/group:Object oval:ssg:obj:2022 of type textfilecontent54_object
Items not found violating audit /etc/passwd:Object oval:ssg:obj:2023 of type textfilecontent54_object
Items not found violating audit /etc/gshadow:Object oval:ssg:obj:2024 of type textfilecontent54_object
Items not found violating audit /etc/shadow:Object oval:ssg:obj:2025 of type textfilecontent54_object
Items not found violating audit /etc/security/opasswd:Object oval:ssg:obj:2026 of type textfilecontent54_object
|
Record Events that Modify the System's Network Environment
Rule ID | xccdf_org.ssgproject.content_rule_audit_network_modifications | ||||||||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26648-6 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5 | ||||||||||||||||||||||||||||||
Description | Add the following to # audit_network_modifications -a always,exit -F arch=ARCH -S sethostname -S setdomainname -k audit_network_modifications -w /etc/issue -p wa -k audit_network_modifications -w /etc/issue.net -p wa -k audit_network_modifications -w /etc/hosts -p wa -k audit_network_modifications -w /etc/sysconfig/network -p wa -k audit_network_modifications | ||||||||||||||||||||||||||||||
Rationale | The network environment should not be modified by anything other than administrator action. Any change to network parameters should be audited. | ||||||||||||||||||||||||||||||
OVAL details Items not found violating network modification syscall:Object oval:ssg:obj:1496 of type textfilecontent54_object
Items not found violating /etc/issue modification:Object oval:ssg:obj:1497 of type textfilecontent54_object
Items not found violating /etc/issue.net modification:Object oval:ssg:obj:1498 of type textfilecontent54_object
Items not found violating /etc/hosts modification:Object oval:ssg:obj:1499 of type textfilecontent54_object
Items not found violating /etc/sysconfig/network modification:Object oval:ssg:obj:1500 of type textfilecontent54_object
|
System Audit Logs Must Be Owned By Root
Rule ID | xccdf_org.ssgproject.content_rule_audit_logs_rootowner | ||||||||||||||||
Result | notselected | ||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||
Severity | low | ||||||||||||||||
Identifiers and References | identifiers: CCE-27244-3 references: AC-6, AU-1(b), AU-9, IR-5, 166, test_attestation | ||||||||||||||||
Description |
To properly set the owner of # chown root/var/log | ||||||||||||||||
Rationale | Failure to give ownership of the audit log files to root allows the designated owner, and unauthorized users, potential access to sensitive information. | ||||||||||||||||
OVAL details Items not found violating /var/log/audit files uid root gid root:Object oval:ssg:obj:2294 of type file_object
Items not found violating /var/log/audit directories uid root gid root:Object oval:ssg:obj:2293 of type file_object
|
Record Events that Modify the System's Mandatory Access Controls
Rule ID | xccdf_org.ssgproject.content_rule_audit_mac_changes | ||||||
Result | fail | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-26657-7 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5 | ||||||
Description | Add the following to -w /etc/selinux/ -p wa -k MAC-policy | ||||||
Rationale | The system's mandatory access policy (SELinux) should not be arbitrarily changed by anything other than administrator action. All changes to MAC policy should be audited. | ||||||
OVAL details Items not found violating audit changes selinux:Object oval:ssg:obj:1759 of type textfilecontent54_object
|
Record Attempts to Alter Logon and Logout Events
Rule ID | xccdf_org.ssgproject.content_rule_audit_manual_logon_edits | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-26691-6 | ||||||||||||
Description |
The audit system already collects login info for all users and root. To watch for attempted manual edits of
files involved in storing logon events, add the following to -w /var/log/faillog -p wa -k logins -w /var/log/lastlog -p wa -k logins | ||||||||||||
Rationale | Manual editing of these files may indicate nefarious activity, such as an attacker attempting to remove evidence of an intrusion. | ||||||||||||
OVAL details Items not found violating faillog:Object oval:ssg:obj:1764 of type textfilecontent54_object
Items not found violating lastlog:Object oval:ssg:obj:1765 of type textfilecontent54_object
|
Record Attempts to Alter Process and Session Initiation Information
Rule ID | xccdf_org.ssgproject.content_rule_audit_manual_session_edits | ||||||||||||||||||
Result | notselected | ||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||
Severity | low | ||||||||||||||||||
Identifiers and References | identifiers: CCE-26610-6 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5 | ||||||||||||||||||
Description | The audit system already collects process information for all
users and root. To watch for attempted manual edits of files involved in
storing such process information, add the following to
-w /var/run/utmp -p wa -k session -w /var/log/btmp -p wa -k session -w /var/log/wtmp -p wa -k session | ||||||||||||||||||
Rationale | Manual editing of these files may indicate nefarious activity, such as an attacker attempting to remove evidence of an intrusion. | ||||||||||||||||||
OVAL details Items not found violating utmp:Object oval:ssg:obj:2109 of type textfilecontent54_object
Items not found violating btmp:Object oval:ssg:obj:2110 of type textfilecontent54_object
Items not found violating wtmp:Object oval:ssg:obj:2111 of type textfilecontent54_object
|
Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification | ||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26712-0 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||||||||||||||
Description | At a minimum the audit system should collect
unauthorized file accesses for all users and root. Add the following
to -a always,exit -F arch=b32 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access -a always,exit -F arch=b32 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access -a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access -a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access | ||||||||||||||||||||||||
Rationale | Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing these events could serve as evidence of potential system compromise. | ||||||||||||||||||||||||
OVAL details Items not found violating 32-bit audit file eacces:Object oval:ssg:obj:1321 of type textfilecontent54_object
Items not found violating 32-bit audit file eperm:Object oval:ssg:obj:1322 of type textfilecontent54_object
Items not found violating 64-bit audit file eacces:Object oval:ssg:obj:1323 of type textfilecontent54_object
Items not found violating 64-bit audit file eperm:Object oval:ssg:obj:1324 of type textfilecontent54_object
|
Ensure auditd Collects Information on the Use of Privileged Commands
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands | ||||||||||||||
Result | fail | ||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||
Severity | low | ||||||||||||||
Identifiers and References | identifiers: CCE-26457-2 references: AC-3(10)), AU-1(b), AU-2(a), AU-2(c), AU-2(d), AC-6(9), IR-5, 40, test_attestation | ||||||||||||||
Description | At a minimum the audit system should collect the execution of privileged commands for all users and root. To find the relevant setuid / setgid programs: $ sudo find / -xdev -type f -perm -4000 -o -perm -2000 2>/dev/nullThen, for each setuid / setgid program on the system, add a line of the following form to /etc/audit/audit.rules , where SETUID_PROG_PATH is the full path to each setuid / setgid program
in the list:
-a always,exit -F path=SETUID_PROG_PATH -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged | ||||||||||||||
Rationale | Privileged programs are subject to escalation-of-privilege attacks, which attempt to subvert their normal role of providing some necessary but limited capability. As such, motivation exists to monitor these programs for unusual activity. | ||||||||||||||
OVAL details Items not found violating /etc/audit/audit.rules contains -a always,exit -F path=path_to_binary -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged for each setuid or setgid binary on the system:Object oval:ssg:obj:2260 of type textfilecontent54_object
State oval:ssg:ste:2261 of type textfilecontent54_state
Items found violating check if count of found privileged commands on the system is equal to count of audit.rules privileged commands definitions:
|
Ensure auditd Collects Information on Exporting to Media (successful)
Rule ID | xccdf_org.ssgproject.content_rule_audit_media_exports | ||||||
Result | fail | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-26573-6 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126, test_attestation | ||||||
Description | At a minimum the audit system should collect media
exportation events for all users and root. Add the following to
-a always,exit -F arch=ARCH -S mount -F auid>=500 -F auid!=4294967295 -k export | ||||||
Rationale | The unauthorized exportation of data to external media could result in an information leak where classified information, Privacy Act information, and intellectual property could be lost. An audit trail should be created each time a filesystem is mounted to help identify and guard against information loss. | ||||||
OVAL details Items not found violating audit mount:Object oval:ssg:obj:2282 of type textfilecontent54_object
|
Ensure auditd Collects File Deletion Events by User
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events | ||||||
Result | fail | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-26651-0 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||
Description | At a minimum the audit system should collect file
deletion events for all users and root. Add the following to
-a always,exit -F arch=ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete | ||||||
Rationale | Auditing file deletions will create an audit trail for files that are removed from the system. The audit trail could aid in system troubleshooting, as well as, detecting malicious processes that attempt to delete log files to conceal their presence. | ||||||
OVAL details Items not found violating audit file delete:Object oval:ssg:obj:1986 of type textfilecontent54_object
|
Ensure auditd Collects System Administrator Actions
Rule ID | xccdf_org.ssgproject.content_rule_audit_sysadmin_actions | ||||||
Result | fail | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-26662-7 references: AC-2(7)(b), AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126, test_attestation | ||||||
Description | At a minimum the audit system should collect
administrator actions for all users and root. Add the following to
-w /etc/sudoers -p wa -k actions | ||||||
Rationale | The actions taken by system administrators should be audited to keep a record of what was executed on the system, as well as, for accountability purposes. | ||||||
OVAL details Items not found violating audit sudoers:Object oval:ssg:obj:2102 of type textfilecontent54_object
|
Ensure auditd Collects Information on Kernel Module Loading and Unloading
Rule ID | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading | ||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26611-4 references: AC-3(10), AU-1(b), AU-2(a), AU-2(c), AU-2(d), IR-5, 126 | ||||||||||||||||||||||||
Description | Add the following to -w /sbin/insmod -p x -k modules -w /sbin/rmmod -p x -k modules -w /sbin/modprobe -p x -k modules -a always,exit -F arch=ARCH -S init_module -S delete_module -k modules | ||||||||||||||||||||||||
Rationale | The addition/removal of kernel modules can be used to alter the behavior of the kernel and potentially introduce malicious code into kernel space. It is important to have an audit trail of modules that have been introduced into the kernel. | ||||||||||||||||||||||||
OVAL details Items not found violating audit insmod:Object oval:ssg:obj:1677 of type textfilecontent54_object
Items not found violating audit rmmod:Object oval:ssg:obj:1678 of type textfilecontent54_object
Items not found violating audit modprobe:Object oval:ssg:obj:1679 of type textfilecontent54_object
Items not found violating audit module syscalls:Object oval:ssg:obj:1680 of type textfilecontent54_object
|
Make the auditd Configuration Immutable
Rule ID | xccdf_org.ssgproject.content_rule_audit_config_immutable | ||||||
Result | fail | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-26612-2 | ||||||
Description | Add the following to -e 2With this setting, a reboot will be required to change any audit rules. | ||||||
Rationale | Making the audit configuration immutable prevents accidental as well as malicious modification of the audit rules, although it may be problematic if legitimate changes are needed during system operation | ||||||
OVAL details Items not found violating immutable:Object oval:ssg:obj:1623 of type textfilecontent54_object
|
Enable auditd Service
Rule ID | xccdf_org.ssgproject.content_rule_service_auditd_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:35:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27058-7 references: AC-17(1), AU-1(b), AU-10, AU-12(a), AU-12(c), IR-5, 347, 157, 172, 880, 1353, 1462, 1487, 1115, 1454, 067, 158, 831, 1190, 1312, 1263, 130, 120, 1589, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig --level 2345 auditd on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Ensuring the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Rule ID | xccdf_org.ssgproject.content_rule_bootloader_audit_argument | ||||||
Result | error | ||||||
Time | 2015-08-22T01:35:58 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26785-6 references: AC-17(1), AU-1(b), AU-2(a), AU-2(c), AU-2(d), AU-10, IR-5, 1464, 130 | ||||||
Description | To ensure all processes can be audited, even
those which start prior to the audit daemon, add the argument
kernel /vmlinuz-version ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet audit=1 | ||||||
Rationale |
Each process on the system carries an "auditable" flag which
indicates whether its activities can be audited. Although | ||||||
OVAL details Items not found violating check for audit=1 in /etc/grub.conf:Object oval:ssg:obj:1416 of type textfilecontent54_object
| |||||||
Remediation script:
|
Disable xinetd Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_xinetd | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27046-2 references: CM-7, 305, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig xinetd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The xinetd service provides a dedicated listener service for some programs, which is no longer necessary for commonly-used network services. Disabling it ensures that these uncommon services are not running, and also prevents attacks against xinetd itself. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1502 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1504 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1505 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1506 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1507 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1508 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1509 of type runlevel_object
State oval:ssg:ste:1503 of type runlevel_state
|
Uninstall xinetd Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_xinetd | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27005-8 references: CM-7, 305, test_attestation | ||
Description | The $ sudo yum erase xinetd | ||
Rationale |
Removing the | ||
OVAL details Items not found satisfying package xinetd is removed:Object oval:ssg:obj:1565 of type rpminfo_object
|
Disable telnet Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_telnet_service | ||||||
Result | pass | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-26836-7 references: CM-7, IA-5(1)(c), 68, 1436, 197, 877, 888, test_attestation | ||||||
Description |
The # chkconfig telnet off | ||||||
Rationale | The telnet protocol uses unencrypted network communication, which means that data from the login session, including passwords and all other information transmitted during the session, can be stolen by eavesdroppers on the network. The telnet protocol is also subject to man-in-the-middle attacks. | ||||||
OVAL details Items not found satisfying Disable Telnet Service:Object oval:ssg:obj:1493 of type textfilecontent54_object
|
Uninstall telnet-server Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_telnet_server | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | high | ||
Identifiers and References | identifiers: CCE-27073-6 references: CM-7, 305, 381, test_attestation | ||
Description | The $ sudo yum erase telnet-server | ||
Rationale |
Removing the | ||
OVAL details Items not found satisfying package telnet-server is removed:Object oval:ssg:obj:1511 of type rpminfo_object
|
Remove telnet Clients
Rule ID | xccdf_org.ssgproject.content_rule_package_telnet_removed | ||
Result | notselected | ||
Time | 2015-08-22T01:36:03 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE- | ||
Description | The telnet client allows users to start connections to other systems via the telnet protocol. | ||
Rationale | The | ||
OVAL details Items not found violating package telnet is removed:Object oval:ssg:obj:2182 of type rpminfo_object
|
Uninstall rsh-server Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_rsh-server | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | high | ||
Identifiers and References | identifiers: CCE-27062-9 references: CM-7, 305, 381, test_attestation | ||
Description | The $ sudo yum erase rsh-server | ||
Rationale | The | ||
OVAL details Items not found satisfying package rsh-server is removed:Object oval:ssg:obj:1510 of type rpminfo_object
|
Disable rexec Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_rexec | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-27208-8 references: CM-7, 68, 1436, test_attestation | ||||||
Description | The # chkconfig rexec off | ||||||
Rationale | The rexec service uses unencrypted network communications, which means that data from the login session, including passwords and all other information transmitted during the session, can be stolen by eavesdroppers on the network. | ||||||
OVAL details Items not found violating rexec disabled:Object oval:ssg:obj:1332 of type textfilecontent54_object
|
Disable rsh Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_rsh | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-26994-4 references: CM-7, IA-5(1)(c), 68, 1436, test_attestation | ||||||
Description | The # chkconfig rsh off | ||||||
Rationale | The rsh service uses unencrypted network communications, which means that data from the login session, including passwords and all other information transmitted during the session, can be stolen by eavesdroppers on the network. | ||||||
OVAL details Items not found violating rsh disabled:Object oval:ssg:obj:1582 of type textfilecontent54_object
|
Uninstal rsh Package
Rule ID | xccdf_org.ssgproject.content_rule_package_rsh_removed | ||
Result | notselected | ||
Time | 2015-08-22T01:36:03 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE- references: test_attestation | ||
Description | The | ||
Rationale | These legacy clients contain numerous security exposures and have
been replaced with the more secure SSH package. Even if the server is removed,
it is best to ensure the clients are also removed to prevent users from
inadvertently attempting to use these commands and therefore exposing
their credentials. Note that removing the | ||
OVAL details Items not found violating package rsh is removed:Object oval:ssg:obj:1339 of type rpminfo_object
|
Disable rlogin Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_rlogin | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-26865-6 references: CM-7, IA-5(1)(c), 1436, test_attestation | ||||||
Description | The # chkconfig rlogin off | ||||||
Rationale | The rlogin service uses unencrypted network communications, which means that data from the login session, including passwords and all other information transmitted during the session, can be stolen by eavesdroppers on the network. | ||||||
OVAL details Items not found violating rlogin disabled:Object oval:ssg:obj:1331 of type textfilecontent54_object
|
Remove Rsh Trust Files
Rule ID | xccdf_org.ssgproject.content_rule_no_rsh_trust_files | ||||||||||||||
Result | notselected | ||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||
Severity | high | ||||||||||||||
Identifiers and References | identifiers: CCE-27270-8 references: CM-7, 1436, test_attestation | ||||||||||||||
Description | The files $ sudo rm /etc/hosts.equiv $ rm ~/.rhosts | ||||||||||||||
Rationale | Trust files are convenient, but when used in conjunction with the R-services, they can allow unauthenticated access to a system. | ||||||||||||||
OVAL details Items not found violating look for .rhosts or .shosts in /root:Object oval:ssg:obj:1489 of type file_object
Items not found violating look for .rhosts or .shosts in /home:Object oval:ssg:obj:1490 of type file_object
Items not found violating look for /etc/hosts.equiv or /etc/shosts.equiv:Object oval:ssg:obj:1491 of type file_object
|
Uninstall ypserv Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_ypserv | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | medium | ||
Identifiers and References | identifiers: CCE-27079-3 references: CM-7, 305, 381, test_attestation | ||
Description | The $ sudo yum erase ypserv | ||
Rationale | Removing the | ||
OVAL details Items not found satisfying package ypserv is removed:Object oval:ssg:obj:1763 of type rpminfo_object
|
Disable ypbind Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_ypbind | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26894-6 references: CM-7, 305, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig ypbind off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale |
Disabling the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Remove NIS Client
Rule ID | xccdf_org.ssgproject.content_rule_package_ypbind_removed | ||||||||||||||||
Result | notselected | ||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||
Severity | low | ||||||||||||||||
Identifiers and References | identifiers: CCE- | ||||||||||||||||
Description | The Network Information Service (NIS), formerly known as Yellow Pages,
is a client-server directory service protocol used to distribute system configuration
files. The NIS client ( | ||||||||||||||||
Rationale | The NIS service is inherently an insecure system that has been vulnerable to DOS attacks, buffer overflows and has poor authentication for querying NIS maps. NIS generally has been replaced by such protocols as Lightweight Directory Access Protocol (LDAP). It is recommended that the service be removed. | ||||||||||||||||
OVAL details Items found violating package ypbind is removed:
|
Disable tftp Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_tftp | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27055-3 references: CM-7, 1436, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig tftp off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale |
Disabling the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:2264 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2266 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2267 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2268 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2269 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2270 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2271 of type runlevel_object
State oval:ssg:ste:2265 of type runlevel_state
|
Uninstall tftp-server Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_tftp-server | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | medium | ||
Identifiers and References | identifiers: CCE-26946-4 references: CM-7, 305, test_attestation | ||
Description |
The # yum erase tftp-server | ||
Rationale |
Removing the | ||
OVAL details Items not found satisfying package tftp-server is removed:Object oval:ssg:obj:1956 of type rpminfo_object
|
Remove tftp
Rule ID | xccdf_org.ssgproject.content_rule_package_tftp_removed | ||
Result | notselected | ||
Time | 2015-08-22T01:36:03 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE- | ||
Description | Trivial File Transfer Protocol (TFTP) is a simple file transfer protocol,
typically used to automatically transfer configuration or boot files between machines.
TFTP does not support authentication and can be easily hacked. The package
| ||
Rationale | It is recommended that TFTP be remvoed, unless there is a specific need for TFTP (such as a boot server). In that case, use extreme caution when configuring the services. | ||
OVAL details Items not found violating package tftp is removed:Object oval:ssg:obj:1330 of type rpminfo_object
|
Ensure tftp Daemon Uses Secure Mode
Rule ID | xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-27272-4 | ||||||
Description | If running the server_args = -s /var/lib/tftpboot | ||||||
Rationale | Using the | ||||||
OVAL details Items not found violating tftpd secure mode:Object oval:ssg:obj:1581 of type textfilecontent54_object
|
Uninstall talk-server Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_talk-server | ||
Result | notselected | ||
Time | 2015-08-22T01:36:03 | ||
Severity | medium | ||
Identifiers and References | identifiers: CCE- references: test_attestation | ||
Description |
The # yum erase talk-server | ||
Rationale |
The talk software presents a security risk as it uses unencrypted protocols
for communications. Removing the | ||
OVAL details Items not found violating package talk-server is removed:Object oval:ssg:obj:2181 of type rpminfo_object
|
Uninstall talk Package
Rule ID | xccdf_org.ssgproject.content_rule_package_talk_removed | ||
Result | notselected | ||
Time | 2015-08-22T01:36:03 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE- references: test_attestation | ||
Description | The | ||
Rationale |
The talk software presents a security risk as it uses unencrypted protocols
for communications. Removing the | ||
OVAL details Items not found violating package talk is removed:Object oval:ssg:obj:1536 of type rpminfo_object
|
Disable Automatic Bug Reporting Tool (abrtd)
Rule ID | xccdf_org.ssgproject.content_rule_service_abrtd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27247-6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Automatic Bug Reporting Tool ( # chkconfig abrtd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Mishandling crash data could expose sensitive information about vulnerabilities in software executing on the local machine, as well as sensitive information from within a process's address space or registers. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1702 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1704 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1705 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1706 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1707 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1708 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1709 of type runlevel_object
State oval:ssg:ste:1703 of type runlevel_state
|
Disable Advanced Configuration and Power Interface (acpid)
Rule ID | xccdf_org.ssgproject.content_rule_service_acpid_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27061-1 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Advanced Configuration and Power Interface Daemon ( # chkconfig acpid off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | ACPI support is highly desirable for systems in some network roles, such as laptops or desktops. For other systems, such as servers, it may permit accidental or trivially achievable denial of service situations and disabling it is appropriate. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1456 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1458 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1459 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1460 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1461 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1462 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1463 of type runlevel_object
State oval:ssg:ste:1457 of type runlevel_state
|
Disable Certmonger Service (certmonger)
Rule ID | xccdf_org.ssgproject.content_rule_service_certmonger_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27267-4 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | Certmonger is a D-Bus based service that attempts to simplify interaction
with certifying authorities on networks which use public-key infrastructure. It is often
combined with Red Hat's IPA (Identity Policy Audit) security information management
solution to aid in the management of certificates.
The # chkconfig certmonger off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The services provided by certmonger may be essential for systems fulfilling some roles a PKI infrastructure, but its functionality is not necessary for many other use cases. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1669 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1671 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1672 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1673 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1674 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1675 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1676 of type runlevel_object
State oval:ssg:ste:1670 of type runlevel_state
|
Disable Control Group Config (cgconfig)
Rule ID | xccdf_org.ssgproject.content_rule_service_cgconfig_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27250-0 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | Control groups allow an administrator to allocate system resources (such as CPU,
memory, network bandwidth, etc) among a defined group (or groups) of processes executing on
a system. The # chkconfig cgconfig off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Unless control groups are used to manage system resources, running the cgconfig service is not necessary. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2091 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2093 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2094 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2095 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2096 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2097 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2098 of type runlevel_object
State oval:ssg:ste:2092 of type runlevel_state
|
Disable Control Group Rules Engine (cgred)
Rule ID | xccdf_org.ssgproject.content_rule_service_cgred_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27252-6 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig cgred off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Unless control groups are used to manage system resources, running the cgred service service is not necessary. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2208 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2210 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2211 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2212 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2213 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2214 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2215 of type runlevel_object
State oval:ssg:ste:2209 of type runlevel_state
|
Disable CPU Speed (cpuspeed)
Rule ID | xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26973-8 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig cpuspeed off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2283 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2285 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2286 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2287 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2288 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2289 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2290 of type runlevel_object
State oval:ssg:ste:2284 of type runlevel_state
|
Disable Hardware Abstraction Layer Service (haldaemon)
Rule ID | xccdf_org.ssgproject.content_rule_service_haldaemon_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27086-8 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Hardware Abstraction Layer Daemon ( # chkconfig haldaemon off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The haldaemon provides essential functionality on systems that use removable media or devices, but can be disabled for systems that do not require these. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1948 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1950 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1951 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1952 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1953 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1954 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1955 of type runlevel_object
State oval:ssg:ste:1949 of type runlevel_state
|
Enable IRQ Balance (irqbalance)
Rule ID | xccdf_org.ssgproject.content_rule_service_irqbalance_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26990-2 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig --level 2345 irqbalance on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | In an environment with multiple processors (now common), the irqbalance service provides potential speedups for handling interrupt requests. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1735 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1737 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1738 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1739 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1740 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1741 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1742 of type runlevel_object
State oval:ssg:ste:1736 of type runlevel_state
|
Disable KDump Kernel Crash Analyzer (kdump)
Rule ID | xccdf_org.ssgproject.content_rule_service_kdump_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26850-8 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig kdump off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Unless the system is used for kernel development or testing, there is little need to run the kdump service. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Disable Software RAID Monitor (mdmonitor)
Rule ID | xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27193-2 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig mdmonitor off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | If software RAID monitoring is not required, there is no need to run this service. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1866 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1868 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1869 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1870 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1871 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1872 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1873 of type runlevel_object
State oval:ssg:ste:1867 of type runlevel_state
|
Disable Network Console (netconsole)
Rule ID | xccdf_org.ssgproject.content_rule_service_netconsole_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27254-2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig netconsole off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1522 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1524 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1525 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1526 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1527 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1528 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1529 of type runlevel_object
State oval:ssg:ste:1523 of type runlevel_state
|
Disable ntpdate Service (ntpdate)
Rule ID | xccdf_org.ssgproject.content_rule_service_ntpdate_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27256-7 references: CM-7, 382, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig ntpdate off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1391 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1393 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1394 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1395 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1396 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1397 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1398 of type runlevel_object
State oval:ssg:ste:1392 of type runlevel_state
|
Disable Odd Job Daemon (oddjobd)
Rule ID | xccdf_org.ssgproject.content_rule_service_oddjobd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27257-5 references: CM-7, 381, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig oddjobd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2195 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2197 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2198 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2199 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2200 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2201 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2202 of type runlevel_object
State oval:ssg:ste:2196 of type runlevel_state
|
Disable Portreserve (portreserve)
Rule ID | xccdf_org.ssgproject.content_rule_service_portreserve_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27258-3 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig portreserve off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Enable Process Accounting (psacct)
Rule ID | xccdf_org.ssgproject.content_rule_service_psacct_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27259-1 references: AU-12, CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The process accounting service, # chkconfig --level 2345 psacct on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1902 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1904 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1905 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1906 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1907 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1908 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1909 of type runlevel_object
State oval:ssg:ste:1903 of type runlevel_state
|
Disable Apache Qpid (qpidd)
Rule ID | xccdf_org.ssgproject.content_rule_service_qpidd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26928-2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig qpidd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The qpidd service is automatically installed when the "base"
package selection is selected during installation. The qpidd service listens
for network connections, which increases the attack surface of the system. If
the system is not intended to receive AMQP traffic, then the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2028 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2030 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2031 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2032 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2033 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2034 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2035 of type runlevel_object
State oval:ssg:ste:2029 of type runlevel_state
|
Disable Quota Netlink (quota_nld)
Rule ID | xccdf_org.ssgproject.content_rule_service_quota_nld_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27260-9 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig quota_nld off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | If disk quotas are enforced on the local system, then the
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1923 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1925 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1926 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1927 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1928 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1929 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1930 of type runlevel_object
State oval:ssg:ste:1924 of type runlevel_state
|
Disable Network Router Discovery Daemon (rdisc)
Rule ID | xccdf_org.ssgproject.content_rule_service_rdisc_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27261-7 references: AC-4, CM-7, 382, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig rdisc off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | General-purpose systems typically have their network and routing information configured statically by a system administrator. Workstations or some special-purpose systems often use DHCP (instead of IRDP) to retrieve dynamic network configuration information. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1609 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1611 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1612 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1613 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1614 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1615 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1616 of type runlevel_object
State oval:ssg:ste:1610 of type runlevel_state
|
Disable Red Hat Network Service (rhnsd)
Rule ID | xccdf_org.ssgproject.content_rule_service_rhnsd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26846-6 references: CM-7, 382, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Red Hat Network service automatically queries Red Hat Network
servers to determine whether there are any actions that should be executed,
such as package updates. This only occurs if the system was registered to an
RHN server or satellite and managed as such.
The # chkconfig rhnsd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Although systems management and patching is extremely important to
system security, management by a system outside the enterprise enclave is not
desirable for some environments. However, if the system is being managed by RHN or
RHN Satellite Server the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Disable Red Hat Subscription Manager Daemon (rhsmcertd)
Rule ID | xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27262-5 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Red Hat Subscription Manager (rhsmcertd) periodically checks for
changes in the entitlement certificates for a registered system and updates it
accordingly.
The # chkconfig rhsmcertd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1422 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1424 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1425 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1426 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1427 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1428 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1429 of type runlevel_object
State oval:ssg:ste:1423 of type runlevel_state
|
Disable Cyrus SASL Authentication Daemon (saslauthd)
Rule ID | xccdf_org.ssgproject.content_rule_service_saslauthd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27263-3 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig saslauthd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1557 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1559 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1560 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1561 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1562 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1563 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1564 of type runlevel_object
State oval:ssg:ste:1558 of type runlevel_state
|
Disable SMART Disk Monitoring Service (smartd)
Rule ID | xccdf_org.ssgproject.content_rule_service_smartd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26853-2 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | SMART (Self-Monitoring, Analysis, and Reporting Technology) is a
feature of hard drives that allows them to detect symptoms of disk failure and
relay an appropriate warning.
The # chkconfig smartd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | SMART can help protect against denial of service due to failing hardware. Nevertheless, if it is not needed or the system's drives are not SMART-capable (such as solid state drives), it can be disabled. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1341 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1343 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1344 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1345 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1346 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1347 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1348 of type runlevel_object
State oval:ssg:ste:1342 of type runlevel_state
|
Disable System Statistics Reset Service (sysstat)
Rule ID | xccdf_org.ssgproject.content_rule_service_sysstat_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27265-8 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig sysstat off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | By default the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1998 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2000 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2001 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2002 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2003 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2004 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2005 of type runlevel_object
State oval:ssg:ste:1999 of type runlevel_state
|
Enable cron Service
Rule ID | xccdf_org.ssgproject.content_rule_service_crond_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27070-2 references: CM-7, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig --level 2345 crond on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Due to its usage for maintenance and security-supporting tasks, enabling the cron daemon is essential. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Disable anacron Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_anacron |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27158-5 references: CM-7 |
Description | The # yum erase cronie-anacron |
Rationale |
The |
Disable At Service (atd)
Rule ID | xccdf_org.ssgproject.content_rule_service_atd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27249-2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig atd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale |
The | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Allow Only SSH Protocol 2
Rule ID | xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2 | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-27072-8 references: AC-3(10), IA-5(1)(c), 776, 774, 1436, test_attestation | ||||||
Description | Only SSH protocol version 2 connections should be
permitted. The default setting in
Protocol 2 | ||||||
Rationale | SSH protocol version 1 suffers from design flaws that result in security vulnerabilities and should not be used. | ||||||
OVAL details Items not found violating sshd uses protocol 2:Object oval:ssg:obj:1779 of type textfilecontent54_object
| |||||||
Remediation script:
|
Limit Users' SSH Access
Rule ID | xccdf_org.ssgproject.content_rule_sshd_limit_user_access |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27556-0 |
Description | By default, the SSH configuration allows any user with an account
to access the system. In order to specify the users that are allowed to login
via SSH and deny all other users, add or correct the following line in the
DenyUsers USER1 USER2Where USER1 and USER2 are valid user names.
|
Rationale | Specifying which accounts are allowed SSH access into the system reduces the possibility of unauthorized access to the system. |
Set SSH Idle Timeout Interval
Rule ID | xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout | |||||||||
Result | error | |||||||||
Time | 2015-08-22T01:36:03 | |||||||||
Severity | low | |||||||||
Identifiers and References | identifiers: CCE-26919-1 references: 879, 1133, test_attestation | |||||||||
Description | SSH allows administrators to set an idle timeout
interval.
After this interval has passed, the idle user will be
automatically logged out.
ClientAliveInterval 300The timeout interval is given in seconds. To have a timeout of 15 minutes, set interval to 900. If a shorter timeout has already been set for the login shell, that value will preempt any SSH setting made here. Keep in mind that some processes may stop SSH from correctly detecting that the user is idle. | |||||||||
Rationale | Causing idle users to be automatically logged out guards against compromises one system leading trivially to compromises on another. | |||||||||
OVAL details Items not found violating timeout is configured:Object oval:ssg:obj:1655 of type textfilecontent54_object
State oval:ssg:ste:1656 of type textfilecontent54_state
| ||||||||||
Remediation script:
|
Set SSH Client Alive Count
Rule ID | xccdf_org.ssgproject.content_rule_sshd_set_keepalive | ||||||||
Result | error | ||||||||
Time | 2015-08-22T01:36:03 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-26282-4 references: 879, 1133, test_attestation | ||||||||
Description | To ensure the SSH idle timeout occurs precisely when the ClientAliveCountMax 0 | ||||||||
Rationale |
This ensures a user login will be terminated as soon as the | ||||||||
OVAL details Items not found violating Tests the value of the ClientAliveCountMax setting in the /etc/ssh/sshd_config file:Object oval:ssg:obj:2009 of type textfilecontent54_object
State oval:ssg:ste:2010 of type textfilecontent54_state
| |||||||||
Remediation script:
|
Disable SSH Support for .rhosts Files
Rule ID | xccdf_org.ssgproject.content_rule_sshd_disable_rhosts | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27124-7 | ||||||
Description | SSH can emulate the behavior of the obsolete rsh
command in allowing users to enable insecure access to their
accounts via IgnoreRhosts yes | ||||||
Rationale | SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. | ||||||
OVAL details Items not found violating Tests the value of the IgnoreRhosts[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file:Object oval:ssg:obj:2014 of type textfilecontent54_object
| |||||||
Remediation script:
|
Disable Host-Based Authentication
Rule ID | xccdf_org.ssgproject.content_rule_disable_host_auth | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27091-8 references: 765, 766, test_attestation | ||||||
Description | SSH's cryptographic host-based authentication is
more secure than HostbasedAuthentication no | ||||||
Rationale | SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. | ||||||
OVAL details Items not found violating sshd HostbasedAuthentication:Object oval:ssg:obj:2165 of type textfilecontent54_object
| |||||||
Remediation script:
|
Disable SSH Root Login
Rule ID | xccdf_org.ssgproject.content_rule_sshd_disable_root_login | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27100-7 references: AC-6(2), IA-2(1), 770, test_attestation | ||||||
Description | The root user should never be allowed to login to a
system directly over a network.
To disable root login via SSH, add or correct the following line
in PermitRootLogin no | ||||||
Rationale | Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password. | ||||||
OVAL details Items not found violating Tests the value of the PermitRootLogin[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file:Object oval:ssg:obj:1794 of type textfilecontent54_object
| |||||||
Remediation script:
|
Disable SSH Access via Empty Passwords
Rule ID | xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | high | ||||||
Identifiers and References | identifiers: CCE-26887-0 references: 765, 766, test_attestation | ||||||
Description | To explicitly disallow remote login from accounts with
empty passwords, add or correct the following line in
PermitEmptyPasswords noAny accounts with empty passwords should be disabled immediately, and PAM configuration should prevent users from being able to assign themselves empty passwords. | ||||||
Rationale | Configuring this setting for the SSH daemon provides additional assurance that remote login via SSH will require a password, even in the event of misconfiguration elsewhere. | ||||||
OVAL details Items not found violating Tests the value of the PermitEmptyPasswords[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file:Object oval:ssg:obj:1681 of type textfilecontent54_object
| |||||||
Remediation script:
|
Do Not Allow SSH Environment Options
Rule ID | xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27201-3 references: 1414, test_attestation | ||||||
Description | To ensure users are not able to present
environment options to the SSH daemon, add or correct the following line
in PermitUserEnvironment no | ||||||
Rationale | SSH environment options potentially allow users to bypass access restriction in some configurations. | ||||||
OVAL details Items not found violating Check value of PermitUserEnvironment in /etc/ssh/sshd_config:Object oval:ssg:obj:1454 of type textfilecontent54_object
| |||||||
Remediation script:
|
Use Only Approved Ciphers
Rule ID | xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers | ||||||
Result | error | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26555-3 references: AC-3, AC-17(2), SI-7, IA-5(1)(c), IA-7, 803, 1144, 1145, 1146, test_attestation | ||||||
Description | Limit the ciphers to those algorithms which are FIPS-approved.
Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.
The following line in Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbcThe man page sshd_config(5) contains a list of supported ciphers.
| ||||||
Rationale | Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance. | ||||||
OVAL details Items not found violating tests the value of Ciphers setting in the /etc/ssh/sshd_config file:Object oval:ssg:obj:1782 of type textfilecontent54_object
| |||||||
Remediation script:
|
Disable SSH Server If Possible (Unusual)
Rule ID | xccdf_org.ssgproject.content_rule_ssh_server_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27054-6 references: test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The SSH server service, sshd, is commonly needed.
However, if it can be disabled, do so.
The # chkconfig sshd offThis is unusual, as SSH is a common method for encrypted and authenticated remote access. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
|
Remove SSH Server iptables Firewall exception (Unusual)
Rule ID | xccdf_org.ssgproject.content_rule_ssh_server_iptables_exception | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27060-3 | ||||||||||||
Description | By default, inbound connections to SSH's port are allowed. If
the SSH server is not being used, this exception should be removed from the
firewall configuration.
-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPTThis is unusual, as SSH is a common method for encrypted and authenticated remote access. | ||||||||||||
Rationale | If inbound SSH connections are not expected, disallowing access to the SSH port will avoid possible exploitation of the port by an attacker. | ||||||||||||
OVAL details Items not found violating Test for port 22 access over ipv4:Object oval:ssg:obj:1413 of type textfilecontent54_object
Items not found violating Test for port 22 access over ipv6:Object oval:ssg:obj:1414 of type textfilecontent54_object
|
Disable X Windows Startup By Setting Runlevel
Rule ID | xccdf_org.ssgproject.content_rule_disable_xwindows_with_runlevel | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:03 | ||||||
Severity | low | ||||||
Identifiers and References | identifiers: CCE-27119-7 references: 366, test_attestation | ||||||
Description | Setting the system's runlevel to 3 will prevent automatic startup
of the X server. To do so, ensure the following line in id:3:initdefault: | ||||||
Rationale | Unnecessary services should be disabled to decrease the attack surface of the system. | ||||||
OVAL details Items not found violating default runlevel is 3:Object oval:ssg:obj:2251 of type textfilecontent54_object
|
Remove the X Windows Package Group
Rule ID | xccdf_org.ssgproject.content_rule_packagegroup_xwindows_remove | ||
Result | notselected | ||
Time | 2015-08-22T01:36:03 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27198-1 references: 366, test_attestation | ||
Description | Removing all packages which constitute the X Window System ensures users or malicious software cannot start X. To do so, run the following command: $ sudo yum groupremove "X Window System" | ||
Rationale | Unnecessary packages should not be installed to decrease the attack surface of the system. | ||
OVAL details Items not found violating package xorg-x11-server-common is removed:Object oval:ssg:obj:2216 of type rpminfo_object
|
Disable Avahi Server Software
Rule ID | xccdf_org.ssgproject.content_rule_disable_avahi | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27087-6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig avahi-daemon off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Because the Avahi daemon service keeps an open network port, it is subject to network attacks. Its functionality is convenient but is only appropriate if the local network can be trusted. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:2048 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2050 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2051 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2052 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2053 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2054 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2055 of type runlevel_object
State oval:ssg:ste:2049 of type runlevel_state
|
Serve Avahi Only via Required Protocol
Rule ID | xccdf_org.ssgproject.content_rule_avahi_ip_only |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27590-9 references: CM-7 |
Description |
If you are using only IPv4, edit use-ipv6=noSimilarly, if you are using only IPv6, disable IPv4 sockets with the line: use-ipv4=no |
Check Avahi Responses' TTL Field
Rule ID | xccdf_org.ssgproject.content_rule_avahi_check_ttl |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27340-9 references: CM-7 |
Description |
To make Avahi ignore packets unless the TTL field is 255, edit
check-response-ttl=yes |
Rationale | This helps to ensure that only mDNS responses from the local network are processed, because the TTL field in a packet is decremented from its initial value of 255 whenever it is routed from one network to another. Although a properly-configured router or firewall should not allow mDNS packets into the local network at all, this option provides another check to ensure they are not permitted. |
Prevent Other Programs from Using Avahi's Port
Rule ID | xccdf_org.ssgproject.content_rule_avahi_prevent_port_sharing |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27308-6 references: CM-7 |
Description |
To prevent other mDNS stacks from running, edit disallow-other-stacks=yes |
Rationale | This helps ensure that only Avahi is responsible for mDNS traffic coming from that port on the system. |
Disable Avahi Publishing
Rule ID | xccdf_org.ssgproject.content_rule_avahi_disable_publishing |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27526-3 references: CM-7 |
Description |
To prevent other mDNS stacks from running, edit disallow-other-stacks=yes |
Rationale | This helps ensure that only Avahi is responsible for mDNS traffic coming from that port on the system. |
Restrict Information Published by Avahi
Rule ID | xccdf_org.ssgproject.content_rule_avahi_restrict_published_information |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27300-3 references: CM-7 |
Description |
If it is necessary to publish some information to the network, it should not be joined
by any extraneous information, or by information supplied by a non-trusted source
on the system.
Prevent user applications from using Avahi to publish services by adding or
correcting the following line in the disable-user-service-publishing=yesImplement as many of the following lines as possible, to restrict the information published by Avahi. publish-addresses=no publish-hinfo=no publish-workstation=no publish-domain=noInspect the files in the directory /etc/avahi/services/ . Unless there
is an operational need to publish information about each of these services,
delete the corresponding file.
|
Rationale | These options prevent publishing attempts from succeeding, and can be applied even if publishing is disabled entirely via disable-publishing. Alternatively, these can be used to restrict the types of published information in the event that some information must be published. |
Disable Printer Browsing Entirely if Possible
Rule ID | xccdf_org.ssgproject.content_rule_cups_disable_browsing | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27108-0 references: CM-7 | ||||||||||||
Description | By default, CUPS listens on the network for printer list
broadcasts on UDP port 631. This functionality is called printer browsing.
To disable printer browsing entirely, edit the CUPS configuration
file, located at Browsing Off | ||||||||||||
Rationale | The CUPS print service can be configured to broadcast a list of available printers to the network. Other machines on the network, also running the CUPS print service, can be configured to listen to these broadcasts and add and configure these printers for immediate use. By disabling this browsing capability, the machine will no longer generate or receive such broadcasts. | ||||||||||||
OVAL details Items not found violating Disable Browsing:Object oval:ssg:obj:2291 of type textfilecontent54_object
Items not found violating Do not allow incoming printer information packets:Object oval:ssg:obj:2292 of type textfilecontent54_object
|
Disable Print Server Capabilities
Rule ID | xccdf_org.ssgproject.content_rule_cups_disable_printserver | ||||||||||||
Result | notselected | ||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||
Severity | low | ||||||||||||
Identifiers and References | identifiers: CCE-27107-2 references: CM-7 | ||||||||||||
Description | To prevent remote users from potentially connecting to and using locally configured printers, disable the CUPS print server sharing capabilities. To do so, limit how the server will listen for print jobs by removing the more generic port directive from /etc/cups/cupsd.conf: Port 631and replacing it with the Listen directive:
Listen localhost:631This will prevent remote users from printing to locally configured printers while still allowing local users on the machine to print normally. | ||||||||||||
Rationale | By default, locally configured printers will not be shared over the network, but if this functionality has somehow been enabled, these recommendations will disable it again. Be sure to disable outgoing printer list broadcasts, or remote users will still be able to see the locally configured printers, even if they cannot actually print to them. To limit print serving to a particular set of users, use the Policy directive. | ||||||||||||
OVAL details Items not found violating Disable the more general port directive:Object oval:ssg:obj:1792 of type textfilecontent54_object
Items not found violating Listen only at the localhost level:Object oval:ssg:obj:1793 of type textfilecontent54_object
|
Disable the CUPS Service
Rule ID | xccdf_org.ssgproject.content_rule_service_cups_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26899-5 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig cups off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Turn off unneeded services to reduce attack surface. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2036 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2038 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2039 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2040 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2041 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2042 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2043 of type runlevel_object
State oval:ssg:ste:2037 of type runlevel_state
|
Disable DHCP Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_dhcp_server | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27074-4 references: CM-7, 366, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The # chkconfig dhcpd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Unmanaged or unintentionally activated DHCP servers may provide faulty information to clients, interfering with the operation of a legitimate site DHCP server if there is one. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1402 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1404 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1405 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1406 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1407 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1408 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1409 of type runlevel_object
State oval:ssg:ste:1403 of type runlevel_state
|
Uninstall DHCP Server Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_dhcp_server | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | medium | ||
Identifiers and References | identifiers: CCE-27120-5 references: CM-7, 366, test_attestation | ||
Description | If the system does not need to act as a DHCP server,
the dhcp package can be uninstalled.
The # yum erase dhcp | ||
Rationale | Removing the DHCP server ensures that it cannot be easily or accidentally reactivated and disrupt network operation. | ||
OVAL details Items not found satisfying package dhcpd is removed:Object oval:ssg:obj:1761 of type rpminfo_object
|
Do Not Use Dynamic DNS
Rule ID | xccdf_org.ssgproject.content_rule_dhcp_server_disable_ddns |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27049-6 references: CM-7 |
Description | To prevent the DHCP server from receiving DNS information from
clients, edit ddns-update-style none; |
Rationale | The Dynamic DNS protocol is used to remotely update the data served by a DNS server. DHCP servers can use Dynamic DNS to publish information about their clients. This setup carries security risks, and its use is not recommended. If Dynamic DNS must be used despite the risks it poses, it is critical that Dynamic DNS transactions be protected using TSIG or some other cryptographic authentication mechanism. See dhcpd.conf(5) for more information about protecting the DHCP server from passing along malicious DNS data from its clients. |
Warnings | warning
The ddns-update-style option controls only whether
the DHCP server will attempt to act as a Dynamic DNS client. As long as the DNS
server itself is correctly configured to reject DDNS attempts, an incorrect
ddns-update-style setting on the client is harmless (but should be fixed as a
best practice). |
Deny Decline Messages
Rule ID | xccdf_org.ssgproject.content_rule_dhcp_server_deny_decline |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27106-4 references: CM-7 |
Description | Edit deny declines; |
Rationale | The DHCPDECLINE message can be sent by a DHCP client to indicate that it does not consider the lease offered by the server to be valid. By issuing many DHCPDECLINE messages, a malicious client can exhaust the DHCP server's pool of IP addresses, causing the DHCP server to forget old address allocations. |
Deny BOOTP Queries
Rule ID | xccdf_org.ssgproject.content_rule_dhcp_server_deny_bootp |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-27077-7 references: CM-7 |
Description | Unless your network needs to support older BOOTP clients, disable support for the bootp protocol by adding or correcting the global option: deny bootp; |
Rationale | The bootp option tells dhcpd to respond to BOOTP queries. If support for this simpler protocol is not needed, it should be disabled to remove attack vectors against the DHCP server. |
Configure Logging
Rule ID | xccdf_org.ssgproject.content_rule_dhcp_server_configure_logging |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-26898-7 references: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf |
Description | Ensure that the following line exists in
daemon.* /var/log/daemon.logConfigure logwatch or other log monitoring tools to summarize error conditions reported by the dhcpd process. |
Rationale | By default, dhcpd logs notices to the daemon facility. Sending all daemon messages to a dedicated log file is part of the syslog configuration outlined in the Logging and Auditing section |
Disable DHCP Client
Rule ID | xccdf_org.ssgproject.content_rule_disable_dhcp_client | ||||||||||
Result | notselected | ||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||
Severity | low | ||||||||||
Identifiers and References | identifiers: CCE-27021-5 references: CM-7, 366, test_attestation | ||||||||||
Description |
For each interface on the system (e.g. eth0), edit
| ||||||||||
Rationale | DHCP relies on trusting the local network. If the local network is not trusted, then it should not be used. However, the automatic configuration provided by DHCP is commonly used and the alternative, manual configuration, presents an unacceptable burden in many circumstances. | ||||||||||
OVAL details Items not found violating Tests the value of the ^[\s]*BOOTPROTO[\s]*=[\s]*([^#]*) expression in the /etc/sysconfig/network-scripts/ifcfg-.* file:Object oval:ssg:obj:1653 of type textfilecontent54_object
State oval:ssg:ste:1654 of type textfilecontent54_state
|
Enable the NTP Daemon
Rule ID | xccdf_org.ssgproject.content_rule_service_ntpd_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | medium | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27093-4 references: AU-8(1), 160, test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig --level 2345 ntpd on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Enabling the | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Specify a Remote NTP Server
Rule ID | xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server | ||||
Result | pass | ||||
Time | 2015-08-22T01:36:03 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-27098-3 references: AU-8(1), 160, test_attestation | ||||
Description | To specify a remote NTP server for time synchronization, edit
the file server ntpserverThis instructs the NTP software to contact that remote server to obtain time data. | ||||
Rationale | Synchronizing with an NTP server makes it possible to collate system logs from multiple sources or correlate computer events with real time events. | ||||
OVAL details Items found satisfying Ensure at least one NTP server is set:
|
Specify Additional Remote NTP Servers
Rule ID | xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers |
Result | notselected |
Time | 2015-08-22T01:36:03 |
Severity | low |
Identifiers and References | identifiers: CCE-26958-9 references: AU-8(1) |
Description | Additional NTP servers can be specified for time synchronization
in the file server ntpserver |
Rationale | Specifying additional NTP servers increases the availability of accurate time data, in the event that one of the specified servers becomes unavailable. This is typical for a system acting as an NTP server for other systems. |
Disable Postfix Network Listening
Rule ID | xccdf_org.ssgproject.content_rule_postfix_network_listening | ||||
Result | pass | ||||
Time | 2015-08-22T01:36:04 | ||||
Severity | medium | ||||
Identifiers and References | identifiers: CCE-26780-7 references: CM-7, 382, test_attestation | ||||
Description |
Edit the file inet_interfaces = localhost | ||||
Rationale |
This ensures | ||||
OVAL details Items found satisfying inet_interfaces in /etc/postfix/main.cf should be set correctly:
|
Enable Postfix Service
Rule ID | xccdf_org.ssgproject.content_rule_service_postfix_enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26325-1 references: test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Postfix mail transfer agent is used for local mail delivery
within the system. The default configuration only listens for connections to
the default SMTP port (port 25) on the loopback interface (127.0.0.1). It is
recommended to leave this service enabled for local mail delivery.
The # chkconfig --level 2345 postfix on | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Local mail delivery is essential to some system maintenance and notification tasks. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:2222 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2224 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2225 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2226 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2227 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2228 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:2229 of type runlevel_object
State oval:ssg:ste:2223 of type runlevel_state
|
Uninstall Sendmail Package
Rule ID | xccdf_org.ssgproject.content_rule_package_sendmail_removed | ||
Result | pass | ||
Time | 2015-08-22T01:36:03 | ||
Severity | medium | ||
Identifiers and References | identifiers: CCE-27515-6 references: CM-7, test_attestation | ||
Description | Sendmail is not the default mail transfer agent and is
not installed by default.
The # yum erase sendmail | ||
Rationale | The sendmail software was not developed with security in mind and its design prevents it from being effectively contained by SELinux. Postfix should be used instead. | ||
OVAL details Items not found satisfying package sendmail is removed:Object oval:ssg:obj:1441 of type rpminfo_object
|
Configure LDAP Client to Use TLS For All Transactions
Rule ID | xccdf_org.ssgproject.content_rule_ldap_client_start_tls | ||||||
Result | pass | ||||||
Time | 2015-08-22T01:36:04 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-26690-8 references: CM-7, 776, 778, 1453, test_attestation | ||||||
Description | Configure LDAP to enforce TLS use. First, edit the file
ssl start_tlsThen review the LDAP server and ensure TLS has been configured. | ||||||
Rationale | The ssl directive specifies whether to use ssl or not. If not specified it will default to no. It should be set to start_tls rather than doing LDAP over SSL. | ||||||
OVAL details Items not found satisfying Tests the value of the ssl start_tls setting in the /etc/pam_ldap.conf file:Object oval:ssg:obj:2113 of type textfilecontent54_object
|
Configure Certificate Directives for LDAP Use of TLS
Rule ID | xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath | ||||||||||||
Result | pass | ||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||
Severity | medium | ||||||||||||
Identifiers and References | identifiers: CCE-27189-0 references: CM-7, 776, 778, 1453, test_attestation | ||||||||||||
Description | Ensure a copy of a trusted CA certificate has been placed in
the file tls_cacertdir /etc/pki/tls/CAor tls_cacertfile /etc/pki/tls/CA/cacert.pemThen review the LDAP server and ensure TLS has been configured. | ||||||||||||
Rationale | The tls_cacertdir or tls_cacertfile directives are required when tls_checkpeer is configured (which is the default for openldap versions 2.1 and up). These directives define the path to the trust certificates signed by the site CA. | ||||||||||||
OVAL details Items not found satisfying Tests the value of the tls_cacertdir setting in the /etc/pam_ldap.conf file:Object oval:ssg:obj:2219 of type textfilecontent54_object
Items not found satisfying Tests the value of the tls_cacertfile setting in the /etc/pam_ldap.conf file:Object oval:ssg:obj:2220 of type textfilecontent54_object
|
Uninstall openldap-servers Package
Rule ID | xccdf_org.ssgproject.content_rule_package_openldap-servers_removed | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26858-1 references: CM-7, 366, test_attestation | ||
Description | The $ sudo yum erase openldap-serversThe openldap-servers RPM is not installed by default on RHEL 6 machines. It is needed only by the OpenLDAP server, not by the clients which use LDAP for authentication. If the system is not intended for use as an LDAP Server it should be removed. | ||
Rationale | Unnecessary packages should not be installed to decrease the attack surface of the system. While this software is clearly essential on an LDAP server, it is not necessary on typical desktop or workstation systems. | ||
OVAL details Items not found satisfying package openldap-servers is removed:Object oval:ssg:obj:1812 of type rpminfo_object
|
Disable Network File System Lock Service (nfslock)
Rule ID | xccdf_org.ssgproject.content_rule_service_nfslock_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27104-9 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Network File System Lock (nfslock) service starts the required
remote procedure call (RPC) processes which allow clients to lock files on the
server. If the local machine is not configured to mount NFS filesystems then
this service should be disabled.
The # chkconfig nfslock off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Disable Secure RPC Client Service (rpcgssd)
Rule ID | xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26864-9 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The rpcgssd service manages RPCSEC GSS contexts required to secure protocols
that use RPC (most often Kerberos and NFS). The rpcgssd service is the
client-side of RPCSEC GSS. If the system does not require secure RPC then this
service should be disabled.
The # chkconfig rpcgssd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Disable RPC ID Mapping Service (rpcidmapd)
Rule ID | xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26870-6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The rpcidmapd service is used to map user names and groups to UID
and GID numbers on NFSv4 mounts. If NFS is not in use on the local system then
this service should be disabled.
The # chkconfig rpcidmapd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Disable Network File Systems (netfs)
Rule ID | xccdf_org.ssgproject.content_rule_service_netfs_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | error | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27137-9 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The netfs script manages the boot-time mounting of several types
of networked filesystems, of which NFS and Samba are the most common. If these
filesystem types are not in use, the script can be disabled, protecting the
system somewhat against accidental or malicious changes to # chkconfig netfs off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
Items found violating Runlevel test:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remediation script:
|
Configure lockd to use static TCP port
Rule ID | xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_tcp_port |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27149-4 |
Description | Configure the LOCKD_TCPPORT=lockd-portWhere lockd-port is a port which is not used by any other service on
your network.
|
Rationale | Restrict service to always use a given port, so that firewalling can be done effectively. |
Configure lockd to use static UDP port
Rule ID | xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_udp_port |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27063-7 |
Description | Configure the LOCKD_UDPPORT=lockd-portWhere lockd-port is a port which is not used by any other service on
your network.
|
Rationale | Restricting services to always use a given port enables firewalling to be done more effectively. |
Configure statd to use static port
Rule ID | xccdf_org.ssgproject.content_rule_nfs_fixed_statd_port |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-26889-6 |
Description | Configure the STATD_PORT=statd-portWhere statd-port is a port which is not used by any other service on your network.
|
Rationale | Restricting services to always use a given port enables firewalling to be done more effectively. |
Configure mountd to use static port
Rule ID | xccdf_org.ssgproject.content_rule_nfs_fixed_mountd_port |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27114-8 |
Description | Configure the MOUNTD_PORT=statd-portWhere mountd-port is a port which is not used by any other service on your network.
|
Rationale | Restricting services to always use a given port enables firewalling to be done more effectively. |
Specify UID and GID for Anonymous NFS Connections
Rule ID | xccdf_org.ssgproject.content_rule_nfs_no_anonymous |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27414-2 |
Description | To specify the UID and GID for remote root users, edit the anonuid=Note that a value of "-1" is technically acceptable as this will randomize the anonuid and
anongid values on a RHEL 6 based NFS server. While acceptable from a security perspective,
a value of -1 may cause interoperability issues, particularly with RHEL 7 client systems.
|
Rationale | Specifying the anonymous UID and GID ensures that the remote root user is mapped to a local account which has no permissions on the system. |
Disable Network File System (nfs)
Rule ID | xccdf_org.ssgproject.content_rule_service_nfs_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | notselected | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27199-9 references: test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The Network File System (NFS) service allows remote hosts to mount
and interact with shared filesystems on the local machine. If the local machine
is not designated as a NFS server then this service should be disabled.
The # chkconfig nfs off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Unnecessary services should be disabled to decrease the attack surface of the system. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found violating Runlevel test:Object oval:ssg:obj:1379 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1381 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1382 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1383 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1384 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1385 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
Items not found violating Runlevel test:Object oval:ssg:obj:1386 of type runlevel_object
State oval:ssg:ste:1380 of type runlevel_state
|
Disable Secure RPC Server Service (rpcsvcgssd)
Rule ID | xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27122-1 references: test_attestation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | The rpcsvcgssd service manages RPCSEC GSS contexts required to
secure protocols that use RPC (most often Kerberos and NFS). The rpcsvcgssd
service is the server-side of RPCSEC GSS. If the system does not require secure
RPC then this service should be disabled.
The # chkconfig rpcsvcgssd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Unnecessary services should be disabled to decrease the attack surface of the system. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
Items found satisfying Runlevel test:
|
Mount Remote Filesystems with nodev
Rule ID | xccdf_org.ssgproject.content_rule_use_nodev_option_on_nfs_mounts | ||||||||||||||
Result | pass | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-27090-0 references: test_attestation | ||||||||||||||
Description |
Add the | ||||||||||||||
Rationale | Legitimate device files should only exist in the /dev directory. NFS mounts should not present device files to users. | ||||||||||||||
OVAL details Items not found satisfying no nfs:Object oval:ssg:obj:1588 of type textfilecontent54_object
Items not found satisfying all nfs has nodev:Object oval:ssg:obj:1586 of type textfilecontent54_object
State oval:ssg:ste:1587 of type textfilecontent54_state
|
Mount Remote Filesystems with nosuid
Rule ID | xccdf_org.ssgproject.content_rule_use_nosuid_option_on_nfs_mounts | ||||||||||||||
Result | pass | ||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||
Severity | medium | ||||||||||||||
Identifiers and References | identifiers: CCE-26972-0 references: test_attestation | ||||||||||||||
Description |
Add the | ||||||||||||||
Rationale | NFS mounts should not present suid binaries to users. Only vendor-supplied suid executables should be installed to their default location on the local filesystem. | ||||||||||||||
OVAL details Items not found satisfying no nfs:Object oval:ssg:obj:2276 of type textfilecontent54_object
Items not found satisfying all nfs has nosuid:Object oval:ssg:obj:2274 of type textfilecontent54_object
State oval:ssg:ste:2275 of type textfilecontent54_state
|
Use Root-Squashing on All Exports
Rule ID | xccdf_org.ssgproject.content_rule_use_root_squashing_all_exports |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27138-7 |
Description | If a filesystem is exported using root squashing, requests from root on the client
are considered to be unprivileged (mapped to a user such as nobody). This provides some mild
protection against remote abuse of an NFS server. Root squashing is enabled by default, and
should not be disabled.
|
Rationale | If the NFS server allows root access to local file systems from remote hosts, this access could be used to compromise the system. |
Restrict NFS Clients to Privileged Ports
Rule ID | xccdf_org.ssgproject.content_rule_restrict_nfs_clients_to_privileged_ports |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27121-3 |
Description | By default, the server NFS implementation requires that all client requests be made
from ports less than 1024. If your organization has control over machines connected to its
network, and if NFS requests are prohibited at the border firewall, this offers some protection
against malicious requests from unprivileged users. Therefore, the default should not be changed.
|
Rationale | Allowing client requests to be made from ports higher than 1024 could allow a unprivileged user to initiate an NFS connection. If the unprivileged user account has been compromised, an attacker could gain access to data on the NFS server. |
Ensure Insecure File Locking is Not Allowed
Rule ID | xccdf_org.ssgproject.content_rule_no_insecure_locks_exports | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:04 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27167-6 references: 764 | ||||||
Description | By default the NFS server requires secure file-lock requests,
which require credentials from the client in order to lock a file. Most NFS
clients send credentials with file lock requests, however, there are a few
clients that do not send credentials when requesting a file-lock, allowing the
client to only be able to lock world-readable files. To get around this, the
| ||||||
Rationale | Allowing insecure file locking could allow for sensitive data to be viewed or edited by an unauthorized user. | ||||||
OVAL details Items not found violating Tests the value of the insecure locks in /etc/exports:Object oval:ssg:obj:1694 of type textfilecontent54_object
|
Disable DNS Server
Rule ID | xccdf_org.ssgproject.content_rule_disable_dns_server | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26873-0 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig named off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | All network services involve some risk of compromise due to implementation flaws and should be disabled if possible. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1545 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1547 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1548 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1549 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1550 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1551 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1552 of type runlevel_object
State oval:ssg:ste:1546 of type runlevel_state
|
Uninstall bind Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_bind | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27030-6 | ||
Description | To remove the $ sudo yum erase bind | ||
Rationale | If there is no need to make DNS server software available, removing it provides a safeguard against its activation. | ||
OVAL details Items not found satisfying package bind is removed:Object oval:ssg:obj:1556 of type rpminfo_object
|
Disable Zone Transfers from the Nameserver
Rule ID | xccdf_org.ssgproject.content_rule_dns_server_disable_zone_transfers |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27528-9 |
Description | Is it necessary for a secondary nameserver to receive zone data
via zone transfer from the primary server? If not, follow the instructions in
this section. If so, see the next section for instructions on protecting zone
transfers.
Add or correct the following directive within options { allow-transfer { none; }; ... } |
Rationale | If both the primary and secondary nameserver are under your control, or if you have only one nameserver, it may be possible to use an external configuration management mechanism to distribute zone updates. In that case, it is not necessary to allow zone transfers within BIND itself, so they should be disabled to avoid the potential for abuse. |
Authenticate Zone Transfers
Rule ID | xccdf_org.ssgproject.content_rule_dns_server_authenticate_zone_transfers |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27496-9 references: CM-7 |
Description | If it is necessary for a secondary nameserver to receive zone data via zone transfer from the primary server, follow the instructions here. Use dnssec-keygen to create a symmetric key file in the current directory: $ cd /tmp $ sudo dnssec-keygen -a HMAC-MD5 -b 128 -n HOST dns.example.com Kdns.example.com .+aaa +iiiiiThis output is the name of a file containing the new key. Read the file to find the base64-encoded key string: $ sudo cat Kdns.example.com .+NNN +MMMMM .key dns.example.com IN KEY 512 3 157 base64-key-stringAdd the directives to /etc/named.conf on the primary server:
key zone-transfer-key { algorithm hmac-md5; secret "base64-key-string "; }; zone "example.com " IN { type master; allow-transfer { key zone-transfer-key; }; ... };Add the directives below to /etc/named.conf on the secondary nameserver:
key zone-transfer-key { algorithm hmac-md5; secret "base64-key-string "; }; server IP-OF-MASTER { keys { zone-transfer-key; }; }; zone "example.com " IN { type slave; masters { IP-OF-MASTER ; }; ... }; |
Rationale | The BIND transaction signature (TSIG) functionality allows primary and secondary nameservers to use a shared secret to verify authorization to perform zone transfers. This method is more secure than using IP-based limiting to restrict nameserver access, since IP addresses can be easily spoofed. However, if you cannot configure TSIG between your servers because, for instance, the secondary nameserver is not under your control and its administrators are unwilling to configure TSIG, you can configure an allow-transfer directive with numerical IP addresses or ACLs as a last resort. |
Warnings | warning
The purpose of the dnssec-keygen command is to
create the shared secret string base64-key-string. Once this secret has been
obtained and inserted into named.conf on the primary and secondary servers, the
key files Kdns.example.com .+NNN +MMMMM .key and Kdns.example.com .+NNN +MMMMM
.private are no longer needed, and may safely be deleted. |
Disable Dynamic Updates
Rule ID | xccdf_org.ssgproject.content_rule_dns_server_disable_dynamic_updates |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27105-6 |
Description | Is there a mission-critical reason to enable the risky dynamic
update functionality? If not, edit zone "example.com " IN { allow-update { none; }; ... }; |
Rationale | Dynamic updates allow remote servers to add, delete, or modify any entries in your zone file. Therefore, they should be considered highly risky, and disabled unless there is a very good reason for their use. If dynamic updates must be allowed, IP-based ACLs are insufficient protection, since they are easily spoofed. Instead, use TSIG keys (see the previous section for an example), and consider using the update-policy directive to restrict changes to only the precise type of change needed. |
Disable vsftpd Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_vsftpd | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26948-0 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig vsftpd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Running FTP server software provides a network-based avenue of attack, and should be disabled if not needed. Furthermore, the FTP protocol is unencrypted and creates a risk of compromising sensitive information. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1797 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1799 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1800 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1801 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1802 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1803 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1804 of type runlevel_object
State oval:ssg:ste:1798 of type runlevel_state
|
Uninstall vsftpd Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_vsftpd | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26687-4 | ||
Description |
The # yum erase vsftpd | ||
Rationale | Removing the vsftpd package decreases the risk of its accidental activation. | ||
OVAL details Items not found satisfying package vsftpd is removed:Object oval:ssg:obj:1629 of type rpminfo_object
|
Install vsftpd Package
Rule ID | xccdf_org.ssgproject.content_rule_package_vsftpd_installed | ||
Result | notselected | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27187-4 references: CM-7 | ||
Description | If this machine must operate as an FTP server, install the $ sudo yum install vsftpd | ||
Rationale | After RHEL 2.1, Red Hat switched from distributing wu-ftpd with RHEL to distributing vsftpd. For security and for consistency with future Red Hat releases, the use of vsftpd is recommended. | ||
OVAL details Items not found violating package vsftpd is installed:Object oval:ssg:obj:1661 of type rpminfo_object
|
Restrict Access to Anonymous Users if Possible
Rule ID | xccdf_org.ssgproject.content_rule_ftp_restrict_to_anon |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27115-5 |
Description | Is there a mission-critical reason for users to transfer files to/from their own accounts using FTP, rather than using a secure protocol like SCP/SFTP? If not, edit the vsftpd configuration file. Add or correct the following configuration option: local_enable=NOIf non-anonymous FTP logins are necessary, follow the guidance in the remainder of this section to secure these logins as much as possible. |
Rationale | The use of non-anonymous FTP logins is strongly discouraged. Since SSH clients and servers are widely available, and since SSH provides support for a transfer mode which resembles FTP in user interface, there is no good reason to allow password-based FTP access. |
Enable Logging of All FTP Transactions
Rule ID | xccdf_org.ssgproject.content_rule_ftp_log_transactions | ||||||||||||||||||
Result | notselected | ||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||
Severity | low | ||||||||||||||||||
Identifiers and References | identifiers: CCE-27142-9 | ||||||||||||||||||
Description | Add or correct the following configuration options within the xferlog_enable=YES xferlog_std_format=NO log_ftp_protocol=YES | ||||||||||||||||||
Rationale | To trace malicious activity facilitated by the FTP service, it must be configured to ensure that all commands sent to
the FTP server are logged using the verbose vsftpd log
format. The default vsftpd log file is | ||||||||||||||||||
Warnings | warning
If verbose logging to vsftpd.log is done, sparse logging of downloads to /var/log/xferlog will not also occur. However, the information about what files were downloaded is included in the information logged to vsftpd.log | ||||||||||||||||||
OVAL details Items not found violating log ftp transactions:Object oval:ssg:obj:1368 of type textfilecontent54_object
Items not found violating log ftp transactions:Object oval:ssg:obj:1369 of type textfilecontent54_object
Items not found violating log ftp transactions:Object oval:ssg:obj:1370 of type textfilecontent54_object
|
Disable FTP Uploads if Possible
Rule ID | xccdf_org.ssgproject.content_rule_ftp_disable_uploads |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27117-1 |
Description | Is there a mission-critical reason for users to upload files via FTP? If not, edit the vsftpd configuration file to add or correct the following configuration options: write_enable=NOIf FTP uploads are necessary, follow the guidance in the remainder of this section to secure these transactions as much as possible. |
Rationale | Anonymous FTP can be a convenient way to make files available for universal download. However, it is less common to have a need to allow unauthenticated users to place files on the FTP server. If this must be done, it is necessary to ensure that files cannot be uploaded and downloaded from the same directory. |
Place the FTP Home Directory on its Own Partition
Rule ID | xccdf_org.ssgproject.content_rule_ftp_home_partition |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27411-8 |
Description | By default, the anonymous FTP root is the home directory of the FTP user account. The df command can be used to verify that this directory is on its own partition. |
Rationale | If there is a mission-critical reason for anonymous users to upload files, precautions must be taken to prevent these users from filling a disk used by other services. |
Disable httpd Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_httpd | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27075-1 references: CM-7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig httpd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Running web server software provides a network-based avenue of attack, and should be disabled if not needed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1747 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1749 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1750 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1751 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1752 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1753 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1754 of type runlevel_object
State oval:ssg:ste:1748 of type runlevel_state
|
Uninstall httpd Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_httpd | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27133-8 references: CM-7 | ||
Description |
The # yum erase httpd | ||
Rationale | If there is no need to make the web server software available, removing it provides a safeguard against its activation. | ||
OVAL details Items not found satisfying package httpd is removed:Object oval:ssg:obj:1570 of type rpminfo_object
|
Set httpd ServerTokens Directive to Prod
Rule ID | xccdf_org.ssgproject.content_rule_httpd_servertokens_prod |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27425-8 references: CM-7 |
Description |
ServerTokens Prod |
Rationale | Information disclosed to clients about the configuration of the web server and system could be used to plan an attack on the given system. This information disclosure should be restricted to a minimum. |
Set httpd ServerSignature Directive to Off
Rule ID | xccdf_org.ssgproject.content_rule_httpd_serversignature_off |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27586-7 references: CM-7 |
Description |
ServerSignature Off |
Rationale | Information disclosed to clients about the configuration of the web server and system could be used to plan an attack on the given system. This information disclosure should be restricted to a minimum. |
Disable HTTP Digest Authentication
Rule ID | xccdf_org.ssgproject.content_rule_httpd_digest_authentication |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27553-7 |
Description |
The #LoadModule auth_digest_module modules/mod_auth_digest.so |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable HTTP mod_rewrite
Rule ID | xccdf_org.ssgproject.content_rule_httpd_mod_rewrite |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27570-1 |
Description |
The #LoadModule rewrite_module modules/mod_rewrite.so |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable LDAP Support
Rule ID | xccdf_org.ssgproject.content_rule_httpd_ldap_support |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27395-3 |
Description |
The #LoadModule ldap_module modules/mod_ldap.so #LoadModule authnz_ldap_module modules/mod_authnz_ldap.soIf LDAP is to be used, SSL encryption should be used as well. |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable Server Side Includes
Rule ID | xccdf_org.ssgproject.content_rule_httpd_server_side_includes |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27558-6 |
Description | Server Side Includes provide a method of dynamically generating web pages through the insertion of server-side code. However, the technology is also deprecated and introduces significant security concerns. If this functionality is unnecessary, comment out the related module: #LoadModule include_module modules/mod_include.soIf there is a critical need for Server Side Includes, they should be enabled with the option IncludesNoExec to prevent arbitrary code execution. Additionally, user
supplied data should be encoded to prevent cross-site scripting vulnerabilities.
|
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable MIME Magic
Rule ID | xccdf_org.ssgproject.content_rule_httpd_mime_magic |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27541-2 |
Description |
The #LoadModule mime_magic_module modules/mod_mime_magic.so |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable WebDAV (Distributed Authoring and Versioning)
Rule ID | xccdf_org.ssgproject.content_rule_httpd_webdav |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27329-2 |
Description | WebDAV is an extension of the HTTP protocol that provides distributed and collaborative access to web content. If its functionality is unnecessary, comment out the related modules: #LoadModule dav_module modules/mod_dav.so #LoadModule dav_fs_module modules/mod_dav_fs.soIf there is a critical need for WebDAV, extra care should be taken in its configuration. Since DAV access allows remote clients to manipulate server files, any location on the server that is DAV enabled should be protected by access controls. |
Rationale | Minimizing the number of loadable modules available to the web server, reduces risk by limiting the capabilities allowed by the web server. |
Disable Server Activity Status
Rule ID | xccdf_org.ssgproject.content_rule_httpd_server_activity_status |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27468-8 |
Description |
The #LoadModule status_module modules/mod_status.soIf there is a critical need for this module, ensure that access to the status page is properly restricted to a limited set of hosts in the status handler configuration. |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable Web Server Configuration Display
Rule ID | xccdf_org.ssgproject.content_rule_httpd_server_configuration_display |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27507-3 |
Description |
The #LoadModule info_module modules/mod_info.soIf there is a critical need for this module, use the Location directive to provide
an access control list to restrict access to the information.
|
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable URL Correction on Misspelled Entries
Rule ID | xccdf_org.ssgproject.content_rule_httpd_url_correction |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27276-5 |
Description |
The #LoadModule speling_module modules/mod_speling.soThis functionality weakens server security by making site enumeration easier. |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable Proxy Support
Rule ID | xccdf_org.ssgproject.content_rule_httpd_proxy_support |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27442-3 |
Description |
The #LoadModule proxy_module modules/mod_proxy.soIf proxy support is needed, load mod_proxy and the appropriate proxy protocol handler
module (one of mod_proxy_http , mod_proxy_ftp , or mod_proxy_connect ). Additionally,
make certain that a server is secure before enabling proxying, as open proxy servers
are a security risk. mod_proxy_balancer enables load balancing, but requires that
mod status be enabled.
|
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable Cache Support
Rule ID | xccdf_org.ssgproject.content_rule_httpd_cache_support |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-26859-9 |
Description |
The #LoadModule cache_module modules/mod_cache.soIf caching is required, it should not be enabled for any limited-access content. |
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Disable CGI Support
Rule ID | xccdf_org.ssgproject.content_rule_httpd_cgi_support |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27362-3 |
Description |
The #LoadModule cgi_module modules/mod_cgi.soIf the web server requires the use of CGI, enable mod_cgi .
|
Rationale | Minimizing the number of loadable modules available to the web server reduces risk by limiting the capabilities allowed by the web server. |
Restrict Root Directory
Rule ID | xccdf_org.ssgproject.content_rule_httpd_restrict_root_directory |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27009-0 |
Description |
The <Directory / > Options None AllowOverride None Order allow,deny </Directory> |
Rationale | The Web Server's root directory content should be protected from unauthorized access by web clients. |
Restrict Web Directory
Rule ID | xccdf_org.ssgproject.content_rule_httpd_restrict_web_directory |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27574-3 |
Description |
The default configuration for the web ( <Directory "/var/www/html"> # ... Options SymLinksIfOwnerMatch # ... </Directory> |
Rationale | Access to the web server's directory hierarchy could allow access to unauthorized files by web clients. Following symbolic links could also allow such access. |
Restrict Other Critical Directories
Rule ID | xccdf_org.ssgproject.content_rule_httpd_restrict_critical_directories |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27565-1 |
Description |
All accessible web directories should be configured with similarly restrictive settings.
The |
Rationale | Directories accessible from a web client should be configured with the least amount of access possible in order to avoid unauthorized access to restricted content or server information. |
Limit Available Methods
Rule ID | xccdf_org.ssgproject.content_rule_httpd_limit_available_methods |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27581-8 |
Description |
Web server methods are defined in section 9 of RFC 2616 (http://www.ietf.org/rfc/rfc2616.txt).
If a web server does not require the implementation of all available methods,
they should be disabled.
<Directory /var/www/html> # ... # Only allow specific methods (this command is case-sensitive!) <LimitExcept GET POST> Order allow,deny </LimitExcept> # ... </Directory> |
Rationale | Minimizing the number of available methods to the web client reduces risk by limiting the capabilities allowed by the web server. |
Install mod_ssl
Rule ID | xccdf_org.ssgproject.content_rule_httpd_install_mod_ssl |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27403-5 |
Description |
Install the $ sudo yum install mod_ssl |
Rationale |
|
Install mod_security
Rule ID | xccdf_org.ssgproject.content_rule_httpd_install_mod_security |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27525-5 |
Description |
Install the $ sudo yum install mod_security |
Rationale |
|
Disable Dovecot Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_dovecot | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26922-5 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig dovecot off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Running an IMAP or POP3 server provides a network-based avenue of attack, and should be disabled if not needed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1353 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1355 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1356 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1357 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1358 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1359 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1360 of type runlevel_object
State oval:ssg:ste:1354 of type runlevel_state
|
Uninstall dovecot Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_dovecot | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-27039-7 | ||
Description | The $ sudo yum erase dovecot | ||
Rationale | If there is no need to make the Dovecot software available, removing it provides a safeguard against its activation. | ||
OVAL details Items not found satisfying package dovecot is removed:Object oval:ssg:obj:1530 of type rpminfo_object
|
Enable the SSL flag in /etc/dovecot.conf
Rule ID | xccdf_org.ssgproject.content_rule_dovecot_enable_ssl | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:36:04 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27571-9 | ||||||||
Description | To allow clients to make encrypted connections the ssl = yes | ||||||||
Rationale | SSL encrypt network traffic between the Dovecot server and its clients protecting user credentials, mail as it is downloaded, and clients may use SSL certificates to authenticate the server, preventing another system from impersonating the server. | ||||||||
OVAL details Items not found violating Tests the value of the ssl[\s]*(<:nocomment:>*) setting in the /etc/dovecot.conf file:Object oval:ssg:obj:1863 of type textfilecontent54_object
|
Configure Dovecot to Use the SSL Certificate file
Rule ID | xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_cert |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27459-7 |
Description | This option tells Dovecot where to find the the mail
server's SSL Certificate.
ssl_cert = </etc/pki/dovecot/certs/dovecot.pem |
Rationale | SSL certificates are used by the client to authenticate the identity of the server, as well as to encrypt credentials and message traffic. Not using SSL to encrypt mail server traffic could allow unauthorized access to credentials and mail messages since they are sent in plain text over the network. |
Configure Dovecot to Use the SSL Key file
Rule ID | xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_key |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27633-7 |
Description | This option tells Dovecot where to find the the mail
server's SSL Key.
ssl_key = </etc/pki/dovecot/private/dovecot.pem |
Rationale | SSL certificates are used by the client to authenticate the identity of the server, as well as to encrypt credentials and message traffic. Not using SSL to encrypt mail server traffic could allow unauthorized access to credentials and mail messages since they are sent in plain text over the network. |
Disable Plaintext Authentication
Rule ID | xccdf_org.ssgproject.content_rule_dovecot_disable_plaintext_auth | ||||||||
Result | notselected | ||||||||
Time | 2015-08-22T01:36:04 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-27144-5 | ||||||||
Description | To prevent Dovecot from attempting plaintext
authentication of clients, edit disable_plaintext_auth = yes | ||||||||
Rationale | Using plain text authentication to the mail server could allow an attacker access to credentials by monitoring network traffic. | ||||||||
OVAL details Items not found violating Tests the value of the disable_plaintext_auth[\s]*(<:nocomment:>*) setting in the /etc/dovecot.conf file:Object oval:ssg:obj:1834 of type textfilecontent54_object
|
Disable Samba
Rule ID | xccdf_org.ssgproject.content_rule_disable_smb_server | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27143-7 references: 1436 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig smb off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Running a Samba server provides a network-based avenue of attack, and should be disabled if not needed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:2117 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2119 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2120 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2121 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2122 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2123 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2124 of type runlevel_object
State oval:ssg:ste:2118 of type runlevel_state
|
Disable Root Access to SMB Shares
Rule ID | xccdf_org.ssgproject.content_rule_smb_server_disable_root |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | identifiers: CCE-27533-9 |
Description | Administrators should not use administrator accounts to access Samba file and printer shares. Disable the root user and the wheel administrator group: [share] invalid users = root @wheelIf administrator accounts cannot be disabled, ensure that local machine passwords and Samba service passwords do not match. |
Rationale |
Typically, administrator access is required when Samba must create user and
machine accounts and shares. Domain member servers and standalone servers may
not need administrator access at all. If that is the case, add the invalid
users parameter to |
Require Client SMB Packet Signing, if using smbclient
Rule ID | xccdf_org.ssgproject.content_rule_require_smb_client_signing | ||||||||
Result | fail | ||||||||
Time | 2015-08-22T01:36:04 | ||||||||
Severity | low | ||||||||
Identifiers and References | identifiers: CCE-26328-5 | ||||||||
Description |
To require samba clients running client signing = mandatoryRequiring samba clients such as smbclient to use packet
signing ensures they can
only communicate with servers that support packet signing.
| ||||||||
Rationale | Packet signing can prevent man-in-the-middle attacks which modify SMB packets in transit. | ||||||||
OVAL details Items not found violating check for client signing = mandatory in /etc/samba/smb.conf:Object oval:ssg:obj:2133 of type textfilecontent54_object
|
Require Client SMB Packet Signing, if using mount.cifs
Rule ID | xccdf_org.ssgproject.content_rule_require_smb_client_signing_mount.cifs | ||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26792-2 | ||||||||||||||||||||||||||||||||||||||||
Description | Require packet signing of clients who mount Samba
shares using the | ||||||||||||||||||||||||||||||||||||||||
Rationale | Packet signing can prevent man-in-the-middle attacks which modify SMB packets in transit. | ||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying check for no cifs in /etc/fstab:Object oval:ssg:obj:1567 of type textfilecontent54_object
Items not found satisfying check for sec=krb5i or sec=ntlmv2i in /etc/fstab:Object oval:ssg:obj:1567 of type textfilecontent54_object
State oval:ssg:ste:1568 of type textfilecontent54_state
Items not found satisfying check for no cifs in /etc/mtab:Object oval:ssg:obj:1569 of type textfilecontent54_object
Items not found satisfying check for sec=krb5i or sec=ntlmv2i in /etc/mtab:Object oval:ssg:obj:1569 of type textfilecontent54_object
State oval:ssg:ste:1568 of type textfilecontent54_state
|
Disable Squid
Rule ID | xccdf_org.ssgproject.content_rule_disable_squid | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-27146-0 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig squid off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Running proxy server software provides a network-based avenue of attack, and should be removed if not needed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:2125 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2127 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2128 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2129 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2130 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2131 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:2132 of type runlevel_object
State oval:ssg:ste:2126 of type runlevel_state
|
Uninstall squid Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_squid | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26977-9 | ||
Description |
The # yum erase squid | ||
Rationale | If there is no need to make the proxy server software available, removing it provides a safeguard against its activation. | ||
OVAL details Items not found satisfying package squid is removed:Object oval:ssg:obj:2230 of type rpminfo_object
|
Disable snmpd Service
Rule ID | xccdf_org.ssgproject.content_rule_disable_snmpd | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result | pass | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Time | 2015-08-22T01:36:04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Identifiers and References | identifiers: CCE-26906-8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description |
The # chkconfig snmpd off | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rationale | Running SNMP software provides a network-based avenue of attack, and should be disabled if not needed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OVAL details Items not found satisfying Runlevel test:Object oval:ssg:obj:1571 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1573 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1574 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1575 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1576 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1577 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
Items not found satisfying Runlevel test:Object oval:ssg:obj:1578 of type runlevel_object
State oval:ssg:ste:1572 of type runlevel_state
|
Uninstall net-snmp Package
Rule ID | xccdf_org.ssgproject.content_rule_uninstall_net-snmp | ||
Result | pass | ||
Time | 2015-08-22T01:36:04 | ||
Severity | low | ||
Identifiers and References | identifiers: CCE-26332-7 | ||
Description | The # yum erase net-snmpd | ||
Rationale | If there is no need to run SNMP server software, removing the package provides a safeguard against its activation. | ||
OVAL details Items not found satisfying package net-snmp is removed:Object oval:ssg:obj:1695 of type rpminfo_object
|
Configure SNMP Service to Use Only SNMPv3 or Newer
Rule ID | xccdf_org.ssgproject.content_rule_snmpd_use_newer_protocol | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:04 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27365-6 | ||||||
Description |
Edit $ sudo service snmpd restart | ||||||
Rationale | Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information. | ||||||
OVAL details Items not found violating Check snmpd configuration:Object oval:ssg:obj:1364 of type textfilecontent54_object
|
Ensure Default Password Is Not Used
Rule ID | xccdf_org.ssgproject.content_rule_snmpd_not_default_password | ||||||
Result | notselected | ||||||
Time | 2015-08-22T01:36:04 | ||||||
Severity | medium | ||||||
Identifiers and References | identifiers: CCE-27593-3 references: test_attestation | ||||||
Description |
Edit $ sudo service snmpd restart | ||||||
Rationale | Presence of the default SNMP password enables querying of different system aspects and could result in unauthorized knowledge of the system. | ||||||
OVAL details Items not found violating Check snmpd configuration:Object oval:ssg:obj:1760 of type textfilecontent54_object
|
Product Meets this Requirement
Rule ID | xccdf_org.ssgproject.content_rule_met_inherently_generic |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | references: 42, 56, 206, 1084, 66, 85, 86, 185, 223, 171, 172, 1694, 770, 804, 162, 163, 164, 345, 346, 1096, 1111, 1291, 386, 156, 186, 1083, 1082, 1090, 804, 1127, 1128, 1129, 1248, 1265, 1314, 1362, 1368, 1310, 1311, 1328, 1399, 1400, 1427, 1499, 1632, 1693, 1665, 1674 |
Description | This requirement is a permanent not a finding. No fix is required. |
Rationale | Red Hat Enterprise Linux meets this requirement through design and implementation. |
Product Meets this Requirement
Rule ID | xccdf_org.ssgproject.content_rule_met_inherently_auditing |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | |
Description | This requirement is a permanent not a finding. No fix is required. |
Rationale | The Red Hat Enterprise Linux audit system meets this requirement through design and implementation. |
Product Meets this Requirement
Rule ID | xccdf_org.ssgproject.content_rule_met_inherently_nonselected |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | references: 34, 35, 99, 154, 226, 802, 872, 1086, 1087, 1089, 1091, 1424, 1426, 1428, 1209, 1214, 1237, 1269, 1338, 1425, 1670 |
Description | This requirement is a permanent not a finding. No fix is required. |
Rationale | Red Hat Enterprise Linux meets this requirement through design and implementation. |
Guidance Does Not Meet this Requirement Due to Impracticality or Scope
Rule ID | xccdf_org.ssgproject.content_rule_unmet_nonfinding_nonselected_scope |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | references: 21, 25, 28, 29, 30, 165, 221, 354, 553, 779, 780, 781, 1009, 1094, 1123, 1124, 1125, 1132, 1135, 1140, 1141, 1142, 1143, 1145, 1147, 1148, 1166, 1339, 1340, 1341, 1350, 1356, 1373, 1374, 1383, 1391, 1392, 1395, 1662 |
Description | This requirement is NA. No fix is required. |
Rationale | The guidance does not meet this requirement. The requirement is impractical or out of scope. |
Implementation of the Requirement is Not Supported
Rule ID | xccdf_org.ssgproject.content_rule_unmet_finding_nonselected |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | |
Description | This requirement is a permanent finding and cannot be fixed. An appropriate mitigation for the system must be implemented but this finding cannot be considered fixed. |
Rationale | RHEL6 does not support this requirement. |
Guidance Does Not Meet this Requirement Due to Impracticality or Scope
Rule ID | xccdf_org.ssgproject.content_rule_unmet_nonfinding_scope |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | references: 15, 27, 218, 219, 371, 372, 535, 537, 539, 1682, 370, 37, 24, 1112, 1126, 1143, 1149, 1157, 1159, 1210, 1211, 1274, 1372, 1376, 1377, 1352, 1401, 1555, 1556, 1150 |
Description | This requirement is NA. No fix is required. |
Rationale | The guidance does not meet this requirement. The requirement is impractical or out of scope. |
A process for prompt installation of OS updates must exist.
Rule ID | xccdf_org.ssgproject.content_rule_update_process |
Result | notselected |
Time | 2015-08-22T01:36:04 |
Severity | low |
Identifiers and References | references: 1232 |
Description | Procedures to promptly apply software updates must be established and executed. The Red Hat operating system provides support for automating such a process, by running the yum program through a cron job or by managing the system and its packages through the Red Hat Network or a Satellite Server. |
Rationale | This is a manual inquiry about update procedure. |