-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Harden sshd crypto policy #4663
Harden sshd crypto policy #4663
Conversation
Can one of the admins verify this patch? |
@openscap-ci add to whitelist |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please, look into adding test scenarios;
Add the OCIL clause and question;
This can serve as inspiration.
The ocil_clause
should be the continuation of the question:
Is it the case that....?
And make sure the files have a newline at the end.
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/bash/shared.sh
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
regex working
added also empty lines at end of files
c004e95
to
7408d49
Compare
test this please |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@vojtapolasek Thank you for the updates.
Just a few more fixes to the rule text, and it should be good to go.
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/software/integrity/crypto/harden_sshd_crypto_policy/rule.yml
Show resolved
Hide resolved
@vojtapolasek Thank you! |
Customizing the crypto policy file for https://github.com/ComplianceAsCode/content/blob/master/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml#L16 Otherwise the @yuumasato what do you think about this? |
@ggbecker, yes, you are right. |
Yes, customization of crypto policies fails the check for those symlinks in We can consider dropping all the symlink checks, not being symlinked to a back-end policy does not imply malicious tampering of the policy. |
Alternatively, the check could be for the symlink, or the drop-in snippet file we know we support. |
@adelton I agree with this, I find is as the safest option. However, in this case we need to track somewhere what policies we modify. Just saying. |
How will the rule know that what is in the drop-in snippet is OK? If a rule adds a drop-in replacement for a back-end, shouldn't that rule check it? |
It won't. But it will know that the snippet is allowed, and thus the check for the symlink does not make sense.
Well, it does, functionally. The |
Description:
Added a new rule to harden SSHD by applying stricter crypto policy.
Rationale:
Athering to the CC requirements, based on Kickstart file.