Harden sshd crypto policy#4663
Conversation
|
Can one of the admins verify this patch? |
|
@openscap-ci add to whitelist |
yuumasato
left a comment
There was a problem hiding this comment.
Please, look into adding test scenarios;
Add the OCIL clause and question;
This can serve as inspiration.
The ocil_clause should be the continuation of the question:
Is it the case that....?
And make sure the files have a newline at the end.
regex working
added also empty lines at end of files
c004e95 to
7408d49
Compare
|
test this please |
yuumasato
left a comment
There was a problem hiding this comment.
@vojtapolasek Thank you for the updates.
Just a few more fixes to the rule text, and it should be good to go.
|
@vojtapolasek Thank you! |
|
Customizing the crypto policy file for https://github.com/ComplianceAsCode/content/blob/master/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml#L16 Otherwise the @yuumasato what do you think about this? |
|
@ggbecker, yes, you are right. |
Yes, customization of crypto policies fails the check for those symlinks in We can consider dropping all the symlink checks, not being symlinked to a back-end policy does not imply malicious tampering of the policy. |
|
Alternatively, the check could be for the symlink, or the drop-in snippet file we know we support. |
|
@adelton I agree with this, I find is as the safest option. However, in this case we need to track somewhere what policies we modify. Just saying. |
How will the rule know that what is in the drop-in snippet is OK? If a rule adds a drop-in replacement for a back-end, shouldn't that rule check it? |
It won't. But it will know that the snippet is allowed, and thus the check for the symlink does not make sense.
Well, it does, functionally. The |
Description:
Added a new rule to harden SSHD by applying stricter crypto policy.
Rationale:
Athering to the CC requirements, based on Kickstart file.