-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
timer_dnf-automatic_enabled
doesn't remediate via Ansible on RHEL 9
#12831
Comments
timer_dnf-automatic_enabled
doesn't remediate via Ansible on RHEL 9.0/9.2timer_dnf-automatic_enabled
doesn't remediate via Ansible on RHEL 9
This appears to now be happening on RHEL 9.6 as well. |
This issue is a duplicate of #12119. The problem is that starting the I reproduced this sucessfully. In my example, the rule evaluated as false at 15:49:46 and according to journalctl the timer started at 15:49:48. |
I forgot to mention that there is a reboot in the /hardening/host-os/ansible contest test between the Ansible remediation and the oscap scan. The oscap scan starts sooner after the reboot that the dnf-automatic.timer starts. We think that there are these solutions:
|
I'm not sure that's the issue - on my RHEL-9 VM, it starts in a fraction of a second (under 100ms) and the delays from tmt waiting for the host to reboot + ssh-ing into it + running the test again definitely add up to more than 2secs. Measuring it now (tmt takes a long time to realize a host has booted), it's about 20-30 seconds after sshd becomes accessible. That said, However, while Maybe we could add a |
Maybe a VM is different than the remote VM? |
Description of problem:
Running Ansible remediation on "host-os" (the SUT itself),
results in a following
oscap xccdf eval
FAILing when checking the rule, claiming thatdnf-automatic.timer
isinactive
.The fact that a VM-based Ansible test didn't have this issue might indicate a (Beaker) environment specific issue, or maybe some incompatibility with older RHELs, ie. different unit file naming or disabled-by-default service that we never enable, or perhaps an external override (in
/etc
?) that would inactivate the service.Some more investigation is needed, sorry.
Run on 9.0 or 9.2 as
SCAP Security Guide Version:
master @ 60a184a
Operating System Version:
RHEL-9.0 EUS and RHEL-9.2 EUS
Additional Information/Debugging Steps:
Can't attach report html / ARF xml here since both contain internal hostnames and IP addresses, given that the scan was done on the Beaker system itself, not in a nested VM. Please use the reproducer above.
The text was updated successfully, but these errors were encountered: