-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Crypto-policy-related rules fail on RHEL-8 when installed with fips=1
#12942
Comments
The |
The rule For the same reason the rule We will add |
I have investigated the RHEL 8 STIG profile. I have used current upstream master as of 2025-02-06 as of HEAD 47fd3bc. I have run the test
First, I have focused on rule The rule has been evaluated as false in the after reboot scan. However, the rule has been evaluated as fixed during OSCAP Anaconda Addon run of oscap during the system installation. That means that something changed between the remediation execution and after reboot scan. The file
This corresponds with what I found in the log
At the second of the last modification of the
I think that this action could overwrite our modification of file The same problem situation happens also with rules |
The same problem situation happens also with rules sshd_ciphers_opensshserver_conf_crypto_policy and sshd_macs_opensshserver_conf_crypto_policy. But in these 2 rules there are addintionally 2 suspicious messages produced by remeditaion: harden_sshd_ciphers_opensshserver_conf_crypto_policy:
harden_sshd_macs_opensshserver_conf_crypto_policy:
|
I think it can be related to https://issues.redhat.com/browse/RHEL-4722. |
The other 2 rules (harden_sshd_macs_openssh_conf_crypto_policy and harden_sshd_ciphers_openssh_conf_crypto_policy) were removed this week from the RHEL 8 STIG profile. #12949 |
Addressing: harden_sshd_ciphers_opensshserver_conf_crypto_policy: grep: [email protected],[email protected],aes256-ctr,aes128-ctr: invalid context length argument harden_sshd_macs_opensshserver_conf_crypto_policy: grep: invalid option -- 'M' Usage: grep [OPTION]... PATTERN [FILE]... Try 'grep --help' for more information. Related to: ComplianceAsCode#12942
Description of problem:
fail on RHEL-8 (
stig
andstig_gui
) when using the content-provided Anaconda kickstarts, when the installer is booted withfips=1
, as opposed to RHEL-9 where these also fail, but don't have any remediation, so a potential failure is presumably expected.In addition,
also fails on RHEL-8, and that rule doesn't seem to be part of any relevant RHEL-9 profile.
And
fails with the
ospp
profile, also only seems to be on RHEL-8.SCAP Security Guide Version:
master @ cfed082
Operating System Version:
RHEL-8
Steps to Reproduce:
--rhel 8 --arch x86_64 --test "/hardening/anaconda/(stig|ospp)"
, possibly withCONTENT_PR=12916
(Update rule enable_fips_mode for RHEL 10 #12916) if it is not merged in the meantime.Additional Information/Debugging Steps:
The text was updated successfully, but these errors were encountered: