-
Notifications
You must be signed in to change notification settings - Fork 706
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sshd_use_approved_ciphers
fails for all CIS profiles in all test cases
#12096
Comments
Also caught by Automatus:
|
With the new productization model, these items also started to appear for a "Per Rule" test /per-rule/13/oscap/sshd_use_approved_ciphers/ which runs Automatus test. |
With the new productization model, these items also started to appear for a "Per Rule" test /per-rule/13/oscap/sshd_use_approved_ciphers/ which runs Automatus test. See ComplianceAsCode/content#12096
Part of of the pain is that rule requires the OS be to FIPS certified. However, there still is something wrong with the Ansible remediation when that |
With the new productization model, these items also started to appear for a "Per Rule" test /per-rule/13/oscap/sshd_use_approved_ciphers/ which runs Automatus test. See ComplianceAsCode/content#12096
I can reproduce locally with Ansible the error is above. |
Removed blocker since #12150 has been merged. |
As |
Part of the issue is to decide if we remove the installed of is fips certified criterium or not. |
Okay, so I consider this issue as something we want to have fixed in 0.1.74 release and we should focus on now. |
The profiles group says remove FIPS external check and warning section about FIPS. Profiles that need FIPS certifications should add rules requiring it. |
Description of problem:
sshd_use_approved_ciphers
fails to remediate (error
during remediation) resulting tofail
during final test scan.The problem is in CIS Server L1, CIS Server L2, CIS Workstation L1, and CIS Workstation L2.
Fails for Anaconda installation, Ansible playbook, host-os remediation, Image builder, and also oscap remediation of a VM.
SCAP Security Guide Version:
latest master
Operating System Version:
RHEL 9
Steps to Reproduce:
oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis --progress --report /var/tmp/contest-hardening-host-os-oscap-cis/remediation.html --remediate /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml
Actual Results:
sshd_use_approved_ciphers fails
Expected Results:
sshd_use_approved_ciphers pass
Additional Information/Debugging Steps:
The problem is RHEL9 only
I suspect #12067
However, HTML report says that ciphers setting is
true
(copied from HTML report):tests the value of Ciphers setting in the /etc/ssh/sshd_config file oval:ssg-test_sshd_use_approved_ciphers:tst:1 true
Following items have been found on the system:
Result of item-state comparison | Var ref | Value | Value | Value | Value | Value -- | -- | -- | -- | -- | -- | -- true | oval:ssg-var_sshd_config_ciphers:var:1 | -3des-cbc | aes128-cbc | aes192-cbc | aes256-cbc | rijndael-cbc@lysator.liu.seThe text was updated successfully, but these errors were encountered: