Bug 2213958
| Summary: | Rules "Set Existing Passwords Maximum/Minimum Age" apply to non-local users as well | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Renaud Métrich <rmetrich> | |
| Component: | scap-security-guide | Assignee: | Jan Černý <jcerny> | |
| Status: | VERIFIED --- | QA Contact: | Milan Lysonek <mlysonek> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | medium | |||
| Version: | 9.2 | CC: | ggasparb, jcerny, jjaburek, mhaicman, mlysonek, myllynen, openscap-maint, vpolasek | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | |||
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | scap-security-guide-0.1.69-1.el9 | Doc Type: | Bug Fix | |
| Doc Text: |
.Password age rules apply only to local users
Some compliance profiles, eg. CIS or DISA STIG, contain rules checking password age and password expiration of user account passwords.
Specifically, we are talking about these rules:
accounts_password_set_max_life_existing, accounts_password_set_min_life_existing, accounts_password_set_warn_age_existing, accounts_set_post_pw_existing.
Previously, these rules checked not only configuration of local users but they also evaluated configuration of remote users provided by network sources such as NSS. This behavior was caused by using the `getpwent()` system call in the OpenSCAP scanner. This behavior wasn't desired, behavior the remediation scripts weren't able to change the configuration of the remote users.
Therefore, the internal implementation of the aforementioned rules has been changed to depend only on data present in the "/etc/shadow" file. That means no other sources of user metadata are read by the rules. As a result, the rules now consider only local users configuration.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2228467 2228468 (view as bug list) | Environment: | ||
| Last Closed: | Type: | Bug | ||
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2228467, 2228468 | |||
|
Description
Renaud Métrich
2023-06-10 10:56:04 UTC
A pull request has been submitted to upstream for a review https://github.com/ComplianceAsCode/content/pull/10838 a fix has been merged upstream in https://github.com/ComplianceAsCode/content/pull/10838 |