Bug 1398655 - Evaluation of RHEL6 system after installing it from USGCB kickstart reports some failing rules
Summary: Evaluation of RHEL6 system after installing it from USGCB kickstart reports s...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: scap-security-guide
Version: 6.9
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Watson Yuuma Sato
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-11-25 13:42 UTC by Matus Marhefka
Modified: 2017-12-06 11:47 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-12-06 11:47:36 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Matus Marhefka 2016-11-25 13:42:56 UTC
Install RHEL6 system (server variant) from USGCB kickstart (ssg-rhel6-usgcb-server-with-gui-ks.cfg) provided by scap-security-guide package. After evaluation of USGCB content on the installed system the following rules are failing:
===
These are the unexpected results:
Found 3 nodes:
-- NODE --
<rule-result idref="accounts_umask_etc_csh_cshrc" time="2016-11-24T04:13:17" severity="low" weight="1.000000">
      <result>fail</result>
      <ident system="http://cce.mitre.org">CCE-27034-8</ident>
      <ident system="http://cce.mitre.org">DISA FSO RHEL-06-000343</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="var_accounts_user_umask" />
        <check-content-ref name="oval:ssg-accounts_umask_etc_csh_cshrc:def:1" href="ssg-rhel6-oval.xml" />
      </check>
    </rule-result>-- NODE --
<rule-result idref="rsyslog_files_permissions" time="2016-11-24T04:13:18" severity="medium" weight="1.000000">
      <result>fail</result>
      <ident system="http://cce.mitre.org">CCE-27190-8</ident>
      <ident system="http://cce.mitre.org">DISA FSO RHEL-06-000135</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:ssg-rsyslog_files_permissions:def:1" href="ssg-rhel6-oval.xml" />
      </check>
    </rule-result>-- NODE --
<rule-result idref="rsyslog_remote_loghost" time="2016-11-24T04:13:18" severity="low" weight="1.000000">
      <result>fail</result>
      <ident system="http://cce.mitre.org">CCE-26801-1</ident>
      <ident system="http://cce.mitre.org">DISA FSO RHEL-06-000136</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:ssg-rsyslog_remote_loghost:def:1" href="ssg-rhel6-oval.xml" />
      </check>
    </rule-result>
===

Version-Release number of selected component (if applicable):
scap-security-guide-0.1.28-3.el6.noarch

How reproducible:
Always

Actual results:
Evaluation of USGCB content on the system installed from USGCB kickstart reports failing rules.

Expected results:
Evaluation of USGCB content on the system installed from USGCB kickstart reports that system is USGCB compliant.


Additional info:

Comment 5 Jan Kurik 2017-12-06 11:47:36 UTC
Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available.

The official life cycle policy can be reviewed here:

http://redhat.com/rhel/lifecycle

This issue does not meet the inclusion criteria for the Production 3 Phase and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Note that a strong business justification will be required for re-evaluation. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL:

https://access.redhat.com/


Note You need to log in before you can comment on or make changes to this bug.