Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DISA misalignment with rule mount_option_boot_efi_nosuid #13006

Open
4 tasks done
evgenyz opened this issue Feb 10, 2025 · 1 comment
Open
4 tasks done

DISA misalignment with rule mount_option_boot_efi_nosuid #13006

evgenyz opened this issue Feb 10, 2025 · 1 comment
Labels
Bash Bash remediation update. blocked Issue that can't be fixed in content. OVAL OVAL update. Related to the systems assessments. productization-issue Issue found in upstream stabilization process. RHEL8 Red Hat Enterprise Linux 8 product related. RHEL9 Red Hat Enterprise Linux 9 product related.
Milestone

Comments

@evgenyz
Copy link
Member

evgenyz commented Feb 10, 2025

Description of problem:

The content is misaligned with an external (third party) content that targets the same policy - typically, this means that a system hardened by our content doesn't pass the scan by the external content.

Details:

This content is not aligned with content from DISA (https://www.stigviewer.com/stig/red_hat_enterprise_linux_9/2024-06-04/finding/V-257862).

The misalignment affects these profiles:

  • STIG

The misalignment affects these rules:

  • mount_option_boot_efi_nosuid (passes) / SV-257862r958804_rule (not applicable)

The rule in CaC content after (#12958) does not have a platform and check /boot/efi partition if it is mounted or configured in /etc/fstab (following mount_option template logic). It does pass if neither is present in the system.

The rule in DISA content checks for presence of /sys/firmware/efi (as the rule's platform). Which was the previous behaviour of the CaC's rule.

The uefi platform in CaC is (note that Ansible conditional is different from Bash and OVAL, which also checks for /sys/firmware/efi):

name: cpe:/a:uefi
title: System boot mode is UEFI
check_id: system_boot_mode_is_uefi
bash_conditional: '[ -d /sys/firmware/efi ]'
ansible_conditional: '"/boot/efi" in ansible_mounts | map(attribute="mount") | list'

Ideally the rule should be applicable for systems which have /boot/efi either configured and/or present in runtime. More appropriate platform for that would be mount.

We also might want to persuade DISA into changing the platform criteria.

In any case uefi and non-uefi platforms should be fixed to have consistent conditionals. Essentially at this moment these platforms are used only in /linux_os/guide/system/bootloader-grub2/* rules, and it might make sense to reconsider the criteria and the name. Also it make sense to use not uefi platform expression instead of two platform definitions.

Outcome:

  • This project's content can be improved:
    • Check needs to be improved.
    • Remediation needs to be improved.
  • The external content's check is faulty - the other party needs to be notified, they have work to do.

SCAP Security Guide Version:

74cf6d5

External Content's Version:

RHEL-09-231105

@evgenyz evgenyz changed the title mount_option_boot_efi_nosuid DISA misalignment with rule mount_option_boot_efi_nosuid Feb 10, 2025
@evgenyz evgenyz added OVAL OVAL update. Related to the systems assessments. Bash Bash remediation update. productization-issue Issue found in upstream stabilization process. RHEL9 Red Hat Enterprise Linux 9 product related. RHEL8 Red Hat Enterprise Linux 8 product related. labels Feb 10, 2025
@evgenyz evgenyz added the blocked Issue that can't be fixed in content. label Feb 10, 2025
@evgenyz
Copy link
Member Author

evgenyz commented Feb 10, 2025

The issue is blocked to hide it from the list for the duration of the 0.1.76 stabilization. We can remove the blocked label after the release and work on it.

@evgenyz evgenyz added this to the 0.1.77 milestone Feb 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Bash Bash remediation update. blocked Issue that can't be fixed in content. OVAL OVAL update. Related to the systems assessments. productization-issue Issue found in upstream stabilization process. RHEL8 Red Hat Enterprise Linux 8 product related. RHEL9 Red Hat Enterprise Linux 9 product related.
Projects
None yet
Development

No branches or pull requests

1 participant