-
Notifications
You must be signed in to change notification settings - Fork 696
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove redundant sshd oval macro #12532
Remove redundant sshd oval macro #12532
Conversation
the original macro was used only in this rule and it effectively duplicated the sshd_oval_check with some limitations
This datastream diff is auto generated by the check Click here to see the full diffOVAL for rule 'xccdf_org.ssgproject.content_rule_sshd_use_strong_ciphers' differs.
--- oval:ssg-sshd_use_strong_ciphers:def:1
+++ oval:ssg-sshd_use_strong_ciphers:def:1
@@ -5,5 +5,7 @@
criteria AND
extend_definition oval:ssg-sshd_required_or_unset:def:1
extend_definition oval:ssg-package_openssh-server_installed:def:1
-criteria OR
+criteria AND
+criteria AND
criterion oval:ssg-test_sshd_use_strong_ciphers:tst:1
+criterion oval:ssg-test_Ciphers_present_sshd_use_strong_ciphers:tst:1 |
Code Climate has analyzed commit 87dd7be and detected 0 issues on this pull request. The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 60.9% (0.0% change). View more on Code Climate. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have add the rule sshd_use_strong_ciphers to RHEL 9 default profile and built the content. Then, I have run Automatus test scenarios.
jcerny@fedora:~/work/git/scap-security-guide (pr/12532)$ python3 tests/automatus.py rule --libvirt qemu:///system ssgts_rhel9 sshd_use_strong_ciphers
Setting console output to log level INFO
INFO - The base image option has not been specified, choosing libvirt-based test environment.
INFO - Logging into /home/jcerny/work/git/scap-security-guide/logs/rule-custom-2024-10-24-1350/test_suite.log
INFO - xccdf_org.ssgproject.content_rule_sshd_use_strong_ciphers
INFO - Script good_cipher.pass.sh using profile (all) OK
INFO - Script no_ciphers.fail.sh using profile (all) OK
jcerny@fedora:~/work/git/scap-security-guide (pr/12532)$ python3 tests/automatus.py rule --libvirt qemu:///system ssgts_rhel9 --remediate-using ansible sshd_use_strong_ciphers
Setting console output to log level INFO
INFO - The base image option has not been specified, choosing libvirt-based test environment.
INFO - Logging into /home/jcerny/work/git/scap-security-guide/logs/rule-custom-2024-10-24-1351/test_suite.log
INFO - xccdf_org.ssgproject.content_rule_sshd_use_strong_ciphers
INFO - Script good_cipher.pass.sh using profile (all) OK
INFO - Script no_ciphers.fail.sh using profile (all) OK
WARNING - No remediation is available for rule 'xccdf_org.ssgproject.content_rule_sshd_use_strong_ciphers'.
Description:
Rationale:
Review Hints: