OpenSCAP scan results questions about IPv6 and others

Latest response

After running a scan against on of our lab systems I noticed that I failed the "Result for Disable Accepting IPv6 Redirects" . So I go back and do the remediation steps:

# sysctl -w net.ipv6.conf.default.accept_redirects=0

Which returns:

# error: "net.ipv6.conf.default.accept_redirects" is an unknown key

I found the reason here:

https://access.redhat.com/solutions/1308033

The solution in the link above essentially says to re-enable the ipv6 module which will allow sysctl to read the params and set them. Problem with this is that one of the other SCAP rule ID calls for disabling the ipv6 module. So either way it looks like I'll take a hit on this scan. These rule ID's on ipv6 do not seem to make much sense. If you have the module disabled you should not need to worry about the other parameters in /etc/sysctl.conf such as the redirects as ipv6 is essentially disabled anyway. Am I wrong? So not sure what to do here.

Next question - I am testing with xccdf and the pre-canned stig profile. What constitutes a "passing" score against STIG? And are there any more pre-canned profiles/xml files that I can download for RHEL6? Are most non-DOD enterprises that use SCAP using a STIG profile or creating customized profiles?

Responses

Are you running your scap scan against files provided by DISA?

http://iase.disa.mil/stigs/scap/Pages/index.aspx

For example, for the RHEL5 systems, I download the .zip file (to say /tmp/openscap). I also confirm that I have openscap and openscap utils installed and then from the CLI, this is what I run:

oscap xccdf eval --profile MAC-2_Senstive --results /tmp/openscap/starting_scan.xml /tmp/starting_scan.html --cpe /tmp/openscap/U_RedHat_5_V1R12_STIG_SCAP_1-1_Benchmark-cpe-dictionary.xml /tmp/openscap/U_RedHat_5_V1R12_STIG_SCAP_1-1/Benchmark-xccdf.xml

Once you run this, view the .html in a browser and it will give you the score. From here is will show pass/fail for what stigs still need to be implemented.

I am using what ever came out of the box when I installed oscap on the RHEL6 box. There a a couple of xml files that, if you run "oscap info" against them, cracks them open and list the profiles. So I took the one for STIG ( stig-rhel6-server-upstream is the actual name) and used it in a scan, then opened it up in a browser like you said. Thats when I ran into the ipv6 issue I mentioned in my post.

Thanks for the link. I just downloaded the content file for RHEL6. So you are saying these is no industry standard passing score for one of these STIG scans? I can see the pass/fail numbers but what is considered "acceptable" here is the more accurate question? Also, where can I get information on what each profile description is and what it should be used for? LIke the "profile MAC-2_Sensitive". I need to know more about these so I can determine which one we need to use in our environment.

The other fun one that you'll run into - if you're in a CentOS Dev/Test with Red Hat Prod environment is CPE incompatibilities in the OpenSCAP profiles. I'd submitted a bug to the CentOS team to fix that, but it had sat several months (before I stopped checking) and they hadn't even reviewed the bug-filing. It's especially annoying given that I included a simple fix-suggestion in the bug.

The profiles you download from DISA usually don't have the CPE definition problem - probably because of DoD guidance around "use free where you can". That said, the July STIG update (v1 r8) had a regression on that front. Be interesting to see if that regression gets fixed in subsequent profile updates.

Welcome to the fun that is STIG compliance. If you're extremely lucky, your accreditor will understand "getting V-NNNNN1 to go green will cause V-NNNNN2 to go red: which one do you need green so you can certify this system". If you're other than extremely lucky, you get to go round and round with the script-monkey accreditor ...and then you'll finally have to file a POA&M (that never actually gets followed up on)

Yes - the joys of checkbox security:)

Hello Brian,

I would like to ask you to open a support case, for at the EMEA Partnership Conference it was mentioned that OpenSCAP is a project Red Hat is taken very seriously. So this issue should be addressed IHMO.

A self contradicting set of rules is not a good thing in a security audit.

Kind regards,

Jan Gerrit

The STIGs (the documents that specifically get published through the DISA portal) have had conflicting test/fixes since at least the early 2000s. This has been true of far more than just ELx. It's pretty much "expected" at this point that there'll be conflicting guidances within the test suite.

The other thing to remember there are a couple sets of SCAP profile-sets available. At the very least, there's the ones that Red Hat packages up and makes available and the ones that DISA publishes. Technically, while the Red Hat community is a/the primary source for SCAP profiles, the profiles published by DISA are ones that Red Hat only has advisory access to. While Red Hat could decide "we should deactivate the V-NNNNNN rule/handler in our profiles", it's not guaranteed that DISA wouldn't simply decide "nope: we're not deactivating that".

One other thing I have noticed is that my CVE specific scans are failing on any oval def that pertains to the kernel, even though I am at the latest kernel available and/or one that mitigated the vulnerability. For instance, when I run uname -r I get "2.6.32-573.7.1.el6.x86_64". This is the kernel needed to address most of the RHSA's that map to CVE's. My oscap command to run a test is
"oscap oval eval --results <filename.xml> --report <filename.html> com.redhat.rhsa-all.xml". I have also tried the "com.redhat.rhsa-2015.xml" which is nothing but only the 2015 advisories but still the same result. Should I report this also?

@Tom - Also, do you happen to have a link to the SCAP content from the RH community? I have not been able locate these on the site anywhere.

The main OpenScap prject is at OpenSCAP.Org. The profiles that go into Red Hat are maintained on the Fedora web-site.

Though, if you're trying to meet STIG compliance, none of that really matters. The only thing your IA team will care about is what's at the DISA site.

Thanks! Any thoughts/suggestions on the CVE scan issue I mentioned?

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.