RHEL 7 Vendor STIG Content Peculiarities - Mount-opts for /tmp

Latest response

Got word from our organization's authorization office: given that the DISA STIG looks to be far longer in coming than they'd hoped (see prior discussion), they're now willing for us to move forward with the vendor STIG. So, started the process of aligning our build to that STIG.

Naturally, using anything other than the "common" profile, our scan results are not 100%. Yes - even after running oscap in --remediate mode. The initial failures(s) I'm running into are around the "Add nodev Option to /tmp", "Add noexec Option to /tmp" and "Add nosuid Option to /tmp" test conditions. While our builds do implement /tmp as a filesystem separate from /, we do so by mounting /tmp from tmpfs (using the default-masked systemd service). While I can add the noexec, nosuid and nodev options by adding an entry to /etc/fstab (if I also ensure that the noauto option is also present), it seems like the more natural method would be to add the requisite options via the /usr/lib/systemd/system/tmp.mount file's Options declaration in the [Mount] stanza:

...

[Mount]
What=tmpfs
Where=/tmp
Type=tmpfs
Options=mode=1777,strictatime

...

Unfortunately, the /usr/lib/systemd/system/tmp.mount file is owned by the systemd RPM meaning that modifying this file will cause the RPM content-modification STIG-test to fail. Further, the oscap test is explicitly looking in /etc/fstab - presumably because /tmp is not expected to be a pseudofilesystem.

Were the systemd RPM to have declared the /usr/lib/systemd/system/tmp.mount file a configuration file, the RPM content-modification test could be made to pass (if the RPM content-modification test excludes configuration files like it ought to).

What's Red Hat's recommendation around properly handling mount-options in this scenario?

Responses