8000 RHEL 10 SRG GPOS PAM Hashing Update by Mab879 · Pull Request #13421 · ComplianceAsCode/content · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

RHEL 10 SRG GPOS PAM Hashing Update #13421

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
May 5, 2025

Conversation

Mab879
Copy link
Member
@Mab879 Mab879 commented May 1, 2025

Description:

Move RHEL 10 to use yescrypt.

See each commit for more details.

Rationale:

Update content to match profiles.

@Mab879 Mab879 added this to the 0.1.77 milestone May 1, 2025
@Mab879 Mab879 added New Rule Issues or pull requests related to new Rules. Update Profile Issues or pull requests related to Profiles updates. STIG STIG Benchmark related. RHEL10 Red Hat Enterprise Linux 10 product related. labels May 1, 2025
@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Used by openshift-ci bot. label May 1, 2025
Copy link
openshift-ci bot commented May 1, 2025

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

Copy link
github-actions bot commented May 1, 2025

This datastream diff is auto generated by the check Compare DS/Generate Diff

Click here to see the full diff
New content has different text for rule 'xccdf_org.ssgproject.content_rule_set_password_hashing_min_rounds_logindefs'.
--- xccdf_org.ssgproject.content_rule_set_password_hashing_min_rounds_logindefs
+++ xccdf_org.ssgproject.content_rule_set_password_hashing_min_rounds_logindefs
@@ -19,10 +19,10 @@
 SRG-OS-000120-GPOS-00061
 
 [rationale]:
-Passwords need to be protected at all times, and encryption is the standard
-method for protecting passwords. If passwords are not encrypted, they can
+Passwords need to be protected at all times, and hashing is the standard
+method for protecting passwords. If passwords are not hashed, they can
 be plainly read (i.e., clear text) and easily compromised. Passwords
-that are encrypted with a weak algorithm are no more protected than if
+that are hashed with a weak algorithm are no more protected than if
 they are kept in plain text.
 
          

@Mab879 Mab879 force-pushed the 2025_05_01_psc_updates branch from 2f641ee to 9e5d6ff Compare May 1, 2025 19:51
@Mab879 Mab879 marked this pull request as ready for review May 1, 2025 19:52
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Used by openshift-ci bot. label May 1, 2025
Comment on lines 6 to 7
In <tt>/etc/login.defs</tt>, ensure <tt>YESCRYPT_COST_FACTOR</tt> and
<tt>YESCRYPT_COST_FACTOR</tt> has the minimum value of <tt>{{{ xccdf_value("var_password_yescrypt_cost_factor_login_defs") }}}</tt>.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is YESCRYPT_COST_FACTOR written twice here?

<pre>YESCRYPT_COST_FACTOR {{{ xccdf_value("var_password_yescrypt_cost_factor_login_defs") }}}
YESCRYPT_COST_FACTOR {{{ xccdf_value("var_password_yescrypt_cost_factor_login_defs") }}}</pre>
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

dtto


ocil: |-
Inspect <tt>/etc/login.defs</tt> and ensure that if either
<tt>YESCRYPT_COST_FACTOR</tt> or <tt>SHA_CRYPT_MAX_ROUNDS</tt>
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Here we check 2 different keys but the templated OVAL checks only the first one.

@jan-cerny jan-cerny self-assigned this May 2, 2025
@Mab879 Mab879 force-pushed the 2025_05_01_psc_updates branch from 9e5d6ff to 6398afe Compare May 2, 2025 19:47
Copy link
codeclimate bot commented May 2, 2025

Code Climate has analyzed commit 6398afe and detected 0 issues on this pull request.

The test coverage on the diff in this pull request is 100.0% (50% is the threshold).

This pull request will bring the total coverage in the repository to 61.9% (0.0% change).

View more on Code Climate.

Copy link
Collaborator
@jan-cerny jan-cerny left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have run the automatus tests locally.

jcerny@fedora:~/work/git/scap-security-guide (pr/13421)$ python3 tests/automatus.py rule --libvirt qemu:///system ssgts_rhel10 set_password_hashing_yescrypt_cost_factor_logindefs
Setting console output to log level INFO
INFO - The base image option has not been specified, choosing libvirt-based test environment.
INFO - Logging into /home/jcerny/work/git/scap-security-guide/logs/rule-custom-2025-05-05-0957/test_suite.log
INFO - xccdf_org.ssgproject.content_rule_set_password_hashing_yescrypt_cost_factor_logindefs
INFO - Script commented_value.fail.sh using profile (all) OK
INFO - Script conflicting_values.fail.sh using profile (all) OK
INFO - Script correct_value.pass.sh using profile (all) OK
INFO - Script missing_value.fail.sh using profile (all) OK
INFO - Script missing_file.fail.sh using profile (all) OK
INFO - Script duplicate_values.pass.sh using profile (all) OK
INFO - Script wrong_value.fail.sh using profile (all) OK
jcerny@fedora:~/work/git/scap-security-guide (pr/13421)$ python3 tests/automatus.py rule --libvirt qemu:///system ssgts_rhel10 --remediate-using ansible set_password_hashing_yescrypt_cost_factor_logindefs
Setting console output to log level INFO
INFO - The base image option has not been specified, choosing libvirt-based test environment.
INFO - Logging into /home/jcerny/work/git/scap-security-guide/logs/rule-custom-2025-05-05-1002/test_suite.log
INFO - xccdf_org.ssgproject.content_rule_set_password_hashing_yescrypt_cost_factor_logindefs
INFO - Script conflicting_values.fail.sh using profile (all) OK
INFO - Script missing_value.fail.sh using profile (all) OK
INFO - Script missing_file.fail.sh using profile (all) OK
INFO - Script commented_value.fail.sh using profile (all) OK
INFO - Script duplicate_values.pass.sh using profile (all) OK
INFO - Script correct_value.pass.sh using profile (all) OK
INFO - Script wrong_value.fail.sh using profile (all) OK

@jan-cerny jan-cerny merged commit 8b428de into ComplianceAsCode:master May 5, 2025
104 of 110 checks passed
@Mab879 Mab879 deleted the 2025_05_01_psc_updates branch May 5, 2025 12:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
New Rule Issues or pull requests related to new Rules. RHEL10 Red Hat Enterprise Linux 10 product related. STIG STIG Benchmark related. Update Profile Issues or pull requests related to Profiles updates.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
0