Blame SOURCES/scap-security-guide-0.1.58-RHEL_08_030650-PR_7283.patch

362bfa
From 065b6e540a2aa437ddf5239c97ed4e1fddf43b50 Mon Sep 17 00:00:00 2001
362bfa
From: Matthew Burket <mburket@redhat.com>
362bfa
Date: Mon, 26 Jul 2021 09:00:49 -0500
362bfa
Subject: [PATCH] Update rule aide_check_audit_tools for RHEL-08-030650
362bfa
362bfa
---
362bfa
 .../aide_check_audit_tools/ansible/shared.yml | 27 ++++++++++++------
362bfa
 .../aide_check_audit_tools/bash/shared.sh     | 25 +++++++++++++++++
362bfa
 .../aide_check_audit_tools/oval/shared.xml    | 20 +++++++++++++
362bfa
 .../aide/aide_check_audit_tools/rule.yml      | 28 ++++++++++++-------
362bfa
 .../tests/correct.pass.sh                     | 15 ++++++++++
362bfa
 .../tests/correct_with_selinux.pass.sh        | 12 ++++++++
362bfa
 .../tests/not_config.fail.sh                  | 14 ++++++++++
362bfa
 products/rhel8/profiles/stig.profile          |  1 +
362bfa
 shared/references/cce-redhat-avail.txt        |  1 -
362bfa
 .../data/profile_stability/rhel8/stig.profile |  1 +
362bfa
 .../profile_stability/rhel8/stig_gui.profile  |  1 +
362bfa
 11 files changed, 126 insertions(+), 19 deletions(-)
362bfa
 create mode 100644 linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh
362bfa
 create mode 100644 linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh
362bfa
 create mode 100644 linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh
362bfa
 create mode 100644 linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh
362bfa
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml
362bfa
index 73afaeff869..edef272183d 100644
362bfa
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/ansible/shared.yml
362bfa
@@ -1,18 +1,29 @@
362bfa
-# platform = multi_platform_sle
362bfa
+# platform = multi_platform_sle,multi_platform_rhel
362bfa
 # reboot = false
362bfa
 # strategy = restrict
362bfa
 # complexity = low
362bfa
 # disruption = low
362bfa
 
362bfa
-- name: Install aide package
362bfa
-  zypper:
362bfa
-    name: aide
362bfa
-    state: latest
362bfa
+{{% if 'rhel' not in product %}}
362bfa
+{{% set aide_string = 'p+i+n+u+g+s+b+acl+selinux+xattrs+sha512' %}}
362bfa
+{{% else %}}
362bfa
+{{% set aide_string = 'p+i+n+u+g+s+b+acl+xattrs+sha512' %}}
362bfa
+{{% endif %}}
362bfa
+
362bfa
+
362bfa
+
362bfa
+- name: Ensure aide is installed
362bfa
+  package:
362bfa
+    name: "{{ item }}"
362bfa
+    state: present
362bfa
+  with_items:
362bfa
+    - aide
362bfa
+
362bfa
 
362bfa
 - name: Set audit_tools fact
362bfa
   set_fact:
362bfa
     audit_tools:
362bfa
-      - /usr/sbin/audispd
362bfa
+      {{% if 'rhel' not in product %}}- /usr/sbin/audispd{{% endif %}}
362bfa
       - /usr/sbin/auditctl
362bfa
       - /usr/sbin/auditd
362bfa
       - /usr/sbin/augenrules
362bfa
@@ -24,11 +35,11 @@
362bfa
   lineinfile:
362bfa
     path: /etc/aide.conf
362bfa
     regexp: ^{{ item }}\s
362bfa
-    line: "{{ item }} p+i+n+u+g+s+b+acl+selinux+xattrs+sha512"
362bfa
+    line: "{{ item }} {{{ aide_string }}}"
362bfa
   with_items: "{{ audit_tools }}"
362bfa
 
362bfa
 - name: Configure AIDE to properly protect audit tools
362bfa
   lineinfile:
362bfa
     path: /etc/aide.conf
362bfa
-    line: "{{ item }} p+i+n+u+g+s+b+acl+selinux+xattrs+sha512"
362bfa
+    line: "{{ item }} {{{ aide_string }}}"
362bfa
   with_items: "{{ audit_tools }}"
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh
362bfa
new file mode 100644
362bfa
index 00000000000..0875eeec648
362bfa
--- /dev/null
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/bash/shared.sh
362bfa
@@ -0,0 +1,25 @@
362bfa
+# platform = multi_platform_rhel
362bfa
+# reboot = false
362bfa
+# strategy = restrict
362bfa
+# complexity = low
362bfa
+# disruption = low
362bfa
+. /usr/share/scap-security-guide/remediation_functions
362bfa
+
362bfa
+{{{ bash_package_install("aide") }}}
362bfa
+
362bfa
+{{% set configString = "p+i+n+u+g+s+b+acl+xattrs+sha512" %}}
362bfa
+{{% set configFile = "/etc/aide.conf" %}}
362bfa
+{{% for file in (
362bfa
+      "/usr/sbin/auditctl",
362bfa
+      "/usr/sbin/auditd",
362bfa
+      "/usr/sbin/ausearch",
362bfa
+      "/usr/sbin/aureport",
362bfa
+      "/usr/sbin/autrace",
362bfa
+      "/usr/sbin/augenrules" ) %}}
362bfa
+
362bfa
+if grep -i '^.*{{{file}}}.*$' {{{ configFile }}}; then
362bfa
+sed -i "s#.*{{{file}}}.*#{{{file}}} {{{ configString }}}#" {{{ configFile }}}
362bfa
+else
362bfa
+echo "{{{ file }}} {{{ configString }}}" >> {{{ configFile }}}
362bfa
+fi
362bfa
+{{% endfor %}}
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml
362bfa
index 32e6325a3ab..22c6276a1f5 100644
362bfa
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/oval/shared.xml
362bfa
@@ -8,13 +8,19 @@
362bfa
       <criterion comment="ausearch is checked in /etc/aide.conf" test_ref="test_aide_verify_ausearch" />
362bfa
       <criterion comment="aureport is checked in /etc/aide.conf" test_ref="test_aide_verify_aureport" />
362bfa
       <criterion comment="autrace is checked in /etc/aide.conf" test_ref="test_aide_verify_autrace" />
362bfa
+      {{% if 'rhel' not in product %}}
362bfa
       <criterion comment="audispd is checked in /etc/aide.conf" test_ref="test_aide_verify_audispd" />
362bfa
+      {{% endif %}}
362bfa
       <criterion comment="augenrules is checked in /etc/aide.conf" test_ref="test_aide_verify_augenrules" />
362bfa
     </criteria>
362bfa
   </definition>
362bfa
 
362bfa
   <ind:textfilecontent54_state id="state_aide_check_attributes" version="1">
362bfa
+    {{% if 'rhel' not in product %}}
362bfa
     <ind:subexpression operation="equals">p+i+n+u+g+s+b+acl+selinux+xattrs+sha512</ind:subexpression>
362bfa
+    {{% else %}}
362bfa
+    <ind:subexpression operation="pattern match">p\+i\+n\+u\+g\+s\+b\+acl(|\+selinux)\+xattrs\+sha512</ind:subexpression>
362bfa
+    {{% endif %}}
362bfa
   </ind:textfilecontent54_state>
362bfa
 
362bfa
   
362bfa
@@ -95,6 +101,20 @@
362bfa
     <ind:instance datatype="int" operation="equals">1</ind:instance>
362bfa
   </ind:textfilecontent54_object>
362bfa
 
362bfa
+  
362bfa
+  comment="rsyslogd is checked in /etc/aide.conf" check="all"
362bfa
+  check_existence="all_exist" version="1">
362bfa
+    <ind:object object_ref="object_aide_verify_rsyslogd" />
362bfa
+    <ind:state state_ref="state_aide_check_attributes" />
362bfa
+  </ind:textfilecontent54_test>
362bfa
+  
362bfa
+  version="1">
362bfa
+    <ind:filepath>/etc/aide.conf</ind:filepath>
362bfa
+    <ind:pattern operation="pattern match">^/usr/sbin/rsyslogd\s+([^\n]+)$</ind:pattern>
362bfa
+    <ind:instance datatype="int" operation="equals">1</ind:instance>
362bfa
+  </ind:textfilecontent54_object>
362bfa
+
362bfa
+
362bfa
   
362bfa
   comment="augenrules is checked in /etc/aide.conf" check="all"
362bfa
   check_existence="all_exist" version="1">
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/rule.yml
362bfa
index 126ee756cc0..17a95bf4b31 100644
362bfa
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/rule.yml
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/rule.yml
362bfa
@@ -1,11 +1,11 @@
362bfa
 documentation_complete: true
362bfa
 
362bfa
-prodtype: sle12,sle15,ubuntu2004
362bfa
+prodtype: sle12,sle15,ubuntu2004,rhel8,fedora
362bfa
 
362bfa
 title: 'Configure AIDE to Verify the Audit Tools'
362bfa
 
362bfa
 description: |-
362bfa
-    The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.
362bfa
+    The operating system file integrity tool must be configured to protect the integrity of the audit tools.
362bfa
 
362bfa
 rationale: |-
362bfa
     Protecting the integrity of the tools used for auditing purposes is a
362bfa
@@ -31,32 +31,40 @@ rationale: |-
362bfa
 severity: medium
362bfa
 
362bfa
 identifiers:
362bfa
+    cce@rhel8: CCE-85964-5
362bfa
     cce@sle12: CCE-83204-8
362bfa
     cce@sle15: CCE-85610-4
362bfa
 
362bfa
 references:
362bfa
     disa: CCI-001496
362bfa
-    nist@sle12: AU-9(3),AU-9(3).1
362bfa
+    nist: AU-9(3),AU-9(3).1
362bfa
     srg: SRG-OS-000278-GPOS-00108
362bfa
+    stigid@rhel8: RHEL-08-030650
362bfa
     stigid@sle12: SLES-12-010540
362bfa
     stigid@sle15: SLES-15-030630
362bfa
     stigid@ubuntu2004: UBTU-20-010205
362bfa
 
362bfa
 ocil_clause: 'integrity checks of the audit tools are missing or incomplete'
362bfa
 
362bfa
+{{% if 'rhel' not in product %}}
362bfa
+{{% set aide_string = 'p+i+n+u+g+s+b+acl+selinux+xattrs+sha512' %}}
362bfa
+{{% else %}}
362bfa
+{{% set aide_string = 'p+i+n+u+g+s+b+acl+xattrs+sha512' %}}
362bfa
+{{% endif %}}
362bfa
+
362bfa
 ocil: |-
362bfa
     Check that AIDE is properly configured to protect the integrity of the
362bfa
     audit tools by running the following command:
362bfa
 
362bfa
     
# sudo cat /etc/aide.conf | grep /usr/sbin/au
362bfa
 
362bfa
-    /usr/sbin/auditctl p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
-    /usr/sbin/auditd p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
-    /usr/sbin/ausearch p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
-    /usr/sbin/aureport p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
-    /usr/sbin/autrace p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
-    /usr/sbin/audispd p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
-    /usr/sbin/augenrules p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
362bfa
+    /usr/sbin/auditctl {{{ aide_string }}}
362bfa
+    /usr/sbin/auditd {{{ aide_string }}}
362bfa
+    /usr/sbin/ausearch {{{ aide_string }}}
362bfa
+    /usr/sbin/aureport {{{ aide_string }}}
362bfa
+    /usr/sbin/autrace {{{ aide_string }}}
362bfa
+    {{% if 'rhel' not in product %}}/usr/sbin/audispd {{{ aide_string }}}{{% endif %}}
362bfa
+    /usr/sbin/augenrules {{{ aide_string }}}
362bfa
 
362bfa
     If AIDE is configured properly to protect the integrity of the audit tools,
362bfa
     all lines listed above will be returned from the command.
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh
362bfa
new file mode 100644
362bfa
index 00000000000..756b88d8a23
362bfa
--- /dev/null
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct.pass.sh
362bfa
@@ -0,0 +1,15 @@
362bfa
+#!/bin/bash
362bfa
+# platform = multi_platform_rhel,multi_platform_fedora
362bfa
+
362bfa
+
362bfa
+yum -y install aide
362bfa
+aide --init
362bfa
+
362bfa
+
362bfa
+declare -a bins
362bfa
+bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace')
362bfa
+
362bfa
+for theFile in "${bins[@]}"
362bfa
+do
362bfa
+    echo "$theFile p+i+n+u+g+s+b+acl+xattrs+sha512"  >> /etc/aide.conf
362bfa
+done
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh
362bfa
new file mode 100644
362bfa
index 00000000000..f3a2a126d3d
362bfa
--- /dev/null
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/correct_with_selinux.pass.sh
362bfa
@@ -0,0 +1,12 @@
362bfa
+#!/bin/bash
362bfa
+# platform = multi_platform_rhel,multi_platform_fedora
362bfa
+
362bfa
+yum -y install aide
362bfa
+
362bfa
+declare -a bins
362bfa
+bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace')
362bfa
+
362bfa
+for theFile in "${bins[@]}"
362bfa
+do
362bfa
+    echo "$theFile p+i+n+u+g+s+b+acl+selinux+xattrs+sha5122" >> /etc/aide.conf
362bfa
+done
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh
362bfa
new file mode 100644
362bfa
index 00000000000..4315cef2073
362bfa
--- /dev/null
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_check_audit_tools/tests/not_config.fail.sh
362bfa
@@ -0,0 +1,14 @@
362bfa
+#!/bin/bash
362bfa
+# platform = multi_platform_rhel,multi_platform_fedora
362bfa
+
362bfa
+
362bfa
+yum -y install aide
362bfa
+aide --init
362bfa
+
362bfa
+declare -a bins
362bfa
+bins=('/usr/sbin/auditctl' '/usr/sbin/auditd' '/usr/sbin/augenrules' '/usr/sbin/aureport' '/usr/sbin/ausearch' '/usr/sbin/autrace')
362bfa
+
362bfa
+for theFile in "${bins[@]}"
362bfa
+do
362bfa
+    echo sed -i "s#^.*${theFile}.*##g" /etc/aide.conf
362bfa
+done
362bfa
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
362bfa
index 7270a8f91f2..6b3232a9e00 100644
362bfa
--- a/products/rhel8/profiles/stig.profile
362bfa
+++ b/products/rhel8/profiles/stig.profile
362bfa
@@ -822,6 +822,7 @@ selections:
362bfa
     # RHEL-08-030640
362bfa
 
362bfa
     # RHEL-08-030650
362bfa
+    - aide_check_audit_tools
362bfa
 
362bfa
     # RHEL-08-030660
362bfa
     - auditd_audispd_configure_sufficiently_large_partition
362bfa
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
362bfa
index 665f903ead4..ff557cc2323 100644
362bfa
--- a/shared/references/cce-redhat-avail.txt
362bfa
+++ b/shared/references/cce-redhat-avail.txt
362bfa
@@ -97,7 +97,6 @@ CCE-85960-3
362bfa
 CCE-85961-1
362bfa
 CCE-85962-9
362bfa
 CCE-85963-7
362bfa
-CCE-85964-5
362bfa
 CCE-85965-2
362bfa
 CCE-85966-0
362bfa
 CCE-85967-8
362bfa
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
362bfa
index 7d59cfff625..692a1690b19 100644
362bfa
--- a/tests/data/profile_stability/rhel8/stig.profile
362bfa
+++ b/tests/data/profile_stability/rhel8/stig.profile
362bfa
@@ -60,6 +60,7 @@ selections:
362bfa
 - accounts_user_home_paths_only
362bfa
 - accounts_user_interactive_home_directory_defined
362bfa
 - accounts_user_interactive_home_directory_exists
362bfa
+- aide_check_audit_tools
362bfa
 - aide_scan_notification
362bfa
 - aide_verify_acls
362bfa
 - aide_verify_ext_attributes
362bfa
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
362bfa
index 2c2daad6f6d..cf119c02a17 100644
362bfa
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
362bfa
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
362bfa
@@ -71,6 +71,7 @@ selections:
362bfa
 - accounts_user_home_paths_only
362bfa
 - accounts_user_interactive_home_directory_defined
362bfa
 - accounts_user_interactive_home_directory_exists
362bfa
+- aide_check_audit_tools
362bfa
 - aide_scan_notification
362bfa
 - aide_verify_acls
362bfa
 - aide_verify_ext_attributes