Blame SOURCES/scap-security-guide-0.1.59-sshd_priv_keys_600-PR_7742.patch

ff1465
From a5cce64337e8b8617f3bf3ee1311e80d652754ea Mon Sep 17 00:00:00 2001
ff1465
From: Gabriel Becker <ggasparb@redhat.com>
ff1465
Date: Thu, 14 Oct 2021 12:12:16 +0200
ff1465
Subject: [PATCH] Set sshd priv keys permissions 600 for all products.
ff1465
ff1465
---
ff1465
 .../file_permissions_sshd_private_key/rule.yml    | 15 +++------------
ff1465
 .../tests/correct_value.pass.sh             |  8 +-------
ff1465
 .../tests/multiple_keys.fail.sh                   |  2 +-
ff1465
 4 files changed, 7 insertions(+), 21 deletions(-)
ff1465
ff1465
diff --git a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml
ff1465
index bda7ae4d53b..ddda4075e21 100644
ff1465
--- a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml
ff1465
+++ b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml
ff1465
@@ -3,11 +3,7 @@ documentation_complete: true
ff1465
 title: 'Verify Permissions on SSH Server Private *_key Key Files'
ff1465
 
ff1465
 description: |-
ff1465
-    {{% if product in ['ubuntu1804','opensuse', 'sle12', 'sle15'] %}}
ff1465
     {{{ describe_file_permissions(file="/etc/ssh/*_key", perms="0600") }}}
ff1465
-    {{% else %}}
ff1465
-    {{{ describe_file_permissions(file="/etc/ssh/*_key", perms="0640") }}}
ff1465
-    {{% endif %}}
ff1465
 
ff1465
 rationale: |-
ff1465
     If an unauthorized user obtains the private SSH host key file, the host could be
ff1465
@@ -45,10 +41,10 @@ references:
ff1465
     stigid@sle12: SLES-12-030220
ff1465
     stigid@sle15: SLES-15-040250
ff1465
 
ff1465
-ocil_clause: '{{{ ocil_clause_file_permissions(file="/etc/ssh/*_key", perms="-rw-r-----") }}}'
ff1465
+ocil_clause: '{{{ ocil_clause_file_permissions(file="/etc/ssh/*_key", perms="-rw-------") }}}'
ff1465
 
ff1465
 ocil: |-
ff1465
-    {{{ ocil_file_permissions(file="/etc/ssh/*_key", perms="-rw-r-----") }}}
ff1465
+    {{{ ocil_file_permissions(file="/etc/ssh/*_key", perms="-rw-------") }}}
ff1465
 
ff1465
 template:
ff1465
     name: file_permissions
ff1465
@@ -56,9 +52,4 @@ template:
ff1465
         filepath: /etc/ssh/
ff1465
         missing_file_pass: 'true'
ff1465
         file_regex: ^.*_key$
ff1465
-        filemode: '0640'
ff1465
-        filemode@sle12: '0600'
ff1465
-        filemode@sle15: '0600'
ff1465
-        filemode@ubuntu1604: '0600'
ff1465
-        filemode@ubuntu1804: '0600'
ff1465
-        filemode@ubuntu2004: '0600'
ff1465
+        filemode: '0600'
ff1465
diff --git a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/correct_value.pass.sh b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/correct_value.pass.sh
ff1465
index 5790a48..f7cf8d9 100644
ff1465
--- a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/correct_value.pass.sh
ff1465
+++ b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/correct_value.pass.sh
ff1465
@@ -2,4 +2,4 @@
ff1465
 #
ff1465
 
ff1465
 FAKE_KEY=$(mktemp -p /etc/ssh/ XXXX_key)
ff1465
-chmod 0640 /etc/ssh/*_key
ff1465
+chmod 0600 /etc/ssh/*_key
ff1465
diff --git a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/multiple_keys.fail.sh b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/multiple_keys.fail.sh
ff1465
index 6df9d61b715..7c0d6019702 100644
ff1465
--- a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/multiple_keys.fail.sh
ff1465
+++ b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/tests/multiple_keys.fail.sh
ff1465
@@ -4,4 +4,4 @@
ff1465
 FAKE_KEY=$(mktemp -p /etc/ssh/ XXXX_key)
ff1465
 chmod 0777 $FAKE_KEY
ff1465
 FAKE_KEY2=$(mktemp -p /etc/ssh/ XXXX_key)
ff1465
-chmod 0640 $FAKE_KEY2
ff1465
+chmod 0600 $FAKE_KEY2