On Thursday, November 03, 2011 01:06:52 PM Worsham, Michael wrote:
> After contacting DISA today, here is what they responded with:
> 
> "The SRR script currently does not support RHEL 5, only 3 and 4. Also, the
> STIG for RHEL 5 is currently in draft form and a manual review would need
> to be performed on the assets:
> http://iase.disa.mil/stigs/os/unix/red_hat.html";
 
Yes, its in draft which means there are no STIGs for RHEL5 or 6. However, I 
have met 
with them and there is an agreement that the stig file is correct until new 
requirements are levied.
 
 
> So I took a look at the RHEL 5 draft and found this entry:
> 
> Group ID (Vulid):  V-814
> Group Title:  Audit failed file and program access attempts
> Rule ID:  SV-27291r1_rule
> Severity: CAT II
> Rule Version (STIG-ID):  GEN002720
> Rule Title: The audit system must be configured to audit failed attempts to
> access files and programs.
> 
> Vulnerability Discussion:  If the system is not configured to audit certain
> activities and write them to an audit log, it is more difficult to detect
> and track system compromises and damages incurred during a system
> compromise.
> 
> Responsibility:  System Administrator
> IAControls:  ECAR-1, ECAR-2, ECAR-3
> 
> Check Content:
> Check that auditd is configured to audit failed file access attempts.
> 
> # cat /etc/audit.rules /etc/audit/audit.rules | grep -e "-a always,exit" |
> grep -i "open" If no results are returned, or the results do not contain
> "-S open" and "-F success=0", this is a finding.
> 
> Fix Text: Edit the audit.rules file and add the following line to enable
> auditing of failed attempts to access files and programs: 
> -a always,exit -F arch=<ARCH> -S open -F success=0
> Restart the auditd service.

Which is slightly better, but still wrong.


> The 'Fix Text' sounds like it will still spam the audit.log or am I missing
> something?

It would, which is a good reason its still a draft. This also doesn't cover the 
openat 
syscall which glibc uses. The NSA publishes a SNAC guide for RHEL5. You can 
find the 
latest at this location:

http://www.nsa.gov/ia/_files/os/redhat/NSA_RHEL_5_GUIDE_v4.2.pdf

If you look in section 2.6.2.4.8, you will see the correct audit rule listed as 
CCE 
14917-9. This is what the RHEL5 STIG should map to in its XCCDF.

-Steve


> -----Original Message-----
> From: Steve Grubb [mailto:[email protected]]
> Sent: Wednesday, November 02, 2011 1:12 PM
> To: Worsham, Michael
> Cc: [email protected]
> Subject: Re: Suppress messages from /var/log/audit.log via audit.rules
> 
> On Tuesday, November 01, 2011 11:45:51 AM Worsham, Michael wrote:
> > SRR still shows this as a failure, using stig.rules contents for
> > audit.rules:
> > 
> > GEN002720: UNIX STIG: 3.16 - The audit system is not configured to audit
> > failed attempts to access files and programs. AUDITING is NOT correctly
> > CONFIGURED on va33-time.
> > Ensure that -a exit,always -S open -F success=0 is in
> > /etc/audit/audit.rules
> 
> This ^^^ is wrong. For example, it does not limit the syscall by the arch.
> So what this means is that it will look up the open syscall for the arch
> that auditctl is. So, lets see what that does:
> 
> # ausyscall open
> open               2
> 
> OK, now what does the 32 bit API think of it?
> # ausyscall 2 i386
> fork
> 
> So, that rule will watch for all 32 bit forks and 64 bit opens. Is that
> what your security folks want?
> 
> Additionally, the intent of the STIG is to catch failed opens due to
> permission problems. You are going to trap normal system activity when
> glibc goes looking around for library resolution information. This will
> waste space in your logs and make it hard to find actual problems.
> 
> > PDI Number: GEN002720
> > Finding Category: CAT II
> > Reference: UNIX STIG: 3.16
> > Description: The audit system is not configured to audit failed attempts
> > to access files and programs. Status: Open
> > 
> > 
> > Is there any documentation that says that the stig.rules file is
> > compliant for GEN002720?
> 
> There are no docs that I know of. I could write one, but would that be
> authoritative?
> 
> :)
> :
> > The project security folks will only be looking at the SRR
> > output, which says it's not.
> 
> And the SRR is completely wrong. So, they need to have some understanding
> that you either want a system configured right but failing the SRR's or
> matching the SRR's but configured wrong. I'd hate to be in your position,
> but that's where you are.
> 
> > We are using the rules as found here:
> > https://fedorahosted.org/audit/browser/trunk/contrib/stig.rules
> 
> These rules are correct. You can contact DISA to verify.

--
Linux-audit mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/linux-audit

Reply via email to