See attached patch for the following files

scap-security-guide/RHEL6/input/system/accounts/session.xml
scap-security-guide/RHEL6/input/checks/accounts_umask_etc_profile.xml
scap-security-guide/RHEL6/input/checks/accounts_umask_bash_users.xml
scap-security-guide/RHEL6/input/checks/accounts_umask_csh.xml
scap-security-guide/RHEL6/input/checks/accounts_umask_login_defs.xml
scap-security-guide/RHEL6/input/profiles/usgcb-rhel6-server.xml
scap-security-guide/RHEL6/input/profiles/common.xml
scap-security-guide/RHEL6/input/profiles/maritz-rhel6-server.xml
scap-security-guide/RHEL6/input/profiles/test.xml
scap-security-guide/RHEL6/input/profiles/stig-rhel6-server.xml


result now are

Ensure the Default Bash Umask is Set Correctly                  fail
Ensure the Default C Shell Umask is Set Correctly               fail
Ensure the Default Umask is Set Correctly in /etc/profile       fail
Ensure the Default Umask is Set Correctly in login.defs         pass
Set Daemon Umask                                                fail



-- 
Brian Millett
"If anyone asks, say it fell from the sky."
   -- [ Delenn to Sinclair (re: Vorlon files), "The Gathering"]
--- ./input/system/accounts/session.xml.orig	2013-02-05 19:24:21.154059732 -0600
+++ ./input/system/accounts/session.xml	2013-02-05 20:20:15.095815440 -0600
@@ -193,11 +193,40 @@
 <pre>umask 077</pre>
 </li>
 -->
-<Value id="umask_user_value" type="string"
-operator="equals" interactive="0">
+<Value id="var_accounts_umask_bash_users" type="string" operator="equals" interactive="0">
 <title>Sensible umask</title>
 <description>Enter default user umask</description>
-<value selector="">027</value>
+<value selector="">077</value>
+<value selector="007">007</value>
+<value selector="022">022</value>
+<value selector="027">027</value>
+<value selector="077">077</value>
+</Value>
+
+<Value id="var_accounts_umask_csh" type="string" operator="equals" interactive="0">
+<title>Sensible umask</title>
+<description>Enter default user umask</description>
+<value selector="">077</value>
+<value selector="007">007</value>
+<value selector="022">022</value>
+<value selector="027">027</value>
+<value selector="077">077</value>
+</Value>
+
+<Value id="var_accounts_umask_etc_profile" type="string" operator="equals" interactive="0">
+<title>Sensible umask</title>
+<description>Enter default user umask</description>
+<value selector="">077</value>
+<value selector="007">007</value>
+<value selector="022">022</value>
+<value selector="027">027</value>
+<value selector="077">077</value>
+</Value>
+
+<Value id="var_accounts_umask_login_defs" type="string" operator="equals" interactive="0">
+<title>Sensible umask</title>
+<description>Enter default user umask</description>
+<value selector="">077</value>
 <value selector="007">007</value>
 <value selector="022">022</value>
 <value selector="027">027</value>
@@ -210,7 +239,7 @@
 To ensure the default umask for users of the Bash shell is set properly,
 add or correct the <tt>umask</tt> setting in <tt>/etc/bashrc</tt> to read
 as follows:
-<pre>umask 077<!-- <sub idref="umask_user_value" /> --></pre>
+<pre>umask 077<!-- <sub idref="var_accounts_umask_bash_users" /> --></pre>
 </description>
 <rationale>The umask value influences the permissions assigned to files when they are created.
 A misconfigured umask value could result in files with excessive permissions that can be read and/or
@@ -226,7 +255,7 @@
 </ocil>
 
 <ident cce="26917-5" />
-<oval id="accounts_umask_bash_users" value="umask_user_value"/>
+<oval id="accounts_umask_bash_users" value="var_accounts_umask_bash_users"/>
 <ref nist="" disa="366"/>
 <tested by="swells" on="20120929"/>
 </Rule>
@@ -236,7 +265,7 @@
 <description>
 To ensure the default umask for users of the C shell is set properly,
 add or correct the <tt>umask</tt> setting in <tt>/etc/csh.cshrc</tt> to read as follows:
-<pre>umask 077<!-- <sub idref="umask_user_value" /> --></pre>
+<pre>umask 077<!-- <sub idref="var_accounts_umask_csh" /> --></pre>
 </description>
 <rationale>The umask value influences the permissions assigned to files when they are created.
 A misconfigured umask value could result in files with excessive permissions that can be read and/or
@@ -250,7 +279,7 @@
 umask 077</pre>
 </ocil>
 <ident cce="27034-8" />
-<oval id="accounts_umask_csh" value="umask_user_value"/>
+<oval id="accounts_umask_csh" value="var_accounts_umask_csh"/>
 <ref nist="" disa="366"/>
 <tested by="swells" on="20120929"/>
 </Rule>
@@ -260,7 +289,7 @@
 <description>
 To ensure the default umask controlled by <tt>/etc/profile</tt> is set properly,
 add or correct the <tt>umask</tt> setting in <tt>/etc/profile</tt> to read as follows:
-<pre>umask 077<!--<sub idref="umask_user_value" /> --></pre>
+<pre>umask 077<!--<sub idref="var_accounts_umask_etc_profile" /> --></pre>
 </description>
 <rationale>The umask value influences the permissions assigned to files when they are created.
 A misconfigured umask value could result in files with excessive permissions that can be read and/or
@@ -274,7 +303,7 @@
 <pre># grep "umask" /etc/profile
 umask 077</pre>
 </ocil>
-<oval id="accounts_umask_etc_profile" value="umask_user_value" />
+<oval id="accounts_umask_etc_profile" value="var_accounts_umask_etc_profile" />
 <tested by="swells" on="20120929"/>
 <ref nist="" disa="366"/>
 </Rule>
@@ -284,7 +313,7 @@
 <description>
 To ensure the default umask controlled by <tt>/etc/login.defs</tt> is set properly,
 add or correct the <tt>umask</tt> setting in <tt>/etc/login.defs</tt> to read as follows:
-<pre>umask 077<!-- <sub idref="umask_user_value" /> --></pre>
+<pre>umask 077<!-- <sub idref="var_accounts_umask_login_defs" /> --></pre>
 </description>
 <rationale>The umask value influences the permissions assigned to files when they are created.
 A misconfigured umask value could result in files with excessive permissions that can be read and/or
@@ -298,7 +327,7 @@
 umask 077</pre>
 </ocil>
 <ident cce="26371-5" />
-<oval id="accounts_umask_login_defs" value="umask_user_value" />
+<oval id="accounts_umask_login_defs" value="var_accounts_umask_login_defs" />
 <ref nist="" disa="366"/>
 <tested by="swells" on="20120929" />
 </Rule>
--- ./input/checks/accounts_umask_etc_profile.xml.orig	2013-02-05 19:13:06.732138332 -0600
+++ ./input/checks/accounts_umask_etc_profile.xml	2013-02-05 19:17:21.672181348 -0600
@@ -11,25 +11,26 @@
       correctly</description>
     </metadata>
     <criteria>
-      <criterion test_ref="test_20090" />
+      <criterion test_ref="test_accounts_umask_etc_profile" />
     </criteria>
   </definition>
+
   <ind:textfilecontent54_test check="all"
   check_existence="all_exist"
   comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/profile file"
-  id="test_20090" version="1">
-    <ind:object object_ref="obj_20090" />
-    <ind:state state_ref="state_20090" />
+  id="test_accounts_umask_etc_profile" version="1">
+    <ind:object object_ref="obj_accounts_umask_etc_profile" />
+    <ind:state state_ref="state_accounts_umask_etc_profile" />
   </ind:textfilecontent54_test>
-  <ind:textfilecontent54_state id="state_20090"
+  <ind:textfilecontent54_state id="state_accounts_umask_etc_profile"
   version="1">
     <ind:subexpression operation="equals" var_check="all"
-    var_ref="var_20090" />
+    var_ref="var_accounts_umask_etc_profile" />
   </ind:textfilecontent54_state>
-  <external_variable comment="External variable for definition 20087 - 20090"
-  datatype="string" id="var_20090"
-  version="1" />
-  <ind:textfilecontent54_object id="obj_20090"
+
+  <external_variable comment="External variable for definition 20087 - 20090" datatype="string" id="var_accounts_umask_etc_profile" version="1" />
+  
+  <ind:textfilecontent54_object id="obj_accounts_umask_etc_profile"
   version="1">
     <ind:path>/etc</ind:path>
     <ind:filename>profile</ind:filename>
--- ./input/checks/accounts_umask_bash_users.xml.orig	2013-02-05 19:12:47.772245115 -0600
+++ ./input/checks/accounts_umask_bash_users.xml	2013-02-05 19:13:24.510333217 -0600
@@ -11,25 +11,26 @@
       correctly for the bash shell</description>
     </metadata>
     <criteria>
-      <criterion test_ref="test_20087" />
+      <criterion test_ref="test_accounts_umask_bash_users" />
     </criteria>
   </definition>
+  
   <ind:textfilecontent54_test check="all"
   check_existence="all_exist"
   comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/bashrc file"
-  id="test_20087" version="1">
-    <ind:object object_ref="obj_20087" />
-    <ind:state state_ref="state_20087" />
+  id="test_accounts_umask_bash_users" version="1">
+    <ind:object object_ref="obj_accounts_umask_bash_users" />
+    <ind:state state_ref="state_accounts_umask_bash_users" />
   </ind:textfilecontent54_test>
-  <ind:textfilecontent54_state id="state_20087"
+  <ind:textfilecontent54_state id="state_accounts_umask_bash_users"
   version="1">
     <ind:subexpression operation="equals" var_check="all"
-    var_ref="var_20087" />
+    var_ref="var_accounts_umask_bash_users" />
   </ind:textfilecontent54_state>
-  <external_variable comment="External variable for definition 20087 - 20090"
-  datatype="string" id="var_20087"
-  version="1" />
-  <ind:textfilecontent54_object id="obj_20087"
+
+  <external_variable comment="ensure users umask is set in bashrc" datatype="string" id="var_accounts_umask_bash_users" version="1" />
+  
+  <ind:textfilecontent54_object id="obj_accounts_umask_bash_users"
   version="1">
     <ind:path>/etc</ind:path>
     <ind:filename>bashrc</ind:filename>
--- ./input/checks/accounts_umask_csh.xml.orig	2013-02-05 19:12:57.635254603 -0600
+++ ./input/checks/accounts_umask_csh.xml	2013-02-05 19:15:53.797087905 -0600
@@ -11,25 +11,26 @@
       correctly for the csh shell</description>
     </metadata>
     <criteria>
-      <criterion test_ref="test_20088" />
+      <criterion test_ref="test_accounts_umask_csh" />
     </criteria>
   </definition>
+
   <ind:textfilecontent54_test check="all"
   check_existence="all_exist"
   comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/csh.cshrc file"
-  id="test_20088" version="1">
-    <ind:object object_ref="obj_20088" />
-    <ind:state state_ref="state_20089" />
+  id="test_accounts_umask_csh" version="1">
+    <ind:object object_ref="obj_accounts_umask_csh" />
+    <ind:state state_ref="state_accounts_umask_csh" />
   </ind:textfilecontent54_test>
-  <ind:textfilecontent54_state id="state_20089"
+  <ind:textfilecontent54_state id="state_accounts_umask_csh"
   version="1">
     <ind:subexpression operation="equals" var_check="all"
-    var_ref="var_20089" />
+    var_ref="var_accounts_umask_csh" />
   </ind:textfilecontent54_state>
-  <external_variable comment="External variable for definition 20087 - 20090"
-  datatype="string" id="var_20089"
-  version="1" />
-  <ind:textfilecontent54_object id="obj_20088"
+
+  <external_variable comment="External variable for definition 20087 - 20090" datatype="string" id="var_accounts_umask_csh" version="1" />
+
+  <ind:textfilecontent54_object id="obj_accounts_umask_csh"
   version="1">
     <ind:path>/etc</ind:path>
     <ind:filename>csh.cshrc</ind:filename>
--- ./input/checks/accounts_umask_login_defs.xml.orig	2013-02-05 19:13:14.772287583 -0600
+++ ./input/checks/accounts_umask_login_defs.xml	2013-02-05 19:18:51.432742692 -0600
@@ -11,25 +11,26 @@
       correctly</description>
     </metadata>
     <criteria>
-      <criterion test_ref="test_20089" />
+      <criterion test_ref="test_accounts_umask_login_defs" />
     </criteria>
   </definition>
+
   <ind:textfilecontent54_test check="all"
   check_existence="all_exist"
   comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/login.defs file"
-  id="test_20089" version="1">
-    <ind:object object_ref="obj_20089" />
-    <ind:state state_ref="state_20088" />
+  id="test_accounts_umask_login_defs" version="1">
+    <ind:object object_ref="obj_accounts_umask_login_defs" />
+    <ind:state state_ref="state_accounts_umask_login_defs" />
   </ind:textfilecontent54_test>
-  <ind:textfilecontent54_state id="state_20088"
+  <ind:textfilecontent54_state id="state_accounts_umask_login_defs"
   version="1">
     <ind:subexpression operation="equals" var_check="all"
-    var_ref="var_20088" />
+    var_ref="var_accounts_umask_login_defs" />
   </ind:textfilecontent54_state>
-  <external_variable comment="External variable for definition 20087 - 20090"
-  datatype="string" id="var_20088"
-  version="1" />
-  <ind:textfilecontent54_object id="obj_20089"
+
+  <external_variable comment="External variable for definition 20087 - 20090" datatype="string" id="var_accounts_umask_login_defs" version="1" />
+  
+  <ind:textfilecontent54_object id="obj_accounts_umask_login_defs"
   version="1">
     <ind:path>/etc</ind:path>
     <ind:filename>login.defs</ind:filename>
--- ./input/profiles/usgcb-rhel6-server.xml.orig	2013-02-05 19:24:46.663316515 -0600
+++ ./input/profiles/usgcb-rhel6-server.xml	2013-02-05 19:54:29.689064773 -0600
@@ -93,7 +93,10 @@
 <select idref="root_path_no_dot" selected="true" />
 <select idref="root_path_no_groupother_writable" selected="true" />
 <select idref="homedir_perms_no_groupwrite_worldread" selected="true" />
-<refine-value idref="umask_user_value" selector="077" />
+<refine-value idref="var_accounts_umask_bash_users" selector="077"/>
+<refine-value idref="var_accounts_umask_csh" selector="077"/>
+<refine-value idref="var_accounts_umask_etc_profile" selector="077"/>
+<refine-value idref="var_accounts_umask_login_defs" selector="077"/>
 <select idref="user_umask_bashrc" selected="true" />
 <select idref="user_umask_cshrc" selected="true" />
 <select idref="user_umask_profile" selected="true" />
--- ./input/profiles/common.xml.orig	2013-02-05 19:24:54.305363285 -0600
+++ ./input/profiles/common.xml	2013-02-05 19:54:24.185773580 -0600
@@ -254,7 +254,10 @@
 <!-- Minimum number of characters not present in old password -->
 <refine-value idref="password_history_retain_number" selector="5"/>
 <!-- Passwords to remember -->
-<refine-value idref="umask_user_value" selector="077"/>
+<refine-value idref="var_accounts_umask_bash_users" selector="077"/>
+<refine-value idref="var_accounts_umask_csh" selector="077"/>
+<refine-value idref="var_accounts_umask_etc_profile" selector="077"/>
+<refine-value idref="var_accounts_umask_login_defs" selector="077"/>
 <!-- Sensible umask -->
 <refine-value idref="login_banner_text" selector="usgcb_default"/>
 <!-- login banner verbiage -->
--- ./input/profiles/test.xml.orig	2013-02-05 19:25:03.207794057 -0600
+++ ./input/profiles/test.xml	2013-02-05 19:54:20.058847135 -0600
@@ -48,7 +48,10 @@
 <select idref="user_umask_cshrc" selected="true" />
 <select idref="user_umask_profile" selected="true" />
 <select idref="user_umask_logindefs" selected="true" />
-<refine-value idref="umask_user_value" selector="077"/>
+<refine-value idref="var_accounts_umask_bash_users" selector="077"/>
+<refine-value idref="var_accounts_umask_csh" selector="077"/>
+<refine-value idref="var_accounts_umask_etc_profile" selector="077"/>
+<refine-value idref="var_accounts_umask_login_defs" selector="077"/>
 
 
 <select idref="set_daemon_umask" selected="true"/>
--- ./input/profiles/stig-rhel6-server.xml.orig	2013-02-05 19:25:14.092099033 -0600
+++ ./input/profiles/stig-rhel6-server.xml	2013-02-05 19:54:16.386969577 -0600
@@ -70,7 +70,10 @@
 <select idref="user_umask_logindefs" selected="true" />
 
 
-<refine-value idref="umask_user_value" selector="077"/>
+<refine-value idref="var_accounts_umask_bash_users" selector="077"/>
+<refine-value idref="var_accounts_umask_csh" selector="077"/>
+<refine-value idref="var_accounts_umask_etc_profile" selector="077"/>
+<refine-value idref="var_accounts_umask_login_defs" selector="077"/>
 
 
 <select idref="set_daemon_umask" selected="true" />
_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to