On 4/11/13 1:38 PM, David Smith wrote:
Signed-off-by: David Smith <[email protected]>
---
  RHEL6/input/services/ftp.xml        |    3 ---
  RHEL6/input/system/accounts/pam.xml |    8 ++++----
  2 files changed, 4 insertions(+), 7 deletions(-)

diff --git a/RHEL6/input/services/ftp.xml b/RHEL6/input/services/ftp.xml
index dac91be..27957c8 100644
--- a/RHEL6/input/services/ftp.xml
+++ b/RHEL6/input/services/ftp.xml
@@ -159,7 +159,6 @@ If anonymous access is also required, add the anonymous usernames 
to <tt>/etc/vs
  ftp</pre>
  </description>
  <rationale>Historically, the file <tt>/etc/ftpusers</tt> contained a list of users who were not 
allowed to access the system via ftp. It was used to prevent system users such as the root user from logging in via 
the insecure ftp protocol. However, when the configuration option <tt>userlist deny=NO</tt> is set, 
vsftpd interprets ftpusers as the set of users who are allowed to login via ftp. Since it should be possible for 
most users to access their accounts via secure protocols, it is recommended that this setting be used, so that 
non-anonymous ftp access can be limited to legacy users who have been explicitly identified.</rationale>
-<!--<ident cce="27115-5" />-->
  <!--<oval id="ftp_limit_users" />-->
  <!--<ref nist="CM-7" /> -->
  </Group>
@@ -188,7 +187,6 @@ is necessary to ensure that files cannot be uploaded and 
downloaded from the sam
  be used to verify that this directory is on its own partition.</description>
  <rationale>If there is a mission-critical reason for anonymous users to 
upload files, precautions must be taken to prevent
  these users from filling a disk used by other services.</rationale>
-<!--<ident cce="27115-5" />-->
  <!--<oval id="ftp_home_partition" />-->
  <!--<ref nist="CM-7" /> -->
  </Rule>
@@ -207,7 +205,6 @@ FTP is an older protocol which is not very compatible with 
firewalls. During the
  and server negotiate an arbitrary port to be used for data transfer. The ip 
conntrack ftp module is used by
  iptables to listen to that dialogue and allow connections to the data ports 
which FTP negotiates. This allows an
  FTP server to operate on a machine which is running a firewall.</rationale>
-<!--<ident cce="27115-5" />-->
  <!--<oval id="ftp_configure_firewall" />-->
  <!--<ref nist="CM-7" /> -->
  </Group>
diff --git a/RHEL6/input/system/accounts/pam.xml 
b/RHEL6/input/system/accounts/pam.xml
index 2ca9e54..d523a4c 100644
--- a/RHEL6/input/system/accounts/pam.xml
+++ b/RHEL6/input/system/accounts/pam.xml
@@ -74,7 +74,7 @@ of unsuccessful attempts that were made to login to their 
account
  allows the user to determine if any unauthorized activity has occurred
  and gives them an opportunity to notify administrators.
  </rationale>
-<ident cce="TODO" />
+<ident cce="27291-4" />
  <oval id="TODO" />
  <ref disa="53" />
  </Rule>
@@ -241,7 +241,7 @@ requires some software, such as SSH, to re-connect. This 
can slow down and
  draw additional attention to some types of password-guessing attacks. Note 
that this
  is different from account lockout, which is provided by the pam_faillock 
module.
  </rationale>
-<ident cce="26796-5" />
+<ident cce="27123-9" />
  <oval id="accounts_password_pam_cracklib_retry" 
value="var_password_pam_cracklib_retry"/>
  <ref nist="IA-5" disa="1092" />
  <tested by="DS" on="20121024"/>
@@ -459,7 +459,7 @@ prevents direct password guessing attacks.  Ensuring that 
an administrator is
  involved in unlocking locked accounts draws appropriate attention to such
  situations.
  </rationale>
-<ident cce="3410-8" />
+<ident cce="27110-6" />
  <oval id="accounts_passwords_pam_faillock_unlock_time" 
value="var_accounts_passwords_pam_faillock_unlock_time"/>
  <ref nist="AC-7(b)" disa="47" />
  </Rule>
@@ -483,7 +483,7 @@ The output should show 
<tt>fail_interval=&lt;interval-in-seconds&gt;</tt> where
  Locking out user accounts after a number of incorrect attempts within a
  specific period of time prevents direct password guessing attacks.
  </rationale>
-<ident cce="3410-8" />
+<ident cce="27215-3" />
  <oval id="accounts_passwords_pam_fail_interval" 
value="var_accounts_passwords_pam_faillock_fail_interval"/>
  <ref nist="AC-7(a)" disa="1452" />
  </Rule>

ack
_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to