Shawn,

Really interesting points. 

Can you also speak to Fedora vs RHEL and why Fedora is included?

I think a CentOs generic is a smart approach. 

Greg

Greg Elin
P: 917-304-3488
E:  grege...@gitmachines.com

Sent from my iPhone

> On Aug 15, 2014, at 4:57 PM, Shawn Wells <sh...@redhat.com> wrote:
> 
>> On 8/15/14, 3:59 PM, Greg Elin wrote:
>> Thanks everyone for contributing to this thread. It's been very helpful.
>> 
>> I have had a few draft replies, but let me try to keep things short.
>> 
>> Many of the contributions address altering the files in the source
>> Scap-security-guide repo. It would be great to have an upstream resolution
>> so those installing OpenSCAP and SSG can do so via RPM (or repo) and
>> confidently work across Fedora, RedHat, and CentOS. (Separating CentOS
>> seems might have some nuances to consider because often us users substitute
>> CentOS for RedHat and we may want to see "RedHat" showing up in results.)
>> 
>> I am still interested in how to fix the issue with the files I have
>> installed via RPMs. I'm a little weak still on the whole build thing to be
>> honest. But more importantly, I *want* to be aligned with what is being
>> distributed. I want to have GovReady install OpenSCAP and SSG and then use
>> it. I'm reluctant to fork the source SSG.
>> 
>> So with that in mind, I got this working. I added a new
>> centos6-cpe-dictionary.xml file and centos6-cpe-oval.xml file. The cpe
>> dictionary can be referenced in oscap command line and it points to the
>> correct centos6-cpe-oval.xml file that has a modified test for CentOS.
>> 
>> The changes that needed to be made seem to come down to changing
>> `redhat-release-server` (and/or `redhat-release-workstation`) to
>> `centos-release` and changing the pattern match on the version from
>> `^6\.\d+$
> 
> 
> You're entirely correct that technical enablement is trivial. It comes
> to the issue of Common Criteria certification. The common criteria
> process validates software lifecycle practices, that security
> functionality performs as advertised, that a piece of software can be
> trusted for deployment on government systems.
> 
> A colleague of mine, Gunnar Hellekson, wrote a great common criteria primer:
> http://atechnologyjobisnoexcuse.com/2011/12/a-common-criteria-primer/
> 
> Read it -- really -- it'll give some background to the conversation.
> 
> As noted in the blog, US Gov policy mandates that software be common
> criteria certified. There's no exception. If software you want to use is
> not common criteria certified, you contractually obligate your vendor to
> certify under a relevant protection profile. There's no provision for
> something that isn't certified.
> 
> CentOS has never undergone common criteria, has no government
> certifications (e.g. FIPS), no support, no security patches, no CVE/IAVA
> mappings, and there no plans for these things. In studies of CentOS vs
> RHEL by IAD, some 1/3 of the core binaries are different. CentOS !=
> RHEL. The two can not be used interchangeably in government environments.
> 
> And relating to the DoD/IC community: due to lack of certifications, the
> DoD CIO and DISA FSO have not signed off on CentOS. That's why there is
> no STIG for CentOS. This is why the CPE checks are enabled within SSG
> content. CentOS simply isn't an approved operating system.
> 
> As others have pointed out, DAAs can of course authorize waivers to do
> whatever they want. Many DAAs chose to violate the common criteria
> mandate, and unfortunately, there's no true repercussions for doing so.
> As DAA, they have the authority to accept risk.
> 
> To educate DAAs on the risks taken during CentOS deployments, NSA IAD
> performed a binary analysis of CentOS6 and RHEL6. They found ~1/3 of
> binary packages between the two distros are different, and because of so
> many changes, IAD stated that inferring and understanding what changed
> was infeasible. How is a DAA supposed to make an informed risk decision
> on the use of CentOS when there are so many changes that IAD finds
> proper analysis infeasible?
> 
> But policies are policies, not law. DAAs are certainly able to break
> policies, but by using unsupported and uncertified software, must be
> prepared to staff, fund, and develop on their own any missing gaps.
> 
> And besides, if one chooses to use a completely untrusted operating
> system, why even both to harden it?
> 
> <<takes deep breath>>
> 
> Enabling CentOS on the existing profiles (stig, usgcb, c2s, cs2) is
> counter intuitive, as they're formal government baselines that do
> require a common criteria certified OS as part of their requirement set.
> Perhaps establishing a new profile, e.g. "centos-generic," even if it
> just inherits the RHEL6 STIG and disables the platform checking, would
> be decent compromise. Rules that deal with certain things, like crypto,
> would still need to fail as CentOS doesn't have FIPS.... but it could be
> a start.
> -- 
> SCAP Security Guide mailing list
> scap-security-guide@lists.fedorahosted.org
> https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
> https://github.com/OpenSCAP/scap-security-guide/
-- 
SCAP Security Guide mailing list
scap-security-guide@lists.fedorahosted.org
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
https://github.com/OpenSCAP/scap-security-guide/

Reply via email to