Vincent, The reason the scripts that I wrote were called "stig-fix" is because the bash scripts that I originally I started with were part of Tresys' CLIP project. I wanted to contribute back to Aqueduct originally, but my employer at the time wouldn't let me at the time (I believe I meet you at one of the summit presentations a few years back). It took 4 entire re-writes of the code (each between different government customers and the same employer, starting with the stig-fix base that I wrote at home) before I could get both the government and the and my employer to allow me to release a "finished" and evaluated version the code to Red Hat. (The government was understanding that it could benefit the community, but It took telling my customer that they couldn't make a dime off of the source because I started with open-source code.) I merged in USGCB, NSA SNAC guidance along the way, and the Aqueduct content was finally merged in around the 4th re-write, all of which had to be massaged for changes RHEL 6. It is by no means the official script from Red Hat (SSG is the official project), and is offered AS-IS with no support which is why I put it up on github, I want the users to have control over the end product and make a fork that works for their group/site/project.
I may remove the checks entirely at some point (SSG is the official Red Hat security script to check configurations) and only distribute only some pre-STIG'ed configurations (iptables, ip6tables, sysctl.conf, PAM configs, etc.) and a few toggle scripts (e.g. toggle_usb, toggle_ipv6, etc.), allowing the users to check-point the configurations after customization and creating and redistributing those customizations as an RPM for configuration other like systems using a kickstart. The purpose to allow the customer to decide what's best for them and their site/project. Anyway, I hope this clears up where everything came from. Please feel free to ask if you have any question. I just want to get the job done for a customer in the most efficient way possible, which is straight from the installation. Please feel free to contact me if you have any questions or concerns. Regards, Frank Caviggia ----- Original Message ----- From: "Vincent Passaro" <vi...@buddhalabs.com> To: "Joe Nall" <scap-security-guide@lists.fedorahosted.org> Sent: Wednesday, September 3, 2014 1:49:37 AM Subject: Re: Remediation advice for RHEL 5 and 6 On the topic of the rhel stig fix repo, what was the intent in forking Aqueduct bash content and creating a separate project? Wouldn't we want to keep things together to prevent the community from now having multiple projects attempting the same goal... Using the same Aqueduct code? It would make sense that a fork occurred if it was done by an external person or company, but this was done by Red Hat employees. I'm sure the Aqueduct community would have loved to see the contribution from Red Hat back into the project. On Sep 2, 2014 9:46 PM, "Shawn Wells" < sh...@redhat.com > wrote: On 9/3/14, 12:09 AM, Vincent Passaro wrote: Phillip, Aqueduct definitely has the most options (Ansible / Puppet / Bash) for DISA STIG remediation. Cheers, Vince On Sep 2, 2014, at 9:03 PM, Philip Shuman < philip.shu...@sri.com > wrote: Are the Aqueduct remediation scripts still the best available place to start for implementing requested changes from the DISA STIG findings for RHEL5 and RHEL6? Aqueduct is pretty much the only location with RHEL5 scripts. And like Vince pointed out, Aqueduct also has Puppet and Ansible. IIRC, the Puppet scripts were contributed by Maura Dailey earlier this summer, and represented NSA open sourcing their baseline. Everything Aqueduct has is reputable and very tested. A benefit of SSG is that scanning/remediation is tightly integrated through human-readable prose guides, scanning/evaluation, and remediation. A single change within SSG (say, to tailor password lengths) will automatically trickle to prose guides (XCCDF), evaluation (OVAL), and remediation (bash scripts). SSG also benefits from a vibrant community, and further, will be shipping natively in RHEL 6.6+. A third option would be to evaluate the STIG kickstart builder Red Hat Gov released to GitHub: https://github.com/RedHatGov/stig-fix-el6-kickstart It wraps SSG + stig-fix scripts + banners into a customized installation DVD/ISO. Many of the remediation scripts were originally sourced from Aqueduct. -- SCAP Security Guide mailing list scap-security-guide@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide https://github.com/OpenSCAP/scap-security-guide/ -- SCAP Security Guide mailing list scap-security-guide@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide https://github.com/OpenSCAP/scap-security-guide/ -- Frank Caviggia Consultant, Red Hat fcavi...@redhat.com (M) (571) 295-4560 -- SCAP Security Guide mailing list scap-security-guide@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide https://github.com/OpenSCAP/scap-security-guide/