Re: [Open-scap] timing rule evaluation times

2019-08-07 Thread Shawn Wells


On 8/7/19 2:58 PM, Greg Silverman wrote:
Is there any way within oscap to record the time taken for each rule’s 
evaluation to complete? We sometimes see it taking over an hour to 
complete on RHEL7 and want to understand why.



Could try verbose mode. Not sure if timestamps are generated. Something 
like:


$ oscap xccdf eval --profile ${profile} --results ~/scan-results.xml 
*--verbose devel */path/to/your/content.xml



Worst case you could create a for loop iterating through all the rules 
in your profile. Would have to grep out all the rules in your profile, 
but the SCAP command would be something like:


$ time oscap xccdf eval --profile ${profile} --rule ${rule} 
/path/to/your/content.xml



___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Wish to disable check or remediation of STIG rules to remove X Windows and to use smart card

2019-06-25 Thread Shawn Wells


On 6/25/19 11:36 AM, Boucher, William wrote:


I figured it out!



That's great! To help others down the road who may have a similar issue, 
what was the fix?


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Help needed - to Quantify severity levels

2019-06-18 Thread Shawn Wells


On 6/18/19 3:45 PM, Trevor Vaughan wrote:
At some point, these should probably be changed to correlate with the 
Vulnerability Severity Assessment Scale as outlined in the NIST 800-30 
since it is well defined, a public standard at no cost, and 0-100 
which lines up with most people's internal "gut feeling".



Sounds reasonable. Looks like "TABLE D-6: ASSESSMENT SCALE – RANGE OF 
EFFECTS FOR NON-ADVERSARIAL THREAT SOURCES" seems most applicable [0]. 
Is that what you were thinking?


Worried the broader 800-30 requires advanced multidimensional 
calculus yes, could result in better ratings than the DISA scale, 
but if its to hard to use... nobody will use it.



[0] Page 68 @ 
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Help needed - to Quantify severity levels

2019-06-07 Thread Shawn Wells


On 6/7/19 5:02 AM, harshad wadkar wrote:

Respected Madam / Sir,

I am referring the following url to know about open-scap and Ubuntu 
secure configuration.

https://static.open-scap.org/ssg-guides/ssg-ubuntu1604-guide-anssi_np_nt28_average.html

I have one query :
1. At present, the severities are labelled as unknown, low, medium and 
high.
    a) Is there any mechanism or logic, which will quantify these 
severity levels.
    e.g. low : 0 to < 3, medium : 3 to < 6 and high : 6 to 9 (as given 
in OWASP -

    Owasp risk rating methodology. https://www.owasp.org/index.php/OWASP_
Risk_Rating_Methodolog)
    b) If yes, requesting you share the information / document / url 
with me.


Your guidance is vital to me - waiting for the reply.




They correlate to the DISA Vulnerability Severity Category Code Definitions:



CAT I (HIGH):
Any vulnerability, the exploitation of which will directly and 
immediately result in loss of Confidentiality, Availability, or 
Integrity.



CAT II (MEDIUM):
Any vulnerability, the exploitation of which has a potential to result 
in loss of Confidentiality, Availability, or Integrity.


CAT III (LOW):
Any vulnerability, the existence of which degrades measures to protect 
against loss of Confidentiality, Availability, or Integrity.




Historically used the DISA ratings because much of the original 
community was from Government work (United States, then international) 
and the language was fairly standardized.


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Need help on openscap SSG question

2019-04-29 Thread Shawn Wells
Would need to understand where the content is coming from. Perhaps 
scap-security-guide in RHEL, and if so, what RHEL and SSG version?

Note red hat doesn’t publish rhel6 content in the National Checklist Program 
since rhel6 is out of active maintenance:

https://nvd.nist.gov/ncp/repository?authority=Red+Hat=0

Once the content source/version version is identified , the content can be ran 
through the NIST content validator tooling to see if there are problems with 
the content itself.



> On Apr 29, 2019, at 11:19 AM, Jan Cerny  wrote:
> 
> Hi,
> 
> I have no idea. Does Nessus have any "verbose" mode to get more
> helpful error message?
> 
> Including scap-security-guide list in this conversation because there
> might be people familiar with using SSG with Nessus.
> 
> Regards
> 
>> On Mon, Apr 29, 2019 at 4:54 PM Riaz Ebrahim  wrote:
>> 
>> Hi Jan Cerny,
>> 
>> Thanks a lot for your response, Your answer was very useful to understand 
>> about SSG files. As per your advice i tried with 
>> scap-security-guide-0.1.43-oval-510.zip  and XML validation error was gone, 
>> but encountering new error as below from nessus
>> 
>> "ssg-rhel6-ds-1.zip : Default namespace not found in OVAL"
>> 
>> Do you get any clue by seeing this error?. Thanks in advance :)
>> 
>> Thanks,
>> Riaz
>> 
>>> On Mon, Apr 29, 2019 at 2:44 PM Jan Cerny  wrote:
>>> 
>>> Hi,
>>> 
>>> I will try to answer, but I don't use Nessus, so I'm not sure what is
>>> the exact reason of this fail.
>>> 
>>> In general, the SSG files are validated against SCAP XML schemas, so
>>> they are valid SCAP content.
>>> However, SCAP standard consist of multiple separate specifications.
>>> Strictly speaking, the SSG datastream
>>> doesn't conform to SCAP 1.2 specification, because the datastream
>>> contains OVAL checks conforming to OVAL
>>> version 5.11 which is a part of SCAP 1.3. For SCAP 1.2 conformance it
>>> would need to use OVAL checks
>>> in version 5.10 or older.
>>> 
>>> According to this forum thread, it seems that Nessus doesn't support
>>> OVAL 5.11 it yet, but they say it's planned to be updated
>>> https://community.tenable.com/s/question/0D5f25hKRwqCAG/nessus-pro-7-trouble-getting-oval-scans-to-work
>>> 
>>> It could be a problem that Nessus expects datastreams that  contain
>>> OVAL 5.10 only.
>>> Try using the SSG datastreams that contain OVAL 5.10 only. They can be
>>> downloaded from
>>> https://github.com/ComplianceAsCode/content/releases/download/v0.1.43/scap-security-guide-0.1.43-oval-510.zip
>>> I hope Nessus should be able to consume these files.
>>> 
>>> The reason why we use 5.11 is that it contains new checks that allows
>>> us to check easily system services using systemd
>>> and other new things introduced in RHEL 7. The aforementioned
>>> datastreams that contain OVAL 5.10 only
>>> have limited abilities in comparison with those containing OVAL 5.11.
>>> 
>>> Best Regards
>>> 
>>> Jan Černý
>>> Security Technologies | Red Hat, Inc.
>>> 
>>> 
 On Sat, Apr 27, 2019 at 6:34 AM Riaz Ebrahim  
 wrote:
 
 I need help on openscap SSG project.
 
 I am currently exploring SCAP Auditing feature from Nessus console. I 
 understood that Nessus supports SCAP Content (1.0 or 1.1 or 1.2) which can 
 be downloaded from NIST repository (https://nvd.nist.gov/ncp/repository) 
 based on the target host version. This works great, However when i use 
 SCAP from OpenSCAP SSG (example "ssg-rhel6-ds.xml”), i am getting error as 
 “sg-rhel6-ds. .zip :  sg-rhel6-ds.xml failed XML Schema validation” .
 
 I would like to what is the difference between openSSG scap data stream &  
 scap1.2 content downloaded from NIST repository. How i can convert openssg 
 data stream (Example - ssg-rhel6-ds.xml) to NIST scap 1.2 format.
 
 
 My objective - To use openscap SSG from Nessus. Nessus scap scanning 
 expects SCAP 1.0, 1.1 or 1.2 content(in zip format).
 
 
 Thanks in advance!
 
 ___
 Open-scap-list mailing list
 Open-scap-list@redhat.com
 https://www.redhat.com/mailman/listinfo/open-scap-list
> 
> 
> 
> --
> Jan Černý
> Security Technologies | Red Hat, Inc.
> ___
> scap-security-guide mailing list -- scap-security-gu...@lists.fedorahosted.org
> To unsubscribe send an email to 
> scap-security-guide-le...@lists.fedorahosted.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/scap-security-gu...@lists.fedorahosted.org
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

[Open-scap] Atomic Scan still based off RHEL 7.6?

2019-03-03 Thread Shawn Wells
Pulling the latest atomic scan shows the container image is still based 
on RHEL 7.6 (vs 7.7) and contains very old scap-security-guide package.


When will it be rebased?

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] Phasing out the RHEL6 CI

2019-02-26 Thread Shawn Wells



On 2/26/19 12:07 PM, Boucher, William wrote:

My only concern is that sometimes a government customer will mandate using some 
flavor of RHEL 6, for whatever reason they may have. For example, we have a 
government customer mandating we use 6.5 at the moment. And they are perfectly 
happy to have us STIG the 6.5 OS manually, page by page, if there is no way to 
automate it.



The end of RHEL 6's maintenance support 2 phase isn't until 30-NOV-2020 
[0]. Until then OpenSCAP should be prepared to release security 
advisories (RHSAs) and urgent bug fixes (RHBAs) for OpenSCAP.


Developers judgement call whether downstream RHSAs and RHBAs can be 
released in a timely, high-quality manner, without an upstream CI.


In reality there may have been little to no RHSAs or RHBAs for OpenSCAP. 
However it's the Red Hat brand promise that if there ever are, we'll be 
ready.



[0] https://access.redhat.com/support/policy/updates/errata

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] Open a ticket?

2019-02-18 Thread Shawn Wells


On 2/18/19 9:04 AM, Todd Williams wrote:


I am trying to find out how to go about opening a ticket against 
openSCAP, can anyone point me in the right direction?



Depends where you're consuming it.

If using a commercial linux distro, would suggest opening a ticket with 
them directly. For Red Hat, that'd be here:

https://access.redhat.com/support/cases/#/case/new

If using the upstream bits, the code repo + tickets are here:
https://github.com/OpenSCAP/openscap/


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] V-73159 - Question on requisite vs required in pam.d/system-auth

2019-02-14 Thread Shawn Wells



On 2/14/19 12:21 PM, Marek Haicman wrote:

Hello, according to the v2r2, the check is supposed to be:
```
# cat /etc/pam.d/system-auth | grep pam_pwquality

password required pam_pwquality.so retry=3

If the command does not return an uncommented line containing the 
value "pam_pwquality.so", this is a finding.


If the value of "retry" is set to "0" or greater than "3", this is a 
finding.

```
and there's nothing about `required`. So it's up to your setup, I believe.



Exactly. There's nuance there.

The DISA content is ensuring pam_pwquality is being used, and retry has 
an appropriate value.


requisite or required is not part of the check... just example of how 
things could be setup.


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] Using profiles not distributed in

2019-02-08 Thread Shawn Wells



On 2/8/19 2:34 PM, Greg Silverman wrote:

Let me ask in a different way.

DISA published xml files 
withhttps://iasecontent.disa.mil/stigs/zip/U_Red_Hat_Enterprise_Linux_7_V2R2_STIG_SCAP_1-2_Benchmark.zip.
 The zip's xml file contains a list of vulnerabilities for RHEL7, the Version 2 
Release 2 (V2R2) selection of vulnerabilities. scap-security-guides versions 
1.40+ contain a DISA profile and that profile contains the V1R4 list of 
vulnerabilities.

1. Can oscap v 1.2.17 consume the xml files at the DISA URL and evaluate a 
RHEL7 machine?



DISA only publishes what's called XCCDF -- essentially, human-readable 
prose. DISA does not publish any automation that would result in a 
pass/fail configuration scan.


The most any SCAP tool could do with this content, including OpenSCAP, 
would be to transform it from XML to HTML to ease reading:


$ oscap xccdf generate guide \
U_Red_Hat_Enterprise_Linux_7_V2R2_STIG_SCAP_1-2_Benchmark.xml \
> ~/disa-guide.html



2. How do xml files like the ones at that URL get incorporated in a 
scap-security-guide, as was done with the DISA V1R4 files?


Manually.

Unfortunately DISA does not coordinate their content with DoD, NIST, 
NSA, or even Red Hat. These parties only find out about DISA's content 
when it's made publicly available.


And also unfortunately, DISA does not provide a changelog of what was 
changed. That means someone needs to go through the DISA content and 
compare it by hand. From there a series of tickets are opened to discuss 
alignment:


https://github.com/ComplianceAsCode/content/issues?q=is%3Aissue+is%3Aopen+label%3A%22DISA+Content+Issues%22

Once that ticket queue is resolved, the two bodies of content will be in 
alignment.



___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] When to expect OVAL probes for OpenShift?

2019-02-07 Thread Shawn Wells


On 2/4/19 2:27 PM, William Munyan wrote:


Hey Shawn,

I’ll add to Steve’s point that if there is not current OVAL support 
for the constructs you need, then the new OVAL 
tests/objects/states/items would need to be created in either a new 
OVAL schema or (more likely) as additions to the existing Linux 
schema.  Once created a proposal can be made to the OVAL language team 
through an issue and pull request to the official OVAL Language GitHub 
.  The newly released proposal 
process can be found here 
.


Once proposed, the OVAL community can provide feedback and 
implementations to prove the concept and progress the proposal along 
towards adoption.  Ultimately, the area supervisor for the Linux 
schemas will need to be involved as well.  The supervisor for Linux is 
currently Simon Lukasik.


I’m happy to help out with any schema development, and potential 
implementation of proposed updates as well (although I’ll freely admit 
negligible knowledge of OpenShift).  The language governance, proposal 
and adoption process are all recently “released” so if you find 
yourself needing help with the process, don’t hesitate to reach out.




Thanks Bill & Steve.

So then, to rephrase the question, when will there be OVAL 
tests/subjects/states/items for OpenShift, akin to how there are for 
systemd and SELinux?


Would be extremely surprising to learn this process hasn't been started 
already, but getting the sense it hasn't been. Not really sure who to 
direct the question to likely Marek and Matej?


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] When to expect OVAL probes for OpenShift?

2019-02-04 Thread Shawn Wells


On 2/4/19 6:08 PM, Steve Grubb wrote:

On Mon, 4 Feb 2019 11:06:00 -0500
Shawn Wells  wrote:


When can OpenSCAP probes be expected for OpenShift?

Are you talking about new OVAL tests?




Probes so that OVAL tests could be created. Akin to the systemd probes.

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Hardening Redhawk 6.5

2019-01-30 Thread Shawn Wells


On 1/29/19 11:14 PM, Boucher, William wrote:


Hi folks,

I’ve been tasked with applying the RedHat 6 STIG to several RedHawk 
6.5 systems.


Running oscap should be relatively easy, to see where a base install 
sits initially (RedHawk is RedHat with modifications for embedded 
realtime use).


The RedHawk site talks about testing RedHawk performance after 
applying the RedHat STIG (in a white paper), but it makes no mention 
on how to apply it.




RedHawk Linux doesn't have a STIG or common criteria, so not sure what 
security configuration guides (if any) are available.


If the RHEL STIGs can be applied to it, akin to CentOS, the 
ComplianceAsCode user guide might be helpful:


https://github.com/ComplianceAsCode/content/blob/master/docs/manual/user_guide.adoc

Specifically remediation section:
https://github.com/ComplianceAsCode/content/blob/master/docs/manual/user_guide.adoc#remediation



Applying it manually is an option, but I’d sure like to automate some.

But my question really concerns adding packages (like selinix). 
RedHawk discourages using yum (with the RedHat repositories) to update 
packages, as there may be incompatibilities between the standard 
packages and the RedHawk modifications to the OS.


Perhaps I should direct this question to RedHawk support, but I 
thought I’d ask it here first to get your input.


Not sure how RedHawk works. If they're layering RedHawk software ontop 
of Red Hat instances, then you'd have a Red Hat subscription for every 
node (and could ask Red Hat support). If RedHawk is distributing their 
own independent linux distro, it'd be appropriate to query them about 
package management.



___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Benchmark for Canonical Ubuntu 16.04 LTS

2018-11-27 Thread Shawn Wells



On 11/27/18 6:23 PM, Boucher, William wrote:


Hi folks,

I am currently hardening an Ubuntu embedded system for delivery to a 
customer.


I have downloaded the “Canonical Ubuntu 16.04 LTS STIG Ver 1, Rel 1” 
from DISA, and I have obtained a copy of the SCAP Compliance checker 
tool “SCC 5.0.2 Ubuntu 16 AMD64”.


What I am missing is an SCAP Benchmark file for Ubuntu 16.04. Does one 
exist?


I would like to use OpenSCAP to harden then scan this IS. The 
Open-SCAP BASE page says that Ubuntu is supported, so I can get the 
tools installed. But without a benchmark how would I proceed from there?




Looks like DISA does not publish SCAP content for their Ubuntu STIG:

https://iase.disa.mil/stigs/scap/Pages/index.aspx


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Disable STIG

2018-10-22 Thread Shawn Wells



On 10/22/18 7:22 AM, Gaurav Kamathe wrote:

Hello All,

I am a QA who needs to test some functionality when STIG is enabled on 
a server (RHEL) by the user.
However the software does not provide any way to disable STIG (factory 
reset is the only option).
Is there a workaround for this? Can i disable it from the backend or 
in someway reverse the changes that were done when STIG was enabled 
for testing purposes?

Please let me know or point me in the right direction.
Thanks.


Hi Gaurav,

    Currently there is no "undo" option. Most people reload their 
container/VM/endpoint with a fresh install if needed.


-Shawn

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] OpenSCAP 1.3.0

2018-10-10 Thread Shawn Wells



On 10/10/18 5:01 AM, Jan Cerny wrote:

Hi,

OpenSCAP support for Windows hasn't been improved much since the
1.3.0_alpha1 releases. The only thing that we have done
recently is that we added Windows CPEs to the inbuilt CPE dictionary.


How far along is Windows support? Saw the mention of 'basic' -- but how
should OpenSCAP on Windows be positioned?

OpenSCAP 1.3.0 can be compiled and installed on Windows, it runs, it produces
"some" results. But it's very bad.


- How many Windows probes are implemented?

OpenSCAP 1.3.0 for Windows has the following 4 probes:
* system_info
* registry
* wmi57
* accesstoken


- Does OpenSCAP on Windows pass the NIST automated tooling?

Nobody tried that. I expect that it doesn't pass.


- Where can we send people who want to find out more?

For people that would like to contribute code I would point them to developer's
manual where they can find how to build it on Windows.
https://github.com/OpenSCAP/openscap/blob/master/docs/developer/developer.adoc

For normal users we don't have anything.
I think we definitely should mention that it exists onwww.open-scap.org.

The problem with OpenSCAP for Windows is that nobody is working on that now,
and it is not tested at all. Also, it is not supported by Red Hat in any way.

Understand the Windows support is community driven.

IIRC, wasn't there someone building a master thesis about this work? Has 
that been completed?



I'm sorry if the release announcement email caused a confusion.
I mentioned the Windows support under "Key differences from 1.2.x series"
because the 1.3.0_alpha1 and 1.3.0_alpha2 releases were intended as 
pre-releases.
I supposed most people didn't follow their changelog. I wanted to point out 
there
at least the main differences of 1.3.0 for users of 1.2.x releases.

However, as usually, the full changelog is located at:
https://github.com/OpenSCAP/openscap/blob/master/NEWS


Nah, wouldn't say confusion. Wasn't sure of the broader Windows support 
so figured I'd just ask!
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] OpenSCAP 1.3.0

2018-10-09 Thread Shawn Wells




On 10/9/18 7:38 AM, Jan Cerny wrote:

Hello OpenSCAPers,

We are thrilled to announce general availability of OpenSCAP 1.3.0 release.

This is the first release from maint-1.3 maintenance branch. API/ABI is not
compatible with 1.2.x releases. API/ABI is not compatible with 1.3.0_alpha
releases.

Changes from 1.3.0_alpha2:
   - New features
 - Introduced a virtual '(all)' profile selecting all rules
 - Verbose mode is a global option in all modules
 - Added Microsoft Windows CPEs
 - oscap-ssh can supply SSH options into an environment variable
   - Maintenance
 - Removed SEXP parser
 - Added Fedora 30 CPE
 - Fixed many Coverity defects (memory leaks etc.)
 - SCE builds are enabled by default
 - Moved many low-level functions out of public API
 - Removed unused and dead code
 - Updated manual pages
 - Numerous small fixes

Key differences from 1.2.x series:
- Basic Microsoft Windows support
- Removed deprecated command line interfaces
- Removed deprecated API symbols
- Probes are not separate processes anymore
- CMake used as build system
- CTest used as a test framework

Download:
https://github.com/OpenSCAP/openscap/releases/download/1.3.0/openscap-1.3.0.tar.gz

SHA512:
9405d0f17b60ab4a52ddd0f49d0e2395eb2540f0d07d68dfd142e2b8b2988e88cf127230523e68f67d3d22a6dd4eb2397f9468c923d19bb7cb059abf487ab5a1

Audit, Fix, And Be Merry!


Thanks Jan!

How far along is Windows support? Saw the mention of 'basic' -- but how 
should OpenSCAP on Windows be positioned?


For example:
- How many Windows probes are implemented?
- Does OpenSCAP on Windows pass the NIST automated tooling?
- Where can we send people who want to find out more?

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] question on addon_fedora_oscap

2018-10-04 Thread Shawn Wells




On 10/4/18 3:05 AM, Jan Cerny wrote:

Hi,

Unfortunately, the "tailoring" feature is broken in Anaconda Addon.

However, there is a workaround, suggested by Watson Yuuma Sato (adding him to 
this conversation).
Let me copy-paste his idea:

There is a tool that can combine the tailoring to the datastream or XCCDF file. 
So it is possible
to embed the tailoring into content file and get it through "content-url" field.

Quick howto commands and instructions below:
Grab the combine-tailoring tool
$ git clonehttps://github.com/mpreisler/combine-tailoring.git
cd combine-tailoring

Combine tailoring and content
./combine-tailoring.py --output ssg-rhel7-ds-combined.xml 
/usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml 
ssg-rhel7-ds-standard-tailoring.xml

Serve the file ssg-rhel7-ds-combined.xml in your network, and
in the kickstart:
- change content-type to datastream or xccdf
- add field content-url and point to your new combined content
- change profile to the id of your customized profile, please note that it must 
be the full id.

For example:
%addon org_fedora_oscap
content-type = datastream
content-url =http://192.168.0.2/content/ssg-rhel7-ds-combined.xml
profile = xccdf_org.ssgproject.content_profile_standard_customized
%end


Hopefully it helps.


Where can we find the BZ tracking fixing tailoring in Anaconda? Will 
this be included in the RHEL 7.6 release?


Also - where can we find the KBase article documenting the work around 
on the customer portal?


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] Can we remove some service checks from the profile

2018-09-05 Thread Shawn Wells



On 9/5/18 6:20 AM, Dhanushka Parakrama wrote:

Hi Team

I  Wanted to remove the few service checks from the profile 
*xccdf_org.ssgproject.content_profile_anssi_np_nt28_high (Eg: Ensure 
/tmp Located On Separate Partition , 
*xccdf_org.ssgproject.content_rule_partition_for_tmp ) and build new 
*ssg-centos6-ds.xml* check file how can i do that ?


That's a common use case! Consider evaluating SCAP Workbench. It's a GUI 
tool to tailor what rules are enabled/disabled in your security profile.


Homepage:
https://www.open-scap.org/tools/scap-workbench/

Blog "Customizing SCAP Security Guide for your use-case 
" 
by Jan Cerny is a good place to start!
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] SCAP customizations and OS migrations

2018-06-05 Thread Shawn Wells




On 6/3/18 11:59 PM, Robert Sanders wrote:

Marek,
   Thank you for your reply.  While I understand how it can be difficult to 
compare between versions, I've found it very useful to do so.  I've written a 
very rough hack (as in, one step better than a stone axe) that will compare 
multiple profile/content pairs, and/or customizations.  This includes trying to 
apply one customization to a more recent profile/content.  It basically loops 
over the rules, showing where any of the input files 'differ'.  Isn't perfect, 
but it does help highlight places where things have issues.  If my management 
allows, I may make this available to the community.

Sounds useful! Hope you're able to share.

   I have seen the issue regarding update to a tailoring file.  I'd actually 
gotten to the point of manually tweaking my tailoring file as I need to make 
changes, using an 'expendable' tailoring file to get the new lines.  Do you 
know if this is on the list of things to be fixed at some point?


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] [Suspected Spam] Re: OSCAP Scanner Binaries

2018-04-27 Thread Shawn Wells



On 4/27/18 1:18 AM, Mohanraj, Bharath wrote:


Thanks Shawn for the clarification…

One last thing I want to mention here is… some of the RHEL boxes in my 
environment are locked down from internet.. .so they will not have 
access to the repository to fetch oscap binaries, and that’s the 
reason I had raised this question. Do you have any better suggestion 
for this scenario?




Could implement an on-premise YUM repo. This would give administrators 
the standard YUM functionality. A few RHT articles:


- "How to create a local mirror of the latest update for Red Hat 
Enterprise Linux 5, 6, 7 without using Satellite server?"

https://access.redhat.com/solutions/23016

This article may also be helpful:
"How can we regularly update a disconnected system (A system without 
internet connection)?"

https://access.redhat.com/solutions/29269
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] [Suspected Spam] Re: OSCAP Scanner Binaries

2018-04-26 Thread Shawn Wells



On 4/26/18 7:00 PM, Christopher Wiedmaier wrote:
How can I be removed from this list?  I have completed the unsubscribe 
steps multiple times but I still end up receiving e-mails. 

https://www.redhat.com/mailman/listinfo/open-scap-list

Under the "openscap-list subscribers" section (last section on the page) 
there is a field to enter your EMail and button for unsubscribe.


If having issues, you can ping Martin Preisler (mprei...@redhat.com) and 
he can manually remove.


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] [Suspected Spam] Re: OSCAP Scanner Binaries

2018-04-26 Thread Shawn Wells



On 4/26/18 1:09 PM, Mohanraj, Bharath wrote:


I tried to download only the oscap rpms by using the below command,

*yum install --downloadonly --downloaddir=/opt/oscaprpm 
openscap-scanner***


**

And once the above command is triggered, it downloaded the below bunch 
of RPMs…


My intention here is to get the rpms downloaded, copy it to my other 
RHEL machines that don’t have yum… and directly install the rpms… and 
I’m interested in running the oscap to scan my RHEL machines…


Now, my question here is, should I install all the downloaded RPMs to 
get the oscap scanning work?


The other RPMs contain needed libraries or deprencies of the OpenSCAP 
tooling.


This all seems very unusual. YUM is installed on *every* RHEL host out 
of the box. Administrators would actively have to remove it for this use 
case to be applicable.


Even if OpenSCAP and associated dependencies were installed through 
RPMs, YUM would still be available (and likely ideal) to install 
software through.
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] First try at remote scanning

2018-02-28 Thread Shawn Wells


On 2/28/18 9:24 AM, Geoffry Roberts wrote:
> All,
>
> I tried my first remote. scan and don't understand the result.
>
> I ran the following, which is almost a cut and past from the manual:
>
> oscap-ssh root@ xccdf eval --profile MAC-3_Sensitive --report
> report.html
> /U_Canonical_Ubuntu_V1R1_STIG/U_Canonical_Ubuntu_V1R1_Manual_STIG/U_Canonical_Ubuntu_STIG_V1R1_Manual-xccdf.xml
>
> This is the result:
> This script only supports '-h', '--help', '--v', '--version', 'info',
> 'xccdf eval', 'oval eval' and 'oval collect'.
>
> What does it mean? I am using the supported xccdd eval.  The xccdd
> file comes from DISA.  

Looking at DISA's filename, it appears the content is their *manual*
XCCDF file. Meaning no OVAL checks.

Before troubleshooting to much, you may want to confirm this file
contains OVAL checks. Quick way is to attempt a local run on the
endpoint using the same arguments (oscap xccdf eval --profile foo
/path/to/file.xml). If you're familiar w/SCAP XML you could peek into
their file(s) as well.
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] openscap version support

2018-02-05 Thread Shawn Wells


On 2/5/18 2:10 PM, r hartikainen wrote:
> Hello everyone
>
> I am trying to find answer how Openscap should be used when there is need to 
> run different minor versions of operating system, in my case its about rhel 
> 7.2 and the very latest 7.x.
> I have piece of software that requires me to stay with rhel 7.2, naturally 
> extended update support is needed for this. Target would be to use scap 
> workbench to select options for implementation and then use it to both OS 
> versions, 7.2 and the latest available.
>
> What I have not found is the answer to the compatibility issue, can I pick 
> the very latest scap policy provided in 7.4, modify and use it also with 7.2 
> eus? 

You'll find differences with each content provider.

When it comes to the SCAP Security Guide content shipping natively in
RHEL, it's designed for RHEL 7.x.

I actually don't know how EUS errata is handled (e.g. if everything is
backported). Marek Haicman is the product owner within Red Hat for
OpenSCAP and SSG he may know (and lurks on this list).

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] oscap results stored in central database?

2018-01-31 Thread Shawn Wells


On 1/31/18 10:22 PM, Luke Salsich wrote:
> Hey all,
>
> I've been using OpenSCAP for a while on our servers and really
> appreciate what it does. 
>
> I've been looking around for a way to store scan results and then
> query them and I can't seem to locate any plugins or apps which do
> this other than SCAPTimony. 
>
> SCAPTimony sounds great, but I'm not sure it's currently maintained
> and I don't really want to dive into Foreman just to store Oscap results. 
>
> What does the community use for this kind of scan / report storing and
> querying? 
>
> We're currently using Ansible AWX to run scans and to manage
> remediation. Love to find a way to pull that XML into a central
> database...

This week was DevConf in Brno [0] and this very topic came up multiple
times! The quick answer being broad agreement that "yes this must happen."

There are partner projects like Foreman (upstream) and Satellite
(downstream) which integrate scanning into their embedded databases. In
general there is a desire to unify SCAP with OpenControl for central
reporting though.

Many are in transit from Brno back home over the next few days, or
recovering locally from staying out all night for the past week :) Some
responses might be slightly delayed because of this.

If you could have database integration with SCAP what all would you
want it to do? Could you help the community form a few user stories?


[0] https://devconf.cz/cz/2018
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] https://www.open-scap.org/ down?

2018-01-20 Thread Shawn Wells
Seems restored now (approx 11am US EST).


> On Jan 20, 2018, at 5:21 AM, Šimon Lukašík  wrote:
> 
> 
> Can you guys please take a look?
> 
> ~š.
> 
> ___
> Open-scap-list mailing list
> Open-scap-list@redhat.com
> https://www.redhat.com/mailman/listinfo/open-scap-list

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] [open-scap] scan percentage with respect to rules specified by STIG

2017-09-06 Thread Shawn Wells


On 9/6/17 9:58 AM, Wesley Ceraso Prudencio wrote:
> Thanks Shawn, I didn't notice the extension from common profile.

Of course.

It's incredibly hard to keep tabs on what 3rd parties are putting into
their baselines so while our rule counts may be close, there's
little assurance that mappings are kept updated and rule content aligns.
It's been awhile since anyone has combed through DISA's RHEL6
content. wonder if there's enough community interest to warrant it.

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] [open-scap] scan percentage with respect to rules specified by STIG

2017-09-05 Thread Shawn Wells


On 9/5/17 4:38 AM, Wesley Ceraso Prudencio wrote:
> I'm not an expert, but if I got it right, we currently cover approximately 
> 85% of STIG rules for RHEL7 and 23% for RHEL6.

Something seems off

In RHEL6, the STIG profile extends the common profile:
> $ head -1 stig-rhel6-server-upstream.xml
> 

So, adding in rules from 'common' and STIG profiles:
> $ grep -v ' 182
>
> $ grep -v ' 68

Then subtracting things that are turned off:
> $ grep false stig-rhel6-* | wc -l
> 4

= 246 rules.

Then compared to RHEL6 STIG from DISA:
> $ grep " 259

246 / 259 = 95%

Some gaps are expected (e.g. update 3rd party patches, install 3rd party
software), so we'll never have 100% until baseline owners drop such
rules. This is common across most third parties (e.g. CIS), not just DISA.

. now ensuring the content of the selected rules aligns between
DISA and SSG is another question :)


___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] what profile to use in RHEL7

2017-07-18 Thread Shawn Wells


On 7/18/17 1:09 PM, Martin Preisler wrote:
> On Mon, Jul 17, 2017 at 6:44 PM, Smith, Cathy  wrote:
>> Folks
>>
>> I’m trying to build a customized profile for RHEL7.   I’m not sure about the
>> list of profile names offered through the oscap command and the list shown
>> in the SCAP Workbench.  For example, in RHEL6 the oscap command listed a
>> profile usgcb-rhel6-server, and that corresponded to the United States
>> Government Configuration Baseline (USGCB) in SCAP Workbench.  The RHEL 7
>> SCAP Workbench has a profile for USGCB, but there is no profile listed by
>> that name by the oscap info command.  Does anyone know of a list that shows
>> the relationship between the profile listed by the oscap command and the
>> profiles in the SCAP Workbench?
>>
>> Thank you for your assistance.
> The IDs and titles don't always match. This is exactly the case with
> the USGCB / OSPP profile for RHEL7. Its title is "United States
> Government Configuration Baseline (USGCB / STIG)" but its ID is
> xccdf_org.ssgproject.content_profile_ospp-rhel7.
>
> I usually go to https://static.open-scap.org to figure this out. Click
> on the product, then browse profiles. The page will always tell you
> both title and ID of each.
>
> Hope this helps!


As a future OpenSCAP RFE, could the 'oscap info' output be modified to
show the profile title? e.g.

Title: United States Baseline
XCCDF ID: org.open-scap-ospp-rhel7

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Logos and other materials for SCAP projects

2017-07-17 Thread Shawn Wells


On 7/17/17 2:59 PM, Martin Preisler wrote:
> Hi,
> I have gathered all the logos and other graphics and put them into a
> GitHub repository to make sure they don't get lost. Most of these (if
> not all) have been created by Lenka Horakova.
>
> https://github.com/OpenSCAP/promo
>
> If you have any other materials we'd appreciate pull requests. I'd
> also appreciate tips and recommendations how to make nice and
> reasonably priced sticker sheets . Maybe we could even try to get
> t-shirts done with these.

Have used StickerMule before:
https://www.stickermule.com/products/die-cut-stickers

Corp Red Hat also has some marketing relationships with similar
companies. They all seem comparably priced, though.

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] [Newbie] Way to search the archives?

2017-06-13 Thread Shawn Wells


On 6/13/17 9:42 AM, leam hall wrote:
> Hey Mike, sorry if I'm dense. I looked at the URL and it seems to be
> the initial welcome page. Messages go back as far as 2009, how do I
> search what has already been answered?

google for "centos site:https://www.redhat.com/archives/open-scap-list/;

sans quotes.

to save you time though: CentOS content is now built natively upstream.
Should see something like "ssg-centos7-ds.xml"

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] results not being checked in disa stig

2017-04-05 Thread Shawn Wells


On 4/5/17 2:54 PM, Greg Hennessy wrote:
> Bummer
>
> On Wed, Apr 5, 2017 at 1:53 PM, Shawn Wells <sh...@redhat.com
> <mailto:sh...@redhat.com>> wrote:
>
>
>
> On 4/5/17 1:43 PM, Greg Hennessy wrote:
>> I am exploring the use of open-scap to verify my machines meet
>> the DISA stigs. If I run oscap against the 
>> /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml file  things
>> seem to work
>> as expected. If I run oscap against the file from iase.disa.mil
>> <http://iase.disa.mil>, all 
>> of the results show "notchecked". Does anyone have a sugguestion
>> as to
>> how to force the checks to happen?
>>
>> My typed command line is:
>>
>> # oscap xccdf eval --profile MAC-2_Public  --report
>> /tmp/disa_stig.html
>> U_Red_Hat_Enterprise_Linux_7_STIG_V1R1_Manual-xccdf.xml
>
> DISA does not publish automation content -- so it's impossible to
> use their content.
>

With that said, we're tracking to having a SSG profile align more
directly against the content DISA published. Here's a dashboard with the
missing pieces:

https://github.com/OpenSCAP/scap-security-guide/projects/7

Patches most welcome, especially to build out missing OVAL!
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] results not being checked in disa stig

2017-04-05 Thread Shawn Wells


On 4/5/17 1:43 PM, Greg Hennessy wrote:
> I am exploring the use of open-scap to verify my machines meet
> the DISA stigs. If I run oscap against the 
> /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml file  things seem to work
> as expected. If I run oscap against the file from iase.disa.mil
> , all 
> of the results show "notchecked". Does anyone have a sugguestion as to
> how to force the checks to happen?
>
> My typed command line is:
>
> # oscap xccdf eval --profile MAC-2_Public  --report
> /tmp/disa_stig.html
> U_Red_Hat_Enterprise_Linux_7_STIG_V1R1_Manual-xccdf.xml

DISA does not publish automation content -- so it's impossible to use
their content.
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] SCAP Security Guide 0.1.32

2017-03-30 Thread Shawn Wells
Downloaded and tested the content using STIG profile. Found a few issues
with this release:

- 1x OVAL error
- 62x remediation failures/errors
- 50x rules missing DoD mappings

Made a GitHub project to track these issues:
https://github.com/OpenSCAP/scap-security-guide/projects/7

We'll want to get these resolved before uploading to NIST and before
this release makes it into downstream releases (e.g. RHEL 7.4 rebase).
What's the best way to start working these bugs? Is there a deadline for
when these bugs must be resolved for inclusion downstream?




On 3/30/17 9:07 AM, Shawn Wells wrote:
> Thank you! Looking forward to downloading the data stream and testing it. I 
> can start the process to get the new release posted to Nist .
>
> Shawn Wells
>
>> On Mar 30, 2017, at 8:22 AM, Watson Yuuma Sato <ws...@redhat.com> wrote:
>>
>> Hello folks,
>>
>> We have the pleasure to announce that SCAP Security Guide version 0.1.32 has
>> has been release.
>>
>> Highlights of this release:
>>
>> * New CMake build system
>> * Improved NIST 800-171 profile
>> * Initial RHVH profile
>> * New CPE to identify systems like machines (bare-metal and VM) and 
>> containers (image and container)
>> * Template clean up in lots of remediations
>>
>> For a more detailed overview of changes (bug fixes, enhancements) implemented
>> in this release please have a look at more detailed changelog:
>> * https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.32
>>
>> Full changelog at:
>> * https://github.com/OpenSCAP/scap-security-guide/issues?q=milestone%3A0.1.32
>>
>> Zip archives with pre-built benchmarks in DataStream form:
>> * 
>> https://github.com/OpenSCAP/scap-security-guide/releases/download/v0.1.32/scap-security-guide-0.1.32.zip
>>  
>> (Zip archive using OVAL-5.11.1 language version)
>> * 
>> https://github.com/OpenSCAP/scap-security-guide/releases/download/v0.1.32/scap-security-guide-0.1.32-oval-5.10.zip
>>  
>> (Zip archive using OVAL-5.10 language version only)
>>
>> Thank you to everyone who contributed with issues, patches and discussion.
>>
>> Happy hardening!
>>
>> With regards,
>> Watson Sato
>>
>>
>> -- 
>> Watson Sato
>> Security Technologies | Red Hat, Inc
>> ___
>> scap-security-guide mailing list -- 
>> scap-security-gu...@lists.fedorahosted.org
>> To unsubscribe send an email to 
>> scap-security-guide-le...@lists.fedorahosted.org

-- 
Shawn Wells
Chief Security Strategist
U.S. Public Sector
sh...@redhat.com | 443.534.0130 

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] SCAP Security Guide 0.1.32

2017-03-30 Thread Shawn Wells
Thank you! Looking forward to downloading the data stream and testing it. I can 
start the process to get the new release posted to Nist .

Shawn Wells

> On Mar 30, 2017, at 8:22 AM, Watson Yuuma Sato <ws...@redhat.com> wrote:
> 
> Hello folks,
> 
> We have the pleasure to announce that SCAP Security Guide version 0.1.32 has
> has been release.
> 
> Highlights of this release:
> 
> * New CMake build system
> * Improved NIST 800-171 profile
> * Initial RHVH profile
> * New CPE to identify systems like machines (bare-metal and VM) and 
> containers (image and container)
> * Template clean up in lots of remediations
> 
> For a more detailed overview of changes (bug fixes, enhancements) implemented
> in this release please have a look at more detailed changelog:
> * https://github.com/OpenSCAP/scap-security-guide/releases/tag/v0.1.32
> 
> Full changelog at:
> * https://github.com/OpenSCAP/scap-security-guide/issues?q=milestone%3A0.1.32
> 
> Zip archives with pre-built benchmarks in DataStream form:
> * 
> https://github.com/OpenSCAP/scap-security-guide/releases/download/v0.1.32/scap-security-guide-0.1.32.zip
>  
> (Zip archive using OVAL-5.11.1 language version)
> * 
> https://github.com/OpenSCAP/scap-security-guide/releases/download/v0.1.32/scap-security-guide-0.1.32-oval-5.10.zip
>  
> (Zip archive using OVAL-5.10 language version only)
> 
> Thank you to everyone who contributed with issues, patches and discussion.
> 
> Happy hardening!
> 
> With regards,
> Watson Sato
> 
> 
> -- 
> Watson Sato
> Security Technologies | Red Hat, Inc
> ___
> scap-security-guide mailing list -- scap-security-gu...@lists.fedorahosted.org
> To unsubscribe send an email to 
> scap-security-guide-le...@lists.fedorahosted.org

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list


Re: [Open-scap] tailoring file not working

2017-03-29 Thread Shawn Wells


On 3/29/17 11:52 AM, Mohanraj, Bharath wrote:
>
> Can you try replacing,
>
>  
>
> --profile xccdf_org.ssgproject.content_profile_pci-dss
>
>  
>
> With
>
>  
>
> --profile xccdf_org.ssgproject.content_profile_pci-dss_with_ot
>

+1

Remember to point OpenSCAP at the tailor file, not the original datastream.





>  
>
> *From:*open-scap-list-boun...@redhat.com
> [mailto:open-scap-list-boun...@redhat.com] *On Behalf Of *Josh Moore
> *Sent:* Wednesday, March 29, 2017 6:49 PM
> *To:* open-scap-list@redhat.com
> *Subject:* [Open-scap] tailoring file not working
>
>  
>
> I am working on creating a tailored PCI profile that accounts for
> items covered by our provider.  So I want to tailer the profile to
> remove what I consider to be false positives. I have created the
> tailoring file on my Mac desktop and copied it to my centos 7 test
> machine.  However, when I run the oscap command on the centOS server
> the tailoring file is ignored.  Any idea of what I am doing wrong?
>
>  
>
> oscap xccdf eval --tailoring-file tailoring.xml --report report.html
>  --profile xccdf_org.ssgproject.content_profile_pci-dss
> /usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml
>
>  
>
> Tailoring File content:
>
> 
>
> http://checklists.nist.gov/xccdf/1.2
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__checklists.nist.gov_xccdf_1.2=CwMFaQ=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E=ylluGgiy6YcBNWxAWKqJ9Q=VwBwnTVJ6mbd1LCcB1mmKlR4TDm7H5rmbFpbSTdl8o8=9rqddwDp15TZtPAQFqFc1Cfp3tmrR5nqYnTRme9xenk=>"
> id="xccdf_scap-workbench_tailoring_default">
>
>href="/usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml"/>
>
>   1
>
>id="xccdf_org.ssgproject.content_profile_pci-dss_with_ot"
> extends="xccdf_org.ssgproject.content_profile_pci-dss">
>
> http://www.w3.org/1999/xhtml
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.w3.org_1999_xhtml=CwMFaQ=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E=ylluGgiy6YcBNWxAWKqJ9Q=VwBwnTVJ6mbd1LCcB1mmKlR4TDm7H5rmbFpbSTdl8o8=DKeXAv2csKLxOp4wSQI6DAH1VtLlOc0plYIVpTPuVVs=>"
> xml:lang="en-US" override="true">PCI-DSS v3 Control Baseline for Red
> Hat Enterprise Linux 7 [CUSTOMIZED]
>
> http://www.w3.org/1999/xhtml
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.w3.org_1999_xhtml=CwMFaQ=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E=ylluGgiy6YcBNWxAWKqJ9Q=VwBwnTVJ6mbd1LCcB1mmKlR4TDm7H5rmbFpbSTdl8o8=DKeXAv2csKLxOp4wSQI6DAH1VtLlOc0plYIVpTPuVVs=>"
> xml:lang="en-US" override="true">This is a *draft* profile for PCI-DSS
> v3
>
>  selected="false"/>
>
>  idref="xccdf_org.ssgproject.content_group_smart_card_login"
> selected="false"/>
>
>   
>
> 
>
>
> Thanks,
>
>  
>
> Josh Moore
>
> Chief Architect
>
> TarokoSoftware
>
>
>
> ___
> Open-scap-list mailing list
> Open-scap-list@redhat.com
> https://www.redhat.com/mailman/listinfo/open-scap-list

-- 
Shawn Wells
Chief Security Strategist
U.S. Public Sector
sh...@redhat.com | 443.534.0130 

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] SCAP Workbench 1.1.4

2017-01-23 Thread Shawn Wells


On 1/23/17 11:29 AM, Shawn Wells wrote:
>
>
> On 1/17/17 11:54 AM, Watson Yuuma Sato wrote:
>>
>> I noticed your screenshot doesn't show the count of selected rules
>> for each profile.
>>
>> And the concatenated profile title is something that was fixed recently.
>> If you edited the customization file, at least once after creating
>> it, the wrong title is now in the customization file itself,
>> so you will need to edit the file with a text editor to fix it.
>>
>> Could you please confirm the version of the workbench used for this
>> screenshot?
>
> Used your latest OSX build. Versioning output:
>
> SCAP Workbench 1.1.0, compiled with Qt 4.8.6, using OpenSCAP 1.3.0
>

 which I just noticed is weird.

Went to the OpenSCAP website and downloaded the latest:
https://github.com/OpenSCAP/scap-workbench/releases/download/1.1.4/scap-workbench-1.1.4.dmg

Looks like last time I did "keep old version" or something =/
:: hangs head in shame ::
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] SCAP Workbench 1.1.4

2017-01-16 Thread Shawn Wells


On 1/13/17 12:00 PM, Watson Yuuma Sato wrote:
>
> Hi,
>
> A new release of SCAP Workbench is out!
>
> This release brings a lot of bug fixes and improvements, including
> a lot of UX improvements and fixes for inappropriate error messages
> (fetch remote resources and query capabilities).
>
> Keep in mind that Windows and MacOSX builds use unreleased OpenSCAP from 
> master branch (OpenSCAP/openscap 557e16a) and scap-security-guide 
> version 0.1.31 (OpenSCAP/scap-security-guide feb6160).
>
> Changelog:
> https://github.com/OpenSCAP/scap-workbench/issues?q=milestone%3A1.1.4
>
> Release page:
> https://github.com/OpenSCAP/scap-workbench/releases/tag/1.1.4
> 

Thanks for your work on this!

Couple immediate things:
- Noticed all the non-RHEL content disappeared
- Only the RHEL7 CCP, STIG, Common, and "test" profiles are included.
What happened to the others, e.g. FBI CJIS? RHEL6 seems to have all the
profiles.
- Rule titles no longer appear correctly in RHEL7 content (seems fine in
RHEL6)



___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] Really nice tool

2016-09-27 Thread Shawn Wells


On 9/27/16 4:07 AM, Jan Cerny wrote:
> Hello David,
>
> - Original Message -
>> From: "david oliva" 
>> To: Open-scap-list@redhat.com
>> Sent: Tuesday, September 27, 2016 3:09:35 AM
>> Subject: [Open-scap] Really nice tool
>>
>>
>>
>> Dear Red Hat /OpenSCAP team:
>>
>>
>>
>>
>> Today 26 Sep 2016 Ihad the opportunity to run OpenSCAP on RHEL 7 for the
>> first time, andI am very pleased.
> Nice to hear that!
>
>> Installing OpenSCAP,and the SCAP Workbench was very straight forward with the
>> yum installcommand.
>>
>>
>>
>> - The content thatcame with the package was easy to run. I used the Workbench
>> to run the XCCDF content, created an XML report and looked at the report in
>> another browser.
> You can also generate a nice HTML report using "Show report" button.
>
>>
>>
>>
>> - It was very niceto see a good use of the CCE specification. The first
>> questioncoming to mind is, do you maintain a CCE dictionary that you can
>> makeavailable? A second question is, if a user wants to identify
>> aconfigurable parameter and no CCE is available, can the user (verylikely a
>> developer) request a CCE number?
> We don't maintain a CCE dictionary, the CCE numbers have been requested from 
> NIST.

Tables which map CCEs to NIST 800-53 references exist. For example, the
following is generated via 'make tables':
http://people.redhat.com/swells/scap-security-guide/RHEL/7/output/table-rhel7-nistrefs-ospp.html

Right now the tables are generated on a per-profile basis. That was
largely driven by user request. There's no reason we couldn't generate a
"master mapping table" if that'd be useful.

As Jan mentioned, CCE numbers are given to technology vendors by NIST.
For Red Hat technologies, we drop the CCEs into the
shared/references/cce-rhel-avail.txt file. From there, community members
can take an available CCE and assign them to a RedHat configuration rule
(e.g. in RHEL6 or RHEL7) via a pull request. Alternatively, open a
ticket requesting a mapping. Note that tickets on GitHub reflect
community initiatives -- no SLAs, just community effort. Tickets
directly against Red Hat (via customer support) carry SLAs. Both methods
are valid, just depends on how you chose to engage with the OpenSCAP
community :)


>> - Analyzing theoutput XML reveals that the findings are mapped to the
>> securitycontrols of SP 800-53 Rev 4. What a nice feature!.
>>
>>
>> - One of the videoson your site (
>> https://www.open-scap.org/security-policies/scap-security-guide/#documentation
>> )indicates that you are engaging a remediation mechanism and not
>> justdiscovering vulnerabilities. Are you using a remediation protocolor
>> specification in particular?
> Remediation is done by remediation scripts. The scripts are written in Bash.
> Those scripts are included in the SCAP content.
> The remediation can be run directly while scanning from SCAP Workbench or 
> oscap command line tool.
>
> Currently we are working on adding remediation in a from of Ansible playbooks.
> See https://blog-zbynek.rhcloud.com/2016/09/12/ssg-openscap-and-ansible/
>
>
>> - The output XMLshows a very nice use of the CPE specification.
>>
>>
>> - The use of XCCDFis also very good. Can you please, point me to a Red Hat
>> XCCDFrepository? Are you planning your content in the
>> NationalVulnerabilities Database?
> I suppose you mean that XCCDF that SCAP Workbench used for scanning your RHEL 
> machine.
> That XCCDF comes from the SCAP Security Guide project. SCAP Security guide is 
> an open-source
> set of security policies written in SCAP format.
> The source code is available at Github:
> https://github.com/OpenSCAP/scap-security-guide
> Latest release is here:
> https://github.com/OpenSCAP/scap-security-guide/releases/download/v0.1.30/scap-security-guide-0.1.30.zip
> We plan to submit the USGCB profile of SCAP Security Guide to NVD.

In regards to a "red hat repository," upstream would be the
OpenSCAP/SCAP Security Guide. Downstream in RHEL, content ships via the
"scap-security-guide" package.

We've been trying to get RHEL6 and RHEL7 content into the NIST NVD for
_*years*_. Seems an impossible task.


>> - I am interested inrunning a vulnerability scan (I would like to see how
>> OpenSCAP usesCVEs and CVSS)
> Yes, it is possible, and it's one of the most common use-cases of OpenSCAP.
> Red Hat provides a CVE streams for all the CVEs discovered in RHEL as a part 
> of Red Hat Security Advisories.
> See 
> https://www.open-scap.org/resources/documentation/perform-vulnerability-scan-of-rhel-6-machine/
> (It's for RHEL6, but in RHEL7 it's very similar)
>
>> - I did not see anyindication of using the Asset Identification (AI)
>> specification.
> OpenSCAP doesn't support this.
>
>> - I did not see anyindication of using the Asset Reporting Format (ARF)
>> specification.
> We fully support the ARF format, both in SCAP Workbench and oscap tool.
> In SCAP Workbench, it's possible to save results as ARF using Save results 
> button.
> 

Re: [Open-scap] New COPR repository for OpenSCAP projects

2016-07-19 Thread Shawn Wells



On 7/19/16 11:31 AM, Martin Preisler wrote:

- Original Message -

>From: "Jan Cerny"
>To:open-scap-list@redhat.com
>Sent: Tuesday, July 19, 2016 9:19:04 AM
>Subject: [Open-scap] New COPR repository for OpenSCAP
>
>Hi all,
>
>We have created a new COPR repository that provides unofficial builds
>of latest versions of openscap, scap-security-guide, scap-workbench
>and openscap-daemon packages. The packages are suitable for use
>on Red Hat Enterprise Linux 5, 6 and 7 and CentOS 5, 6 and 7.
>The COPR repository is located on:
>https://copr.fedorainfracloud.org/coprs/openscapmaint/openscap-latest/
>
>The repo enables you to test the latest greatest OpenSCAP bits on RHEL and
>CentOS.
>
>The former repository isimluk/OpenSCAP will not be maintained anymore.
>Sorry for inconvenience.
>
>Best regards
>
>Jan Černý
>Security Technologies | Red Hat, Inc.

CC-ing scap-security-guide. The new COPR repo contains latest SSG packages
and might be useful to our community members.

The repo is:
https://copr.fedorainfracloud.org/coprs/openscapmaint/openscap-latest/

Instructions on how to enable the repo are on the page.


Thanks guys. Updated SSG's README.

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] SCAP editor

2016-05-23 Thread Shawn Wells



On 5/23/16 1:05 AM, Pravin Goyal wrote:


Hi All,

Drawing your attention towards http://www.g2-inc.com/escape.


Do we have a fair number of people who are using this (or wanted to 
use this but put it down since it is not kept up to date)?



I am trying to refresh the tool:

 1. Add support for OVAL 5.11.1 - for Windows, Linux, Unix and
Independent schemas only
 2. Add support for creating XCCDF 1.2 from OVAL 5.11.1 content (No
XCCDF development support as such. Just take OVAL as input and xsl
transform it into XCCDF 1.2)
 3. Strip down all other broken capabilities and schema versions (such
as OVAL 5.3 etc.)

To me, #1 is the most important thing and is most widely used. Is 
there anything else that I should look at?


Please let me know your comments.


- Adding a feature akin to the SSG testcheck.py scripts. If writing a 
singular OVAL check, it'd be great to compile that into proper SCAP 1.2 
compliant file and run it.

- Auto completion of OVAL definitions (ind:filepath, testcheck...)

--
Shawn Wells
Chief Security Strategist
U.S. Public Sector
sh...@redhat.com | 443.534.0130

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list