content icon indicating copy to clipboard operation
content copied to clipboard

harden_sshd_ciphers_opensshserver_conf_crypto_policy is misaligned with DISA

Open jan-cerny opened this issue 1 year ago • 2 comments

Description of problem:

harden_sshd_ciphers_opensshserver_conf_crypto_policy is misaligned with DISA

Details:

The SSG's rule checks for a specific list of ciphers. It fails because it finds this:

Ciphers [email protected],aes256-ctr,[email protected],aes128-ctr

The DISA's rule checks whether SSHD configuration includes crypto policies, it doesn't check a specific cipher.

Include /etc/crypto-policies/back-ends/opensshserver.config 

Related to: https://github.com/ComplianceAsCode/content/issues/11575

Outcome:

SSG result: fail DISA result: pass

The issue is present in these test variants:

  • oscap
  • ansible
  • anaconda

SCAP Security Guide Version:

Current upstream master as of 2024-03-12 as of HEAD cbbca44.

External Content's Version:

DISA STIG RHEL 9 V1R1

jan-cerny avatar Mar 13 '24 10:03 jan-cerny

So this is the relevant STIG: https://stigaview.com/products/rhel9/v1r2/RHEL-09-255065/ The description of this upstream issue is misleading because it talks about RHEL-09-255060. DISA needs to change the requirement so that it checks for the file /etc/crypto-policies/back-ends/opensshserver.config, currently in their content it checks for /etc/crypto-policies/back-ends/openssh.config. I believe our check is correct.

vojtapolasek avatar Apr 11 '24 11:04 vojtapolasek

STIG ID RHEL-09-255065 should be referencing opensshserver.config but is not. SSG checks the correct file but fails. Rule "harden_sshd_ciphers_opensshserver_conf_crypto_policy" is looking for "[email protected],[email protected],aes256-ctr,[email protected],aes128-ctr" but I believe it should be looking for "[email protected],[email protected],aes256-ctr,[email protected],aes128-ctr".

image

image

christopher-davidson avatar May 13 '24 15:05 christopher-davidson