17:01:48 #startmeeting Ansible Lockdown Working Group 17:01:48 Meeting started Wed Oct 9 17:01:48 2019 UTC. 17:01:48 This meeting is logged and archived in a public location. 17:01:48 The chair is cyberpear. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:01:48 Useful Commands: #action #agreed #halp #info #idea #link #topic. 17:01:48 The meeting name has been set to 'ansible_lockdown_working_group' 17:02:16 So I've recieved word that allowed to contribute is https://github.com/Michael-Angel-Sec/PostgreSQL-9_STIG 17:02:34 I have pushed them to PR to the PG9 stig in the Ansible Lockdown group 17:02:39 expect to see that soon 17:02:52 excellent 17:03:27 I am aslo working to determine how to move the lockdown repos out of mindpoint's group into the ansible lockdown one, as only pg9 is in there now 17:03:37 I should have news on that this week 17:03:42 sounds good 17:04:41 other than that I have not made much more progress on the push back up to upsteam for rhel 7, but will circle back to that this weekend 17:05:53 That's all I have at the moment, do you need to discuss anything? 17:06:04 seeking feedback on ... 17:06:45 https://github.com/MindPointGroup/RHEL7-STIG/pull/282 17:07:26 specifically, does it make sense to set a default acl on the homedir so all content created there adheres to 755 mode requirement 17:07:59 or should that part be optional 17:08:18 or just set umask system-wide (also optionally) 17:08:32 I will need to ping with Dan on that. I think we should probably make it optional, because I can see use cases where it would not be well to 17:08:51 at least, it'll skip container use cases since ACLs don't play well there 17:08:56 and in many cases the umask system wide will be set, so maybe that too 17:09:03 the STIG doesn't actually require setting the umask system wide; it only forbids users to set their own umask 17:09:06 right 17:09:30 true, but at least three shops I dealt with used the system wide for audit reasons 17:09:37 so it'll be a common use case. 17:10:11 did this come from the downstream btw? because I don't remember writing that LOL 17:10:22 I did go thru and update lots of the old tickets w/ references to prs and checking off done items 17:10:40 I saw yours and said "I can do it better" 17:10:41 oh awesome, thanks for that, I had that on my todo 17:10:57 I mean you sure can do better, LOL. I will never claim to be the end authority on tasks 17:11:01 (I'm swamped the next week or 2, so may be sparse) 17:11:11 fair 17:11:24 it should have been a single task, but then there were the issues: 17:11:31 I like how this is handled atm, but I think we should make some optionals for dir and system wide acls 17:11:33 1. don't want to create domedirs in this task 17:11:54 2. file doesn't handle check-mode; always reports changed w/ recursive 17:11:58 no that's another contorl, right? make sure interactives have a home dir 17:12:12 exactly; I didn't want to conflate them 17:12:12 true 17:12:20 these are good changes, I think. 17:12:29 then I added the ACL item to ensure future compliance 17:12:47 so it really should be just a single "file" task, but reasons^ made it 4 tasks 17:12:47 I can add a review in depth more on the PR later today or tomrorow 17:13:10 I mean....always the case. 17:13:11 I opened the smartcard PR based on downstream, and I had comments, but i'll add those to the draft PR 17:13:15 LOL 17:13:27 awesome, happy to take improvements to that one 17:13:28 (I'd typed them on my phone, then it navigated away from the page and dropped them) 17:13:32 I have little ability to test that 17:13:52 i'm implementing it for-real somewhere now, so I'll be able to test it 17:14:05 those controls specifically are tricky, I don't have a cac machine handy 17:14:19 nice 17:14:21 really all you need is a smart card; doesn't have to be a cac specifically 17:14:27 that's invaluable, looking forward to the changes there 17:14:34 * cyberpear wonders if these modern credit cards could be used for the purpose 17:14:48 I guess I could do it against a machine I added a yubikey to maybe. 17:15:07 yeah, if the yubikey is in CCID mode, it should work 17:15:21 noted, willl set up some stuff on that later 17:15:25 on the "implement cat2 patches", i added comments where DISA breaks things 17:15:45 oh cool 17:15:49 i.e., they tell you to use tls for communicating w/ ldap, but w/ active Directory, it encrypts w/ kerberos instead, and adding the starttls option breaks it 17:16:08 that's true, and I didn't know how to handle that specifically, btw. 17:16:22 I'd raise that one in particular w/ DISA. 17:16:36 I can add that to the other windows-specific ones we opened 17:16:53 it should be a SASL/GSSAPI OR TLS requirement 17:17:11 I think we can just do that, and use notes to explain for audits. 17:17:12 raised it sev2 w/ red hat, and that's what they said 17:17:16 yeah 17:18:15 for the smart card stuff, it'd be good if we can avoid the authconfig tool, as it has a tendency to break the system, sometimes in a fail-open manner 17:18:31 (I've seen it put an unconditional pam-permit.so at the top, e.g.) 17:18:33 did not know that specifically 17:18:35 wow LOL 17:18:56 but in "best case scenario" it can give a good starting point 17:19:20 w/ RHEL 8, they have authselect, which is a bunch of pre-tested pam configs and you choose one 17:19:42 yeah I'm starting to do rhel 8 stig now, I noticed a bunch of approaches like that 17:20:22 Seems like RHEL 8 should be just parametrizing some paths, and a few things where one tool has been swapped for another 17:20:39 (based on having read the release notes months ago) 17:21:00 yeah, how that vectors is what I'm looking at and I think you're right 17:21:16 don't know if pam_pkcs11 config can ben snippeted, but at least blockinfile seems better than placing the whole file, I think 17:21:42 but I hope to provide real-world feedback on that one when I get to it 17:21:47 agreed. 17:21:55 nice, I look forward to it 17:22:10 I don't think I have anything more for today. 17:22:36 awesome. Thanks for the meeting. I'll ping you as I get through my action items 17:22:53 sounds good. will close meeting in 5 in case anything comes up 17:22:58 we will likely need to talk about how the migration of repos goes 17:23:05 thanks! 17:23:29 #info a complete PGS9 STIG has been made open source by a third party 17:26:25 They also seem to have kept real close to our conventions 17:29:59 indeed. 17:30:38 #endmeeting