22:13:10 #startmeeting Ansible Lockdown Working Group 22:13:10 Meeting started Wed May 27 22:13:10 2020 UTC. 22:13:10 This meeting is logged and archived in a public location. 22:13:10 The chair is cyberpear. Information about MeetBot at http://wiki.debian.org/MeetBot. 22:13:10 Useful Commands: #action #agreed #halp #info #idea #link #topic. 22:13:10 The meeting name has been set to 'ansible_lockdown_working_group' 22:13:18 #topic Draft RHEL 8 STIG Review 22:13:38 figured I'd live-tweet my initial review of the Draft STIG 22:14:20 #topic Draft RHEL 8 STIG Review (CAT 1) 22:14:23 "All RHEL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection." unless "documented and approved reason for not having data-at-rest encryption" 22:14:41 that's going to be an ouchie, but probably for all but laptops, folks will just write an exception 22:14:59 ^ 010030 22:16:19 010450 "RHEL 8 must enable the SELinux targeted policy." 22:16:50 010820 "Unattended or automatic logon via the RHEL 8 graphical user interface must not be allowed." 22:17:09 010830 "Unattended or automatic logon to RHEL 8 via ssh must not be allowed." 22:17:46 ^ implemented by "PermitUserEnvironment no" haven't checked how those 2 match 22:23:27 020330 "RHEL 8 must not have accounts configured with blank or null passwords." 22:23:44 ^ combines SSH config and pam config into a single rule 22:25:19 040060 "RHEL 8 must enforce SSHv2 for network access to all accounts." 22:25:35 ^ pretty sure "Protocol 2" is the only thing that works anymore 22:27:31 040340 "Remote X connections for interactive users must be encrypted in RHEL 8." 22:27:54 ^ but LOL, implemented via sshd_config "X11Forwarding yes" 22:28:12 that's all that's worth mentioning of the CAT 1 items 22:28:45 #info DISA should split 020330 into 2 rules 22:36:54 #info DISA should drop 040060, since "The OpenSSH SSH daemon supports SSH protocol 2 only." (man 8 sshd) 22:43:31 #topic Draft RHEL 8 STIG Review (CAT 2) 22:45:43 install updates, 3 rules for banner, rsyslog messages and secure, fips SSH (not using crypto policies) 22:46:15 #info DISA might consider crypto-policies for 010080 but only if Red Hat fixes them to actually work 22:49:25 010090 properly SSSD PKI /etc/sssd/pki/sssd_auth_ca_db.pem 22:49:46 010100 "RHEL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key." -- requires password-protecting SSH keys 23:01:06 shadow passwords 3 ways, minimum of 5000 rounds for shadow, world-write must be root-owned, sticky bit required, ssh timeout, file attributes for /var/log and /var/log/messages, audit log file attributes, crypto_policy=FIPS, file attributes for files in $PATH and $lib, auto periodic aide scans with personnel notifications 23:01:57 010380 '"NOPASSWD" or "!authenticate"' are a single rule 23:02:20 #info DISA should split 010380 '"NOPASSWD" or "!authenticate"' as with RHEL 7; NOPASSWD is required w/ MFA 23:03:19 010390 "If the "esc" and "openssl-pkcs11" packages are not installed, this is a finding." 23:03:52 #info DISA should fix 010390, esc is not required (as w/ latest RHEL 7 STIG changes) 23:05:01 010400 'certificate_verification line contains either "no_ocsp", "no_verification"' -- need to handle offline case RH and/or DISA 23:05:33 #info RH or DISA should handle offline PKI logins without no_ocsp option 23:06:20 install opensc, NX (no execute) must be enabled in the kernel 23:07:09 kaslr, lock down ssh host keys 23:08:32 #info DISA should allow 0640 mode on SSH host keys like RHEL 7 010490 23:14:40 ssh StrictModes, delayed Compression, no RHosts auth, no ssh root login, auditd running, nosuid nodev noexec for /home usb NFS, no world-write shell init files, kdump must be active 23:14:55 010670 "In the event of a system failure, RHEL 8 must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes." 23:15:03 ^ a reversal from previous requirements, IIRC 23:15:28 #info investigate reversal of kdump requirement 23:22:42 nsswitch hosts dns, users can't modify $PATH to point anywhere but their own homedir, world-write dirs group-owned by a system group, home dirs exist for users, homedir mode, homedir assigned, homedir attributes, CREATE_HOME login.defs, dotfile 0740 mode, all files owned by a user and group (watch out containers!), separate /home fs, UMASK in login.defs, 23:23:05 #info will pick up next time at 020000 23:23:07 #endmeeting