Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate ansible fails, enable host-os ansible test #25

Open
comps opened this issue Jun 21, 2023 · 0 comments
Open

Investigate ansible fails, enable host-os ansible test #25

comps opened this issue Jun 21, 2023 · 0 comments

Comments

@comps
Copy link
Contributor

comps commented Jun 21, 2023

We seem to have a lot of Ansible test fails, largely uninvestigated / undocumented:

contest/conf/waivers

Lines 122 to 185 in 11f7a3a

# TODO: completely unknown, investigate and sort
#
# all RHELs
/hardening/ansible/.+/aide_verify_acls
/hardening/ansible/.+/aide_verify_ext_attributes
/hardening/ansible/.+/mount_option_boot_noexec
/hardening/ansible/.+/mount_option_boot_nosuid
/hardening/ansible/.+/mount_option_home_noexec
/hardening/ansible/.+/accounts_password_set_min_life_existing
/hardening/ansible/.+/audit_rules_usergroup_modification
True
# RHEL-9 only
/hardening/ansible/.+/aide_scan_notification
/hardening/ansible/.+/dnf-automatic_apply_updates
/hardening/ansible/.+/dnf-automatic_security_updates_only
/hardening/ansible/.+/accounts_polyinstantiated_tmp
/hardening/ansible/.+/accounts_polyinstantiated_var_tmp
/hardening/ansible/.+/disable_ctrlaltdel_(burstaction|reboot)
/hardening/ansible/.+/configure_opensc_card_drivers
/hardening/ansible/.+/force_opensc_card_drivers
/hardening/ansible/with-gui/.+/network_nmcli_permissions
rhel == 9
# RHEL-8 or 9
/hardening/ansible/.+/no_tmux_in_shells
/hardening/ansible/.+/configure_usbguard_auditbackend
/hardening/ansible/.+/audit_rules_unsuccessful_file_modification
rhel == 8 or rhel == 9
# RHEL-7
/hardening/ansible/.+/sshd_use_strong_ciphers
/hardening/ansible/.+/sshd_use_strong_macs
/hardening/ansible/.+/audit_rules_for_ospp
/hardening/ansible/.+/aide_use_fips_hashes
/hardening/ansible/.+/smartcard_auth
rhel == 7
# it's weird how specific home_nosuid is - seems to pass for many other
# profiles, or even for the same profile on different RHELs
/hardening/ansible(/with-gui)?/anssi_bp28_high/mount_option_home_nosuid
/hardening/ansible/stig/mount_option_home_nosuid
rhel == 9 or rhel == 8
/hardening/ansible/with-gui/stig_gui/mount_option_home_nosuid
rhel == 9
/hardening/ansible/cui/mount_option_home_nosuid
/hardening/ansible/ospp/mount_option_home_nosuid
rhel == 8
/hardening/ansible/with-gui/anssi_nt28_high/mount_option_home_nosuid
rhel == 7
# only on ism_o, seems to pass everywhere else
/hardening/ansible(/with-gui)?/ism_o/enable_fips_mode
rhel == 9
# only pci-dss, passes everywhere else
/hardening/ansible(/with-gui)?/pci-dss/audit_rules_login_events
rhel == 8 or rhel == 9
# WARNING: UNPROTECTED PRIVATE KEY FILE!
/hardening/ansible/with-gui/cis_workstation_l[12]
status == 'error'
# ansible-playbook completed, but returned non-0, TODO: investigate
/hardening/ansible/stig
/hardening/ansible/with-gui/stig_gui
status == 'error' and rhel == 8

Look into each of them, why it fails, and split these waivers further by topic (like the ones in the lower part of the highlighted area on the link above).

Additionally, enable the (now disabled) /hardening/host-os/ansible test and make the proper waivers applicable to it as well (if relevant). The test is disabled now just to reduce the amount of unknown failures, which seem like duplicates to the existing ansible waivers.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant