Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

V1R24 #164

Open
2 of 6 tasks
jamescassell opened this issue Jan 21, 2020 · 1 comment
Open
2 of 6 tasks

V1R24 #164

jamescassell opened this issue Jan 21, 2020 · 1 comment

Comments

@jamescassell
Copy link
Collaborator

jamescassell commented Jan 21, 2020

NEW

  • RHEL-06-000534 V-97229 fips=1 in the kernel cmdline
  • RHEL-06-000244 V-97231 FIPS compliant MACs in sshd_config

UPDATED

  • RHEL-06-000078 thru RHEL-06-000099 sysctl --system to enforce sysctl params, sysctl.d files are fine, too (I didn't verify our fixes for these, but this change is just a clarification)
  • RHEL-06-000067 V-38583 Removes check for UEFI grub.conf permissions (I didn't verify our fix, but this change is a relaxing of the previous rule, so any deficiency should be in an already-open ticket.)
  • RHEL-06-000223 V-38609 tftp okay if documented and approved by ISSO
  • RHEL-06-000243 V-38617 sshd_config: removes cbc-mode ciphers from the example list in favor of ctr ciphers, but check does not meaningfully change "fips approved" is the requirement:
-Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc
+Ciphers aes128-ctr,aes192-ctr,aes256-ctr

https://vaulted.io/library/disa-stigs-srgs/red_hat_enterprise_linux_6_security_technical_implementation_guide?version=V1R23&compareto=V1R24

@jamescassell jamescassell changed the title V1R25 V1R24 Jan 21, 2020
@jamescassell
Copy link
Collaborator Author

(There was no RHEL 6 STIG update today, but there was an updated benchmark.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant