Based on:
   
https://lists.fedorahosted.org/pipermail/scap-security-guide/2013-December/004616.html

update XCCDF rule names for Fedora (make the rules have desired target state in 
their names).


Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Technologies Team
From abc901fad9c3542e02adf18e276a022d3fa79e4e Mon Sep 17 00:00:00 2001
From: Jan Lieskovsky <[email protected]>
Date: Mon, 9 Dec 2013 15:10:02 +0100
Subject: [PATCH] [Fedora] Rename XCCDF rules

Signed-off-by: Jan Lieskovsky <[email protected]>
---
 Fedora/input/services/ntp.xml                                |  4 ++--
 Fedora/input/services/ssh.xml                                |  8 ++++----
 .../system/accounts/restrictions/password_expiration.xml     |  8 ++++----
 .../input/system/accounts/restrictions/password_storage.xml  | 11 +++++------
 Fedora/input/system/accounts/restrictions/root_logins.xml    | 12 ++++++------
 Fedora/input/system/permissions/files.xml                    | 10 +++++-----
 Fedora/input/system/settings/disable_prelink.xml             |  2 +-
 Fedora/input/system/software/updating.xml                    |  4 ++--
 Fedora/scap-security-guide.spec                              |  5 ++++-
 9 files changed, 33 insertions(+), 31 deletions(-)

diff --git a/Fedora/input/services/ntp.xml b/Fedora/input/services/ntp.xml
index cf5fe50..61fc8c8 100644
--- a/Fedora/input/services/ntp.xml
+++ b/Fedora/input/services/ntp.xml
@@ -29,7 +29,7 @@ http://www.ntp.org.
 </description>
 
 <Rule id="service_ntpd_enabled" severity="medium">
-<title>Enable the NTP Daemon</title>
+<title>NTP Daemon Enabled</title>
 <description> <service-enable-macro service="ntpd" /> </description>
 <rationale>Enabling the <tt>ntpd</tt> service ensures that the <tt>ntpd</tt>
 service will be running and that the system will synchronize its time to any
@@ -47,7 +47,7 @@ http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate</rationale>
 </Rule>
 
 <Rule id="ntpd_specify_remote_server" severity="medium">
-<title>Specify a Remote NTP Server</title>
+<title>Remote NTP Server Specified</title>
 <description>To specify a remote NTP server for time synchronization, edit
 the file <tt>/etc/ntp.conf</tt>. Add or correct the following lines,
 substituting the IP or hostname of a remote NTP server for <em>ntpserver</em>:
diff --git a/Fedora/input/services/ssh.xml b/Fedora/input/services/ssh.xml
index dee9899..d0ed58f 100644
--- a/Fedora/input/services/ssh.xml
+++ b/Fedora/input/services/ssh.xml
@@ -26,7 +26,7 @@ to this file. See the <tt>sshd_config(5)</tt> man page for more detailed
 information.</description>
 
 <Rule id="sshd_disable_root_login" severity="medium">
-<title>Disable SSH Root Login</title>
+<title>SSH Root Login Disabled</title>
 <description>The root user should never be allowed to login to a system
 directly over a network. To disable root login via SSH, add or correct the
 following line in <tt>/etc/ssh/sshd_config</tt>:
@@ -42,7 +42,7 @@ root's password.
 </Rule>
 
 <Rule id="sshd_disable_empty_passwords" severity="high">
-<title>Disable SSH Access via Empty Passwords</title>
+<title>SSH Access via Empty Passwords Disabled</title>
 <description>To explicitly disallow remote login from accounts with empty
 passwords, add or correct the following line in <tt>/etc/ssh/sshd_config</tt>:
 <pre>PermitEmptyPasswords no</pre>
@@ -60,7 +60,7 @@ misconfiguration elsewhere.
 </Rule>
 
 <Rule id="sshd_set_idle_timeout">
-<title>Set SSH Idle Timeout Interval</title>
+<title>SSH Idle Timeout Interval Used</title>
 <description>SSH allows administrators to set an idle timeout interval.
 After this interval has passed, the idle user will be automatically logged out.
 <br /><br />
@@ -83,7 +83,7 @@ one system leading trivially to compromises on another.
 </Rule>
 
 <Rule id="sshd_set_keepalive">
-<title>Set SSH Client Alive Count</title>
+<title>SSH Client Alive Count Used</title>
 <description>To ensure the SSH idle timeout occurs precisely when the
 <tt>ClientAliveCountMax</tt> is set, edit <tt>/etc/ssh/sshd_config</tt> as
 follows:
diff --git a/Fedora/input/system/accounts/restrictions/password_expiration.xml b/Fedora/input/system/accounts/restrictions/password_expiration.xml
index 2abd5ab..fd4646e 100644
--- a/Fedora/input/system/accounts/restrictions/password_expiration.xml
+++ b/Fedora/input/system/accounts/restrictions/password_expiration.xml
@@ -75,7 +75,7 @@ age, and 7 day warning period with the following command:
 </Value>
 
 <Rule id="accounts_password_minlen_login_defs" severity="medium">
-<title>Set Password Minimum Length in login.defs</title>
+<title>Password Minimum Length</title>
 <description>To specify password length requirements for new accounts,
 edit the file <tt>/etc/login.defs</tt> and add or correct the following
 lines:
@@ -107,7 +107,7 @@ counterproductive behavior that may result.
 </Rule>
 
 <Rule id="accounts_minimum_age_login_defs" severity="medium">
-<title>Set Password Minimum Age</title>
+<title>Password Minimum Age</title>
 <description>To specify password minimum age for new accounts,
 edit the file <tt>/etc/login.defs</tt> and add or correct the
 following line, replacing the <i>DAYS</i> item as appropriate:
@@ -129,7 +129,7 @@ requirement.
 </Rule>
 
 <Rule id="accounts_maximum_age_login_defs" severity="medium">
-<title>Set Password Maximum Age</title>
+<title>Password Maximum Age</title>
 <description>To specify password maximum age for new accounts,
 edit the file <tt>/etc/login.defs</tt> and add or correct the
 following line, replacing the <i>DAYS</i> item appropriately:
@@ -152,7 +152,7 @@ location subject to physical compromise.</rationale>
 </Rule>
 
 <Rule id="accounts_password_warn_age_login_defs">
-<title>Set Password Warning Age</title>
+<title>Password Warning Age</title>
 <description>To specify how many days prior to password
 expiration that a warning will be issued to users,
 edit the file <tt>/etc/login.defs</tt> and add or correct
diff --git a/Fedora/input/system/accounts/restrictions/password_storage.xml b/Fedora/input/system/accounts/restrictions/password_storage.xml
index d2337a9..2c7c957 100644
--- a/Fedora/input/system/accounts/restrictions/password_storage.xml
+++ b/Fedora/input/system/accounts/restrictions/password_storage.xml
@@ -1,6 +1,5 @@
 <Group id="password_storage">
-<title>Verify Proper Storage and Existence of Password
-Hashes</title>
+<title>Proper Storage and Existence of Password Hashes</title>
 <description>
 By default, password hashes for local accounts are stored
 in the second field (colon-separated) in
@@ -17,7 +16,7 @@ should allow administrators to avoid such misconfiguration.
 </description>
 
 <Rule id="no_empty_passwords" severity="high">
-<title>Prevent Log In to Accounts With Empty Password</title>
+<title>Log In to Accounts With Empty Password Impossible</title>
 <description>If an account is configured for password authentication
 but does not have an assigned password, it may be possible to log
 into the account without authentication. Remove any instances of the <tt>nullok</tt>
@@ -41,7 +40,7 @@ environments.
 </Rule>
 
 <Rule id="no_hashes_outside_shadow" severity="medium">
-<title>Verify All Account Password Hashes are Shadowed</title>
+<title>Password Hashes For Each Account Shadowed</title>
 <description>
 If any password hashes are stored in <tt>/etc/passwd</tt> (in the second field,
 instead of an <tt>x</tt>), the cause of this misconfiguration should be
@@ -65,7 +64,7 @@ which is readable by all users.
 </Rule>
 
 <Rule id="gid_passwd_group_same">
-<title>All GIDs referenced in /etc/passwd must be defined in /etc/group</title>
+<title>All GIDs referenced in /etc/passwd Defined in /etc/group</title>
 <description>
 Add a group to the system for each GID referenced without a corresponding group.
 </description>
@@ -82,7 +81,7 @@ Inconsistency in GIDs between <tt>/etc/passwd</tt> and <tt>/etc/group</tt> could
 </Rule>
 
 <Rule id="no_netrc_files" severity="medium">
-<title>Verify No netrc Files Exist</title>
+<title>netrc Files Do Not Exist</title>
 <description>The <tt>.netrc</tt> files contain login information
 used to auto-login into FTP servers and reside in the user's home
 directory. These files may contain unencrypted passwords to
diff --git a/Fedora/input/system/accounts/restrictions/root_logins.xml b/Fedora/input/system/accounts/restrictions/root_logins.xml
index 2cbacd9..c04dc22 100644
--- a/Fedora/input/system/accounts/restrictions/root_logins.xml
+++ b/Fedora/input/system/accounts/restrictions/root_logins.xml
@@ -57,7 +57,7 @@ by security standards.
 </Rule>
 
 <Rule id="securetty_root_login_console_only" severity="medium">
-<title>Restrict Virtual Console Root Logins</title>
+<title>Virtual Console Root Logins Restricted</title>
 <description>
 To restrict root logins through the (deprecated) virtual console devices,
 ensure lines of this form do not appear in <tt>/etc/securetty</tt>:
@@ -82,7 +82,7 @@ using the root account.
 </Rule>
 
 <Rule id="restrict_serial_port_logins">
-<title>Restrict Serial Port Root Logins</title>
+<title>Serial Port Root Logins Restricted</title>
 <description>To restrict root logins on serial ports,
 ensure lines of this form do not appear in <tt>/etc/securetty</tt>:
 <pre>ttyS0
@@ -105,7 +105,7 @@ using the root account.
 </Rule>
 
 <Rule id="no_root_webbrowsing">
-<title>Restrict Web Browser Use for Administrative Accounts</title>
+<title>Web Browser Use for Administrative Accounts Restricted</title>
 <description>
 Enforce policy requiring administrative accounts use web browsers only for
 local service administration.
@@ -122,7 +122,7 @@ administration should be documented in site-defined policy.
 </Rule>
 
 <Rule id="no_shelllogin_for_systemaccounts" severity="medium">
-<title>Ensure that System Accounts Do Not Run a Shell Upon Login</title>
+<title>System Accounts Do Not Run a Shell Upon Login</title>
 <description>
 Some accounts are not associated with a human
 user of the system, and exist to perform some administrative
@@ -159,7 +159,7 @@ become inaccessible.
 </Rule>
 
 <Rule id="no_uidzero_except_root" severity="medium">
-<title>Verify Only Root Has UID 0</title>
+<title>Only Root Has UID 0</title>
 <description>
 If any account other than root has a UID of 0,
 this misconfiguration should be investigated and the
@@ -182,7 +182,7 @@ access to root privileges in an accountable manner.
 </Rule>
 
 <Rule id="root_path_default">
-<title>Root Path Must Be Vendor Default</title>
+<title>Root Path Is Vendor Default</title>
 <description>
 Assuming root shell is bash, edit the following files:
 <pre>~/.profile</pre>
diff --git a/Fedora/input/system/permissions/files.xml b/Fedora/input/system/permissions/files.xml
index 5d0e507..b365f1c 100644
--- a/Fedora/input/system/permissions/files.xml
+++ b/Fedora/input/system/permissions/files.xml
@@ -4,11 +4,11 @@
 is notably important and may also be susceptible to misconfiguration over time,
 particularly if unpackaged software is installed. As such, an argument exists
 to verify that files' permissions within these directories remain configured
-correctly and restrictively.   
+correctly and restrictively.
 </description>
 
 <Rule id="file_permissions_library_dirs" severity="medium">
-<title>Verify that Shared Library Files Have Restrictive Permissions</title>
+<title>Shared Library Files Have Restrictive Permissions</title>
 <description>System-wide shared library files, which are linked to executables
 during process load time or run time, are stored in the following directories
 by default:
@@ -34,7 +34,7 @@ system.
 </Rule>
 
 <Rule id="file_ownership_library_dirs" severity="medium">
-<title>Verify that Shared Library Files Have Root Ownership</title>
+<title>Shared Library Files Have Root Ownership</title>
 <description>System-wide shared library files, which are linked to executables
 during process load time or run time, are stored in the following directories
 by default:
@@ -59,7 +59,7 @@ runtime. Proper ownership is necessary to protect the integrity of the system.
 </Rule>
 
 <Rule id="file_permissions_binary_dirs" severity="medium">
-<title>Verify that System Executables Have Restrictive Permissions</title>
+<title>System Executables Have Restrictive Permissions</title>
 <description>
 System executables are stored in the following directories by default:
 <pre>/bin
@@ -82,7 +82,7 @@ these programs cannot be co-opted.
 </Rule>
 
 <Rule id="file_ownership_binary_dirs" severity="medium">
-<title>Verify that System Executables Have Root Ownership</title>
+<title>System Executables Have Root Ownership</title>
 <description>
 System executables are stored in the following directories by default:
 <pre>/bin
diff --git a/Fedora/input/system/settings/disable_prelink.xml b/Fedora/input/system/settings/disable_prelink.xml
index ed9b492..a5871a6 100644
--- a/Fedora/input/system/settings/disable_prelink.xml
+++ b/Fedora/input/system/settings/disable_prelink.xml
@@ -1,5 +1,5 @@
 <Rule id="disable_prelink">
-<title>Disable Prelinking</title>
+<title>Prelinking Disabled</title>
 <description>
 The prelinking feature changes binaries in an attempt to decrease their startup
 time. In order to disable it, change or add the following line inside the file
diff --git a/Fedora/input/system/software/updating.xml b/Fedora/input/system/software/updating.xml
index 248c0d5..84de806 100644
--- a/Fedora/input/system/software/updating.xml
+++ b/Fedora/input/system/software/updating.xml
@@ -16,7 +16,7 @@ inventory of installed software on the system, and is highly recommended.
      via the security_patches_up_to_date rule, we must
      ensure they have configured an update source! -->
 <Rule id="ensure_gpgcheck_globally_activated" severity="high">
-<title>Ensure gpgcheck Enabled In Main Yum Configuration</title>
+<title>gpgcheck Enabled In Main Yum Configuration</title>
 <description>The <tt>gpgcheck</tt> option should be used to ensure
 checking of an RPM package's signature always occurs prior to its
 installation. To configure yum to check package signatures before installing
@@ -43,7 +43,7 @@ protects against malicious tampering.
 </Rule>
 
 <Rule id="ensure_gpgcheck_never_disabled" severity="high">
-<title>Ensure gpgcheck Enabled For All Yum Package Repositories</title>
+<title>gpgcheck Enabled For All Yum Package Repositories</title>
 <description>To ensure signature checking is not disabled for
 any repos, remove any lines from files in <tt>/etc/yum.repos.d</tt> of the form:
 <pre>gpgcheck=0</pre>
diff --git a/Fedora/scap-security-guide.spec b/Fedora/scap-security-guide.spec
index fc5cac3..c252535 100644
--- a/Fedora/scap-security-guide.spec
+++ b/Fedora/scap-security-guide.spec
@@ -5,7 +5,7 @@
 # file one level up - in the main scap-security-guide directory (instead of
 # this one).
 
-%global	fedorassgversion	4.rc11
+%global	fedorassgversion	4.rc12
 
 Name:		scap-security-guide
 Version:	0.1.%{fedorassgversion}
@@ -54,6 +54,9 @@ cp -a Fedora/input/auxiliary/scap-security-guide.8 %{buildroot}%{_mandir}/en/man
 %doc Fedora/LICENSE Fedora/output/ssg-fedora-guide.html
 
 %changelog
+* Mon Dec 09 2013 Jan iankko Lieskovsky <[email protected]> 0.1.4.rc12-1
+- Rename XCCDF rules
+
 * Fri Dec 06 2013 Jan iankko Lieskovsky <[email protected]> 0.1.4.rc11-1
 - Shared OVAL check for Verify that Shared Library Files Have Root Ownership
 - Shared OVAL check for Verify that System Executables Have Restrictive Permissions
-- 
1.8.3.1

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to