Hello Martin, sorry for the delay when processing this request (other issues prevented me from sooner reaction). Anyway, pls see below.
----- Original Message ----- > From: "Martin Preisler" <[email protected]> > To: "Jan Lieskovsky" <[email protected]> > Cc: "SCAP Security Guide" <[email protected]>, > "open-scap-list" <[email protected]> > Sent: Thursday, July 28, 2016 8:01:47 PM > Subject: Re: Latest OpenSCAP changes to speed up SSG builds > > ----- Original Message ----- > > From: "Jan Lieskovsky" <[email protected]> > > To: "Martin Preisler" <[email protected]> > > Cc: "SCAP Security Guide" <[email protected]>, > > "open-scap-list" <[email protected]> > > Sent: Thursday, July 28, 2016 5:05:26 AM > > Subject: Re: Latest OpenSCAP changes to speed up SSG builds > > > > [snip] > > > > That would be helpful, yes. Thanks, Martin. > > > > There will be some differences (for example timestamp) for sure. But > > the point is to ensure there won't be some other inevitable deviations > > (that could lead e.g. to the reduction of the file size at the end). > > IOW verification if those XSLT changes are that isolated enough, > > it won't hurt when they are used also together with old openscap > > code base (without other patches from upstream being applied). > > I wrote a blog post about the optimizations and about the test-case I > created to verify correctness. Check it out at > https://martin.preisler.me/2016/07/openscap-xslt-performance-improvements-for-faster-ssg-builds/ > and let me know if this addresses your concerns. > > Feel free to run the test-case on your machine as well so that we have > more data sources. I have compared the output on two RHEL-7 machines running openscap-1.2.10 vs openscap-1.2.11 (latest 1.2-main master) and diffed both *-xccdf-1.2.xml and selected guides manually, and the results are below: * for -xccdf-1.2 files, the output is identical: $ diff -s ssg-rhel7-xccdf-1.2.xml ssg-rhel7-xccdf-1.2.xml-latest Files ssg-rhel7-xccdf-1.2.xml and ssg-rhel7-xccdf-1.2.xml-latest are identical $ ls -l ssg-rhel7-xccdf-1.2.xml* -rw-r--r--. 1 iankko iankko 1839260 aug 1 18:16 ssg-rhel7-xccdf-1.2.xml -rw-rw-r--. 1 iankko iankko 1839260 aug 1 17:47 ssg-rhel7-xccdf-1.2.xml-latest * for the modified guides template, the output differs slightly. The 'guide-tree-leaf-id*' changes are irrelevant (looks like just different hash value) => safe. When unified all of them to same form in both files, there are some changes in xccdf:Values yet (looks some xccdf:Values got different default selector values, pls see the attached file below. But IMHO this is just demonstration of the bug you have mentioned before) => changes pending confirmation. The other change is just oscap version change in some element at the benchmark end => expected / safe change too. To summary, IMHO the changes are either safe, or are demonstration of that 'default selector' xccdf:Value bug, you mentioned earlier => I agree this change to be safe to be applied on Jenkins slaves (IOW it's functionally identical to version in previous oscap releases). Regards, Jan -- Jan iankko Lieskovsky / Red Hat Security Technologies Team > > -- > Martin Preisler > Identity Management and Platform Security | Red Hat, Inc. >
1719c1719 < var_password_pam_dcredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_dcredit">1</abbr>" --- > var_password_pam_dcredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_dcredit">-1</abbr>" 1867c1867 < var_password_pam_ucredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_ucredit">1</abbr>" --- > var_password_pam_ucredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_ucredit">-1</abbr>" 1929c1929 < <code>/etc/security/pwquality.conf</code> to equal <abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_ocredit">1</abbr> to require use of a special character in passwords. --- > <code>/etc/security/pwquality.conf</code> to equal <abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_ocredit">-1</abbr> to require use of a special character in passwords. 1944c1944 < var_password_pam_ocredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_ocredit">1</abbr>" --- > var_password_pam_ocredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_ocredit">-1</abbr>" 2021c2021 < var_password_pam_lcredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_lcredit">1</abbr>" --- > var_password_pam_lcredit="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_lcredit">-1</abbr>" 2083c2083 < to equal <abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_difok">8</abbr> to require differing characters --- > to equal <abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_difok">5</abbr> to require differing characters 2102c2102 < var_password_pam_difok="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_difok">8</abbr>" --- > var_password_pam_difok="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_var_password_pam_difok">5</abbr>" 3049c3049 < sysctl_net_ipv4_conf_all_accept_redirects_value="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value">disabled</abbr>" --- > sysctl_net_ipv4_conf_all_accept_redirects_value="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value">0</abbr>" 3083c3083 < sysctl_net_ipv4_conf_default_accept_source_route_value="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value">disabled</abbr>" --- > sysctl_net_ipv4_conf_default_accept_source_route_value="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value">0</abbr>" 3116c3116 < sysctl_net_ipv4_conf_default_accept_redirects_value="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value">disabled</abbr>" --- > sysctl_net_ipv4_conf_default_accept_redirects_value="<abbr title="from Profile/refine-value: xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value">0</abbr>" 13664c13664 < Generated using <a href="http://open-scap.org">OpenSCAP</a> 1.2.10</p></div></footer></body></html> --- > Generated using <a href="http://open-scap.org">OpenSCAP</a> 1.2.11</p></div></footer></body></html>
-- SCAP Security Guide mailing list [email protected] https://lists.fedorahosted.org/admin/lists/[email protected] https://github.com/OpenSCAP/scap-security-guide/
