Re: [Open-scap] OpenSCAP for embedded/network devices

2017-03-16 Thread Watson Yuuma Sato

On 15/03/17 17:24, Eric Holtzclaw wrote:


You do have support for Cisco 
http://www.cisco.com/c/en/us/about/security-center/oval-security-automation.html




I see that Cisco provides OVAL content to scan their devices, and even 
provides an example of how to do so, but using joval, which can perform 
remote scanning without installation of any agent.


I still don't see how to scan Cisco devices with OpenSCAP. Am I missing 
something?


--
Watson Sato
Security Technologies | Red Hat, Inc

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Re: [Open-scap] OpenSCAP for embedded/network devices

2017-03-15 Thread Watson Yuuma Sato

On 25/02/17 16:43, Lee Wilson wrote:


Hi Everyone,


Hi Lee, sorry for delayed response.



I've recently come across OpenSCAP after wasting my time with 
openVAS as a means of improving the way my company does vulnerability 
and configuration management of our network devices (e.g. Cisco, 
Juniper, Palo Alto, etc).



From an initial review though, it seems in it's current state to very 
server focused. Would that be a fair assessment?


I wouldn't say so but I guess you can, OpenSCAP was designed with 
machines in mind. And recent efforts have been directed to container and 
container image.



Back in January 2016 someone posted a similar query on this list where 
it was suggested to use jovalcm but that is a propriatary product and 
they have ceased all development on the open source variant.


https://www.redhat.com/archives/open-scap-list/2016-January/msg0.html


I'm think it is still true, we don't have support for Cisco.

As far as I can tell there is nothing in the underlying architecture 
that prevents this from working, the main issue being that it is 
required for the various scripts to be copied to the device being 
scanned. This is required even when using the remote SSH scanning 
option according to the documentation:


http://martin.preisler.me/2015/05/scanning-remote-machines-with-openscap/

I think that by script you mean the SCAP contents, or policies. Yes, 
even when using remote scanning the contents are copied into remote machine.

And the remote machine also needs to have oscap-scanner installed.

I came across a presentation which pretty much covers what I'm trying 
to do:


https://scap.nist.gov/events/2011/itsac/presentations/day3/Nunez%20-%20SCAP%20for%20Inter-networking%20Devices.pdf


The use of the Script Check Engine intriges me but I believe I'll 
still be restricted as those scripts still need to be copied to the 
server but it does mention that environment variables can be passed to 
the script so that remote checks can be run and then the output saved 
as check result files as documented:


https://www.open-scap.org/features/other-standards/sce/


I'm not much familiar with SCE, but I'll try to explain.
What happens is that oscap will copy the SCAP contents to remote 
machine, along with checking scripts.
And where defined in this content, that instead of an OVAL check, the 
checking script should be used,
oscap will pass the checking script and environment variables defined in 
the content to SCE (Script Check Engine).

Then SCE, with scripts and environment variables will perform the check.



In essence the steps would be:

1) Specify profile to run and the target(s) to run on

2) Pass target hostname/ip along with (perhaps) login credentials 
(e.g. username/password or SNMP community) to the script


3) Script runs on the same device as the SCAP workbench, logging into 
the device via the appropriate method (SSH or SNMP)


4) Results are saved as check-result files to be picked up by the 
oscap tool forprocessing


The checking script doesn't need to know any credentials. Oscap will 
receive the credentials, login to the target machine and copy content 
and scripts.
If performing remote scan with SCAP workbench no content or script scan 
is performed in local machine.




The only concern I have the moment with this approach is that it would 
require multiple SSH logins (one for each script run) but I'm sure 
improvements could be made in the future to batch them during a single 
login session.



AFAIK It requires one SSH login per device/machine scanned.



Alternatively would it be possible for all the above steps to be run 
in advance and then just have the oscap tool look as the resulting 
check-result files, in effect doing something similar to an offline 
config audit? This would be considered a local scan I guess, no 
different to a customer handing me a raw cisco cli output/config and 
saying here audit this.


Whether performing local or remote scan, OpenSCAP can generate XCCDF 
results and HTML reports for someone to audit.



I'd be interested in trying to get something like this working but if 
anyone has got any experience and can tell me if I'm wasting my time 
or not, it would be appreciated.


I think the major blocker here is that OpenSCAP needs an agent in the 
target machine being scanned, and we don't have such for Cisco.
I don't know what Cisco runs underneath nor the difficulty on making it 
run on it.



Thanks in advance


Hope to have clarified your vision on what OpenSCAP is capable.



Lee



___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list



--
Watson Sato
Security Technologies | Red Hat, Inc

___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

[Open-scap] OpenSCAP for embedded/network devices

2017-02-25 Thread Lee Wilson
Hi Everyone,


I've recently come across OpenSCAP after wasting my time with openVAS as a 
means of improving the way my company does vulnerability and configuration 
management of our network devices (e.g. Cisco, Juniper, Palo Alto, etc).


>From an initial review though, it seems in it's current state to very server 
>focused. Would that be a fair assessment?


Back in January 2016 someone posted a similar query on this list where it was 
suggested to use jovalcm but that is a propriatary product and they have ceased 
all development on the open source variant.

https://www.redhat.com/archives/open-scap-list/2016-January/msg0.html


As far as I can tell there is nothing in the underlying architecture that 
prevents this from working, the main issue being that it is required for the 
various scripts to be copied to the device being scanned. This is required even 
when using the remote SSH scanning option according to the documentation:

http://martin.preisler.me/2015/05/scanning-remote-machines-with-openscap/


I came across a presentation which pretty much covers what I'm trying to do:

https://scap.nist.gov/events/2011/itsac/presentations/day3/Nunez%20-%20SCAP%20for%20Inter-networking%20Devices.pdf


The use of the Script Check Engine intriges me but I believe I'll still be 
restricted as those scripts still need to be copied to the server but it does 
mention that environment variables can be passed to the script so that remote 
checks can be run and then the output saved as check result files as documented:

https://www.open-scap.org/features/other-standards/sce/


In essence the steps would be:

1) Specify profile to run and the target(s) to run on

2) Pass target hostname/ip along with (perhaps) login credentials (e.g. 
username/password or SNMP community) to the script

3) Script runs on the same device as the SCAP workbench, logging into the 
device via the appropriate method (SSH or SNMP)

4) Results are saved as check-result files to be picked up by the oscap tool 
forprocessing


The only concern I have the moment with this approach is that it would require 
multiple SSH logins (one for each script run) but I'm sure improvements could 
be made in the future to batch them during a single login session.


Alternatively would it be possible for all the above steps to be run in advance 
and then just have the oscap tool look as the resulting check-result files, in 
effect doing something similar to an offline config audit? This would be 
considered a local scan I guess, no different to a customer handing me a raw 
cisco cli output/config and saying here audit this.


I'd be interested in trying to get something like this working but if anyone 
has got any experience and can tell me if I'm wasting my time or not, it would 
be appreciated.


Thanks in advance


Lee
___
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list