Blame SOURCES/scap-security-guide-0.1.55-update_RHEL_07_040710-PR_6537.patch

618a7c
From 35eb6ba272c4ca0b7bae1c10af182e59e3e52c6a Mon Sep 17 00:00:00 2001
618a7c
From: Gabriel Becker <ggasparb@redhat.com>
618a7c
Date: Fri, 15 Jan 2021 16:28:07 +0100
618a7c
Subject: [PATCH] RHEL-07-040710 now configures X11Forwarding to disable.
618a7c
618a7c
---
618a7c
 .../sshd_disable_x11_forwarding/rule.yml      | 19 ++++++++++---------
618a7c
 .../sshd_enable_x11_forwarding/rule.yml       |  1 -
618a7c
 rhel7/profiles/stig.profile                   |  2 +-
618a7c
 3 files changed, 11 insertions(+), 11 deletions(-)
618a7c
618a7c
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml
618a7c
index 1779129f87..7da2e067a6 100644
618a7c
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml
618a7c
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml
618a7c
@@ -19,22 +19,23 @@ rationale: |-
618a7c
     other users on the X11 server. Note that even if X11 forwarding is disabled,
618a7c
     users can always install their own forwarders.
618a7c
 
618a7c
-severity: low
618a7c
+severity: medium
618a7c
 
618a7c
-ocil_clause: "that the X11Forwarding option exists and is enabled"
618a7c
-
618a7c
-ocil: |-
618a7c
-    {{{ ocil_sshd_option(default="no", option="X11Forwarding", value="no") }}}
618a7c
+{{{ complete_ocil_entry_sshd_option(default="yes", option="X11Forwarding", value="no") }}}
618a7c
 
618a7c
 identifiers:
618a7c
     cce@rhel7: CCE-83359-0
618a7c
     cce@rhel8: CCE-83360-8
618a7c
 
618a7c
 references:
618a7c
-  cis@rhel7: 5.2.4
618a7c
-  cis@rhel8: 5.2.6
618a7c
-  cis@sle12: 5.2.4
618a7c
-  cis@sle15: 5.2.6
618a7c
+    cis@rhel7: 5.2.4
618a7c
+    cis@rhel8: 5.2.6
618a7c
+    cis@sle12: 5.2.4
618a7c
+    cis@sle15: 5.2.6
618a7c
+    stigid@rhel7: RHEL-07-040710
618a7c
+    srg: SRG-OS-000480-GPOS-00227
618a7c
+    disa: CCI-000366
618a7c
+    nist: CM-6(b)
618a7c
 
618a7c
 template:
618a7c
     name: sshd_lineinfile
618a7c
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_enable_x11_forwarding/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_enable_x11_forwarding/rule.yml
618a7c
index 803e581a0f..87c3cb7f5a 100644
618a7c
--- a/linux_os/guide/services/ssh/ssh_server/sshd_enable_x11_forwarding/rule.yml
618a7c
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_enable_x11_forwarding/rule.yml
618a7c
@@ -29,7 +29,6 @@ references:
618a7c
     nist: CM-6(a),AC-17(a),AC-17(2)
618a7c
     nist-csf: DE.AE-1,PR.DS-7,PR.IP-1
618a7c
     srg: SRG-OS-000480-GPOS-00227
618a7c
-    stigid@rhel7: RHEL-07-040710
618a7c
     stigid@sle12: SLES-12-030260
618a7c
     isa-62443-2013: 'SR 7.6'
618a7c
     isa-62443-2009: 4.3.4.3.2,4.3.4.3.3,4.4.3.3
618a7c
diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile
618a7c
index 817e0982e5..6c06a8ede6 100644
618a7c
--- a/rhel7/profiles/stig.profile
618a7c
+++ b/rhel7/profiles/stig.profile
618a7c
@@ -285,7 +285,7 @@ selections:
618a7c
     - postfix_prevent_unrestricted_relay
618a7c
     - package_vsftpd_removed
618a7c
     - package_tftp-server_removed
618a7c
-    - sshd_enable_x11_forwarding
618a7c
+    - sshd_disable_x11_forwarding
618a7c
     - sshd_x11_use_localhost
618a7c
     - tftpd_uses_secure_mode
618a7c
     - package_xorg-x11-server-common_removed