diff --git a/SOURCES/scap-security-guide-0.1.25-centos-menu-branding.patch b/SOURCES/scap-security-guide-0.1.25-centos-menu-branding.patch new file mode 100644 index 0000000..cda0a9d --- /dev/null +++ b/SOURCES/scap-security-guide-0.1.25-centos-menu-branding.patch @@ -0,0 +1,151 @@ +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/C2S.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/C2S.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/C2S.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/C2S.xml 2016-11-15 16:20:21.101599393 +0000 +@@ -1,10 +1,10 @@ + <Profile id="C2S"> +-<title>C2S for Red Hat Enterprise Linux 7</title> ++<title>C2S for CentOS Linux 7</title> + <description>This profile demonstrates compliance against the + U.S. Government Commercial Cloud Services (C2S) baseline. + + This baseline was inspired by the Center for Internet Security +-(CIS) Red Hat Enterprise Linux 7 Benchmark, v1.1.0 - 04-02-2015. ++(CIS) CentOS Linux 7 Benchmark, v1.1.0 - 04-02-2015. + For the SCAP Security Guide project to remain in compliance with + CIS' terms and conditions, specifically Restrictions(8), note + there is no representation or claim that the C2S profile will +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/nist-CL-IL-AL.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/nist-CL-IL-AL.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/nist-CL-IL-AL.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/nist-CL-IL-AL.xml 2016-11-15 18:30:22.535473255 +0000 +@@ -1,5 +1,5 @@ + <Profile id="nist-cl-il-al" extends="common"> +-<title override="true">CNSSI 1253 Low/Low/Low Control Baseline for Red Hat Enterprise Linux 7</title> ++<title override="true">CNSSI 1253 Low/Low/Low Control Baseline for CentOS Linux 7</title> + <description override="true">This profile follows the Committee on National Security Systems Instruction + (CNSSI) No. 1253, "Security Categorization and Control Selection for National Security + Systems" on security controls to meet low confidentiality, low integrity, and low +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/ospp-rhel7-server.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/ospp-rhel7-server.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/ospp-rhel7-server.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/ospp-rhel7-server.xml 2016-11-15 18:30:44.136480430 +0000 +@@ -1,6 +1,6 @@ + <Profile id="ospp-rhel7-server"> + <title>United States Government Configuration Baseline (USGCB / STIG)</title> +-<description override="true">This is a *draft* profile for NIAP OSPP v4.0. This profile is being developed under the National Information Assurance Partnership. The scope of this profile is to configure Red Hat Enteprise Linux 7 against the NIAP Protection Profile for General Purpose Operating Systems v4.0. The NIAP OSPP profile also serves as a working draft for USGCB submission against RHEL7 Server.</description> ++<description override="true">This is a *draft* profile for NIAP OSPP v4.0. This profile is being developed under the National Information Assurance Partnership. The scope of this profile is to configure CentOS Linux 7 against the NIAP Protection Profile for General Purpose Operating Systems v4.0. The NIAP OSPP profile also serves as a working draft for USGCB submission against CentOS7 Server.</description> + + <!-- OSPP v4.0 is available here: + https://www.niap-ccevs.org/pp/PP_OS_v4.0/ +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/pci-dss.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/pci-dss.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/pci-dss.xml 2016-11-15 18:35:12.316574543 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/pci-dss.xml 2016-11-15 18:31:03.287486842 +0000 +@@ -1,5 +1,5 @@ + <Profile id="pci-dss" xmlns="http://checklists.nist.gov/xccdf/1.1"> +-<title>PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7</title> ++<title>PCI-DSS v3 Control Baseline for CentOS Linux 7</title> + <description>This is a *draft* profile for PCI-DSS v3</description> + + <refine-value idref="var_password_pam_unix_remember" selector="4" /> +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule scap-security-guide-0.1.30.new/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule 2016-11-15 18:31:24.039493843 +0000 +@@ -1,5 +1,5 @@ + <Profile id="pci-dss" xmlns="http://checklists.nist.gov/xccdf/1.1"> +-<title>PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7</title> ++<title>PCI-DSS v3 Control Baseline for CentOS Linux 7</title> + <description>This is a *draft* profile for PCI-DSS v3</description> + + <refine-value idref="var_password_pam_unix_remember" selector="4" /> +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/rht-ccp.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/rht-ccp.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/rht-ccp.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/rht-ccp.xml 2016-11-15 18:32:04.251507569 +0000 +@@ -98,11 +98,11 @@ + <select idref="sysctl_kernel_ipv6_disable" selected="true"/> + <select idref="service_ip6tables_enabled" selected="true"/> + +-This requirement does not apply against Red Hat Enterprise Linux 7: ++This requirement does not apply against CentOS Linux 7: + see: https://github.com/OpenSCAP/scap-security-guide/issues/66 for details. + <select idref="kernel_module_rds_disabled" selected="true"/> + +-This requirement does not apply against Red Hat Enterprise Linux 7: ++This requirement does not apply against CentOS Linux 7: + see: https://github.com/OpenSCAP/scap-security-guide/issues/67 for details. + <select idref="kernel_module_tipc_disabled" selected="true"/> + +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/standard.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/standard.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/standard.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/standard.xml 2016-11-15 18:32:32.999517516 +0000 +@@ -1,6 +1,6 @@ + <Profile id="standard"> + <title>Standard System Security Profile</title> +-<description>This profile contains rules to ensure standard security baseline of Red Hat Enterprise Linux 7 system. ++<description>This profile contains rules to ensure standard security baseline of CentOS Linux 7 system. + Regardless of your system's workload all of these checks should pass.</description> + + <select idref="ensure_redhat_gpgkey_installed" selected="true" /> +@@ -14,7 +14,7 @@ Regardless of your system's workload all + <select idref="accounts_root_path_dirs_no_write" selected="true"/> + <select idref="dir_perms_world_writable_sticky_bits" selected="true" /> + +-<!-- The following rules currently returns 'notapplicable' on RHEL-7 container --> ++<!-- The following rules currently returns 'notapplicable' on CentOS-7 container --> + <!-- Investigate why, fix the issues, and re-enable back once fixed --> + <!-- <select idref="accounts_password_all_shadowed" selected="true"/> --> + <!-- <select idref="root_path_no_dot" selected="true"/> --> +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/stig-rhel7-server-gui-upstream.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/stig-rhel7-server-gui-upstream.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/stig-rhel7-server-gui-upstream.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/stig-rhel7-server-gui-upstream.xml 2016-11-15 18:32:48.434522900 +0000 +@@ -1,5 +1,5 @@ + <Profile id="stig-rhel7-server-gui-upstream" extends="stig-rhel7-server-upstream"> +-<title override="true">STIG for Red Hat Enterprise Linux 7 Server Running GUIs</title> ++<title override="true">STIG for CentOS Linux 7 Server Running GUIs</title> + <description override="true">This is a *draft* profile for STIG. This profile is being developed under the DoD consensus model to become a STIG in coordination with DISA FSO.</description> + + <!-- DISA FSO REFINEMENT VALUES +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml 2016-11-15 18:33:07.232529497 +0000 +@@ -1,5 +1,5 @@ + <Profile id="stig-rhel7-server-upstream" extends="ospp-rhel7-server"> +-<title override="true">STIG for Red Hat Enterprise Linux 7 Server</title> ++<title override="true">STIG for CentOS Linux 7 Server</title> + <description override="true">This is a *draft* profile for STIG. This profile is being developed under the DoD consensus model to become a STIG in coordination with DISA FSO.</description> + + <!-- DISA FSO REFINEMENT VALUES +diff -uNrp scap-security-guide-0.1.30/RHEL/7/input/profiles/stig-rhel7-workstation-upstream.xml scap-security-guide-0.1.30.new/RHEL/7/input/profiles/stig-rhel7-workstation-upstream.xml +--- scap-security-guide-0.1.30/RHEL/7/input/profiles/stig-rhel7-workstation-upstream.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30.new/RHEL/7/input/profiles/stig-rhel7-workstation-upstream.xml 2016-11-15 18:33:34.107539010 +0000 +@@ -1,5 +1,5 @@ + <Profile id="stig-rhel7-workstation-upstream" extends="stig-rhel7-server-gui-upstream"> +-<title override="true">STIG for Red Hat Enterprise Linux 7 Workstation</title> ++<title override="true">STIG for CentOS Linux 7 Workstation</title> + <description override="true">This is a *draft* profile for STIG. This profile is being developed under the DoD consensus model to become a STIG in coordination with DISA FSO.</description> + + <!-- DISA FSO REFINEMENT VALUES +diff -uNrp scap-security-guide-0.1.30.orig/RHEL/7/input/profiles/cjis-rhel7-server.xml scap-security-guide-0.1.30/RHEL/7/input/profiles/cjis-rhel7-server.xml +--- scap-security-guide-0.1.30.orig/RHEL/7/input/profiles/cjis-rhel7-server.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30/RHEL/7/input/profiles/cjis-rhel7-server.xml 2017-03-03 10:31:09.864377323 +0000 +@@ -1,6 +1,6 @@ + <Profile id="cjis-rhel7-server"> + <title>Criminal Justice Information Services (CJIS) Security Policy</title> +-<description override="true">This is a *draft* profile for CJIS v5.4. The scope of this profile is to configure Red Hat Enteprise Linux 7 against the U. S. Department of Justice, FBI CJIS Security Policy. ++<description override="true">This is a *draft* profile for CJIS v5.4. The scope of this profile is to configure CentOS Linux 7 against the U. S. Department of Justice, FBI CJIS Security Policy. + </description> + + <!-- CJIS v5.4 is available here: +@@ -118,7 +118,7 @@ + <select idref="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" /> + + <!-- 5.10.1.2 Encryption --> +-<!-- How can I make RHEL 6 or RHEL 7 FIPS 140-2 compliant? https://access.redhat.com/solutions/137833 --> ++<!-- How can I make CentOS 6 or CentOS 7 FIPS 140-2 compliant? https://access.redhat.com/solutions/137833 --> + <refine-value idref="var_password_pam_ocredit" selector="1" /> + <refine-value idref="var_password_pam_dcredit" selector="1" /> + <refine-value idref="var_password_pam_ucredit" selector="1" /> +@@ -141,4 +141,4 @@ + <!-- 5.13.1.3 Bluetooth --> + <select idref="kernel_module_bluetooth_disabled" selected="true"/> + +-</Profile> +\ No newline at end of file ++</Profile> diff --git a/SOURCES/scap-security-guide-0.1.30-centos-menu-branding-2.patch b/SOURCES/scap-security-guide-0.1.30-centos-menu-branding-2.patch new file mode 100644 index 0000000..53798c8 --- /dev/null +++ b/SOURCES/scap-security-guide-0.1.30-centos-menu-branding-2.patch @@ -0,0 +1,63 @@ +diff -uNrp scap-security-guide-0.1.30.orig/RHEL/7/input/guide.xml scap-security-guide-0.1.30/RHEL/7/input/guide.xml +--- scap-security-guide-0.1.30.orig/RHEL/7/input/guide.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30/RHEL/7/input/guide.xml 2016-12-04 12:58:05.537287951 +0000 +@@ -2,9 +2,9 @@ + <Benchmark xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:dc="http://purl.org/dc/elements/1.1/" id="RHEL-7" xsi:schemaLocation="http://checklists.nist.gov/xccdf/1.1 xccdf-1.1.4.xsd" style="SCAP_1.1" resolved="false" xml:lang="en-US" > + + <status date="2011-12-20">draft</status> +-<title>Guide to the Secure Configuration of Red Hat Enterprise Linux 7</title> ++<title>Guide to the Secure Configuration of CentOS Linux 7</title> + <description>This guide presents a catalog of security-relevant +-configuration settings for Red Hat Enterprise Linux 7 formatted in the ++configuration settings for CentOS Linux 7 formatted in the + eXtensible Configuration Checklist Description Format (XCCDF). + <br/> + <br/> +@@ -22,7 +22,7 @@ providing baselines that meet a diverse + XCCDF <i>Profiles</i>, which are selections of items that form checklists and + can be used as baselines, are available with this guide. They can be + processed, in an automated fashion, with tools that support the Security +-Content Automation Protocol (SCAP). The DISA STIG for Red Hat Enterprise Linux 7 is one example of ++Content Automation Protocol (SCAP). The DISA STIG for CentOS Linux 7 is one example of + a baseline created from this guidance. + </description> + <notice id="terms_of_use">Do not attempt to implement any of the settings in +@@ -32,7 +32,7 @@ other parties, and makes no guarantees, + quality, reliability, or any other characteristic.</notice> + + <front-matter>The SCAP Security Guide Project<br/>https://fedorahosted.org/scap-security-guide</front-matter> +-<rear-matter>Red Hat and Red Hat Enterprise Linux are either registered ++<rear-matter>Red Hat and Red Hat Enterprise Linux are either registered + trademarks or trademarks of Red Hat, Inc. in the United States and other + countries. All other names are registered trademarks or trademarks of their + respective companies.</rear-matter> +diff -uNrp scap-security-guide-0.1.30.orig/RHEL/7/input/intro/intro.xml scap-security-guide-0.1.30/RHEL/7/input/intro/intro.xml +--- scap-security-guide-0.1.30.orig/RHEL/7/input/intro/intro.xml 2016-06-22 12:56:46.000000000 +0000 ++++ scap-security-guide-0.1.30/RHEL/7/input/intro/intro.xml 2016-12-04 13:02:13.903282198 +0000 +@@ -3,7 +3,7 @@ + <description> + <!-- purpose and scope of guidance --> + The purpose of this guidance is to provide security configuration +-recommendations and baselines for the Red Hat Enterprise Linux (RHEL) 7 operating ++recommendations and baselines for the CentOS Linux 7 operating + system. The guidance provided here should be applicable to all variants + (Desktop, Server, Advanced Platform) of the product. Recommended + settings for the basic operating system are provided, as well as for many +@@ -33,7 +33,7 @@ to passive monitoring. Whenever practica + such data exist, they should be applied. Even if data is expected to + be transmitted only over a local network, it should still be encrypted. + Encrypting authentication data, such as passwords, is particularly +-important. Networks of Red Hat Enterprise Linux 7 machines can and should be configured ++important. Networks of CentOS Linux 7 machines can and should be configured + so that no unencrypted authentication data is ever transmitted between + machines. + </description> +@@ -44,7 +44,7 @@ machines. + <title>Minimize Software to Minimize Vulnerability</title> + <description> + The simplest way to avoid vulnerabilities in software is to avoid +-installing that software. On RHEL, the RPM Package Manager (originally ++installing that software. On CentOS, the RPM Package Manager (originally + Red Hat Package Manager, abbreviated RPM) allows for careful management of + the set of software packages installed on a system. Installed software + contributes to system vulnerability in several ways. Packages that diff --git a/SPECS/scap-security-guide.spec b/SPECS/scap-security-guide.spec index 1d9e0a9..a75ac4d 100644 --- a/SPECS/scap-security-guide.spec +++ b/SPECS/scap-security-guide.spec @@ -16,6 +16,8 @@ Patch4: scap-security-guide-0.1.30-rhbz#1344581.patch Patch5: scap-security-guide-0.1.30-rhbz#1351751.patch Patch6: scap-security-guide-0.1.30-downstream-rhbz#1357019.patch Patch7: scap-security-guide-0.1.30-zstream-rhbz#1415152.patch +Patch99: scap-security-guide-0.1.25-centos-menu-branding.patch +Patch100: scap-security-guide-0.1.30-centos-menu-branding-2.patch BuildArch: noarch BuildRequires: libxslt, expat, python, openscap-scanner >= 1.2.5, python-lxml @@ -69,6 +71,11 @@ been generated from XCCDF benchmarks present in %{name} package. # moved to different location. Also, changes in 'sshd_use_approved_macs.sh' are slightly # different due to commit c6730b867f6760b94ec193e95484a16054b27f48a). %patch7 -p1 -b .rhbz#1415152 +%patch99 -p1 +%patch100 -p1 + +# Remove the RHEL Certified Cloud Provider profile for debranding purposes +%{__rm} RHEL/7/input/profiles/rht-ccp.xml %build (cd RHEL/7 && make dist) @@ -84,12 +91,12 @@ mkdir -p %{buildroot}%{_mandir}/en/man8/ # Add in RHEL-7 core content (SCAP) cp -a RHEL/7/dist/content/ssg-rhel7-cpe-dictionary.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ cp -a RHEL/7/dist/content/ssg-rhel7-cpe-oval.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ -cp -a RHEL/7/dist/content/ssg-rhel7-ds.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ +cp -a RHEL/7/dist/content/ssg-centos7-ds.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ cp -a RHEL/7/dist/content/ssg-rhel7-oval.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ -cp -a RHEL/7/dist/content/ssg-rhel7-xccdf.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ +cp -a RHEL/7/dist/content/ssg-centos7-xccdf.xml %{buildroot}%{_datadir}/xml/scap/ssg/content/ # Add in RHEL-6 datastream (SCAP) -cp -a RHEL/6/dist/content/ssg-rhel6-ds.xml %{buildroot}%{_datadir}/xml/scap/ssg/content +cp -a RHEL/6/dist/content/ssg-centos6-ds.xml %{buildroot}%{_datadir}/xml/scap/ssg/content # Add in Firefox datastream (SCAP) cp -a Firefox/dist/content/ssg-firefox-ds.xml %{buildroot}%{_datadir}/xml/scap/ssg/content @@ -119,12 +126,15 @@ cp -a docs/scap-security-guide.8 %{buildroot}%{_mandir}/en/man8/scap-security-gu %files doc %defattr(-,root,root,-) -%doc RHEL/6/output/ssg-rhel6-guide-*.html -%doc RHEL/7/output/ssg-rhel7-guide-*.html +%doc RHEL/6/output/ssg-centos6-guide-*.html +%doc RHEL/7/output/ssg-centos7-guide-*.html %doc JRE/output/ssg-jre-guide-*.html %doc Firefox/output/ssg-firefox-guide-*.html %changelog +* Fri Mar 3 2017 Johnny Hughes <johnny@centos.org> 0.1.30-5 +- Manual CentOS Debranding + * Tue Feb 14 2017 Watson Sato <wsato@redhat.com> 0.1.30-5 - Fix template remediation function used by SSHD remediation - Reduce scope of patch that fixes SSHD remediation (RH BZ#1415152)