Skip to content

Release of 8.0.0

Compare
Choose a tag to compare
@lnemsick-simp lnemsick-simp released this 18 Jul 14:38
· 105 commits to master since this release
8.0.0
  • Thu Jun 21 2018 Liz Nemsick [email protected] - 8.0.0-0
    • Added ability to select one or more audit profiles. When multiple
      profiles are selected, their rules are effectively concatenated in
      the order in which the profiles are listed in
      auditd::default_audit_profiles.
    • The following API Changes were made in support of multiple audit
      profiles:
      • $::auditd::$default_audit_profile has been deprecated by
        $::auditd::$default_audit_profiles
      • auditd::config and auditd::config::audit_profiles::simp classes are
        now private. In the unlikely event that you included just these
        classes in your manifest, you must now include auditd instead.
      • The following auditctl global configuration options that were in
        auditd::config::audit_profiles::simp are now in the auditd class,
        instead: $ignore_errors, $ignore_anonymous, $ignore_system_services,
        and $ignore_crond. They were moved because they are now applied to
        the set of audit profiles selected, not just the 'simp' audit
        profile.
      • The following auditd::config::audit_profiles::simp class parameters
        have been deprecated for clarity:
        • $audit_sudoers has been deprecated by $audit_cfg_sudoers
        • $audit_sudoers_tag has been deprecated by $audit_cfg_sudoers
        • $audit_grub has been deprecated by $audit_cfg_grub
        • $audit_grub_tag has been deprecated by $audit_cfg_grub_tag
        • $audit_yum has been deprecated by $audit_cfg_yum
        • $audit_yum_tag has been deprecated by $audit_cfg_yum_tag
      • Some previously hard-coded, internal configuration is now exposed
        as data-in-modules.
    • Added 'stig' audit profile which manages rules that match DISA STIG
      checks, exactly.
      • For executables explicitly listed in the RHEL7 STIG, includes watchs
        for binaries in the real paths (/usr/bin, /usr/sbin) and linked paths
        (/bin, /sbin). This is to address inconsistencies among the STIG and
        the Inspec and OSCAP scans. (All should use the real paths, but don't.)
    • Fixed bugs in 'simp' audit profile
      • Fixed umask syscall rules. These rules require arch filters.
      • Fixed clock_settime syscall rules. Per the sample STIG audit rules
        packaged in the auditd RPM, these rules require an 'a0' filter.
      • Fixed bug in which /var/log/tallylog was grouped with session
        instead of logins.
      • Fixed bug in which the /etc/pam.d watch rule had the wrong tag
    • Updated 'simp' audit profile settings for DISA STIG.
      • Expanded the list of successful syscall operations audited.
      • Expanded the list of module syscall operations audited
      • Added an option to monitor selinux commands, (i.e., chcon,
        semanage, setfiles, setsebool)
      • Added an option to audit the execution of password commands
        ('passwd', 'unix_chkpwd', 'gpasswd', 'chage', 'userhelper')
      • Added an option to audit the execution of privilege-related
        commands ('su', 'sudo', 'newgrp', 'chsh', 'sudoedit')
      • Added an option to audit the execution of postfix-related commands
        ('postdrop', 'postqueue')
      • Added an option to audit the execution of the 'ssh-keysign' command
      • Added an option to audit the execution of the 'crontab' command
      • Added an option to audit the execution of the 'pam_timestamp_check'
        command
      • Added an option to audit the execution of rename/remove operations
        for non-service users (rename', 'renameat', rmdir', 'unlink', and
        'unlinkat')
      • Added watch rules for /etc/hostname and /etc/NetworkManager (for
        centos7) pulled from the sample STIG audit rules packaged in the
        auditd RPM.
      • For executables explicitly listed in the RHEL7 STIG, includes watchs
        for binaries in the real paths (/usr/bin, /usr/sbin) and linked paths
        (/bin, /sbin). This is to address inconsistencies among the STIG and
        the Inspec and OSCAP scans. (All should use the real paths, but don't.)