Replies: 1 comment
-
The reason I bring this up is because the FIPS-certified rule can be deselected on a non-FIPS-certified distro (i.e. Stream), but the rules that extend |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi,
With the addition of the
![Screenshot 2023-10-03 at 23 39 24](https://private-user-images.githubusercontent.com/8332322/272472436-c10fc69f-92a2-4410-94fe-964f4c2b1bf0.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.Qr0aL_uM4F_bML30M7Ffs7UOfAFGXf7meiVBpTTRu1o)
sshd_use_approved_kex_ordered_stig
rule in #10103 (and my subsequent failure to comply on my machines), I decided to start looking at the differences between the crypto policy rules (harden_sshd_ciphers_opensshserver_conf_crypto_policy
,harden_sshd_macs_opensshserver_conf_crypto_policy
, etc.) and the other sshd hardening rules (sshd_use_approved_ciphers
,sshd_use_approved_macs
, etc.). This was mostly due to the visual difference between the two types:Now, from what I can glean from the OVAL files, some differences are:
installed_OS_is_FIPS_certified
Firstly, are there differences I'm missing here? There doesn't seem to be an obvious technical reason why there is a divide between the RHEL 7 and RHEL 8 rules. Second, is there a reason there is no new RHEL 8 crypto policy equivalent of
sshd_use_approved_kex_ordered_stig
and insteadsshd_use_approved_kex_ordered_stig
is applied to both RHEL 7 and RHEL 8+ systems, unlike the other adjacent rules (sshd_use_approved_ciphers
andsshd_use_approved_macs
)? Thanks!Beta Was this translation helpful? Give feedback.
All reactions