-
Notifications
You must be signed in to change notification settings - Fork 698
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
firewalld_sshd_port_enabled fails on aarch64 in ism_o profile #12233
Comments
The remediation might be suspect. |
@Mab879 are you sure
^ aarch64, RHEL 9.0.0 GA compose Edit: Same after ISM O profile remediation on latest nightly 9.0 compose. The rule passed |
I recently found a similar error on the STIG aarch64 test as well. |
But this time it's 9.2. ISM in 9.0 is fine. |
Reserved the problematic system and here's what I found:
The problem is that one of the connections is not
But OVAL expects that ALL connections have the zone set. As there's several connection types allowed (see https://docs.fedoraproject.org/en-US/quick-docs/configuring-ip-networking-with-nmcli/#_the_nmcli_options), my proposal is to change the remediation to not |
I think that makes sense to exclude loop back. |
yes it probably makes sense to apply it on all interface types except loopback |
Description of problem:
The rule mentioned in the title fails when ism_o profile is remediated and evaluated on AARCH64 system.
SCAP Security Guide Version:
master as of d9086f6
Operating System Version:
RHEL 9.0
Steps to Reproduce:
Actual Results:
The mentioned rule is reported as failing in the final report, although the remediation looks to be performed correctly.
Expected Results:
The rule is reported as passing.
Additional Information/Debugging Steps:
It seems that the OVAL check of the rule fails because of this particular test: test_firewalld_sshd_port_enabled_all_nics_in_zones
The text was updated successfully, but these errors were encountered: